G06F2201/86

Measuring mobile application program reliability caused by runtime errors

A quality score for a computer application release is determined using a first number of unique users who have launched the computer application release on user devices and a second number of unique users who have encountered at least once an abnormal termination with the computer application release on user devices. Additionally or optionally, an application quality score can be computed for a computer application based on quality scores of computer application releases that represent different versions of the computer application. Additionally or optionally, a weighted application quality score can be computed for a computer application by further taking into consideration the average application quality score and popularity of a plurality of computer applications.

MONITORING USER EXPERIENCE USING DATA BLOCKS FOR SECURE DATA ACCESS

Techniques for enabling secure access to data using data blocks is described. Computing device(s) can provide instruction(s) to a component associated with an entity, wherein the instruction(s) are associated with an identifier corresponding to a data block of a plurality of data blocks. The computing device(s) can receive, from the component, data associated with the component, wherein the data is associated with the identifier and is indicative of a state of the component. The computing device(s) can store the data in the data block and monitor, using rule(s), changes to the state of the component based at least partly on the data in the data block. As a result, techniques described herein enable near real-time—and in some examples, automatic—reporting and/or remediation for correcting changes to the state of the component using data that is securely accessed by use of data blocks.

Method And System For Event Based, Privacy Aware Capturing Of Partial Screen Changes For Devices With restricted Resources
20230214240 · 2023-07-06 · ·

A technology is disclosed for the efficient capturing of monitoring data capable to reconstruct the experience of a user during the interaction with an application on a mobile device. The proposed approach uses instrumentation to detect the occurrence of events that change the user interface of the monitored application and that, in response to such an event, identifies the fraction of the user interface that was altered by the event and then captures only the changed portion of the user interface display. Additionally, privacy configuration data is evaluated during the capturing process to identify portions of the user interface that contain data that is protected due to privacy policy settings. In case an event changes such a privacy protected user interface portion, only the occurrence of the event and the affected screen area are captured, but no actual display data.

Early boot event logging system
11550664 · 2023-01-10 · ·

An early boot debug system includes a first memory subsystem that includes boot instructions and a processing system that is coupled to the first memory subsystem. The processing system includes a primary processing subsystem, and a secondary processing subsystem that is coupled to the primary processing subsystem and a second memory subsystem. The secondary processing subsystem copies the boot instructions from the first memory subsystem to the second memory subsystem and executes the boot instructions from the second memory subsystem during a boot operation. The secondary processing subsystem then detects a first event during the execution of the boot instructions and, in response, generates a first event information. The secondary processing subsystem stores the first event information in the second memory subsystem to be retrieved on-demand by an administrator.

System and method for measuring navigation of a computer application

Described herein is a computer implemented method comprising receiving a navigation event generated at an application; determining the navigation event is a start navigation session event and recording the event as a startpoint of a navigation session; determining an end of the navigation session has occurred and, in response, recording an endpoint of the navigation session. The method further comprises calculating a navigation session metric for the navigation session; determining a particular category of the navigation session; and determining a measure of navigation success for the navigation session based on the navigation session metric and particular category.

Tracking application usage for microapp recommendation
11553053 · 2023-01-10 · ·

Disclosed is a system for tracking user interactions with an application to recommend creation of a microapp. The system determines a recommendation score for creating a microapp corresponding to a functionality of an application based on at least one of the amount of time users spend interacting with the application, the number of interface elements of the application that the user changes, and the input values provided by the users. The system uses interactions corresponding to multiple different users to determine the recommendation score. The system may also recommend an interface element to be included in the microapp. The recommendation score is provided to an administrator, who may use the information to create a microapp.

Integrated event processing and policy enforcement
11550692 · 2023-01-10 · ·

A method may include receiving an event from an event source. The event may correspond to event data. The event source may be a container executing an image. The image may correspond to image metadata including attributes describing the image. The method may further include combining the event data with the image metadata to obtain enriched data, detecting, using the enriched data, a deviation from a policy, and in response to detecting the deviation from the policy, performing an action to enforce the policy.

Virtual machine vulnerabilities and sensitive data analysis and detection
11693685 · 2023-07-04 · ·

A system and method for securing virtual cloud assets in a cloud computing environment against cyber threats. The method includes: determining a location of a snapshot of at least one virtual disk of a protected virtual cloud asset, wherein the virtual cloud asset is instantiated in the cloud computing environment; accessing the snapshot of the virtual disk based on the determined location; analyzing the snapshot of the protected virtual cloud asset to detect potential cyber threats risking the protected virtual cloud asset; and alerting detected potential cyber threats based on a determined priority.

Elastic buffer in a memory sub-system for debugging information

A processing device in a memory system determines to send system state information associated with the memory device to a host system and identifies a subset of a plurality of event entries from a staging buffer based on one or more filtering factors, the plurality of event entries corresponding to events associated with the memory device. The processing device further sends the subset of the plurality of event entries as the system state information to the host system over a communication pipe having limited bandwidth.

Smart span prioritization based on ingestion service backpressure

Disclosed techniques relate to automatically instrumenting a web application. In an aspect, a method identifies that a web application includes an event that is triggered by a user interaction. The method associates the event with a tracer that is configured to log tracing information based on an execution of a first set of operations caused by the event and to obtain a first measurement of performance of a first span. The method identifies, in the code, that the execution of a first set of operations causes a request to be made to a server. The method associates the request with the tracer. The tracer is configured to log tracing information based on an execution of a second set of operations caused by the request and to obtain a second measurement of performance of a second span that is a child span of the first span.