G06F8/41

Software pipeline configuration
11704115 · 2023-07-18 · ·

In certain embodiments, a software pipeline (“pipeline”) is configured by the use of gates for progressing an application from one stage to another (e.g., from a development stage to a production stage). A configuration file having a set of attribute values that is descriptive of an application, and a gate mapping file having information associated with the gates to be invoked for different combinations of attribute values are obtained. The configuration file is processed using the gate mapping file to determine a set of gates to be invoked for progressing the application in the pipeline based on the attribute values of the application. The set of gates are invoked to cause a corresponding set of software routines to be executed for progressing the application.

Function-level redundancy detection and optimization
11704101 · 2023-07-18 · ·

The present disclosure provides computer-executable tools which, implemented in a programming language library, may enable source code written using the library to be compiled to object code instrumented for function-level dynamic analysis of memory allocation functions. By tracking heap reads and writes of each target function, symbols may be mapped to memory addresses allocated therefor, and values of input arguments of functions may be mapped to values of output returns. Based on this information, pure functions which embody redundant computations across multiple executions thereof may be identified, while non-pure functions may be screened out. Among pure functions, candidate functions which are executed having the same arguments and returns across multiple executions thereof may be identified, and these functions may be re-compiled to generate object code wherein redundant subsequent executions are avoided, and return values from a first execution thereof are reused across subsequent executions, reducing computational cost.

Detecting and preventing unauthorized command injection
11704403 · 2023-07-18 · ·

Input data for an operating system command of an automation process is received. The operating system command is generated based on the received input data. The generated operating system command is parsed to identify one or more metrics. The identified one or more metrics are automatically evaluated to determine a security risk associated with the generated operating system command.

Inline compilation of user defined functions

Embodiments described herein provide techniques for in-line compiling of UDFs in other programming languages. These techniques enable faster programming iterations because it allows users to compile directly in the cloud processing system. Moreover, it allows the UDFs to tie into existing libraries. The compiled results are treated as sensitive and handled with appropriate security policies, as with any other user data in the system.

Inline compilation of user defined functions

Embodiments described herein provide techniques for in-line compiling of UDFs in other programming languages. These techniques enable faster programming iterations because it allows users to compile directly in the cloud processing system. Moreover, it allows the UDFs to tie into existing libraries. The compiled results are treated as sensitive and handled with appropriate security policies, as with any other user data in the system.

Discovering matching code segments according to index and comparative similarity

Code search is used to support various features. Code segments may be indexed using a code structure representation of the code segment. Code segments may be compared for similarity to identify a match with an input code segment using a comparison of logic trees generated for the input code segment and a stored code segment in an entry with a matching index value.

APPARATUS AND METHOD FOR COHERENT ERROR MITIGATION USING CLIFFORD GATE INJECTION

Apparatus and method for actively mitigating coherent errors by modifying an original quantum circuit, inserting Clifford gate operations at intermediate stages. Embodiments of the apparatus and method may perform CGI statically, at the compiling stage, and/or dynamically, at the control processing stage. The insertion of Clifford gates takes advantage of the symmetries in a quantum circuit and actively cancels coherent errors, maintaining the quantum processor in a state as close as possible to the original tune-up environment.

COMPILATION METHOD, COMPILATION CIRCUIT, MODE REGISTER AND MEMORY
20230014084 · 2023-01-19 · ·

A compilation method includes the following: receiving a signal to be compiled and a resistance matching signal; performing compilation processing on the signal to be compiled to obtain a compilation result signal; and in the case where the signal to be compiled is a reserved code, performing compatibility selection processing on the compilation result signal according to the resistance matching signal to determine a first compiled value.

COMPILATION METHOD, COMPILATION CIRCUIT, MODE REGISTER AND MEMORY
20230014084 · 2023-01-19 · ·

A compilation method includes the following: receiving a signal to be compiled and a resistance matching signal; performing compilation processing on the signal to be compiled to obtain a compilation result signal; and in the case where the signal to be compiled is a reserved code, performing compatibility selection processing on the compilation result signal according to the resistance matching signal to determine a first compiled value.

Engine to propagate data across systems

Aspects of the disclosure relate to cognitive automation-based engine processing to propagate data across multiple systems via a private network to overcome technical system, resource consumption, and architecture limitations. Data to be propagated can be manually input or extracted from a digital file. The data can be parsed by analyzing for correct syntax, normalized into first through sixth normal forms, segmented into packets for efficient data transmission, validated to ensure that the data satisfies defined formats and input criteria, and distributed into a plurality of data stores coupled to the private network, thereby propagating data without repetitive manual entry. The data may also be enriched by, for example, correcting for any errors or linking with other potentially related data. Based on data enrichment, recommendations of additional target(s) for propagation of data can be identified. Reports may also be generated. The cognitive automation may be performed in real-time to expedite processing.