Patent classifications
G06F8/51
Perceptible indicators of wires being attached correctly to controller
Tools and techniques are described to automate line testing when wiring devices (such as equipment and sensors) to controllers. Controllers have access to databases of the devices that are controlled by them, including wiring diagrams and protocols, such that the controller can automatically check that each wire responds correctly to stimulus from the controller. After testing, a reporting device rapidly shows the results of the line testing.
Perceptible indicators of wires being attached correctly to controller
Tools and techniques are described to automate line testing when wiring devices (such as equipment and sensors) to controllers. Controllers have access to databases of the devices that are controlled by them, including wiring diagrams and protocols, such that the controller can automatically check that each wire responds correctly to stimulus from the controller. After testing, a reporting device rapidly shows the results of the line testing.
Application modernization
A method analyzes applications for modernization. Processor units analyze each application in the applications in isolation from other applications to identify issues in code for the applications and a number of common code components. The processor units create a directed graph structure using the issues identified in the applications and the number of common code components. The directed graph structure includes relationships between the applications, the number of common code components, and the issues identified. The processor units determine a common code component modernization cost for the number of common code components using the directed graph structure. The processor units determine an application modernization cost for a set of the applications using the directed graph structure. The application modernization cost for the set of the applications takes into account the common code component cost for modernizing the number of common code components a single time.
Migrating infrastructure as code between different cloud providers
A method for automatically migrating infrastructure as code (IaC) from a first cloud infrastructure platform to a second cloud infrastructure platform is provided. The method may include receiving an original IaC comprising a first type of coding language. The method may further include using natural language processing to map a connection between the first type of coding language and a second type of coding language. The method may further include based on the mapped connection, using the NLP to automatically generate a partial translation of the first type of coding language to the second type of coding language. The method may further include using a machine learning algorithm to correct at least one inaccuracy in the partial translation. The method may further include generating a complete translation and implementing a second IaC on the second cloud infrastructure platform based on the complete translation.
Migrating infrastructure as code between different cloud providers
A method for automatically migrating infrastructure as code (IaC) from a first cloud infrastructure platform to a second cloud infrastructure platform is provided. The method may include receiving an original IaC comprising a first type of coding language. The method may further include using natural language processing to map a connection between the first type of coding language and a second type of coding language. The method may further include based on the mapped connection, using the NLP to automatically generate a partial translation of the first type of coding language to the second type of coding language. The method may further include using a machine learning algorithm to correct at least one inaccuracy in the partial translation. The method may further include generating a complete translation and implementing a second IaC on the second cloud infrastructure platform based on the complete translation.
Instruction translation support method and information processing apparatus
A process includes receiving a table data set that represents mappings between a plurality of operand patterns indicating types of operands possibly included in a first instruction used in a first assembly language and a plurality of second instructions used in a second assembly language or a machine language corresponding to the second assembly language. The table data set maps two or more of the second instructions to each of the operand patterns. The process also includes generating, based on the table data set, a translation program used to translate first code written in the first assembly language into second code written in the second assembly language or the machine language. The translation program defines a process of determining an operand pattern of an instruction included in the first code and outputting two or more instructions of the second code according to the determined operand pattern.
Cyclically dependent checks for software tamper-proofing
Embodiments of the present disclosure relate to anti-tamper computer systems, in particular to methods and systems which can embed protection code into software. Among other things, the protection code helps prevent (and make it more costly) to reverse engineer to tamper with the protected software with malicious intent, such as, but not restricted to: the removal of a license protection mechanism; the removal of code displaying advertisements; the injection of a malicious thread into the program memory space; illicit usage; or any other kind of unauthorized modification of the software.
METHOD AND SYSTEM FOR VALIDATING TRANSACTION IN CLIENT-SERVER ENVIRONMENT
A method of validating a transaction in a client-server environment, the method including: receiving a transaction request from a user at a client device; executing a command at the client device associated with the transaction request based on a state data corresponding to the user at the client device; transmitting a request by the client device to a server for execution of the command at the server, upon the command being executed at the client device; executing the command by the server using a copy of the state data stored on the server, upon receiving the request from the client device, for validating the transaction associated with the transaction request at the client device by the server; and performing one of: allowing the transaction or preventing the transaction, at the client device by the server, based on the execution of the command at the server.
Systems and methods for presenting web application content
Methods, systems, and computer-readable medium are disclosed for presenting web application content. For example, a computer-readable medium may include instructions executable by one or more processors to perform operations including: executing a parent application using a web browser, the parent application being a single page application configured to display a web page element in the web browser; identifying a child application requested by a user action; obtaining, from a server system, child application code of the identified child application, the child application code defining a micro-frontend in a first programming language; transpiling the child application code from the first programming language to a second programming language executable by the web browser, to obtain a transpiled child application code renderable by the web browser; and rendering the transpiled child application code so that the micro-frontend is displayed in the web browser.
Machine learning (ML) powered programming code transformations
A machine learning (ML) based code transformation system that transforms a source programming code developed using a source library for execution on a source platform into remediated code for execution on a target platform is disclosed. Metadata extracted from the source programming code is used to detect the source programming language, source libraries, and the source platform. The metadata also enables modularizing the source programming code based on the functionality and identifying a node from a plurality of nodes in a communication network to execute the various source code modules. A similarity map is generated mapping the source libraries to the target libraries and the source code modules that are incompatible with the target platform are identified and remediated with similar target code modules using the similarity map.