G06F8/75

Application modernization

A method analyzes applications for modernization. Processor units analyze each application in the applications in isolation from other applications to identify issues in code for the applications and a number of common code components. The processor units create a directed graph structure using the issues identified in the applications and the number of common code components. The directed graph structure includes relationships between the applications, the number of common code components, and the issues identified. The processor units determine a common code component modernization cost for the number of common code components using the directed graph structure. The processor units determine an application modernization cost for a set of the applications using the directed graph structure. The application modernization cost for the set of the applications takes into account the common code component cost for modernizing the number of common code components a single time.

Application modernization

A method analyzes applications for modernization. Processor units analyze each application in the applications in isolation from other applications to identify issues in code for the applications and a number of common code components. The processor units create a directed graph structure using the issues identified in the applications and the number of common code components. The directed graph structure includes relationships between the applications, the number of common code components, and the issues identified. The processor units determine a common code component modernization cost for the number of common code components using the directed graph structure. The processor units determine an application modernization cost for a set of the applications using the directed graph structure. The application modernization cost for the set of the applications takes into account the common code component cost for modernizing the number of common code components a single time.

Information processing device, non-transitory computer-readable storage medium for storing application startup program, and application startup method
11556457 · 2023-01-17 · ·

A computer-based method of an application startup includes: in response to an instruction to perform a reading processing configured to load an application program, determining whether an analysis result of an annotation included in a source code of the application program is stored in a storage device being non-volatile; and in response to a determination that the analysis result is stored in the storage device, starting the application program by using the analysis result stored in the storage device without executing an analysis processing of the annotation.

Information processing device, non-transitory computer-readable storage medium for storing application startup program, and application startup method
11556457 · 2023-01-17 · ·

A computer-based method of an application startup includes: in response to an instruction to perform a reading processing configured to load an application program, determining whether an analysis result of an annotation included in a source code of the application program is stored in a storage device being non-volatile; and in response to a determination that the analysis result is stored in the storage device, starting the application program by using the analysis result stored in the storage device without executing an analysis processing of the annotation.

Electronic system for static program code analysis and detection of architectural flaws

Embodiments of the invention are directed to static program code analysis and detection of architectural flaws. The system provides a rule-based anomaly detection engine structured to capture application logs during construction of technology program code and dynamically detect anti-pattern conflicts to remediate defects in the technology program code. In particular, the system receives a request to perform defect analysis of a first technology program code. In response, the system constructs a first layer transition map based on mapping each of a plurality of first classes associated with the first technology program code to one or more application layers. The system may then determine, via an anomaly detection engine component, one or more anomalies associated with the first technology program code.

Electronic system for static program code analysis and detection of architectural flaws

Embodiments of the invention are directed to static program code analysis and detection of architectural flaws. The system provides a rule-based anomaly detection engine structured to capture application logs during construction of technology program code and dynamically detect anti-pattern conflicts to remediate defects in the technology program code. In particular, the system receives a request to perform defect analysis of a first technology program code. In response, the system constructs a first layer transition map based on mapping each of a plurality of first classes associated with the first technology program code to one or more application layers. The system may then determine, via an anomaly detection engine component, one or more anomalies associated with the first technology program code.

GROUPING SOFTWARE APPLICATIONS BASED ON TECHNICAL FACETS

Embodiments of the present disclosure provide to techniques for automatically grouping software applications based on their technical patterns/characteristics (i.e., technical facets) via machine learning (ML) algorithms. For instance, a first set of software applications that exhibit a high prevalence of one or more first technical facets may be grouped into a first category, a second set of software applications that exhibit a high prevalence of one or more second technical facets may be grouped into a second category, and so on. Once grouped into categories, the software applications in a given category may be assessed, analyzed, and/or processed together for various purposes.

GROUPING SOFTWARE APPLICATIONS BASED ON TECHNICAL FACETS

Embodiments of the present disclosure provide to techniques for automatically grouping software applications based on their technical patterns/characteristics (i.e., technical facets) via machine learning (ML) algorithms. For instance, a first set of software applications that exhibit a high prevalence of one or more first technical facets may be grouped into a first category, a second set of software applications that exhibit a high prevalence of one or more second technical facets may be grouped into a second category, and so on. Once grouped into categories, the software applications in a given category may be assessed, analyzed, and/or processed together for various purposes.

SEARCH BASED APPROACH FOR GENERATING CONTROLLER MODELS

A method includes obtaining a binary code of a controller. The method also includes decompiling the binary code of the controller to generate a source code. The method further includes generating one or more abstract syntax trees based on the source code. The method further includes generating an interpretable model based on the one or more abstract syntax trees. The interpretable model is interpretable by subject matter experts.

SEARCH BASED APPROACH FOR GENERATING CONTROLLER MODELS

A method includes obtaining a binary code of a controller. The method also includes decompiling the binary code of the controller to generate a source code. The method further includes generating one or more abstract syntax trees based on the source code. The method further includes generating an interpretable model based on the one or more abstract syntax trees. The interpretable model is interpretable by subject matter experts.