G06F9/44

Method and apparatus for running applet

A method and an apparatus for running an applet are provided. The method includes: reading, in response to issuing an applet to a host application, a configuration file to determine a dynamic library referenced by the applet; loading the dynamic library referenced by the applet from a sandbox directory and/or an applet platform; and running, in response to a running instruction of the applet, a script code of the applet to call the dynamic library referenced by the applet. When the applet is run, the dynamic library referenced by the applet is loaded from the sandbox directory and/or the applet platform, and the dynamic library is no longer integrated into the applet package.

Automatic derivation of repository access data based on symbolic configuration
11552847 · 2023-01-10 · ·

In an embodiment, a data processing method comprises detecting an approval of a change to an electronic configuration document that symbolically identifies one or more configurations of users, groups, and/or permissions relating to access to computer program artifacts that are stored in a first repository of a geographically distributed, replicated artifact repository system; the artifact repository system comprising one or more second repositories that are geographically remote with respect to the first repository and which replicate the first repository; in response to the detecting: obtaining the electronic configuration document and deriving, based on the electronic configuration document, a plurality of regional repository settings values for users, groups, and/or permissions relating to access to the computer program artifacts and for the one or more second repositories; transmitting the one or more settings values to the one or more second repositories and causing injection of the one or more settings values into one or more repository configuration settings of the second repositories.

Usage-based software library decomposition
11550553 · 2023-01-10 · ·

Performing usage-based software library decomposition is disclosed herein. In some examples, a processor device generates a first library graph representing a first software library including multiple functions. The first library graph comprises a plurality of nodes that each correspond to a function of the first software library. The processor device identifies a function within the first software library (“invoked function”) that is directly invoked by an application that depends on the first software library, then generates a call graph including nodes within the first library graph (“dependency nodes”) corresponding to either the invoked function or another function invoked by the invoked function during application execution. Using the call graph, the processor device generates a second software library including only functions of the first software library corresponding to dependency nodes of the call graph.

Generation of knowledge graphs based on repositories of code

Techniques for code analysis are provided. User code is received, and an import statement is identified in the user code. A first empty object is generated based on the import statement, and the first empty object is named based on the name of an import reference included in the import statement. A knowledge graph is generated based at least in part on the first empty object.

Anti-pattern detection in extraction and deployment of a microservice

Disclosed are various embodiments for anti-pattern detection in extraction and deployment of a microservice. A software modernization service is executed to analyze a computing application to identify various applications. When one or more of the application components are specified to be extracted as an independently deployable subunit, anti-patterns associated with deployment of the independently deployable subunit are determined prior to extraction. Anti-patterns may include increases in execution time, bandwidth, network latency, central processing unit (CPU) usage, and memory usage among other anti-patterns. The independently deployable subunit is selectively deployed separate from the computing application based on the identified anti-patterns.

Systems and methods for measuring complexity of applications and components in software development and deployment platforms

Disclosed are methods, systems, devices, apparatus, media, design structures, platforms, and other implementations, including a method that includes receiving, by a processor-based device, configuration data representative of an initial arrangement of interlinked components forming a data application, and determining based on the configuration data, by the processor-based device, one or more complexity scores indicative of levels of complexities for one or more portions of the initial arrangement of interlinked components forming the data application. The method further includes automatically reconfiguring, by the processor-based device, the initial arrangement of interlinked components based on the computed one or more complexity scores to produce a resultant arrangement of interlinked components forming the data application.

Managing sharable cell-based analytical notebooks

In an embodiment, a data processing method comprises accessing a computer memory comprising a shareable cell-based computation notebook comprising: notebook metadata specifying a kernel for execution, and a computational cell comprising cell metadata, a source code reference, and an output reference, wherein the cell metadata identifies a particular version of source code of a function that defines an input dataset, a transformation, and one or more variables that are to be associated with output data that is to be generated as a result of executing the particular version of the source code; updating the source code reference to identify a first storage location that is to contain the particular version of the source code of the function; and updating the output reference to identify a second storage location that is to contain the output data that is to be generated as a result of executing the particular version of the source code identified in the cell metadata using the kernel specified in the notebook metadata, wherein the method is performed by one or more computing devices.

Method and apparatus of code management

A method, apparatus, electronic device, storage medium and program product of code management are provided. In response to a request for building an executable file, corresponding developed code is obtained from a code library. The developed code is compiled into intermediate code to determine security of the intermediate code. In response to determining that the intermediate code is secure, an executable file is generated based on the intermediate code.

Compositional entity modeling systems and methods

An entity modeling system integrated with a low-code application development platform may have a web/mobile-based user interface that can run in a browser environment on user devices ranging from desktop computers to smart phones. Users such as a subject matter expert may access an entity model designer tool of the system to model an entity. Responsive to user interaction with an entity composition function, the system may access a data store over a network and generate a view including a collection of entity building block(s) retrieved from the data store. Responsive to the user selecting a first entity building block from the collection to add to the entity, the system may automatically extend the entity to include settings of the first entity building block. The settings may include at least one of a property, permission, action, behavior, or resource to the entity.

Automatic creation of device campaigns

Disclosed are various embodiments for automatically creating device campaigns. A computing device first determines that a second version of a software package assigned to an existing device campaign has been uploaded to a data store. The existing device campaign can include an existing compliance policy applicable to individual IoT endpoints assigned to the existing device campaign. The compliance policy may specify that a first version of the software package be installed on the individual IoT endpoints. In response, to the change, the computing device can create a new device campaign that includes a new compliance policy applicable to the individual IoT endpoints assigned to the new device campaign. The new compliance policy may specify that the second version of the software package be assigned to the individual IoT endpoints.