G06F8/315

Checking source code validity at time of code update

A computer-implemented method includes receiving, by a processor, an updated version of a computer program that includes several source code changes. A compiler preprocesses the source code changes for a target computing platform. The preprocessing includes identifying a compile time condition associated with one or more computer instructions enclosed by a macro, determining a current value of the compile time condition at the time of compiling, and determining corresponding object code based on the current value. Further, a macro information record for the macro is generated that includes the compile time condition, the current value, and an identification of the computer instructions. Further, a linker preprocesses the source code changes. This preprocessing includes determining that the object code is not included in an executable file, and updating the macro information record to indicate that the macro is not included in the executable file.

Aggregation of connected objects
11477046 · 2022-10-18 · ·

A method and device for aggregating connected objects of a communications network. The connected objects have at least one basic feature. The method includes the following steps implemented on an aggregation device, in order to obtain a group avatar suitable for representing the connected objects: obtaining at least one basic feature; obtaining at least one feature of the group object, linked to a basic feature; and creating the group avatar including: a structure having a basic feature; a structure having a group feature; a structure for linking the group feature to at least one basic feature; and a group proxy structure having an association between an address of the group avatar and an address of the connected objects.

Multi-tenant java agent instrumentation system

In one embodiment, a device launches a core agent for a Java application. The core agent loads a first tenant and a second tenant, each tenant having its own isolated class loader. The device instruments, via the core agent and by each tenant, the Java application to capture data regarding execution of the Java application. The device provides the captured data to a user interface.

Distributed and redundant machine learning quality management

Provided is a process including: writing modelling-object classes using object-oriented modelling of the modelling methods, the modelling-object classes being members of a set of class libraries; writing quality-management classes using object-oriented modelling of quality management, the quality-management classes being members of the set of class libraries; scanning modelling-object classes in the set of class libraries to determine modelling-object class definition information; scanning quality-management classes in the set of class libraries to determine quality-management class definition information; using the modelling-object class definition information and the quality-management class definition information to produce object manipulation functions that allow a quality management system to access methods and attributes of modelling-object classes to manipulate objects of the modelling-object classes; and using the modelling-object class definition information and the quality-management class definition information to produce access to the object manipulation functions.

SOFTWARE OBJECT IDENTIFICATION USING RECORD GENERATING CODE INSERTION

Using a code transformation tool, a portion of executable code is inserted into existing executable code, the existing executable code comprising an existing constructor of a class, the existing constructor, when executed, instantiating an object of the class. During execution of the existing constructor, execution of the portion is caused to occur, the execution generating a record, the record comprising execution tracing data of the object.

System and Method for Real-Time, Dynamic Creation, Delivery, and Use of Customizable Web Applications
20230060787 · 2023-03-02 ·

A computer-based system with a software platform that may provide organizations and users an ecosystem for real-time creation, manipulation, delivery, and use of server-side and client-side custom web applications utilizing a novel object-oriented system for configuration, storage, retrieval, rendering and continuous bi-directional communication of information between a web server (1000) and multiple web clients (1200). There may be a client-side system with a single page application with an architecture to communicate back and render multiple applications, multiple dynamic pages, all at the same time. All such apps, living under one platform, may be built in real-time using rapid customization tools such as design editors, a scripting engine (4300) utilizing a unique object-oriented system, and a secure sandbox containment and linking system.

REDUCING CALL STACK USAGE FOR FUTURE OBJECT COMPLETIONS
20230064547 · 2023-03-02 ·

Reducing call stack usage for future object completions is disclosed herein. In one example, a processor device of a computing device employs a completion queue when managing completions of future objects. When a future object is determined to have a status of complete, the processor device determines whether the current thread of the future object is associated with a completion queue. If so, a completion operation of the future object is enqueued in the completion queue. If the current thread is not associated with a completion queue, one is created and associated with the current thread, and the completion operation of the future object is performed. After completion, if the completion queue is not empty, any enqueued completion operations are dequeued and performed. Once the completion queue is empty, the completion queue is removed.

Frequent source code pattern mining

A data mining technique is used to find large frequently-occurring source code patterns from methods/APIs that can be used in code development. Simplified trees that represent the syntactic structure and type and method usage of a source code fragment, such as a method, are mined to find closed and maximal frequent subtrees which represent the largest frequently-occurring source code patterns or idioms associated with a particular type and method usage. These idioms are then used in an idiom web service and/or a code completion system to assist users in the development of source code programs.

Bytecode verification using class relationship caching

A computer-implemented method for bytecode class verification includes: encountering a class requiring verification of its bytecode during a run of an application; determining whether class relationship data for the class exists in a shared classes cache; in response to a determination that the class relationship data for the class does not exist in the shared classes cache: performing a linear bytecode walk of the bytecode to identify relationship data for the class and verify that the bytecode is well-formed; and storing the identified relationship data as the class relationship data for the class in the shared classes cache; in response to a determination that the class relationship data for the class does exist in the shared classes cache: retrieving the class relationship data for the class from the shared classes cache; and processing the class relationship data.

Initial loading of partial deferred object model

Partial initial construction of a deferred object model. This is done using a map that correlates positions of a hierarchically structured definition and corresponding hierarchical positions within an object model. The map is accessed and used to initially construct a deferred object model that even leaves some of the deferred objects unpopulated. The map is used to determine which parts of the hierarchical object definition no longer need to be parsed in order to construct this initial form of the deferred object model. If a request for an object is detected at some point after the initial construction, and that requested object is not represented even in deferred form in the deferred object model, the system uses the map to find the position of the corresponding object definition in the hierarchical object definition. At that point, the system parses that position, and constructs the object.