Patent classifications
G06F11/3644
Smart span prioritization based on ingestion service backpressure
Disclosed techniques relate to automatically instrumenting a web application. In an aspect, a method identifies that a web application includes an event that is triggered by a user interaction. The method associates the event with a tracer that is configured to log tracing information based on an execution of a first set of operations caused by the event and to obtain a first measurement of performance of a first span. The method identifies, in the code, that the execution of a first set of operations causes a request to be made to a server. The method associates the request with the tracer. The tracer is configured to log tracing information based on an execution of a second set of operations caused by the request and to obtain a second measurement of performance of a second span that is a child span of the first span.
TECHNIQUES FOR UTILIZING DISRUPTIONS TO ENTERPRISE SYSTEMS
Various embodiments are generally directed to techniques for utilizing disruptions to enterprise systems, such as to test and/or improve the ability of the enterprise system to recover from system failures, for instance. In many embodiments, an enterprise system may include two or more networked components, such as hardware components and software components. Some embodiments are particularly directed to generating a disruption scheme for an enterprise system based on analysis of one or more aspects of the enterprise system. For example, embodiments may include one or more of planning, scheduling, creating, timing, implementing, administering, and/or strengthening against a disruption to an enterprise system in a controlled and monitored manner. In many embodiments, administration of a disruption scheme may be monitored, recorded, and/or analyzed. In many such embodiments, a library of disruption events may be generated based on monitoring, recording, and/or analyzing implementation of the disruption scheme.
SELECTIVE INDUCTION OF BINARY CODE AT RUN-TIME FOR WEB-BASED CUSTOMER SERVICE
Apparatus and methods for deploying a web application including a plurality of binary objects. The methods may include isolating from the plurality of class files a class file in which a run-time behavior occurs. The methods may include updating the class file to produce a modified class file that does not have the behavior. The methods may include testing performance of the modified class file. The methods may include storing the class file in a dynamic configuration database. The methods may include recognizing the modified class file as being modified. The methods may include, using a cron job processor, reading the metadata. The methods may include compiling the modified class file into binary code. The methods may include executing the binary code instead of a different binary code that corresponds to the class file in which the run-time behavior occurs.
DEBUGGING SQL STATEMENTS
A method and system for debugging SQL statements by computing and saving to memory metadata for each component part of the statement. The system includes a user interface, memory, and a processor, the processor configured to compute and save to memory metadata of SQL statements. The stored metadata may be used for later computation of modified SQL statements. The metadata may also be displayed through a user interface to assist a user in the process of debugging component portions of an SQL statement.
Performance utilities for mobile applications
Techniques for evaluating software systems are provided, including measurement of performance ratings of features of an app-under-test are described. The evaluation may include analysis of a video recording of the user interface of the app-under-test, where the video analysis may include comparing the changes over time of co-located pixel in the video to produce a performance rating, for example a speed index. The results of multiple such tests can be compared by comparing the performance rating produced during execution of different tests.
CLIENT-SIDE ENRICHMENT AND TRANSFORMATION VIA DYNAMIC LOGIC FOR ANALYTICS
Described are systems and methods for client side enrichment and transform via dynamic logic for analytics across various platforms for improved performance, features, and uses. Analytics data collected in client applications is transformed and enriched before being sent to the downstream pipeline using native code and logic bundled into the core application code. The additional logic specific to manipulation of analytics may be unbundled from client-side application code and still be executed on on-device to achieve the same result. The logic may be written in a single language, such as JavaScript, and run across all clients including web browser and mobile operating systems.
Method and apparatus for tracing memory accesses
Apparatus, computer-readable storage medium and a method executed by a computer for tracing the memory accesses of an object-oriented program comprises assigning a unique identification to each class object created from at least one class in the object-oriented program by modifying a class definition of the at least one class. In response to an unloading of one of the class objects, obtaining class unloading related information from a runtime environment of the object-oriented program and obtaining the unique identification of the unloaded class object according to the returned information. Then releasing memory space assigned to the unloaded class object for storing the memory access information of the unloaded class object.
Hot rollback of updated agent
Technology is disclosed herein for managing versions of an Agent associated with an application. Code for the Agent can be updated, and subsequently rolled back without being disruptive to the application. The technology includes running an Agent with an Application in a Java Virtual Machine and rolling back the Agent to use a previous version of code for the Agent while the Application and the Java Virtual Machine continue to run. The rolled back Agent with the Application in the Java Virtual Machine can then be run while the Application and the Java Virtual Machine continue to run.
Anti-malware program with stalling code detection
Execution of a sample program being evaluated for malware is initiated and then suspended to set breakpoints on timing operations of the sample program. Execution of the sample program is suspended again when a breakpoint is hit, at which time a loop is identified in the sample program and evaluated for presence of stalling code. Execution flow of the sample program is changed to exit the loop when the loop is determined to include the stalling code.
AUTOMATED PROBLEM DETERMINATION FOR COOPERATING WEB SERVICES USING DEBUGGING TECHNOLOGY
In an approach to problem determination for cooperating web services, a computing device executes a debug script. The computing device discovers one or more web services based on a web service discovery mechanism. The computing device connects, by the debug daemon, with a debug probe to set a breakpoint on a web service. The computing device receives a file containing connection parameters. The computing device initiates a debug session with the web service using a designated connection channel. The computing device invokes a breakpoint handler function for the web service. The computing device sends commands to the debug probe, which forwards the debug commands to the web service. The computing device closes the debug session with the web service when the breakpoint handler function has run to completion.