Patent classifications
G06F8/433
COGNITIVE METHOD TO SPLIT MONOLITHIC ARCHITECTURE INTO MICROSERVICE ARCHITECTURE
A method and related system detail a split of an architecture of a monolithic application into an architecture of a micro service application. The method receives source code for the monolithic application, and maps the source code into a directed graph. The graph is split into subgraphs and optimized. The method further provides the detailing of the micro service application split, based on the subgraphs.
AUTO MAPPING RECOMMENDER
Disclosed herein are system, method, and computer program product embodiments for providing an auto-mapping recommendation between a source asset and a target asset in an integration flow design tool. Because the number of fields passed from a source asset to a target asset may be multitudinous, by auto-recommending mappings between fields provided by the source asset to the target asset, an integration flow design tool may save time developers a significant amount of time and optimize the integration flow design process.
CODE-INDEPENDENT GRAPH TECHNOLOGY
A computing environment of the invention comprises a graph structure, or multiple interconnected graph structures, the behavior of which is driven by data flow through interconnected nodes, independent of an external code base. The computer system may include a plurality of interconnected nodes in which data flow between the nodes drives execution of one or more functions and wherein code within the system is restricted to said nodes, each of which performs a dedicated function and an engine to drive communication between said system and operating hardware. Data are injected into a node and the node responds by outputting a value (data) to one or more subsequent nodes. Those nodes, in turn, output a behavior that is dependent upon the value (data) they received from one or more other nodes. Thus, it is the data that drives operation of the graph and not a traditional code stack.
Code-independent graph technology
A computing environment of the invention comprises a graph structure, or multiple interconnected graph structures, the behavior of which is driven by data flow through interconnected nodes, independent of an external code base. The computer system may include a plurality of interconnected nodes in which data flow between the nodes drives execution of one or more functions and wherein code within the system is restricted to said nodes, each of which performs a dedicated function and an engine to drive communication between said system and operating hardware. Data are injected into a node and the node responds by outputting a value (data) to one or more subsequent nodes. Those nodes, in turn, output a behavior that is dependent upon the value (data) they received from one or more other nodes. Thus, it is the data that drives operation of the graph and not a traditional code stack.
Open data protocol performance test automation intelligence (OPT-AI)
A testing scenario (forming part of a computing environment executing a plurality of applications) is initiated to characterize performance of the applications. During the execution of the testing scenario, various performance metrics associated with the applications are monitored. Thereafter, data characterizing the performance metrics is provided (e.g., displayed, loaded into memory, stored on disk, transmitted to a remote computing system, etc.). The testing scenario is generated by monitoring service calls being executed by each of a plurality of automates across the applications, generating a service request tree based on the monitored service calls for all of the applications, and removing cyclic dependencies in the service request tree such that reusable testing components are only used once. Related apparatus, systems, techniques and articles are also described.
Updating An Edge Node of a Process Control System
A method, edge node application investigator, computer program and computer program product for for updating an edge node of a process control system using an information model for the edge node, where the information model representing the edge node as an object to which one or more application objects are linked, which application objects represent applications that are provided for being run by the edge node as well as to a process control system including such an edge node application investigator. The edge node application investigator compares applications of the edge node with the application objects in the information model and changes the applications of the edge node, if there is a deviation between the applications of the edge node and the application objects of the information model, so that the applications of the edge node correspond to the application objects of the information model.
Function-level redundancy detection and optimization
The present disclosure provides computer-executable tools which, implemented in a programming language library, may enable source code written using the library to be compiled to object code instrumented for function-level dynamic analysis of memory allocation functions. By tracking heap reads and writes of each target function, symbols may be mapped to memory addresses allocated therefor, and values of input arguments of functions may be mapped to values of output returns. Based on this information, pure functions which embody redundant computations across multiple executions thereof may be identified, while non-pure functions may be screened out. Among pure functions, candidate functions which are executed having the same arguments and returns across multiple executions thereof may be identified, and these functions may be re-compiled to generate object code wherein redundant subsequent executions are avoided, and return values from a first execution thereof are reused across subsequent executions, reducing computational cost.
Detecting and preventing unauthorized command injection
Input data for an operating system command of an automation process is received. The operating system command is generated based on the received input data. The generated operating system command is parsed to identify one or more metrics. The identified one or more metrics are automatically evaluated to determine a security risk associated with the generated operating system command.
CAPTURING VARIABLE DEPENDENCIES USING A VARIABLE AGNOSTIC OBJECT
Capturing dependencies between variables using a variable agnostic object is disclosed. A system is configured to obtain an indication of a first dependency of a first variable to a second variable via a programming interface and depict the first dependency, the first variable, and the second variable in a first instance of a variable agnostic object in a source code. The system is also configured to obtain an indication of a second dependency of a third variable to a fourth variable via the programming interface and depict the second dependency, the third variable, and the fourth variable in a second instance of the variable agnostic object in the source code. The system is also configured to compile the source code to generate a computer-executable program capturing the first dependency and the second dependency based on the first instance and the second instance of the variable agnostic object.
DYNAMIC RECOMMENDATIONS FOR RESOLVING STATIC CODE ISSUES
According to some embodiments, systems and methods are provided, comprising receiving a code fragment exhibiting a static code issue; determining, via a trained exemption neural network, whether the received code fragment is exempt or not exempt from resolution; in a case it is not exempt, inputting the code fragment to a trained classification neural network; determining whether the static code issue is a syntactical static code issue or a non-syntactical static code issue; in a case it is a syntactical static code issue, inputting the code fragment to a first trained network to generate a first resolution; and in a case the static code issue is a non-syntactical static code issue, inputting the code fragment to a second trained network to generate a second resolution of the non-syntactical static code issue. Numerous other aspects are provided.