G06F9/44521

Technique For Reporting Nested Linking Among Applications In Mainframe Computing Environment
20220342678 · 2022-10-27 · ·

A computer-implemented method is presented for reporting application programs linked to by an application running under an online transaction processor of a mainframe computing environment. An intercept program is implanted in an address space of the online transaction processor. A task executing outside of the address space of the online transaction processor identifies an address for a target domain gate program supported in a domain by the online transaction processor; identifies an address for an unused domain gate program supported in the domain by the online transaction processor; replaces the address for the unused domain gate program with the address for the target domain gate program; and replaces the address for the target domain gate program with an address for the intercept program.

Decentralized application development and deployment

Decentralized development and deployment of applications is described. An application may be defined as being composed of multiple code libraries, each independently developed and deployed. Packagers of individual code libraries may deploy various versions of respective code libraries in multiple code cells and may further define cell selection criteria for the libraries. An application manifest may be constructed identifying the component code libraries with optional version selection criteria for the libraries. Upon receiving a request for the application for a particular client, a refined manifest for the application may be generated for that client, the refined manifest including identifiers of particular cells for the respective component code libraries. The application may then be generated according to the refined manifest and provided to the client. Subsequent requests for the application for the same client may be serviced according to the refined manifest.

Co-managing links with a link platform and partner service

The present technology pertains to a link service that can create, maintain, and service links to objects on behalf of a content management system or other services. The link service can share administration of links with other services when desired or can even allow other services to issue the link and manage the object that is the subject of the link while providing other functions to support the link. Additionally, link service can interface with a file system that can support links as actors in the file system, whereby greater control and flexibility in supporting links is provided. Link service can also accommodate servicing and management of links issued by legacy services, where the legacy services have unique link logic that should still be utilized to maintain a consistent user experience.

Voice command integration for local network connected devices
11611796 · 2023-03-21 · ·

Various arrangements for facilitating smart television content receivers in a local network are provided. A primary television receiver executing a first operating system can receive audio data including human voice from a voice enabled remote control. The primary television receiver can transmit the audio data to a secondary television receiver executing a second operating system and that includes a voice command component. The secondary television receiver can convert the audio data into voice command data and transmit the voice command data to the primary television receiver. The primary television receiver can transmit the voice command data to a voice processing server via the Internet and receive, in response, a command generated based on the voice command data. The primary television receiver can transmit the command to the secondary television receiver. The voice command component can then control an operation of the secondary television receiver based on the command.

Methods and terminal for updating converted applet file, and Java Card device
20230084048 · 2023-03-16 ·

A method implemented by a Java Card device for updating a CAP file including at least one existing component on the Java Card device. The method includes: receiving from a terminal one or multiple first commands including an update file for updating the CAP file; determining at least one element type or location of at least one existing first element of the CAP file using type information or first location information included in the update file; searching the CAP file on the Java Card device for the at least one existing first element using the at least one determined element type or location; and if the at least one existing first element is found, replacing each of the at least one existing first element by one of at least one new first element included in the update file.

Capturing traces of virtual machine objects combined with correlated system data

A computer-implemented method includes opening, by a computer device, a global data dictionary on a virtual machine running on the computer device; running, by the computer device, a system defined class on the virtual machine; allocating, by the computer device, program objects that relate to the system defined class from an operating system onto the virtual machine; initializing, by the computer device, a system trace module on the virtual machine; collecting and storing in the global data dictionary, by the computer device, additional class data that was not originally abstracted, the additional class data being references to the allocated program objects; triggering, by the computer device, the system trace module in response to a trace event; identifying, by the computer device, particular ones of the program objects that relate to the trace event; and consolidating, by the computer device, the additional class data that corresponds to the particular ones of the program objects with abstracted object data that corresponds to the particular ones of the program objects, the additional class data being different from the abstracted object data.

Securing an application framework from shared library sideload vulnerabilities

There is disclosed in one example a computing apparatus, including: a processor and a memory; an operating system; an application framework including instructions to search a target directory for one or more shared libraries and to attempt to load the one or more shared libraries if found; and an application including: a library file including a primary feature module to provide a primary feature of the application, the primary feature module structured to operate within the application framework, wherein the library file is not independently executable by the operating system; and an unmanaged executable binary to host the library file, wherein the unmanaged executable binary is not managed by the application framework, and includes hooks to intercept the application framework's attempt to load the one or more shared libraries, and to provide security services to the one or more shared libraries before permitting the application framework to attempt to load the one or more shared libraries.

Utilization of predictive gesture analysis for preloading and executing application components

The techniques disclosed herein utilize predictive gestures to preload and/or execute application components to provide improved responsiveness and loading times in software applications. In some configurations, a system can monitor user input gestures to determine if a user-controlled cursor moves into a detection area positioned in proximity to one or more selectable user interface (“UI”) elements. When a user input causes a cursor to move into the detection area, a computing device can preload or execute one or more application components in memory. The system can also dynamically adjust the position, size and/or shape of the detection area based on a number of factors, including the recognition of one or more predetermined input gestures. By dynamically adjusting a detection area, the system can optimize the predictive techniques for identifying the intent of a user for initiating preload or pre-execution operations for one or more application components.

Method for launching application, storage medium, and terminal

A method for launching an application, a storage medium, and a terminal are provided. The method includes the following. An application to be preloaded is determined in response to an event of application preloading being triggered. Resources for launching the application to be preloaded are preloaded. The application to be preloaded includes a target application, the resources includes a first resource for launching the target application, and the first resource includes network data of the target application, which is dynamically updated on a network side. In response to receiving an instruction indicative of launching the target application, the target application is launched based on latest network data of the target application and the first resources preloaded.

EMBEDDABLE NOTEBOOK ACCESS SUPPORT

Some embodiments support embedding of a notebooks software component in a surrounding host application, thereby promoting consistency of notebook user interfaces and user experiences between different kinds of applications. For instance, the notebook access added to an integrated development environment (IDE) may be aesthetically consistent with the notebook access added to a business analytics tool from the same vendor as the IDE. Departures from the aesthetic are still supported, e.g., a notebook access provided in a video gaming environment to teach gamers programming skills may have the same aesthetic as the simulated world of the video game, rather than an IDE aesthetic or an enterprise software aesthetic. Direct integration or proxied integration architectures may be used. Efficiencies may be gained by distinguishing between notebook viewing, editing, and executing operations, and providing more computationally expensive resources only as needed for the notebook access being performed.