G06F11/3604

Open data protocol performance test automation intelligence (OPT-AI)

A testing scenario (forming part of a computing environment executing a plurality of applications) is initiated to characterize performance of the applications. During the execution of the testing scenario, various performance metrics associated with the applications are monitored. Thereafter, data characterizing the performance metrics is provided (e.g., displayed, loaded into memory, stored on disk, transmitted to a remote computing system, etc.). The testing scenario is generated by monitoring service calls being executed by each of a plurality of automates across the applications, generating a service request tree based on the monitored service calls for all of the applications, and removing cyclic dependencies in the service request tree such that reusable testing components are only used once. Related apparatus, systems, techniques and articles are also described.

System and method for in-ide code review
11561771 · 2023-01-24 · ·

Methods, system and apparatus for the augmentation of an integrated development environment (IDE). The system and methods provide for the integration of all aspects of a development workflow to be initiated and completed from within the IDE. Every phase of development, including, grabbing a ticket, working on the ticket, asking teammates questions, requesting feedback, initiating code reviews, performing code reviews, creating feature branches, creating pull requests, creating merge requests and generating audit trails of all interactions users have with the IDE are managed and performed from within the IDE, eliminating the need to context switch or open additional application or websites.

Methods, systems, articles of manufacture and apparatus to detect code defects

Methods, apparatus, systems, and articles of manufacture are disclosed to detect code defects. An example apparatus includes repository interface circuitry to retrieve code repositories corresponding to a programming language of interest, tree generating circuitry to generate parse trees corresponding to code blocks contained in the code repositories, directed acyclic graph (DAG) circuitry to generate DAGs corresponding to respective ones of the parse trees, the DAGs including control flow information and data flow information, abstraction generating circuitry to abstract the DAGs, invariant identification circuitry to extract invariants from the abstracted DAGs, and DAG comparison circuitry to cluster respective ones of the extracted invariants to identify respective ones of the abstracted DAGs with common invariants.

DATA TRANSFORMATION FOR ACCELERATION OF CONTEXT MIGRATION IN INTERACTIVE COMPUTING NOTEBOOKS

A method of data transformation for acceleration of context migration includes monitoring user actions in a source code development environment using fragment-based source code documents are monitored. A content of each fragment of the source code document is determined. A sequence of execution of the fragments is determined. A status of a project captured by the source code development environment is determined. A fidelity of the data to be transformed to a new execution environment is determined. Upon determining that a new execution environment is warranted based on the determined fidelity, the new execution environment is determined. The one or more fragments are then executed in the new execution environment.

Method for automatic creation of malware detection signature

Herein disclosed is a method for automatically extracting signatures for malware. The method takes advantage of a fundamental economic requirement of malware authors: they must reuse code to manage the time investment. The method disclosed finds shared code between malware and generates signatures from the code. A method is also disclosed for separating code that is found predominantly, if not exceptionally, in malware from code that may be found in benign program.

Information processing device, non-transitory computer-readable storage medium for storing application startup program, and application startup method
11556457 · 2023-01-17 · ·

A computer-based method of an application startup includes: in response to an instruction to perform a reading processing configured to load an application program, determining whether an analysis result of an annotation included in a source code of the application program is stored in a storage device being non-volatile; and in response to a determination that the analysis result is stored in the storage device, starting the application program by using the analysis result stored in the storage device without executing an analysis processing of the annotation.

Smart code editor for detecting and visualizing deviations
11698775 · 2023-07-11 · ·

According to an aspect, there is provided a computing device for performing the following. The computing device maintains, in a database, a first deviation detection algorithm for evaluating values of a first deviation metric. The computing device obtains, in the code editor, a plurality of logical lines of code and performs, for at least one logical line of code, the following. The computing device evaluates, using the first deviation detection algorithm, for a program instruction defined in a logical line of code, a value of the first deviation metric based at least on one or more other program instructions. The computing device selects a first color based on the first deviation metric from a first colormap. Finally, the computing device colors, in part or fully, a background or a text of the logical line of code or a graphical element associated with it with the first color.

Cross jobs failure dependency in CI/CD systems
11550697 · 2023-01-10 · ·

A build fail of a job in a development pipeline of an application development system is analyzed. A determination as to whether the build fail affects other jobs in the development pipeline is made. In response to determining that the build fail affects at least one of the other jobs of the plurality of jobs, an alert identifying the at least one of the other jobs affected by the build fail is generated.

Systems and/or methods for static-dynamic security testing using a test configurator to identify vulnerabilities and automatically repair defects
11550923 · 2023-01-10 · ·

Certain example embodiments test an application for security vulnerabilities. Binary and/or source code representations are subjected to static testing. Static testing identifies potential security weaknesses in the application. For each potential security weakness, a corresponding dynamic test set, containing one or more test cases, is generated based on (i) the corresponding potential security weakness, and (ii) lookups to weakness, application context, and attack pattern databases. The weakness database includes different weakness types and descriptions thereof. The attack pattern database includes information about how to generate attacks for the different weakness types. An instance of the application running in a test runtime environment is dynamically tested using the dynamic test cases. The dynamic test results verify whether each potential security weakness is a real vulnerability. The dynamic test results include fewer false-positives than the raw static test results. Verified security weakness of the application are repairable automatically.

System, method and apparatus for selection of hardware and software for optimal implementation of one or more functionality or algorithm
11550708 · 2023-01-10 · ·

A system, method and apparatus for choosing a digital processing platform that is optimal for a specified type of application and satisfies a set of user-specified constraints is provided. In operation, all known parameters on all available processing platforms in a database are stored, providing this information to a computer software application run by the user by querying the database, and then allowing a remote user to specify the constraints, in terms of hardware and system software, to eliminate those entries that would not satisfy the constraints in a step-by-step filtering process. The user then chooses a set of application programs to run on the platforms that were not eliminated. The runtime performance parameters/characteristics—e.g. computational throughput, I/O bandwidth, environmental parameters, etc. are measured to select the optimal solution. The system and method also allows for a regression test to ensure consistency between test software processes running on discrete platforms.