G06F11/3644

Immersive web-based simulator for digital assistant-based applications
11556454 · 2023-01-17 · ·

Immersive web-based simulator for digital assistant-based applications is provided. A system can provide, for display in a web browser, an inner iframe configured to load, in a secure, access restricted computing environment, an application configured to integrate with a digital assistant. The application can be provided by a third-party developer device. The system can provide, for display in a web browser, an outer iframe configured with a two-way communication protocol to communicate with the inner iframe. The system can provide a state machine to identify a current state of the application loaded in the inner frame, and load a next state of the application responsive to a control input.

Information processing device, non-transitory computer-readable storage medium for storing application startup program, and application startup method
11556457 · 2023-01-17 · ·

A computer-based method of an application startup includes: in response to an instruction to perform a reading processing configured to load an application program, determining whether an analysis result of an annotation included in a source code of the application program is stored in a storage device being non-volatile; and in response to a determination that the analysis result is stored in the storage device, starting the application program by using the analysis result stored in the storage device without executing an analysis processing of the annotation.

Smart span prioritization based on ingestion service backpressure

Disclosed techniques relate to automatically instrumenting a web application. In an aspect, a method identifies that a web application includes an event that is triggered by a user interaction. The method associates the event with a tracer that is configured to log tracing information based on an execution of a first set of operations caused by the event and to obtain a first measurement of performance of a first span. The method identifies, in the code, that the execution of a first set of operations causes a request to be made to a server. The method associates the request with the tracer. The tracer is configured to log tracing information based on an execution of a second set of operations caused by the request and to obtain a second measurement of performance of a second span that is a child span of the first span.

Self executing and self disposing signal
11537499 · 2022-12-27 · ·

Described herein are systems, apparatus, methods and computer program products for implementing a self executing and self disposing signal for an imperative programming language. The self executing and self disposing signal may be utilized by a ReactiveX specification programming language. The signal may be executed before it is observed by an external observer, reducing load times. Additionally, the signal may allow for multiple observers to observe the output of the signal at the same time and may be self disposing to prevent memory leaks.

Code editor for user interface component testing

A system for conducting user interface (UI) software component testing has been developed. The test of the UI software component is initiated and a display of the test results are shown to a user in a browser used in the testing. A code editor used for debugging by the user receives the test results from the browser and presents the test results to the user for debugging. The browser webview and the code editor are simultaneously displayed to the user in a dual screencast window during the UI software testing.

Generating metric data streams from spans ingested by a cloud deployment of an instrumentation analytics engine

A method of generating metrics data associated with a microservices-based application comprises ingesting a plurality of spans and mapping an ingested span of the plurality of spans to a span identity, wherein the span identity comprises a tuple of information identifying a type of span associated with the span identity, wherein the tuple of information comprises user-configured dimensions. The method further comprises grouping the ingested span by the span identity, wherein the ingested span is grouped with other spans from the plurality of spans comprising a same span identity. The method also comprises computing metrics associated with the span identity and using the metrics to generate a stream of metric data associated with the span identity.

Code coverage method for embedded system on chip

A code coverage method for an embedded System on Chip (SoC) includes detecting a presence of a utility function in target source code; adding a hook function to the target source code; and recording at least one property of the utility function based on the hook function in a bit array in a memory of the SoC. The method may further include extracting at least one recorded property from bit arrays in the memory; and generating a code coverage report based on an analysis of the extracted properties.

METHOD OF DEBUGGING APPLET, ELECTRONIC DEVICE, AND STORAGE MEDIUM
20220374331 · 2022-11-24 ·

A method of debugging an applet, an electronic device, a storage medium. The method includes: selecting at least one debugging module from a plurality of debugging modules as a target debugging module according to a first debugging instruction; running the applet so that the target debugging module is interrupted in response to running to the target debugging module in the applet; and awakening the interrupted target debugging module for debugging according to a second debugging instruction, so as to generate a debugging result.

AUTOMATED CLASSIFICATION OF DEFECTIVE CODE FROM BUG TRACKING TOOL DATA

Systems and methods are described for automated classification of defective code from bug tracking tool data. An example method includes receiving a plurality of datasets representing a plurality of bug reports from a bug tracking application. Each dataset may be generated by vectorizing and clustering a source code associated with a respective bug report represented by the dataset. Each dataset may comprise a plurality of classes. At least one class of each dataset may indicate at least one known bug. For each dataset of the plurality of datasets, a respective supervised feature vector may be generated. Each supervised feature vector may be associated with an index of the at least one class with the at least one known bug. Using the supervised feature vectors, a classification model is trained to detect a new bug presence in a new source code.

Debugging dataflow computer architectures

Disclosed in some examples are methods, systems, devices, and machine-readable mediums that use parallel hardware execution with software co-simulation to enable more advanced debugging operations on data flow architectures. Upon a halt to execution of a program thread, a state of the tiles that are executing the thread are saved and offloaded from the HTF to a host system. A developer may then examine this state on the host system to debug their program. Additionally, the state may be loaded into a software simulator that simulates the HTF hardware. This simulator allows for the developer to step through the code and to examine values to find bugs.