Patent classifications
G06F11/3668
Operation verifying apparatus, operation verifying method and operation verifying system
An operation verifying apparatus of a first embodiment acquires a log indicating the content of a sequence of operations performed on a predetermined device, identifies corresponding functions from the log, and automatically generates a program based on the identified functions. Input data, which is to serve as an argument of each of these functions, is set. Execution sets as well as test scenarios are each structured by combining a program and input data. Then each execution set is continuously executed. As a result, an operation test using a test program is executed.
DYNAMIC RESOURCE PROVISIONING FOR USE CASES
A computer-implemented method, according to one embodiment, includes: receiving, at a computer, a request to facilitate a testing environment, where the request specifies a number and type of resources to be included in the testing environment. A database which lists available resources in systems and/or devices that are in communication with the computer is inspected and the available resources are compared to the number and type of resources specified in the request to be included in the testing environment. In response to determining that a valid combination of the available resources meets the number and type of resources specified in the request to be included in the testing environment, the database is updated to indicate that each of the resources in the valid combination are in use. Moreover, the request is satisfied by returning information about the resources in the valid combination.
Providing image and text data for automatic target selection in robotic process automation
A software robot is designed to carry out an activity (e.g., a mouse click, a text input, etc.) on a target element (e.g., a button, an input field, etc.) of a user interface. The robot's code specification is configured to include an on-screen image of the target element and a text displayed by the target element. The robot is configured to automatically identify the target element at runtime according to an element ID specified in the source-code of the user interface, and when such identification fails, to identify the target element according to the text and image stored in the robot's code.
REDUCING TIME TO TEST CYCLE FIRST FAIL
A system that automatically reduces test cycle time to save resources and developer time. The present system selects a subset of tests from a full test plan that should be selected for a particular test cycle, rather than running the entire test plan. The subset of tests is intelligently selected using metrics such as tests associated with changed code and new and modified tests.
INPUT DISCOVERY FOR UNKNOWN PROGRAM BINARIES
A method to discover an input sequence for an unknown binary program is provided. The method may include obtaining a first input sequence for an unknown binary program. The method may also include generating multiple mutated input sequences from the first input sequence and executing the unknown binary program with the first input sequence and/or the mutated input sequences as the input. The method may further include recording one or more branch counts and execution traces of the executions of the unknown binary program and selecting an execution trace that is different or has a different branch count from the other execution traces of the unknown binary program. A branch in the selected execution trace may be negated to generate a symbolic path condition and the symbolic path condition may be solved to discover a second input sequence for the unknown binary program.
Workflows for automated operations management
Techniques are disclosed relating to automated operations management. In various embodiments, a computer system accesses operational information that defines commands for an operational scenario and accesses blueprints that describe operational entities in a target computer environment related to the operational scenario. The computer system implements the operational scenario for the target computer environment. The implementing may include executing a hierarchy of controller modules that include an orchestrator controller module at top level of the hierarchy that is executable to carry out the commands by issuing instructions to controller modules at a next level. The controller modules may be executable to manage the operational entities according to the blueprints to complete the operational scenario. In various embodiments, the computer system includes additional features such as an application programming interface (API), a remote routing engine, a workflow engine, a reasoning engine, a security engine, and a testing engine.
3D MULTI-OBJECT SIMULATION
An occlusion metric is computed for a target object in a 3D multi-object simulation. The target object is represented in 3D space by a collision surface and a 3D bounding box. In a reference surface defined in 3D space, a bounding box projection is determined for the target object with respect to an ego location. The bounding box projection is used to determine a set of reference points in 3D space. For each reference point of the set of reference points, a corresponding ray is cast based on the ego location, and it is determined whether the ray is an object ray that intersects the collision surface of the target object. For each such object ray, it is determined whether the object ray is occluded. The occlusion metric conveys an extent to which the object rays are occluded.
DISTRIBUTED DATABASE SYSTEM AND DATA DISASTER BACKUP DRILLING METHOD
A distributed database system, a data disaster backup exercise method and a non-transitory computer-readable storage medium are disclosed. The distributed database system may include a local computer room (110) and an offsite computer room (120), where the local computer room (110) includes a local management node (111) and a local database cluster (112), the offsite computer room (120) includes an offsite management node (121), an offsite exercise database cluster (123) and an offsite synchronization database cluster (122); where the local database cluster (112) and the offsite synchronization database cluster (122) are both connected with the local management node (111); the offsite exercise database cluster (123) is configured for: establishing a first connection with the offsite management node (121); and receiving a test service sent by a service layer.
Systems for exchange of data between remote devices
Application debug protocols that require waiting for responses between each request may be adversely affected if significant latency exists between a test device executing an application and a remote device used to debug the application. To address this, the test device is connected to a separate device that receives requests from the remote device. When a first request is received, the separate device determines other requests that are related to the first request, sequentially sends the other requests to the test device, and receives a response after each request, using a wired connection affected by less latency than communication with the remote device. The separate device then sends each of the requests and responses to the remote device for storage. When the remote device prepares to send a subsequent request, if a response can be determined using the stored data, the stored data is used to determine the response locally.
INTELLIGENT AND EFFICIENT PIPELINE MANAGEMENT
A pipeline management system that allows for creating and managing pipelines and pipeline execution. The system allows a user to create pipeline stages, steps for the pipeline stages, and commands for the pipeline steps. The system efficiently allows users to create and manage multiple pipelines by allowing attributes of commands, such as for example variables in the commands, to be entered at runtime. The runtime entry attributes for a pipeline make up an input set. A pipeline can be bound with one or more input sets that are used to fill or instantiate the pipeline variables at runtime.