Patent classifications
G06F8/22
Efficient defect location in new code versions
Source code of a golden version and a next version of a program is received in which procedure calls are modified to call from an entry point table (EPT) with index numbers corresponding to procedure memory addresses. An executable defect-free golden version program and next version program with a defect are received. A first entry point table (first EPT) for the new version program and a second EPT for the golden version program are generated. A series of substitutions of procedures from the second EPT to the first EPT is performed and an order of substitutions includes: a module set, a module of the module set, a procedure set of the module, and a procedure of the procedure set. The defect producing procedure is identified by substituting in order until the defect is absent and proceeding to the next substitution in order.
EXTENSIBLE DATA TRANSFORMATION AUTHORING AND VALIDATION SYSTEM
A computer-implemented method comprises obtaining a first build task for building first source code in a first programming language of a plurality of programming languages; retrieving, by the processor, the first source code based on the first build task; building the first source code into one or more artifacts and one or more job specifications; storing the one or more artifacts in a cache shared across a cluster; and initializing an application module on the cluster based on the first programming language, the application module configured to receive a job specification of the one or more job specifications and execute a data transformation job using a reference to a location in the cache.
AUTOMATIC SCRIPT GENERATION
An example embodiment of automatic script generation includes receiving input describing a task to be performed by a script. The input may be analyzed, and at least one option corresponding to the task may be outputted. Code may be embedded in the script based on a selected option.
DISCOVERING AND USING APPLICATION DEPLOYMENT DEPENDENCIES TO AUGMENT GOVERNANCE AND COMPLIANCE POLICY
A compliance discovery and integration process is implemented in association with a cloud-based security and compliance platform and associated CI/CD framework. The process assumes an existing DevOps-based deployment of a product, such as an enterprise application that executes in a runtime production environment. The technique of this disclosure addresses the problem of misalignment between a compliance policy and the product’s post-deployment regulation posture by providing tools and methods that enable pro-active augmentation of governance and compliance policy during the pre-deployment phase and with respect to a next deployment of the product (e.g., a next or updated version). Thus, when the product is later deployed in its next deployment, its regulation posture (post-deployment) is already consistent with the compliance policy.
ENTERPRISE SOFTWARE DEVELOPMENT DASHBOARD TOOL
A dashboard framework system for monitoring business performance, the system comprising: a processor, a memory operatively coupled to the processor and a connector component configured to receive data from business attributes of at least one source program and an analytical component configured to generate an analytics from the received data, the analytical component comprising an analytics engine to track the at least one source program status using quality parameters, and an agile module to provide continuous improvement steps to the business attributes using an agile maturity index score, wherein business formulae are applied to generate the analytics from the received data by the analytical component, and wherein the agile maturity index score is calculated for each of the business attributes by the analytical component using the generated analytics.
Methods and systems for building custom automation workflows to integrate multiple applications
A workflow construction system for constructing automation workflows that automate user specific processes. The workflow construction system may include a template library including workflow templates and pre-configured attributes. The workflow template can accelerate the design and construction of custom automation workflows. An orchestration layer included in the workflow construction system will also improve the performance of systems that execute the automation workflows by dynamically scaling the processing capacity, memory, and storage of servers and other systems hosting the model file instances of the automation workflows to ensure the available resources meet the demands of users completing processes using the automation workflows.
Providing image and text data for automatic target selection in robotic process automation
A software robot is designed to carry out an activity (e.g., a mouse click, a text input, etc.) on a target element (e.g., a button, an input field, etc.) of a user interface. The robot's code specification is configured to include an on-screen image of the target element and a text displayed by the target element. The robot is configured to automatically identify the target element at runtime according to an element ID specified in the source-code of the user interface, and when such identification fails, to identify the target element according to the text and image stored in the robot's code.
METHODS AND SYSTEMS FOR BUILDING CUSTOM AUTOMATION WORKFLOWS
A workflow construction system for constructing automation workflows that automate user specific processes. The workflow construction system may include a template library including workflow templates and pre-configured attributes. The workflow template can accelerate the design and construction of custom automation workflows. An orchestration layer included in the workflow construction system will also improve the performance of systems that execute the automation workflows by dynamically scaling the processing capacity, memory, and storage of servers and other systems hosting the model file instances of the automation workflows to ensure the available resources meet the demands of users completing processes using the automation workflows.
Limited duration supply for heuristic algorithms
Limited duration supply for heuristic algorithms is disclosed. A supply manager receives, from a first subsystem, a first request for a first supply. The supply manager determines that the first supply is not executing. The supply manager initiates the first supply, the first supply to return supply data upon request. The supply manager provides to the first subsystem a supply reference that refers to the first supply that allows the first subsystem to request the supply data directly from the first supply. The supply manager subsequently determines that no subsystem requires the first supply and disables the first supply.
Systems and methods for generating a software application
A software development system for generating a software application is provided. The software development system comprises a configuration file generator tool configured to: read a design model comprising a plurality of individual blocks with a specified data flow between the blocks, wherein each block has a defined behavioral expectation, wherein the design model is configured to cause a desired behavior for the software application when given a set of inputs. The configuration file generator tool is further configured to generate a configuration file, based on the design model, that identifies a plurality of preexisting, verified, and compiled/linked software code segments configured to perform mathematical and/or logical actions to cause the desired behavior for the software application. The configuration file configures an execution engine to execute the portion of the software application represented by the model by invoking execution of the plurality of preexisting, verified, and compiled/linked software code segments specified in the configuration file.