G06F8/71

DETECTION OF API BACKWARD COMPATIBILITY ACROSS SOFTWARE VERSIONS
20230049741 · 2023-02-16 · ·

According to an aspect of an embodiment, operations for detection of API compatibility across software versions are provided. The operations may include receiving an input associated with a software application. The operations may further include determining first information. The operations may further include extracting a set of data from one or more web-based sources based on the determined first information. The operations may further include executing a set of operations including one or more pattern searching operations on the extracted set of data to generate a compatibility result. The operations may further include controlling a display device based on the generated compatibility result. The display device may be controlled to display assistive information which informs about a compatibility of the one or more APIs or the functions used in the source code of the software application with respect to the second version of the software.

Secure Firmware Update through a Predefined Server
20230046674 · 2023-02-16 ·

The disclosed embodiments relate to securely booting firmware images. In one embodiment, a method is disclosed comprising receiving, by a memory device, a firmware update; validating, by the memory device, a signature associated with the firmware update; copying, by the memory device, an existing firmware image to an archive location, the archive location storing a plurality of firmware images sorted by version identifiers; booting, by the memory device, and executing the firmware update; and replacing, by the memory device, the firmware update with the existing firmware image stored in the archive location upon detecting an error while booting the firmware update.

Secure Firmware Update through a Predefined Server
20230046674 · 2023-02-16 ·

The disclosed embodiments relate to securely booting firmware images. In one embodiment, a method is disclosed comprising receiving, by a memory device, a firmware update; validating, by the memory device, a signature associated with the firmware update; copying, by the memory device, an existing firmware image to an archive location, the archive location storing a plurality of firmware images sorted by version identifiers; booting, by the memory device, and executing the firmware update; and replacing, by the memory device, the firmware update with the existing firmware image stored in the archive location upon detecting an error while booting the firmware update.

REUSABLE CODE MANAGEMENT FOR IMPROVED DEPLOYMENT OF APPLICATION CODE

A code repository stores application code. A code management determines, based at least in part on requested features selected in a graphical user interface, code requirements that include attributes of application code needed to achieve the requested features. The code management system determines, based at least in part on the determined code requirements and the metadata for each entry of application code stored in the code repository, one or more candidate application code entries from the code repository. The code management system presents the candidate application code entries for user selection in the graphical user interface. After receipt of a user selection of a selected application code, the selected application code is provided to a computing device associated with the user.

REUSABLE CODE MANAGEMENT FOR IMPROVED DEPLOYMENT OF APPLICATION CODE

A code repository stores application code. A code management determines, based at least in part on requested features selected in a graphical user interface, code requirements that include attributes of application code needed to achieve the requested features. The code management system determines, based at least in part on the determined code requirements and the metadata for each entry of application code stored in the code repository, one or more candidate application code entries from the code repository. The code management system presents the candidate application code entries for user selection in the graphical user interface. After receipt of a user selection of a selected application code, the selected application code is provided to a computing device associated with the user.

Managing container images in groups

A method includes: creating, by a computing device, a container image group; adding, by the computing device, container images which share file characteristics into the container image group; defining, by the computing device, a homogeneity of the container image group; and applying, by the computing device, a life cycle action on image layers of the container images within the container image group based on the homogeneity of the container image group.

Managing container images in groups

A method includes: creating, by a computing device, a container image group; adding, by the computing device, container images which share file characteristics into the container image group; defining, by the computing device, a homogeneity of the container image group; and applying, by the computing device, a life cycle action on image layers of the container images within the container image group based on the homogeneity of the container image group.

Developer collaboration control system
11579866 · 2023-02-14 · ·

A method includes providing, to a first client device, a presentation of a first instance of source code. The method further includes receiving, by a server device from the first client device, a selection of a first presentation type from a plurality of presentation types comprising the first presentation type and a second presentation type. The first presentation type specifies first access privileges to first source code changes made by a first user associated with the first client device to the first instance of the source code. The second presentation type specifies second access privileges that are different from the first access privileges of the first presentation type. The method further includes providing, to a second client device, a presentation of a second instance of the source code with the first source code changes in accordance with the first presentation type.

Developer collaboration control system
11579866 · 2023-02-14 · ·

A method includes providing, to a first client device, a presentation of a first instance of source code. The method further includes receiving, by a server device from the first client device, a selection of a first presentation type from a plurality of presentation types comprising the first presentation type and a second presentation type. The first presentation type specifies first access privileges to first source code changes made by a first user associated with the first client device to the first instance of the source code. The second presentation type specifies second access privileges that are different from the first access privileges of the first presentation type. The method further includes providing, to a second client device, a presentation of a second instance of the source code with the first source code changes in accordance with the first presentation type.

Master network techniques for a digital duplicate

Disclosed herein are techniques and tools for verifying data for semantic correctness and/or verifying data for network correctness. In one respect, a method includes receiving an input defining at least two master nodes and at least one master link, each master node having at least one or more respective data properties populated with master node data and the master link having at least one or more master link data, the master nodes and master link defining a master semantic network, importing source data into a second semantic network, comparing the source data to the master node data and making a first determination that the source data reflects a data relationship defined by the master node data, and based on the first determination, populating the source data into the second semantic network, wherein the source data populated within the second semantic network reflects the data relationship defined by the master node data and the master link data.