Patent classifications
G06F9/45508
Application function library for cloud systems
A method, a system, and computer program product for application function library installation for cloud-based systems. An application function in a plurality of application functions is executed. The application function is executed using a server instance running in a container. A determination is made that execution of the application function requires an application function library. The application function library for executing of the application function is obtained. The obtained application function library is loaded during runtime of the application function.
SCALABLE COMPUTER VULNERABILITY TESTING
Vulnerability testing tasks can be received and distributed, via a work scheduler, to computer test environments. Each of the test environments can have a detector computing component running in the environment. Each detector component can respond to receiving one of the tasks from the work scheduler by conducting a vulnerability test on an endpoint of a target, detecting results of the vulnerability test, generating output indicating the results of the vulnerability test, and sending the output to an output processor. The work scheduler can initiate dynamic scaling of the test environments by activating and deactivating test environments in response to determining that the test environments are overloaded or underloaded, respectively. Also an overall time-based limit on testing for a target can be enforced via the work scheduler.
Systems and Methods for Emulating Resources Using Abstract Containerization with Abstract Categorization and Policy Setting
Various embodiments are described herein for methods and systems for providing, at a user device, an online emulation via a host server. A plurality of resources are provided via a host server by providing a plurality of initial software applications. Each resource in the plurality of resources is included in at least one initial software application in the plurality of initial software applications. A customized software application for emulation at the user device is defined to include a set of functionalities with at least one distinguishing functionality that is absent from each initial software application. The host server determines a set of resources for providing the set of functionalities and provides the emulation by accessing and running the set of resources.
Automatic generation of source code implementing a regular expression
The present application discloses methods, systems, and computer program products for automatically generating source code implementing a regular expression. A regular expression that is defined within source code of an application project is identified. The source code uses a higher-level programming language. Based on identifying the regular expression, a source code implementation of the regular expression is automatically generated using the higher-level programming language, and the source code implementation of the regular expression is integrated into the application project. After integrating the source code implementation of the regular expression into the application project, the source code implementation of the regular expression is compiled into lower-level code and the lower-level code is emitted into an application executable when building the application project, or the source code implementation of the regular expression is interpreted when executing the application project.
Hardware offload support for an operating system offload interface using operation code verification
A method may include receiving, by a privileged component executed by a processing device, bytecode of a packet processing component from an unprivileged component executed by the processing device, analyzing, by the privileged component, the bytecode of the packet processing component to identify whether the bytecode comprises a first command that returns a redirect, analyzing, by the privileged component, the bytecode of the packet processing component to identify whether the bytecode comprises a second command that returns a runtime computed value, and responsive to determining that the bytecode comprises the first command or the second command, setting a redirect flag maintained by the privileged component.
Method and system for data processing
System (100) comprising several edge computing devices (ECD), each comprising a sensor (S); a memory (M); a Central Processing Unit, CPU; and digital communication interface (IF), for communication across a network (NW).
The invention is characterised in that each edge computing device is arranged with a respective interpreting software function, arranged to execute on said CPU and to interpret computer code, received via said digital communication interface and stored in said memory, according to a query language having a predetermined syntax; in that said syntax is arranged to define queries the results of which are streams of data; in that a first such software function is arranged to pose a first query to a second edge computing device (120), in that a second such software function of said type is arranged to, in response thereto, generate and communicate a second stream of data; in that the first software function is arranged to preprocessing said second stream so that it adheres to a predefined global data ontology, and to perform a first calculation using said second stream.
The invention also relates to a method.
Low-code development platform
A computer-implemented low-code development platform is provided including a user interface and having access to a library of step macros configured for user configuration and interconnection via the user interface to generate executable code. Each step macro includes a step configuration generator and an execution code generator. The step configuration generator is configured to generate a step configuration file based on user-configurable data points configurable via the user interface. The execution code generator is configured to generate executable code in the form of a compiled step file configured for storage in memory and execution by a processor of a computing system. The execution code generator receives and inputs the step configuration file into a metaprogramming component configured to interpret the user-configurable data points of the step configuration file and to generate and output the compiled step file.
Information processing device, non-transitory computer-readable storage medium for storing application startup program, and application startup method
A computer-based method of an application startup includes: in response to an instruction to perform a reading processing configured to load an application program, determining whether an analysis result of an annotation included in a source code of the application program is stored in a storage device being non-volatile; and in response to a determination that the analysis result is stored in the storage device, starting the application program by using the analysis result stored in the storage device without executing an analysis processing of the annotation.
METHOD AND SYSTEM FOR DETERMINING THE NEXT STATE OF APPLICATION UPGRADES USING A DEVICE EMULATION SYSTEM OF A CUSTOMER ENVIRONMENT
A method for managing a client environment includes obtaining, by a predictor, a future state prediction request associated with an application upgrade on an emulation of a client device, wherein the application upgrade failed; in response to the future state prediction request: obtaining live data associated with the application upgrade; performing natural language processing on the live data to obtain processed live data; applying a future state prediction model to the processed live data to generate a future state prediction; and initiating the remediation of the application upgrade based on the future state prediction.
Driver Configuration Management Method and Apparatus, Medium, Device, and System
A driver configuration management method may be applied to a management device and includes determining target information, where the target information is used to represent a computing capability of an electronic device; converting, based on the target information, a configuration source file into a target configuration file that uses a target file format; and sending the target configuration file to the electronic device. The method may be applied to a scenario in which the management device generates and sends configuration files in different formats for electronic devices having different computing capabilities.