Patent classifications
G06F9/45512
Robotic process automation system with device user impersonation
A robotic process automation system provides a capability to deploy software robots (bots) by receiving from a deployment user a bot deployment request comprising a bot identification that identifies a specific preexisting bot and an authorized class of user to execute the specific preexisting bot. Credentials of the deployment user are checked. An execution device upon which the specific preexisting bot will execute is identified from a set of available devices. An authorization token is issued for the execution device to uniquely identify the execution device and to authorize the execution device to communicate with the robotic process automation system. In response to a request by the execution device the specific preexisting bot and credentials corresponding to the authorized class of user are provided, wherein the specific preexisting bot executes on the execution device automatically without input from any individual corresponding to the authorized class of user.
Optionally compressed output from command-line interface
A method for presenting output returned by a command-line interface is disclosed. In one embodiment, such a method submits, by way of a command-line interface (CLI), a command to retrieve a list of resources. The method further submits, in association with the command, an indicator to compress the list. In response to receiving the command and indicator, the method retrieves the list of resources and compresses the list such that resources with identical attributes are presented as a single tuple in the list. Such a tuple may, in certain embodiments, identify the resources with identical attributes as a range of resources and/or as a comma delimited list of resources. The tuple may also, in certain embodiments, identify how many resources with identical attributes are represented by the tuple. A corresponding system and computer program product are also disclosed.
SCRIPTING WEB SERVICES
A process performed on a server includes configuring the server to enable script for a Web service to be defined dynamically, where the Web service includes an application program interface (API) for enabling access by, and interaction with, a computer program executing on a device other than the server. The process also includes compiling the script to produce machine-executable code for the Web service, receiving a call from the computer program to the Web service, executing the machine-executable code in response to the call to produce an output, and sending the output to the device.
CONTROL INFRASTRUCTURE
In an embodiment, the infrastructure comprises a script execution module that comprises a compiler that compiles scripts, having instructions that reference device properties, into virtual-machine programs, a virtual machine that executes virtual-machine programs, and a script manager that stores scripts, retrieves scripts, and loads scripts into the compiler. In addition, the infrastructure may comprise gateway(s), communicatively connected to physical device(s). The gateway(s) may each comprise processor(s), driver(s) that each communicate with at least one physical device using a communication protocol to read and/or write device properties of the physical device, and a device manager that maps device properties referenced in the virtual-machine programs to device properties used by the driver(s).
APPLICATION RECORDING
In one example of the disclosure, a graphic user interface is sent to a client system for display via a web browser. The graphic user interface is to enable receipt of a user instruction to commence recording of user actions made via the web browser upon a subject web application. Responsive to receipt of the user instruction, a key is caused to be sent via the web browser to a host system hosting the subject web application. The key and recording data indicative of user actions performed upon the subject web application via the web browser are received from the host system via the web browser. The key and the recording data are included within a web page or web pages of the subject web application. The key is utilized to access the recording data. The recording data is sent to the client system for display via the web browser.
CLOUD COMPUTING RESOURCE ORCHESTRATION
Provided are example methods and apparatus for orchestrating cloud computing resources which enable customizing cloud management software to add, via user-provided code, features and functionality which go beyond base features built into the cloud management software, without otherwise modifying the cloud computing management software. The user-provided code can include a plug-in, a script, a webhook, a callout, the like, or a combination thereof.
SERVER APPARATUS, IMAGE FORMING APPARATUS, INFORMATION PROCESSING APPARATUS, IMAGE FORMING CONTROL METHOD, AND IMAGE FORMING CONTROL PROGRAM
A server apparatus provides a social networking service (SNS). The server apparatus stores a specific relation between a terminal apparatus and a printer that are allowed for communication using the SNS. The server apparatus stores relations between one or more icons and commands each corresponding to a respective one of the icons and including an image forming condition and an image forming instruction. Upon receiving a selected icon having been selected on the terminal apparatus, information indicating a selected printer having been selected on the terminal apparatus out of printers in specific relations with the terminal apparatus, and a piece of image data from the terminal apparatus, the server apparatus transmits a command corresponding to the selected icon and the piece of image data to the selected printer.
CLIENT SIDE BROWSER-BASED CACHING FOR MONITORED RESOURCES
Methods and systems are provided for a browser in a client device that receives a user interface script-code snippet from a web page. A chain logic engine determines whether an in-memory map indicates an output value of prior execution of the UI script-code snippet. If the in-memory map does indicate the output value, it is returned from the in-memory map to generate the user interface. If not, the engine determines whether an in-local storage map indicates the prior executed snippet output. If the in-local storage map indicates the prior executed snippet output, it is returned from the in-local storage map to generate the user interface, and it is stored in the in-memory map. If not, the UI script-code snippet is executed to generate the output value, which is used to generate the user interface, and is stored in the in-memory map and in the in-local storage map.
Insider attack resistant system and method for cloud services integrity checking
An insider attack resistant system for providing cloud services integrity checking is disclosed. In particular, the system utilizes an automated integrity checking script and virtual machines to check the integrity of a service. The system may utilize the integrity checking script and virtual machines to execute a set of operations associated with the service so as to check the integrity of the service. When executing the set of operations, the system may only have access to the minimum level of access to peripherals that is required for each operation in the set of operations to be executed. After each operation is executed, the system may log each result for each operation, and analyze each result to determine if a failure exists for any of the operations. If a failure exists, the system may determine that a change in an expected system behavior associated with the service has occurred.
Systems and methods for providing an instant communication channel within integrated development environments
A method and system may be provided for recording discussions about computer code in an integrated development environment (“IDE”). In some aspects, a communication channel is integrated with an IDE. Communications and discussions may be tracked and linked with specific code sections.