Patents Issued in April 20, 2017
-
Publication number: 20170109228Abstract: A set of processors in a symmetric multiprocessor (SMP) system are deconfigured following a first failed processor to return the SMP system to a symmetric state. One or more deconfiguration options are identified, and a respective cost is calculated for each deconfiguration option. A deconfiguration option is selected and applied to the SMP system based on the respective costs of the one or more identified deconfiguration options.Type: ApplicationFiled: October 14, 2015Publication date: April 20, 2017Inventors: Jayanth Othayoth, Venkatesh Sainath, Vishwanatha Subbanna, Dhruvaraj Subhashchandran
-
Publication number: 20170109229Abstract: Code word sequences obtained from data transmission/storage channels, e.g. nucleic acid storage systems, encounter code symbol insertion and deletion errors. A data processing device recovers valid code words from corrupted code word sequences. The valid code words belong to at least one code book of channel modulated code words of identical length. A code word sequence is obtained, presumed code word boundaries for the sequence are determined depending on the identical length, code words corresponding with the boundaries are compared with the code book to identify valid code words, and a section of the sequence is identified as not containing a valid code word. Then shifted code word boundaries are determined for the section assuming at least one insertion or deletion error, and code words corresponding with the shifted boundaries are compared with the code book to identify recovered valid code words.Type: ApplicationFiled: October 18, 2016Publication date: April 20, 2017Inventors: INGO HUETTER, Meinolf BLAWAT, Klaus GAEDKE, Xiaoming CHEN
-
Publication number: 20170109230Abstract: Provided are an apparatus and method for generating common locator bits to locate a device or column error during error correction operation for a memory subsystem having memory modules, each including a plurality of memory devices. Error detection logic generates common locator bits from device bits in a plurality of memory devices in one of the memory modules. The error detection logic uses the common locator bits to locate a column across at least two of the memory devices having an error when there is a column error and to locate a memory device in the devices having an error when there is a device error. A same of the common locator bits are used to locate both one of the columns and the memory devices having errors. Error correction is performed on the located memory device or column having the error.Type: ApplicationFiled: October 14, 2015Publication date: April 20, 2017Inventor: Debaleena DAS
-
Publication number: 20170109231Abstract: A semiconductor memory device includes a memory cell array, an error correction circuit and a control logic circuit. The error correction circuit performs an error correction code (ECC) encoding on write data to be stored in the memory cell array, and performs an ECC decoding on read data from the memory cell array. The control logic circuit controls access to the memory cell array and generates an engine configuration selection signal based on a command. The error correction circuit reconfigures a number of units for which ECC including the ECC encoding and the ECC decoding is performed, in response to the engine configuration selection signal.Type: ApplicationFiled: July 7, 2016Publication date: April 20, 2017Inventors: Sang-Uhn CHA, Hoi-Ju CHUNG
-
Publication number: 20170109232Abstract: A method of scrubbing errors from a semiconductor memory device including a memory cell array and an error correction circuit, can be provided by accessing a page of the memory cell array to provide a data that includes sub units that are separately writable to the page of memory and to provide parity data configured to detect and correct a bit error in the data and selectively enabling write-back of a selected sub unit of the data responsive to determining that the selected sub unit of data includes a correctable error upon access as part of an error scrubbing operation.Type: ApplicationFiled: October 11, 2016Publication date: April 20, 2017Inventors: SANG-UHN CHA, HOI-JU CHUNG, UK-SONG KANG
-
Publication number: 20170109233Abstract: An apparatus includes an encoder configured to receive data and to encode the data based on an adjoint matrix to generate a codeword. The apparatus further includes a memory coupled to the encoder and configured to store the codeword.Type: ApplicationFiled: October 20, 2015Publication date: April 20, 2017Inventor: ISHAI ILANI
-
Publication number: 20170109234Abstract: Embodiments include accelerating capture of a system dump at system failure in a computer system. A method includes capturing a system snapshot that includes data from real memory frames of the computer system and storing the system snapshot in a storage. The method also includes monitoring periodically a change between the data in the system snapshot and a current state of the real memory frames of the computer system and updating the system snapshot according to the changed real memory frames based on a rate of change of the real memory frames. Further, in response to encountering the system failure, the snapshot is updated based on a delta between the system snapshot and the current state of the real memory frames. The snapshot on the storage is used as the system dump. The present document further describes examples of other aspects such as systems, computer products.Type: ApplicationFiled: October 15, 2015Publication date: April 20, 2017Inventors: DEBORAH A. FURMAN, ANDREW C.M. HICKS
-
Publication number: 20170109235Abstract: A method for recovering a baseboard management controller (BMC) by determining, by a basic input/output system (BIOS), whether a BMC recovery mode is generated by a recovery mode jumper being triggered. The system performing the method can further install, if the recovery jumper is not triggered, a BMC firmware update driver and detect, if the recovery jumper is not triggered, a BMC image. The system that performs the method can further update, if the recovery jumper is not triggered, the BMC firmware and copy to a backup image, if the recovery jumper is not triggered, the BMC firmware update.Type: ApplicationFiled: October 16, 2015Publication date: April 20, 2017Inventor: Ming-Hung HUNG
-
Publication number: 20170109236Abstract: A memory protection device is used for protecting a memory. The memory protection device includes a filtering unit and an encoding unit. The filtering unit searches an input data and outputs an encoding selection signal based on a bit component pattern of the input data. The encoding unit selects one or more encoding implementations among a plurality of encoding implementations based on the encoding selection signal from the filtering unit, to encode the input data.Type: ApplicationFiled: November 25, 2015Publication date: April 20, 2017Applicant: INDUSTRIAL TECHNOLOGY RESEARCH INSTITUTEInventors: Li-Ren HUANG, Chih-Jen YANG, Yung-Chang CHANG, Kung-Ming JI
-
Publication number: 20170109237Abstract: A system and method for block-based restarts are described. A data storage system interfaces with one or more nodes of a network file system on which a volume is provided in order to read data stored on the volume on a block-by-block basis. Backup data sets capable of recreating the data on the volume are generated from the data blocks read from the volume. The system can interface with a backup memory resource and write the backup data sets to the backup memory resource in a sequential order. As the backup data sets are generated and written to the backup memory resource, restart checkpoints for the data set are also regularly generated and stored for use in restarting the backup process in the event of a recoverable failure in the transfer.Type: ApplicationFiled: November 28, 2016Publication date: April 20, 2017Inventors: James Namboorikandathil Joseph, Manoj Kumar Venkatachary Sundararajan, Ravi K. Budhia
-
Publication number: 20170109238Abstract: A processor determines a predicted quantity of updates to be made to a set of data using a history of updates. The set of data is associated with a category of replication that indicates a first frequency of data replication to be applied to the set of data. The processor determines whether the first predicted quantity of updates meets a first threshold for a frequency of replication of the set of data. The first threshold indicates an allowed number of updates and meeting the first threshold indicates that an adjustment to the frequency of replication of the set of data is to be initiated. The processor responds to a determination that the first threshold has been met by associating the set of data with a category of replication that has a second frequency of data replication to be applied to the set of data.Type: ApplicationFiled: January 4, 2017Publication date: April 20, 2017Inventors: David R. Blea, Matthew E. Brooks, Steven M. Kern, Khang N. Nguyen, Scott N. Trevett
-
Publication number: 20170109239Abstract: Systems, methods, and computer program products are provided for selective processing of file system objects for an image level backup. An example method receives backup parameters for an image level backup. The backup parameters include a selection of at least one file system object to include. The method attaches to a source disk as a block device. The source disk corresponds to the selected at least one file system object, and a file system includes a file allocation table (FAT). The method determines file system objects of the source disk to be excluded from the image level backup. The method issues file deletion API calls to initiate deletion of the determined file system objects. The method stores FAT content change caused by the issued file deletion API calls. The method creates a reconstructed disk image from the source disk based on the stored FAT content change.Type: ApplicationFiled: October 20, 2015Publication date: April 20, 2017Applicant: Veeam Software AGInventors: Anton GOSTEV, Alexander BARANOV
-
Publication number: 20170109240Abstract: A computer system maintains identifiers that identify changed blocks of virtual machine (VM) storage. The computer system accesses a stable VM checkpoint comprising a restorable VM image at a time, and that stores a representation of data of at least one block as it existed at the time. The computer system converts the checkpoint to a reference point. Reference point information is transferable with the VM, such that if the VM is moved to a different computing system, any data identified by the reference point is recoverable. The conversion includes querying the storage to determine an identifier corresponding to the block of the checkpoint at the time, storing this identifier as a part of the reference point, and releasing the representation of the data of the block from the checkpoint. The computer system then uses the reference point to identify changes in the blocks of the storage since the time.Type: ApplicationFiled: July 26, 2016Publication date: April 20, 2017Inventors: Angshuman Bezbaruah, Lars Reuther, Taylor O'Neil Brown, John Andrew Starks
-
Publication number: 20170109241Abstract: According to certain aspects, a system includes a client device that includes a virtual machine (VM) executed by a hypervisor, a driver located within the hypervisor, and a data agent. The VM may include a virtual hard disk file and a change block bitmap file. The driver may intercept a first write operation generated by the VM to store data in a first sector, determine an identity of the first sector based on the intercepted write operation, determine an entry in the change block bitmap file that corresponds with the first sector, and modify the entry in the change block bitmap file to indicate that data in the first sector has changed. The data agent may generate an incremental backup of the VM based on the change block bitmap file in response to an instruction from a storage manager, where the incremental backup includes the data in the first sector.Type: ApplicationFiled: December 29, 2016Publication date: April 20, 2017Inventors: Henry Wallace DORNEMANN, Rahul S. PAWAR
-
Publication number: 20170109242Abstract: Systems and methods of transmitting data from one location to another location that can be used in a number of applications including, but not limited to, secure transmission of data from one location to another and secure data backup. In one embodiment, a data file is split into pieces and the pieces are placed randomly in a diverse mesh of online cloud storage providers. So all the data is not sitting in a single point of failure and with the entire file available for theft. Each piece of data is given a randomized numerical code that determines where the packet of data is stored. Also, the pieces of data can be encrypted.Type: ApplicationFiled: December 22, 2016Publication date: April 20, 2017Inventor: Mark Urban CREE
-
Publication number: 20170109243Abstract: An improved model-based approach for undoing actions in an application that was not previously configured with an undo feature is disclosed. Object models are constructed for each object invoked by the application. Snapshots of the object model are captured after every action to preserve the object model state at different points in time. The object model includes an object tree data structure having multiple nodes comprising data and metadata for the object. The object model is frozen and editing of the object is only permitted via an undo management engine. In response to edits from the application, the undo management engine responds by unfreezing the path of object nodes from leaf node to root node in the object tree data structure. Edits are applied to the object model at the leaf node. The object model can then be re-frozen to maintain the state of the object after each action.Type: ApplicationFiled: October 16, 2015Publication date: April 20, 2017Inventor: Viren Kumar
-
Publication number: 20170109244Abstract: According to one embodiment, a storage device connectable to a host and includes a storage medium and a controller. The controller is configured to measure, if detecting a situation in which quality of a signal is measurable in a state where communication with a host is possible, an eye pattern of the signal communicated with the host, and store a measurement result on the storage medium.Type: ApplicationFiled: February 2, 2016Publication date: April 20, 2017Inventors: Yuu Kawai, Mamoru Mori
-
Publication number: 20170109245Abstract: A network-based services provider may reserve and provision primary resource instance capacity for a given service (e.g., enough compute instances, storage instances, or other virtual resource instances to implement the service) in one or more availability zones, and may designate contingency resource instance capacity for the service in another availability zone (without provisioning or reserving the contingency instances for the exclusive use of the service). For example, the service provider may provision resource instance(s) for a database engine head node in one availability zone and designate resource instance capacity for another database engine head node in another availability zone without instantiating the other database engine head node. While the service operates as expected using the primary resource instance capacity, the contingency resource capacity may be leased to other entities on a spot market. Leases for contingency instance capacity may be revoked when needed for the given service (e.g.Type: ApplicationFiled: December 27, 2016Publication date: April 20, 2017Inventors: GRANT ALEXANDER MACDONALD MCALISTER, SAMUEL JAMES MCKELVIE, ANURAG WINDLASS GUPTA
-
Publication number: 20170109246Abstract: Techniques are describe herein for associating storage management properties with a group of files of a database referred to herein as a “file group”. In this system, storage management properties are defined at the database-level. Thus, multiple databases can be stored across a single disk group, gaining the benefits of having multiple block access devices working in parallel, but each respective database may be associated with a respective file group in a one-to-one relationship, so that each database can have different storage management properties.Type: ApplicationFiled: October 17, 2016Publication date: April 20, 2017Inventors: HANLIN D. CHIEN, PRASAD V. BAGAL, HARISH NANDYALA, ANA L. SOLIS, SANTHOSH SELVARAJ
-
Publication number: 20170109247Abstract: Exemplary embodiments provide a way to manage data recovery in a distributed system having multiple data store nodes. A storage system comprises: a first node including a first processor; and a plurality of second nodes coupled to the first node, each of the plurality of second nodes including a second processor and one or more second storage devices. The first processor is configured to control to store data and replication of the data in the second storage devices of two or more second nodes. If at least one of the second nodes has failed and a storage capacity of the plurality of second nodes is below a given threshold, one of the second nodes is configured to receive a first data, which is replication of data stored in a failed second node, from another of the second nodes, and create parity data based on the received first data.Type: ApplicationFiled: October 17, 2014Publication date: April 20, 2017Inventor: Akio NAKAJIMA
-
Publication number: 20170109248Abstract: A system for sharing a bus port includes a first bus host, a second bus host, a multiplexer configured to select either the first bus host or the second bus host to connect to a bus port, and a port detector configured to detect whether a peripheral is connected or disconnect to the bus port. The first bus host is configured to: determine, in response detecting a peripheral connected to the bus port, which one of the first bus host or the second bus host the peripheral is dedicated to, and control, in response to the port detector determining that the peripheral is dedicated to the second bus host, the multiplexer to select the second bus host to connect to the bus port.Type: ApplicationFiled: October 20, 2015Publication date: April 20, 2017Inventors: Chien-Hua YANG, Yao-Yu CHAO
-
Publication number: 20170109249Abstract: An arbitration system and method is disclosed. The apparatus includes first and second memory devices, and a resistor coupled in common to the first and second memory devices, the first memory device including a first calibration circuit configured to perform, when activated, a first calibration operation based on the resistor and a first arbiter configured to activate the first calibration circuit responsive, at least in part, to an assertion of a first command or keep the first calibration circuit inactive irrespective of the assertion of the first command.Type: ApplicationFiled: October 14, 2015Publication date: April 20, 2017Inventors: Suryanarayana Tatapudi, Sujeet Ayyapureddi
-
Publication number: 20170109250Abstract: A monitoring apparatus includes a memory, and a processor configured to obtain a plurality of first measurement results relating to a first performance of an application and a plurality of second measurement results relating to a second performance of the infrastructure when the application is executed by using the infrastructure, classify the plurality of first measurement results into a plurality of groups, determine a first mean value of one or more of the plurality of first measurement results which are included in each of the group, and determine a second mean value of one or more of the plurality of second measurement results which are associated with the one or more first measurement results included in the group, and execute regression analysis based on a plurality of the first mean values and a plurality of the second mean values for the plurality of groups.Type: ApplicationFiled: October 14, 2016Publication date: April 20, 2017Applicant: FUJITSU LIMITEDInventor: Tatsuma MATSUKI
-
Publication number: 20170109251Abstract: Apparatuses, methods, systems, and computer program products are disclosed for monitoring performance of multithreaded workloads. A workload module starts a workload comprising one or more threads. The workload reaches a steady state after a period of time. A data module receives a first set of performance data for each thread in response to the workload reaching the steady state. The first set of performance data is received concurrently for each thread. The data module receives a second set of performance data for each thread a period of time after the first set of performance data is received. The second set of performance data is received concurrently for each thread. A result module calculates one or more performance metrics for each thread based on the first and second sets of performance data.Type: ApplicationFiled: October 20, 2015Publication date: April 20, 2017Inventors: RAJARSHI DAS, PHILIP L. VITALE
-
Publication number: 20170109252Abstract: A dynamic monitoring process begins with configuring a start and end method to be monitored. The dynamic monitoring process may intercept both the start and end methods as and when the loader is initiated or at runtime to dynamically attach and detach the instrumentation. A loader may then be modified to call a library method upon detection of the start method. The library method may serve as a notification to the start of the method and causes a reflector to retrieve information from the incoming request. The incoming information may include data from which a business transaction name may be determined. The business transaction name is then associated with the monitoring of the particular request. When an exit call is detected, a call may be made to the library for a method which invokes a decorator. The decorator may insert business transaction name and other data into the outgoing call.Type: ApplicationFiled: December 23, 2016Publication date: April 20, 2017Applicant: AppDynamics, Inc.Inventors: Pankaj Kumar, Amod Gupta, Sanjay Nagaraj, Michael Margulis
-
Publication number: 20170109253Abstract: The present invention is a system and a method for filtering a system log under an operating system, implemented on an electronic device installed with the operating system. The electronic device executes a system log filter procedure including a program compile-time stage and a program runtime stage. The program compile-time stage is executed to establish an editable database storing debugging information. The program runtime stage is executed to configure configured filtered information, and outputs a filtered system log according to the debugging information corresponding to the configured filtered information. The electronic device connects to a remote device to configure and receive new configured filtered information, and the program runtime stage is executed to filter system log corresponding to the new configured filtered information. Therefore, the efficiency of tracing a specific system log is raised.Type: ApplicationFiled: October 14, 2016Publication date: April 20, 2017Applicant: INSYDE SOFTWARE CORP.Inventor: Chih-Chieh SHEN
-
Publication number: 20170109254Abstract: According to one exemplary embodiment, a method for preparing a software component for verification is provided. The method may include receiving the software component and a design model. The method may also include generating a wrapper program based on the received software component and the received design model. The method may then include associating the received software component with the generated wrapper program. The method may further include determining a plurality of inputs for the received software component based on the received design model. The method may also include sending the determined plurality of inputs and the received software component with associated wrapper program to a verification tool.Type: ApplicationFiled: January 9, 2017Publication date: April 20, 2017Inventors: Allon Adir, Fady Copty, Dmitry Pidan, Tamer Salman
-
Publication number: 20170109255Abstract: According to one exemplary embodiment, a method for preparing a software component for verification is provided. The method may include receiving the software component and a design model. The method may also include generating a wrapper program based on the received software component and the received design model. The method may then include associating the received software component with the generated wrapper program. The method may further include determining a plurality of inputs for the received software component based on the received design model. The method may also include sending the determined plurality of inputs and the received software component with associated wrapper program to a verification tool.Type: ApplicationFiled: January 9, 2017Publication date: April 20, 2017Inventors: Allon Adir, Fady Copty, Dmitry Pidan, Tamer Salman
-
Publication number: 20170109256Abstract: In one embodiment, a computer-implemented method includes monitoring one or more data sources resulting from execution of one or more program components. One or more events are encountered in the one or more data sources during the execution of the one or more program components. One or more messages are generated, with each message describing an event encountered. Each of the one or more messages is parsed for a name of a corresponding source file in which an associated event was encountered, a corresponding line number at which the event was encountered, and at least one of: a timestamp, severity level, full stack trace, category of the event, and summary of the event. The one or more messages are notified of within an integrated development environment (IDE). Each of the one or more messages is associated in the IDE with the corresponding source file at the corresponding line number.Type: ApplicationFiled: October 15, 2015Publication date: April 20, 2017Inventors: Kulvir S. Bhogal, Lisa Seacat DeLuca, Robert R. Peterson
-
Publication number: 20170109257Abstract: A framework for improving robustness in the execution of software workflows is described herein. One such workflow is a testing scenario, where multiple testing modules are to be executed sequentially, with some of the modules receiving as input the output of other modules. Many types of modules are contemplated, such as Application Program Interface (API) modules, User Interface (UI) modules, Database (DB) modules, and the like. Each of these modules may invoke, respond to, and/or extract data from various subjects of the testing scenario, among other operations. One aspect of the invention wraps each of these modules in a software component, such that disparate module types can be operated on with a common interface. In one embodiment, the common interface enables a test executor to retry and/or debug the software components in novel ways.Type: ApplicationFiled: October 16, 2015Publication date: April 20, 2017Inventor: Yuan LI
-
Publication number: 20170109258Abstract: An improved technique for storing trace data involves storing software operation debug trace information in a buffer memory rather than in a log file in the main memory, and after completion of the software operation either (1) deleting the debug trace information upon the successful completion of the operation, or (2) transferring the debug trace information to a log file memory upon a failure of the operation.Type: ApplicationFiled: March 26, 2015Publication date: April 20, 2017Inventor: Alexey Valeryevich Martynov
-
Publication number: 20170109259Abstract: A method of operating a telemetry system includes automatically populating a base field of a schema in an event definition using a logging library of the telemetry system for an event of an instrumented application, and automatically populating a conditional field of the schema in the event definition using the logging library in response to a selected condition for the event.Type: ApplicationFiled: October 16, 2015Publication date: April 20, 2017Applicant: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Amy M. Lewis, Ravi C. Shahani, Mahmood G. Qadir, Wojtek Kozaczynski, Brian R. Crawford, William M. Zintel, George Joy, Brian P. Ellis, Ken Ming-Kin Yip, Vitaliy Titov, Mark E. Russinovich, James O. Todd, Vito J. Sabella, Christopher M. Lang, Jonathan K. Johnson
-
Publication number: 20170109260Abstract: Concepts and technologies are disclosed herein for test simulation for software defined networking environments. A computing device can receive a service request comprising a request to instantiate a service and create a service order based on the service request. The service order can include instructions to instantiate the service. The computing device can replicate the service order to obtain a replicated service order that includes instructions to instantiate a replicated service in a test environment, test paths and connections associated with the replicated service within the test environment using a test simulator, test device outage handling functionality of the replicated service within the test environment using the test simulator, test network outage handling functionality of the replicated service within the test environment using the test simulator, verify the replicated service, and initiate instantiation of the service requested by the service request.Type: ApplicationFiled: October 14, 2015Publication date: April 20, 2017Applicant: AT&T Intellectual Property I, L.P.Inventors: Zhenzhen Wang, Teh-Hsin K. Wu
-
Publication number: 20170109261Abstract: In one embodiment, a computer-implemented method includes monitoring one or more data sources resulting from execution of one or more program components. One or more events are encountered in the one or more data sources during the execution of the one or more program components. One or more messages are generated, with each message describing an event encountered. Each of the one or more messages is parsed for a name of a corresponding source file in which an associated event was encountered, a corresponding line number at which the event was encountered, and at least one of: a timestamp, severity level, full stack trace, category of the event, and summary of the event. The one or more messages are notified of within an integrated development environment (IDE). Each of the one or more messages is associated in the IDE with the corresponding source file at the corresponding line number.Type: ApplicationFiled: November 30, 2015Publication date: April 20, 2017Inventors: Kulvir S. Bhogal, Lisa Seacat DeLuca, Robert R. Peterson
-
Publication number: 20170109262Abstract: An approach for dynamic test topology visualization is provided. The approach retrieves test data from one or more databases. The approach retrieves test data from an application under test. The approach creates a visual diagram, wherein the visual diagram includes one or more topological elements, one or more topological relationships between the one or more topological elements, the test data, and a screen snapshot of an application under test. The approach overlays the visual diagram with user interaction information. The approach associates the visual diagram to the test execution performed on the application under test.Type: ApplicationFiled: January 6, 2017Publication date: April 20, 2017Inventor: Alok A. Trivedi
-
Publication number: 20170109263Abstract: An apparatus includes a memory and a processor. The memory stores a test plan, a plurality of performed steps, a configuration for a test environment in which the test was performed, and a result of the test. The processor compares the plurality of performed steps to the plurality of planned steps, compares the configuration for a first test environment and the configuration for the second test environment, and determines whether an action of the plurality of actions resulted in a failure. The processor presents a first chart, a second chart, and a third chart the results of the comparisons and determination. The processor deploys an application corresponding to the test plan if each step of the plurality of planned steps was performed during the test, if the second test environment was configured according to the configuration for the first test environment, and if the failure was fixed.Type: ApplicationFiled: October 15, 2015Publication date: April 20, 2017Inventors: Mandeep Singh Anand, Sushil Kumar, Hitendra Kumar
-
Publication number: 20170109264Abstract: A processor receives a rule containing a first set of code statements. The processor compares the first set of code statements of the rule to a second set of code statements of a plurality of code statements of source code. The processor responds to a match of the first set of code statements of the rule and the second set of code statements of the plurality of code statements of the source code, by applying a weight modifier to the rule, which adds a weighted value to the rule, and the processor, in response to a second matching of the first set of code statements of the rule to the second set of code statements of the plurality of code statements of the source code, applies the weight modifier to the rule, which includes a weighted value, and the weight modifier adjusts the weighted value of the rule.Type: ApplicationFiled: January 4, 2017Publication date: April 20, 2017Inventors: Logeswaran T. Rajamanickam, Arun Ramakrishnan, Rohit Shetty
-
Publication number: 20170109265Abstract: A processor receives a rule containing a first set of code statements. The processor compares the first set of code statements of the rule to a second set of code statements of a plurality of code statements of source code. The processor responds to a match of the first set of code statements of the rule and the second set of code statements of the plurality of code statements of the source code, by applying a weight modifier to the rule, which adds a weighted value to the rule, and the processor, in response to a second matching of the first set of code statements of the rule to the second set of code statements of the plurality of code statements of the source code, applies the weight modifier to the rule, which includes a weighted value, and the weight modifier adjusts the weighted value of the rule.Type: ApplicationFiled: January 4, 2017Publication date: April 20, 2017Inventors: Logeswaran T. Rajamanickam, Arun Ramakrishnan, Rohit Shetty
-
Publication number: 20170109266Abstract: In an approach for generating transaction tracking data that is used to simulate a customer environment or test case scenario, a processor receives user input data, wherein the user input data includes, at least, an application topology constructed using a graphical user interface. A processor validates the user input data for, at least, supported environments of components of the application topology. A processor generates transaction tracking data based on, at least, the user input data.Type: ApplicationFiled: October 14, 2015Publication date: April 20, 2017Inventors: Boon C. Chee, Scot W. Dixon, Michelle M.Y. Loffler, Samuel K.H. Seow, Nicholas Wu
-
Publication number: 20170109267Abstract: In an approach for generating transaction tracking data that is used to simulate a customer environment or test case scenario, a processor receives user input data, wherein the user input data includes, at least, an application topology constructed using a graphical user interface. A processor validates the user input data for, at least, supported environments of components of the application topology. A processor generates transaction tracking data based on, at least, the user input data.Type: ApplicationFiled: September 12, 2016Publication date: April 20, 2017Inventors: Boon C. Chee, Scot W. Dixon, Michelle M.Y. Loffler, Samuel K.H. Seow, Nicholas Wu
-
Publication number: 20170109268Abstract: Embodiments of the present invention include systems and methods for dynamically adjusting instrumentation scope of a profiler gent. The method for dynamically adjusting an instrumentation scope of a profiler agent includes: supplying an initial instrumentation scope profile (ISP) that defines an instrumentation scope of a profiler agent to the profiler agent; receiving performance data of a call tree from the profiler agent based on the initial ISP; adjusting the instrumentation scope; updating the initial ISP based on the adjusted instrumentation scope; and supplying the updated ISP to the profiler agent.Type: ApplicationFiled: October 15, 2015Publication date: April 20, 2017Applicant: DELL PRODUCTS L.P.Inventors: ShengZhi Liu, Yinghua Qin, PeiSen Lin
-
Publication number: 20170109269Abstract: Described herein is a test data framework. In accordance with one aspect, the framework creates a test data container that stores test data corresponding to one or more attributes of a business object. The framework may further create a test metaobject instance corresponding to the business object, wherein the test metaobject instance defines associations with the test data container and the business object. The test data container and the test metaobject instance may be sent to a test system for creating one or more instances of the business object that reflect the test data.Type: ApplicationFiled: October 16, 2015Publication date: April 20, 2017Inventors: Thomas ANGERMAYER, Bjoern SANDERS
-
Publication number: 20170109270Abstract: Methods and arrangements for a method of managing crowdsourced devices for application testing, said method comprising: utilizing at least one processor to execute computer code that performs the steps of: receiving, from a mobile device, a request to register itself as a rentable device; receiving, from a remote device, a request to test an application; transmitting, to the remote device, a list of rentable devices available; receiving a selection, from the remote device, of at least one rentable device for testing; and responsive to receiving the selection, transmitting instructions to the at least one rentable device to execute the instructions, the instructions comprising at least one test step for an application. Other variants and embodiments are broadly contemplated herein.Type: ApplicationFiled: October 16, 2015Publication date: April 20, 2017Inventors: Vijay Ekambaram, Ashish Kumar Mathur, Nitendra Rajput, Vivek Sharma
-
Publication number: 20170109271Abstract: An automated test is identified for testing a software system including a graphical user interface (GUI) including a particular GUI element, where the automated test is to simulate user interactions with at least the particular GUI element. The particular GUI element is of a particular type of GUI element and the automated test includes a call to a particular one of a plurality of abstraction layer functions. The automated test is executed, including calling the particular abstraction layer function, where the particular abstraction layer function corresponds to GUI elements of the particular type. A reference to the particular GUI element is received from the particular abstraction layer function.Type: ApplicationFiled: December 30, 2016Publication date: April 20, 2017Inventors: Devin B. Avery, Jacob H. Stoddard
-
Publication number: 20170109272Abstract: According to an example, source code flow analysis may include receiving source code for an application, and identifying virtual flow documents for the application from the source code. The virtual flow documents may represent ordered sequences of method calls for the application. The source code flow analysis may further include extracting features of the virtual flow documents, determining similarity between the virtual flow documents by estimating similarities for the extracted features to determine a flow-to-flow similarity, and clustering the virtual flow documents based on the flow-to-flow similarity. The flow-to-flow similarity may be further used, for example, to generate highest priority virtual flow documents and methods for the source code.Type: ApplicationFiled: December 27, 2016Publication date: April 20, 2017Applicant: Accenture Global Services LimitedInventors: Annervaz KM, Vikrant Shyamkant KAULGUD, Shubhashis SENGUPTA
-
Publication number: 20170109273Abstract: A memory system may include a nonvolatile memory device including a plurality of blocks each including a plurality of pages, and a controller that selects a mapping block from the plurality of blocks, stores address information corresponding to each of other blocks, except for the mapping block and a free block among the plurality of blocks, in each of the plurality of pages, searches for a block including no valid page among the other blocks, and invalidates a page of the mapping block storing the address information corresponding to the searched block.Type: ApplicationFiled: March 4, 2016Publication date: April 20, 2017Inventor: Jong-Min LEE
-
Publication number: 20170109274Abstract: A memory system includes: a first memory device including a plurality of first memories and a first memory controller suitable for controlling the plurality of first memories to store data; a second memory device including a second memory and a second memory controller suitable for controlling the second memory to store data; and a processor suitable for executing an operating system (OS) and an application to access a data storage memory through the first and second memory devices.Type: ApplicationFiled: October 12, 2016Publication date: April 20, 2017Inventors: Do-Yun LEE, Min-Chang KIM, Chang-Hyun KIM, Yong-Woo LEE, Jae-Jin LEE, Hoe-Kwon JUNG
-
Publication number: 20170109275Abstract: Applications may request persistent storage in nonvolatile memory. The persistent storage is maintained across power events and application instantiations. Persistent storage may be maintained by systems with or without memory management units.Type: ApplicationFiled: December 29, 2016Publication date: April 20, 2017Applicant: Micron Technology, Inc.Inventors: Jared E. Hulbert, John C. Rudelic, Hongyu Wang
-
Publication number: 20170109276Abstract: A memory system includes a memory device comprising a plurality of blocks, and a controller suitable for erasing at least one victim block selected from among the plurality of blocks in a first garbage collection operation, and preparing a second garbage collection operation for one or more other blocks, except for the victim block among the plurality of blocks during a period in which the victim block is erased.Type: ApplicationFiled: March 11, 2016Publication date: April 20, 2017Inventor: Jong-Min LEE
-
Publication number: 20170109277Abstract: A memory system includes: a memory unit including first and second memories of different types; a processor separated from the memory unit, and suitable for executing an operating system (OS) and an application to access the data storage memory through the memory unit; and a combined memory controller suitable for transferring data between the memory unit and the processor.Type: ApplicationFiled: October 14, 2016Publication date: April 20, 2017Inventors: Min-Chang KIM, Chang-Hyun KIM, Do-Yun LEE, Yong-Woo LEE, Jae-Jin LEE, Hun-Sam JUNG