Abstract:
An example method of preserving a modification to an internal state of a computer system includes applying an overlay on a target container. The overlay includes a set of events corresponding to a first set of modifications to a computer system. The method also includes after applying the overlay, receiving a set of user requests corresponding to a second set of modifications to the computer system. The method further includes changing, based on the set of user requests, the third set of internal states of the computer system to the fourth set of internal states. The method also includes removing the overlay from the target container, while preserving the second set of modifications to the computer system.
Abstract:
Methods, systems, and computer program products are included for executing one or more instructions of a program in a debugging session; receiving a command at a debugger, the command comprising an expression for the debugger to evaluate in the debugging session; evaluating the expression, at least in part by the debugger, the evaluating including attempting to perform a write operation to write a data value to a target; preventing the data value from being written to the target; and outputting, by the debugger, a result of the evaluating.
Abstract:
A method relates to identifying, by a processing device, a plurality of subscriber identity modules (SIMs) coupled to the processing device, each of the plurality of SIMs storing data enabling a set of communication services provided by a respective one of a plurality of communication service providers, determining a request parameter comprising at least one of a time, a location of the processing device, or a destination to provide a first communication service, determining a plurality of cost rates to provide the first communication service by the respective one of the plurality of communication service providers in view of a cost rate table and the request parameter, selecting a first SIM from the plurality of SIMs in view of the plurality of cost rates, and displaying, on a screen of the processing device, a first icon indicating the selected first SIM to provide the first communication service.
Abstract:
A meta-debugger receives a first debugging command from a debugger client to set a breakpoint in a first service in a first language and sets the breakpoint in a first native debugger. After receiving a service message invoking the first service, the breakpoint is triggered and the meta-debugger provides to the debugger client a first graphical representation of the first native debugger. The meta-debugger receives a second debugging command from the debugger client, converts the second debugging command into a third debugging command to provide to the first native debugger. After invoking a second service in a second language, the meta-debugger provides to the debugger client a second graphical representation of the second native debugger. The meta-debugger receives a fourth debugging command from the debugger client, converts the fourth debugging command into a fifth debugging command to provide to the second native debugger.
Abstract:
An example method of transmitting data to a destination node in a wireless communications network includes detecting, at a wireless device, a plurality of mesh nodes connected to a common communications medium used to access a wireless communications network. The method also includes calculating a score for the mesh nodes of the plurality of mesh nodes, where the score is based on a hop distance between the respective mesh node and a root access point connected to the wireless communications network, the quality of signal between the wireless device and the respective mesh node, the data bandwidth between the wireless device and the respective mesh node, and/or the current number of mesh nodes using the respective mesh node as a wireless access point to connect to the wireless communications network. The wireless device selects a mesh node to connect to as a mesh access point based on the calculated scores.
Abstract:
A time based touch screen input recognition system detects a touch on a touch screen display by receiving a first signal indicating a start of the touch and starts a timer in response to the first signal. The system monitors a length of the touch as the touch continues, determines a current time period covering the length of the touch using a current value of the timer and identifies a first function corresponding to a current time period. The system further identifies a second function corresponding to a second signal indicating an end of the touch and causes a processing device to implement the corresponding function.
Abstract:
Synchronizing user input with a user interface is disclosed. User input that identifies a selected location on a display device that is presenting a first user interface (UI) is received at the first time. A user input record that includes a location identifier that identifies the selected location, and a user input timestamp that identifies the first time, is stored in a memory. At a second time, a second UI is presented on the display device that is different from the first UI. The second UI includes a user-activatable UI portion having an activatable extent that includes the selected location. After the second time, processing of the user input record is initiated. It is determined that the user input timestamp identifies a time earlier than the second time, and activation of the user-activatable UI portion is inhibited.
Abstract:
An example method of preserving a modification to an internal state of a computer system includes applying an overlay on a target container. The overlay includes a set of events corresponding to a first set of modifications to a computer system. The method also includes after applying the overlay, receiving a set of user requests corresponding to a second set of modifications to the computer system. The method further includes changing, based on the set of user requests, the third set of internal states of the computer system to the fourth set of internal states. The method also includes removing the overlay from the target container, while preserving the second set of modifications to the computer system.
Abstract:
A debugger executes on a computer system to receive a first debugging command from a client, where the first debugging command sets a first instruction in the reactive application to suspend execution of the reactive application, and where during execution of the reactive application the first instruction is triggered which suspends execution of the reactive application. Responsive to the execution of the reactive application being suspended, a system clock of the reactive application is replaced with a substitute clock and the substitute clock is paused. The debugger then receives a second debugging command, where the second debugging command triggers a second instruction in the reactive application to continue execution of the reactive application. Responsive to the execution of the reactive application being continued, clocking of the substitute clock is continued.
Abstract:
A method relates to identifying, by a processing device, a plurality of subscriber identity modules (SIMs) coupled to the processing device, each of the plurality of SIMs storing data enabling a set of communication services provided by a respective one of a plurality of communication service providers, determining a request parameter comprising at least one of a time, a location of the processing device, or a destination to provide a first communication service, determining a plurality of cost rates to provide the first communication service by the respective one of the plurality of communication service providers in view of a cost rate table and the request parameter, selecting a first SIM from the plurality of SIMs in view of the plurality of cost rates, and displaying, on a screen of the processing device, a first icon indicating the selected first SIM to provide the first communication service.