Abstract:
Synchronizing user input with a user interface is disclosed. User input that identifies a selected location on a display device that is presenting a first user interface (UI) is received at the first time. A user input record that includes a location identifier that identifies the selected location, and a user input timestamp that identifies the first time, is stored in a memory. At a second time, a second UI is presented on the display device that is different from the first UI. The second UI includes a user-activatable UI portion having an activatable extent that includes the selected location. After the second time, processing of the user input record is initiated. It is determined that the user input timestamp identifies a time earlier than the second time, and activation of the user-activatable UI portion is inhibited.
Abstract:
An example method of preserving a modification to an internal state of a computer system includes applying an overlay on a target container. The overlay includes a set of events corresponding to a first set of modifications to a computer system. The method also includes after applying the overlay, receiving a set of user requests corresponding to a second set of modifications to the computer system. The method further includes changing, based on the set of user requests, the third set of internal states of the computer system to the fourth set of internal states. The method also includes removing the overlay from the target container, while preserving the second set of modifications to the computer system.
Abstract:
A debugger executes on a computer system to receive a first debugging command from a client, where the first debugging command sets a first instruction in the reactive application to suspend execution of the reactive application, and where during execution of the reactive application the first instruction is triggered which suspends execution of the reactive application. Responsive to the execution of the reactive application being suspended, a system clock of the reactive application is replaced with a substitute clock and the substitute clock is paused. The debugger then receives a second debugging command, where the second debugging command triggers a second instruction in the reactive application to continue execution of the reactive application. Responsive to the execution of the reactive application being continued, clocking of the substitute clock is continued.
Abstract:
A method relates to identifying, by a processing device, a plurality of subscriber identity modules (SIMs) coupled to the processing device, each of the plurality of SIMs storing data enabling a set of communication services provided by a respective one of a plurality of communication service providers, determining a request parameter comprising at least one of a time, a location of the processing device, or a destination to provide a first communication service, determining a plurality of cost rates to provide the first communication service by the respective one of the plurality of communication service providers in view of a cost rate table and the request parameter, selecting a first SIM from the plurality of SIMs in view of the plurality of cost rates, and displaying, on a screen of the processing device, a first icon indicating the selected first SIM to provide the first communication service.
Abstract:
An example method of transmitting data to a destination node in a wireless communications network includes detecting, at a wireless device, a plurality of mesh nodes connected to a common communications medium used to access a wireless communications network. The method also includes calculating a score for the mesh nodes of the plurality of mesh nodes, where the score is based on a hop distance between the respective mesh node and a root access point connected to the wireless communications network, the quality of signal between the wireless device and the respective mesh node, the data bandwidth between the wireless device and the respective mesh node, and/or the current number of mesh nodes using the respective mesh node as a wireless access point to connect to the wireless communications network. The wireless device selects a mesh node to connect to as a mesh access point based on the calculated scores.
Abstract:
A meta-debugger receives a first debugging command from a debugger client to set a breakpoint in a first service in a first language and sets the breakpoint in a first native debugger. After receiving a service message invoking the first service, the breakpoint is triggered and the meta-debugger provides to the debugger client a first graphical representation of the first native debugger. The meta-debugger receives a second debugging command from the debugger client, converts the second debugging command into a third debugging command to provide to the first native debugger. After invoking a second service in a second language, the meta-debugger provides to the debugger client a second graphical representation of the second native debugger. The meta-debugger receives a fourth debugging command from the debugger client, converts the fourth debugging command into a fifth debugging command to provide to the second native debugger.
Abstract:
Methods, systems, and computer program products are included for determining the risk that a file includes malware. The risk is determined by sending identifying information of the file from a client to a server. The server matches the identifying information with identifying information stored in a registry, in order to identify the file. Once the file is identified, the server identifies the risk of malware corresponding to the file, and sends the risk information to the client. The client is able to use the risk information to make determinations regarding performing operations with regard to the file.
Abstract:
A system includes a processor and a memory comprising machine readable instructions that when executed by the processor, cause the system to receive command line instructions associated with execution of a Java virtual machine, the command line instructions associated with a set of rules for switching the Java virtual machine to a debugging mode, start execution of the Java virtual machine, start execution of an application on the Java virtual machine in a standard mode, during execution of the application, detecting an event that triggers a rule within the set of rules, and in response to the event, automatically switching the Java virtual machine from the standard mode to the debugging mode.
Abstract:
A mechanism for migrating an application in a process virtual machine environment. A method includes pausing execution of an application in a source process virtual machine (PVM). The method also includes recording a state of the source PVM at a time of the pausing of the execution of the application. The method further includes copying the recorded state of the source PVM into a destination PVM, wherein the destination PVM resumes the execution of the application using the recorded state.
Abstract:
Systems, methods, and techniques of distributing a workload of an application to a GPU are provided. An example method includes obtaining an intermediate representation of a source code portion of an application and compiling the intermediate representation into a set of instructions that is native to the GPU. The set of instructions includes a binary representation of the source code portion executable on the GPU, and execution of the set of instructions on the GPU includes processing a workload of the application. The method also includes transforming data associated with the source code portion into one or more data types native to the GPU and sending to the GPU a communication including the set of instructions executable on the GPU and the one or more data types native to the GPU.