AUTOMATED EVALUATION OF CODE DELIVERY
    31.
    发明公开

    公开(公告)号:US20230394438A1

    公开(公告)日:2023-12-07

    申请号:US18329694

    申请日:2023-06-06

    CPC classification number: G06Q10/101 G06F8/70 G06Q10/103 G06F18/22

    Abstract: Systems, methods and/or computer program products for automating evaluations of code deliveries for software projects. Automated evaluations are generated by selecting software projects and dividing a project into a plurality of code blocks by analyzing the code, build file and build log. Attributes of code blocks are extracted and correlations between code blocks are calculated. Dynamic distance between code blocks is calculated by the correlation and code delivery history, to create a Dynamic General Distance Map and Dynamic User Distance Map for the code blocks. Code delivery distance indicating the code delivery behavior is generated by the Dynamic User Distance Map while the delivery assessment criteria is generated to evaluate code delivery and assess levels of risk associated with delivery of the code. High-level risk indicates that a code delivery may not follow best practices and users are alerted to pay more attention to the code delivery during review.

    Automated evaluation of code delivery

    公开(公告)号:US11734649B1

    公开(公告)日:2023-08-22

    申请号:US17831609

    申请日:2022-06-03

    CPC classification number: G06Q10/101 G06F8/70 G06F18/22 G06Q10/103

    Abstract: Systems, methods and/or computer program products for automating evaluations of code deliveries for software projects. Automated evaluations are generated by selecting software projects and dividing a project into a plurality of code blocks by analyzing the code, build file and build log. Attributes of code blocks are extracted and correlations between code blocks are calculated. Dynamic distance between code blocks is calculated by the correlation and code delivery history, to create a Dynamic General Distance Map and Dynamic User Distance Map for the code blocks. Code delivery distance indicating the code delivery behavior is generated by the Dynamic User Distance Map while the delivery assessment criteria is generated to evaluate code delivery and assess levels of risk associated with delivery of the code. High-level risk indicates that a code delivery may not follow best practices and users are alerted to pay more attention to the code delivery during review.

    Configuration after cluster migration

    公开(公告)号:US11586447B2

    公开(公告)日:2023-02-21

    申请号:US16668003

    申请日:2019-10-30

    Abstract: A method, computer system and computer program product for processing configuration after a cluster migration are provided. In this method, a network booting program is received at a computing node from a management node for a cluster. The cluster includes at least one computing node. An operating system is booted in a memory of the computing node with the received network booting program. Configuration changes are received from the management node, and the configurations in a local storage of the computing node are updated according to the received configuration changes.

    DATA REORGANIZATION
    34.
    发明申请

    公开(公告)号:US20220414122A1

    公开(公告)日:2022-12-29

    申请号:US17360363

    申请日:2021-06-28

    Abstract: A method, system, and computer program product for data reorganization and logs reorganization. The method includes receiving, by one or more processing units, original data. The method also includes classifying, by the one or more processing units, the original data into different types based on a trained type classification model. The method also includes generating, by the one or more processing units, at least one severity for at least part of the original data based on a trained severity classification model, the at least part of the original data corresponding to at least one type. The method also includes outputting, by the one or more processing units, at least one message, the at least one message indicating the severity of the at least part of the original data.

    File exposure to an intended recipient

    公开(公告)号:US11200333B2

    公开(公告)日:2021-12-14

    申请号:US16539632

    申请日:2019-08-13

    Abstract: A method, computer system, and computer program product for file exposure to an intended recipient. A computer system receives a request to view a file is received first, wherein the file is encrypted with a first key generated based on at least one biological feature of an intended recipient. The computer system causes at least one biological feature of a viewer to be captured, wherein the at least one biological feature of the viewer is corresponding to the at least one biological feature of the intended recipient. The computer system generates a second key based on the at least one biological feature of the viewer. The computer decrypts the file with the second key.

    SYSTEM-LEVEL TUNABLE PARAMETER IDENTIFICATION

    公开(公告)号:US20210081760A1

    公开(公告)日:2021-03-18

    申请号:US16572752

    申请日:2019-09-17

    Abstract: Disclosed are a computer-implemented method, a system, and a computer program product for system-level tunable parameter identification. Performance characteristic data for an application to be tuned can be obtained by one or more processing units. At least one system-level tunable parameter for the application to be tuned can be identified by one or more processing units based on the obtained performance characteristic data for the application to be tuned and a pattern between training performance characteristic data and a set of training system-level parameter-related correlation coefficients. The set of training system-level parameter-related correlation coefficients can be respective correlation coefficients of system-level tunable parameters with respect to at least one performance metric.

    MESSAGE PROCESSING
    38.
    发明申请
    MESSAGE PROCESSING 审中-公开

    公开(公告)号:US20200151036A1

    公开(公告)日:2020-05-14

    申请号:US16188600

    申请日:2018-11-13

    Abstract: Embodiments of the present disclosure relate to methods, systems, and computer program products for processing a message including a content and operations performed on the content. According to the method, in response to a message including both a content and a description of operations performed on the content being requested to access, an application may be made to access the content; and the application may be made to execute the operations performed on the content.

Patent Agency Ranking