Universal lexical analyzers
    41.
    发明授权

    公开(公告)号:US10169324B2

    公开(公告)日:2019-01-01

    申请号:US15373204

    申请日:2016-12-08

    Abstract: An example lexical analysis system may include lexical analyzer instructions and training instructions. The lexical analyzer instructions, when executed, may form a universal lexical analyzer that is to lexically analyze an input program by evaluating a function that maps an input tuple of lexemes to an output tuple of tokens based on input probability parameters. The universal lexical analyzer may be configurable for any programming language by inputting a set of probability parameters for the respective programming language as the input probability parameters of the function. The training instructions, when executed, may generate a set of probability parameters for any programming language by: receiving training programs that are in the respective programming language, each comprising a tuple of lexemes with associated tokens, and determining the set of probability parameters for the respective programming language based on lexemes and tokens in the training programs that are in the respective programming language.

    Dependency monitoring
    43.
    发明授权

    公开(公告)号:US10162696B2

    公开(公告)日:2018-12-25

    申请号:US14761370

    申请日:2013-01-31

    Abstract: Dependency monitoring can include monitoring a first application and a second application for un-expected behavior. Dependency monitoring can also include receiving a description of a number of dependencies between a number of applications wherein the description of the number of dependencies is created before monitoring of the first application and the second application begins. Dependency monitoring can include sending a message to an information technology (IT) personnel, wherein the message identifies a dependency from the number of dependencies between the first application and the second application based on the description of the number of dependencies.

    Threat scores for a hierarchy of entities

    公开(公告)号:US10104109B2

    公开(公告)日:2018-10-16

    申请号:US14914122

    申请日:2013-09-30

    Abstract: A device for providing hierarchical threat intelligence includes a non-transitory machine-readable storage medium storing instructions that cause the device to receive, a plurality of calculated threat scores for a plurality of threat management devices, wherein the threat scores are respectively associated with context information, determine a first threat scores for a first entity based on a first subset of the calculated threat scores, determine a second threat score for a second entity based on a second subset of the calculated threat scores, receive update information of one of the calculated threat scores of the first subset from a listener of the threat management devices, and update the first threat score based on the update information.

    Determining code complexity scores
    46.
    发明授权

    公开(公告)号:US10102105B2

    公开(公告)日:2018-10-16

    申请号:US15302759

    申请日:2014-06-24

    Abstract: In one example of the disclosure, code lines for a software program are received, the code lines including a unit of code lines. Code entities within the unit are identified. Each code entity includes a line or consecutive lines of code implementing a distinct program requirement or defect fix for the program. Context changes are identified within the unit, each context change including an occurrence of a first code line set implementing an entity, adjacent to a second code line set implementing another entity, within a same code scope. A code complexity score is determined based upon counts of entities identified and context changes identified within the unit, and upon counts of code lines and entities within the program.

    Legacy system
    47.
    发明授权

    公开(公告)号:US10073761B2

    公开(公告)日:2018-09-11

    申请号:US14915341

    申请日:2013-09-30

    Abstract: An example method for creating and operating a mobile application for an existing legacy system is provided in accordance with an aspect of the present disclosure. The method includes encapsulating a plurality of user interface (UI) automation scripts of an existing legacy system with an application programming interface (API) wrapper associated with a mobile application. In response to a call from the mobile application, the method further includes utilizing a selected one of the plurality of recorded UI automation scripts in the API wrapper to execute at least one action in the legacy system. The method also includes returning results from the at least one action in the legacy system to the mobile application.

    DETERMINING IDLE TESTING PERIODS
    50.
    发明申请

    公开(公告)号:US20180143897A1

    公开(公告)日:2018-05-24

    申请号:US15568099

    申请日:2015-05-04

    CPC classification number: G06F11/3688 G06F11/302 G06F11/3692

    Abstract: Example implementations relate to determining idle testing periods. Some implementations may include a data capture engine to capture data points during test executions of the application under test. The data points may include, for example, test action data and application action data. Additionally, some implementations may include a data correlation engine to correlate each of the data points with a particular test execution of the test executions, and each of the data points may be correlated based on a sequence of events that occurred during the particular test execution. Furthermore, some implementations may also include an idle testing period determination engine to determine, based on the correlation of the data points, idle testing periods of the test executions. The idle testing periods may be periods of time where both the test executions and the application under test are idle.

Patent Agency Ranking