摘要:
A novel and useful apparatus for and method of associating a dedicated coverage bit to each instruction in a software system. Coverage bits are set every time the software application runs, enabling a more comprehensive and on-going code coverage analysis. The code coverage bit mechanism enables code coverage analysis for all installations of a software application, not just software in development mode or at a specific installation. Code coverage bits are implemented in either the instruction set architecture (ISA) of the central processing unit, the executable file of a software application, a companion file to the executable file or a code coverage table residing in memory of the computer system.
摘要:
a novel and useful apparatus for and method of associating a dedicated coverage bit to each instruction in a software system. Coverage bits are set every time the software application runs, enabling a more comprehensive and on-going code coverage analysis. The code coverage bit mechanism enables code coverage analysis for all installations of a software application, not just software in development mode or at a specific installation. Code coverage bits are implemented in either the instruction set architecture (ISA) of the central processing unit, the executable file of a software application, a companion file to the executable file or a code coverage table residing in memory of the computer system.
摘要:
A data transmission optimization method and system. The method comprises analyzing program code to identify data access calls in the program code, using one or more processor; determining whether a first data access call is for retrieving target data stored in a data structure with a plurality of fields, wherein the target data is stored in one or more target fields of the data structure; determining whether servicing the first data access call will result in transfer of non-target data stored in one or more non-target fields in the data structure; and replacing the first data access call with a second data access call, wherein servicing the second data access call will result in transfer of the target data and minimizes the transfer of non-target data.
摘要:
A method for consistent version of multiple information items is provided. The method includes receiving a conditional request to copy a version of multiple information items at a condition fulfillment point of time that is associated with a fulfillment of a condition of the conditional request. Then determining that the condition is fulfilled, and participating in generating a condition fulfillment point in time version of the multiple information items.
摘要:
A method for establishing a communication connection between a first communication device and a second communication device, the method comprising requesting contact information for a second communication device, during a first communication connection established between a first communication device and a third communication device; receiving the contact information from the third communication device, in response to a third party interacting with the third communication device during the first communication connection; and establishing a second communication connection between the first communication device and the second communication device based on the contact information received from the third communication device, wherein the second communication connection is established by way of the first communication device independently initiating communication with the second communication device.
摘要:
A trigger can relate to power usage of a computing device that a computer program to be run or running on the computing device causes. Detection of the trigger causes performance of a power-saving action. The power-saving action relates to the computer program to reduce the power usage of the computing device. The power-saving action is a strictly software-oriented action. An amount of power of the computing device used in detecting the trigger and performing the power-saving action is less than a reduction of the power usage of the computing device that results from performing the power-saving action, resulting in a net power usage reduction.
摘要:
A method for re-establishing a backup relationship between first and second volumes associated with one or more storage media in a data storage system is provided. The method comprises storing first information for preserving the backup relationship, in response to or in advance of receiving a request to terminate the backup relationship; recording changes to the first or second volumes that occur subsequent to terminating the backup relationship; and re-establishing the backup relationship between the first and second volumes according to the first information such that the first and second volumes are synchronized by merging the recorded changes with the first or second volumes.
摘要:
Provided are a method, system, and article of manufacture for limiting the availability of computational resources to a device to stimulate a user of the device to apply necessary updates. Indication of the n update to the device is received and a determination is made as to whether the update has been applied to the device. The availability of computational resources at the device to use to execute processes at the device are limited in response to determining that the update has not been applied to the device. Processes are executed at the device using the limited available computational resources after the limiting of the availability of the computational resources. A determination is made as to whether the update has been applied to the device after limiting the availability of the computational resources. The limiting of the availability of the computational resources at the device is reversed in response to determining that the update to the device was applied.
摘要:
A method, system and computer program product for providing accurate recipients lists. Keywords (e.g., processor, monitor) in a document (e.g., electronic mail message) are identified. These keywords are tagged, where tagging refers to an index term assigned to a piece of information, such as these keywords. A list of recipients may be provided to be correlated with these tagged keywords. The list of recipients is associated with these tagged keywords thereby providing a predefined recipient list to be used when a subsequent document with these tagged keywords is identified. Furthermore, the user is provided an option to modify this recipient list when a subsequent document containing the tagged keywords associated with the recipient list is identified thereby ensuring an accurate recipient list is used.
摘要:
Two or more received SMS messages can be aggregated into a single consolidated SMS message. The consolidated SMS message can be conveyed across a boundary in accordance with SMS protocols. A fee per SMS message can be incurred for conveying SMS messages across the boundary. The fee can be minimized by use of the consolidated SMS message in lieu of having to convey multiple SMS messages. Once the consolidated SMS message have been conveyed across the boundary, the consolidated SMS message can be parsed or decomposed into its constituent SMS messages, each of which can be conveyed to an intended recipient.