摘要:
Various technologies and techniques are disclosed for using heuristics to determine source code ownership. A request is received to identify at least one owner of a particular source code unit. Initial ownership totals are calculated for the source code unit based upon a code contribution heuristic. The code contribution heuristic counts lines of code that were added and that were modified in the totals for contributing users. The initial ownership totals of the particular source code unit are adjusted based upon at least one other heuristic. The at least one owner of the particular source code unit is then output to an output device. The at least one owner is determined by selecting a contributing user that has a highest ranking total after adjusting the initial ownership totals. For example, there can be a primary owner and a backup owner selected based on the ranking of the ownership totals.
摘要:
Various technologies and techniques are disclosed for using heuristics to determine source code ownership. A request is received to identify at least one owner of a particular source code unit. Initial ownership totals are calculated for the source code unit based upon a code contribution heuristic. The code contribution heuristic counts lines of code that were added and that were modified in the totals for contributing users. The initial ownership totals of the particular source code unit are adjusted based upon at least one other heuristic. The at least one owner of the particular source code unit is then output to an output device. The at least one owner is determined by selecting a contributing user that has a highest ranking total after adjusting the initial ownership totals. For example, there can be a primary owner and a backup owner selected based on the ranking of the ownership totals.
摘要:
A method and user interface for informing a user of the status of a network connection are provided. Conventionally, the “connected” icon in the system tray only informs the user that the computer is linked to a network medium, such as an Ethernet or wireless access point. This icon does not indicate whether a routable IP address has been obtained. In this invention, an icon is used to inform the user that the network connection is disabled, connecting, connected (routable IP address obtained), or in a warning state. The warning state indicates that a non-routable IP address (e.g. autonet address) has been obtained, which will likely be unsatisfactory to the user. However, when connected to an 802.11 ad-hoc network, or when IP status checking is disabled, a non-routable IP address is deemed acceptable, and thus the “connected” icon is displayed.
摘要:
A materials trouble shooter is provided for use with 3D models in computer graphics. An error texture is displayed that is distinguishable from textures without errors. If a texture is missing or is applied incorrectly to the 3D model, an error texture is displayed using an error shader instead of a regular shader for the texture for which an error in loading or application has been detected.
摘要:
Interrelated items in a complex item set (such as a set of components in a complex software architecture) may be difficult to present in a manner that facilitates an understanding and evaluation of the item set, due to the amount of information and the difficulty in automatically discerning the organization of the item set. A set of criteria may be utilized to form criterion groups to which items matching respective criteria may be automatically assigned. Further grouping assignments may be achieved by identifying an ungrouped item that is associated with a grouped item. Such techniques may be applied in many variations to yield a representation of the item set, and a presentation of the item set to a user, that aggregates similar items and interrelationships, thereby promoting an understanding and analysis of the structure and organization of the item set while reducing the user involvement in the generation of same.
摘要:
An integrated development environment includes a visual shader designer engine that enables a user to create a pixel shader embodied as a directed acyclic graph. The directed acyclic graph contains nodes, where each node is associated with an operation that is used to generate a color characteristic of a final rendered model. The visual shader designer engine displays a rendered image at each node that is the result of the node's operation during development of the directed acyclic graph. An error texture is rendered in a node when an erroneous condition is detected in rendering a node's operations.
摘要:
Scalable architecture for managing and rendering a large graph containing a large number of nodes and edges. The user can group arbitrary nodes to encapsulate complexity without losing any of the cross-group edges dependencies. All edges of the nodes contained in the group are rolled up into roll-up links (or “arteries”) where the graphical thickness indicates relatively how many links are bundled. By collapsing groups the entire view gives the user a clearer understanding of the graph. Information related to the groups and links is retained for drill-into to obtain the details inside each group on the same canvas and for user navigation across groups.
摘要:
Methods and systems are described for simplified creation of, connection to, and termination from an ad hoc wireless network. Graphical user interfaces are used to guide users though creation and joining ad hoc network. The option to share one user's Internet connection with the entire ad hoc network is also described. The ad hoc networks described can provide some managed services traditionally unavailable in ad hoc networks, such as IP address assignment and name resolution services. The ad hoc networks can be created with termination criteria, such that a computer's connection to the ad hoc network is automatically terminated and previous network configuration settings are restored when one or a combination of termination criteria are met.
摘要:
Component identifications in a package identify components to be installed and/or components to be uninstalled. Each component has one or more install-uninstall-privilege requirements, namely, credentials that must be available to an installer-uninstaller in order to install-uninstall that component. Individual components and component sets are installed and/or uninstalled based on the privilege requirement(s) and the privilege(s) available to a current user of a target system. If required privilege(s) are not available, notice is given and additional privileges are requested. A user may receive partial functionality from a partially completed installation, and additional components may be installed later as more privileges become available.
摘要:
In one or more embodiments, a cascading item and action browser enables items and associated actions to be displayed. In at least some embodiments, items are presented in a column and can be selected by a user. Responsive to selecting a particular item or items, actions that can be performed on or relative to a selected item or items can be presented in a second adjacent column. From here, users can select one or more actions that can be performed on items presented in the first-mentioned column. Results of the action or actions being performed, at least some of which can include additional items, can then be presented in a next-adjacent column. Navigation through the items and actions displayed in their respective columns can then continue in a cascaded fashion.