Abstract:
An application process can be executed based on an initialization instruction, where the application process includes instructions associated with a hook framework. A virtual machine configured to load the hook framework on the virtual machine based on instructions included in the application process can be initiated and the instructions associated with the hook framework can be executed upon initiation of the virtual machine to insert a hook on the virtual machine. A nascent process configured to initiate an additional virtual machine can be initiated based on a request to load an application, where the additional virtual machine is hooked via the hook inserted on the virtual machine.
Abstract:
Example embodiments relate to tracing source code for end user monitoring. In example embodiments, an application is monitored to obtain an interaction log, where the interaction log tracks application interactions by each of a plurality of synthetic monitors. Further, an execution of application code that is associated with the application is monitored to obtain an instrumentation log. At this stage, the interaction log and the instrumentation log are used to determine relationships between portions of the application code and the plurality of synthetic monitors. A notification of a modification to the application is received, and an affected subset of the synthetic monitors that are affected by the modification are identified based on the relationships.
Abstract:
Simulating sensors can include hooking an application associated with sensory data and associating the sensory data with an automation instruction. Simulating sensors can include providing the sensory data to a support device having an ability to modify the application and automatically causing the support device to simulate a sensory input using the sensory data by executing the automation instruction.
Abstract:
Examples disclosed herein relate to acquiring identification of an application lifecycle management (ALM) entity associated with similar code. Examples include identifying a target code segment, and acquiring, from an ALM system, identification of an ALM entity associated with other code similar to the target code segment and identified by a code similarity system.
Abstract:
A monitor that monitors an application is provided herein. The monitor provides a monitor function that monitors an application. The monitor embeds the monitor function in meta data of a code base of the application. The monitor function embedded in the code base is activated. The monitor function is used to monitor data associated therewith during deployment of the application.
Abstract:
Verifying user interface conformance can include deriving a conformance rule set based on desired user interface characteristics identified through an examination of mockup data for the user interface. That mockup data includes a visual representation of the desired characteristics. Conformance data can then be generated based on differences between the desired characteristics and actual characteristics. Those differences are identified by processing the conformance rule set against screen capture data of the user interface as produced by an application under test. The screen capture data includes a visual representation of the actual characteristics of the user interface.
Abstract:
An application process can be executed based on an initialization instruction, where the application process includes instructions associated with a hook framework. A virtual machine configured to load the hook framework on the virtual machine based on instructions included in the application process can be initiated and the instructions associated with the hook framework can be executed upon initiation of the virtual machine to insert a hook on the virtual machine. A nascent process configured to initiate an additional virtual machine can be initiated based on a request to load an application, where the additional virtual machine is hooked via the hook inserted on the virtual machine.
Abstract:
An example method for handling dependencies between feature flags can include defining, by a processing resource executing instructions, dependencies between a plurality of feature flags in a process executable by the processing resource. The method can include enforcing, by the processing resource executing instructions, the dependencies during activation of a first feature by a determination of validity of utilization of a feature flag as a switch for a second feature.
Abstract:
Examples disclosed herein relate to acquiring identification of an application lifecycle management (ALM) entity associated with similar code. Examples include identifying a target code segment, and acquiring, from an ALM system, identification of an ALM entity associated with other code similar to the target code segment and identified by a code similarity system.
Abstract:
Example embodiments relate to tracing source code for end user monitoring. In example embodiments, an application is monitored to obtain an interaction log, where the interaction log tracks application interactions by each of a plurality of synthetic monitors. Further, an execution of application code that is associated with the application is monitored to obtain an instrumentation log. At this stage, the interaction log and the instrumentation log are used to determine relationships between portions of the application code and the plurality of synthetic monitors. A notification of a modification to the application is received, and an affected subset of the synthetic monitors that are affected by the modification are identified based on the relationships.