Abstract:
Source code of a golden version and a next version of a program is received in which procedure calls are modified to call from an entry point table (EPT) with index numbers corresponding to procedure memory addresses. An executable defect-free golden version program and next version program with a defect are received. A first entry point table (first EPT) for the new version program and a second EPT for the golden version program are generated. A series of substitutions of procedures from the second EPT to the first EPT is performed and an order of substitutions includes: a module set, a module of the module set, a procedure set of the module, and a procedure of the procedure set. The defect producing procedure is identified by substituting in order until the defect is absent and proceeding to the next substitution in order.
Abstract:
Systems and methods are provided to recommend software patches based on task operation mapping. In embodiments, a method includes abstracting test cases for a software patch into a sequence of task operations and parameters associated with each task operation; encoding the task operations and the parameters associated with each task operation based on predetermined rules, thereby generating encoded task operations with unique identifiers assigned thereto and associated encoded parameters with numeric values assigned thereto; generating, using machine learning, a list of frequent operation items, based on the encoded task operations and the associated encoded parameters; generating, using clustering, clusters of parameters for each frequent operation item in the list of frequent operation items; and sending a software patch package including the list of frequent operation items, the clusters of parameters and the software patch to a remote server for distribution to one or more user devices.
Abstract:
In an approach for debugging and simulating application runtime execution, a processor loads source code and logs into a debug tool. A processor generates log debug information including a log map, a log variable cross reference table, and a method call stack tree. A processor determines a plurality of log blocks based on log context in the logs and the method call stack tree. A processor maps the source code to the logs for each log block. A processor suggests a starting point and a breakpoint based on the log variable cross reference table and the log blocks. A processor compares a source code variable value to a log variable value and a source code execution path to a log execution path based on the mapping set between the source code and the logs. A processor simulates the source code variable value with the log variable value.
Abstract:
Member profiles, for the participants of a social networking service and their relationship information with other participants and activity history data, are received. A plurality of groups is generated that include one or more participants. A set of parameters for a collaborative shopping event is received. At least one group is adjusted based upon the set of parameters. The participants of the at least one group are sent an invitation to join the collaborative shopping event. The collaborated shopping event is linked to a cyber shopping service. The at least one group is scored based upon participation of participants in the collaborative shopping event. The participants in the collaborative shopping event are modified based upon the score.
Abstract:
An example operation may include one or more of storing an index that comprises identifiers of role-based access privileges for a plurality of users with respect to a database, receiving a database query associated with a user from a software program, identifying data records within the database that the user has permission to access based on database accessibility rights of the user stored within the index, prior to execution of the database query, loading the identified data records into the memory and filtering out other data records from the database which the user does not have permission to access, and executing the database query on the identified data records loaded from the database and returning query results from the execution to the software program.
Abstract:
Member profiles, for the participants of a social networking service and their relationship information with other participants and activity history data, are received. A plurality of groups is generated that include one or more participants. A set of parameters for a collaborative shopping event is received. At least one group is adjusted based upon the set of parameters. The participants of the at least one group are sent an invitation to join the collaborative shopping event. The collaborated shopping event is linked to a cyber shopping service. The at least one group is scored based upon participation of participants in the collaborative shopping event. The participants in the collaborative shopping event are modified based upon the score.
Abstract:
Examples described herein provide a computer-implemented method for multi-user debugging of a program. The method includes receiving a first request from a first developer to initiate a debug of the program and receiving a second request from a second developer to initiate the debug of the program. The method further includes, responsive to receiving the first request and the second request, initiating the debug of the program. The method further includes sending first source code for the program to the first developer, wherein the first source code is associated with the first developer. The method further includes sending second source code for the program to the second developer, wherein the second source code is associated with the second developer. The method further includes updating the program responsive to receiving a change to at least one of the first source code or the second source code.
Abstract:
Source code of a golden version and a next version of a program is received in which procedure calls are modified to call from an entry point table (EPT) with index numbers corresponding to procedure memory addresses. An executable defect-free golden version program and next version program with a defect are received. A first entry point table (first EPT) for the new version program and a second EPT for the golden version program are generated. A series of substitutions of procedures from the second EPT to the first EPT is performed and an order of substitutions includes: a module set, a module of the module set, a procedure set of the module, and a procedure of the procedure set. The defect producing procedure is identified by substituting in order until the defect is absent and proceeding to the next substitution in order.
Abstract:
Member profiles, for the participants of a social networking service and their relationship information with other participants and activity history data, are received. A plurality of groups is generated that include one or more participants. A set of parameters for a collaborative shopping event is received. At least one group is adjusted based upon the set of parameters. The participants of the at least one group are sent an invitation to join the collaborative shopping event. The collaborated shopping event is linked to a cyber shopping service. The at least one group is scored based upon participation of participants in the collaborative shopping event. The participants in the collaborative shopping event are modified based upon the score.
Abstract:
Member profiles, for the participants of a social networking service and their relationship information with other participants and activity history data, are received. A plurality of groups is generated that include one or more participants. A set of parameters for a collaborative shopping event is received. At least one group is adjusted based upon the set of parameters. The participants of the at least one group are sent an invitation to join the collaborative shopping event. The collaborated shopping event is linked to a cyber shopping service. The at least one group is scored based upon participation of participants in the collaborative shopping event. The participants in the collaborative shopping event are modified based upon the score.