-
公开(公告)号:AU2002234575A1
公开(公告)日:2002-07-16
申请号:AU2002234575
申请日:2001-12-14
Applicant: IBM
Inventor: SEGAL ALLA , SWIMMER MORTON , BOULAY JEAN-MICHAEL
Abstract: A method is disclosed for automatically exercising a target application process having a Graphical User Interface (GUI), as is a system for implementing a method and a computer program, stored on a computer readable medium, that embodies the method. The method includes the computer executed steps of starting the target application process; detecting a presence of a first window opened by the target application process; processing the first window by determining a content of the first window, including a list of user controls; exercising the user controls until all of the user controls have been exercised, with user controls likely to cause termination being identified and exercised after user controls that are less likely to cause termination; and closing the first window. The step of exercising includes steps of estimating a best order of execution of user controls and text to be input to user input fields. If exercising a particular user control causes the first window to close before all of the user controls have been exercised for the first window, the method further includes steps of reopening the first window; and exercising user controls other than the particular user control unless the particular user control is required to close the first window when all of the window's user controls have been exercised. If exercising a particular user control causes the second window to open, the method includes steps of determining a content of the second window, including a list of user controls; exercising the user controls until all of the user controls of the second window have been exercised; closing the second window; and continuing the processing of the first window.
-
公开(公告)号:DE60311666D1
公开(公告)日:2007-03-22
申请号:DE60311666
申请日:2003-07-17
Applicant: IBM
Inventor: ARNOLD CARLISLE , CHESS MICHAEL , MORAR FREDERICK , SEGAL ALLA , WHALLEY NICHOLAS , WHITE RICHARD
Abstract: A method and system for the automatic determination of the behavioral profile of a program suspected of having worm-like characteristics includes analyzing data processing system resources required by the program and, if the required resources are not indicative of the program having worm-like characteristics, running the program in a controlled non-network environment while monitoring and logging accesses to system resources to determine the behavior of the program in the non-network environment. A logged record of the observed behavior is analyzed to determine if the behavior is indicative of the program having worm-like characteristics. The non-network environment may simulate the appearance of a network to the program, without emulating the operation of the network.
-
公开(公告)号:AU2003288894A1
公开(公告)日:2004-04-08
申请号:AU2003288894
申请日:2003-05-27
Applicant: IBM
Inventor: DAS RAJARSHI , LASSETTRE EDWIN , SEGAL ALLA , WHALLEY IAN , WHITE STEVE
Abstract: A method, apparatus, and computer instructions for updating a software component. A determination is made as to whether to update the software component. The software component is updated to form an updated software component in response to a determination to update the software component. The updated software component is automatically tested. A corrective action is performed in response to a failure in testing of the updated component.
-
公开(公告)号:AU2003252077A1
公开(公告)日:2004-04-08
申请号:AU2003252077
申请日:2003-07-21
Applicant: IBM
Inventor: CHAN HOI , DAS RAJARSHI , KEPHART JEFFREY , SEGAL ALLA
Abstract: A method, computer program product, and data processing system for recognizing, tracing, diagnosing, and repairing problems in an autonomic computing system is disclosed. Rules and courses of actions to follow in logging data, in diagnosing faults (or threats of faults), and in treating faults (or threats of faults) are formulated using an adaptive inference and action system. The adaptive inference and action system includes techniques for conflict resolution that generate, prioritize, modify, and remove rules based on environment-specific information, accumulated time-sensitive data, actions taken, and the effectiveness of those actions. Thus, the present invention enables a dynamic, autonomic computing system to formulate its own strategy for self-administration, even in the face of changes in the configuration of the system.
-
公开(公告)号:CA2717505C
公开(公告)日:2017-12-12
申请号:CA2717505
申请日:2009-04-24
Applicant: IBM
Inventor: KARVE ALEXEI ARUN , MOHINDRA AJAY , RENDAHL RANDY ALLAN , SEGAL ALLA
IPC: H04L12/28
Abstract: Techniques are disclosed for the dynamic introduction of new components to be used during provisioning of solu-tions in data processing system environments such as service delivery environments. For example, in a provisioning system that manages provisioning of components in a data processing system, an automated method of dynamically provisioning one or more new components in the data processing system comprises the provisioning system performing the following steps. The provision-ing system accepts a registration of a new component during a runtime period of the data processing system, wherein the new component has not been previously registered in the data processing system prior to the runtime period, and further wherein the registration comprises obtaining information relating to at least one of one or more prerequisites and a configuration associated with the new component. The provisioning system causes a modification to the data processing system by enabling use of the reg-istered new component therein.
-
公开(公告)号:CA2717505A1
公开(公告)日:2009-10-29
申请号:CA2717505
申请日:2009-04-24
Applicant: IBM
Inventor: KARVE ALEXEI ARUN , MOHINDRA AJAY , RENDAHL RANDY ALLAN , SEGAL ALLA
Abstract: Techniques are disclosed for the dynamic introduction of new components to be used during provisioning of solu-tions in data processing system environments such as service delivery environments. For example, in a provisioning system that manages provisioning of components in a data processing system, an automated method of dynamically provisioning one or more new components in the data processing system comprises the provisioning system performing the following steps. The provision-ing system accepts a registration of a new component during a runtime period of the data processing system, wherein the new component has not been previously registered in the data processing system prior to the runtime period, and further wherein the registration comprises obtaining information relating to at least one of one or more prerequisites and a configuration associated with the new component. The provisioning system causes a modification to the data processing system by enabling use of the reg-istered new component therein.
-
公开(公告)号:AT353452T
公开(公告)日:2007-02-15
申请号:AT03738350
申请日:2003-07-17
Applicant: IBM
Inventor: ARNOLD WILLIAM CARLISLE , CHESS DAVID MICHAEL , MORAR JOHN FREDERICK , SEGAL ALLA , WHALLEY IAN NICHOLAS , WHITE STEVE RICHARD
Abstract: A method and system for the automatic determination of the behavioral profile of a program suspected of having worm-like characteristics includes analyzing data processing system resources required by the program and, if the required resources are not indicative of the program having worm-like characteristics, running the program in a controlled non-network environment while monitoring and logging accesses to system resources to determine the behavior of the program in the non-network environment. A logged record of the observed behavior is analyzed to determine if the behavior is indicative of the program having worm-like characteristics. The non-network environment may simulate the appearance of a network to the program, without emulating the operation of the network.
-
18.
公开(公告)号:AU2003244875A1
公开(公告)日:2004-02-09
申请号:AU2003244875
申请日:2003-07-17
Applicant: IBM
Inventor: ARNOLD WILLIAM CARLISLE , CHESS DAVID MICHAEL , MORAR JOHN FREDERICK , SEGAL ALLA , WHALLEY IAN NICHOLAS , WHITE STEVE RICHARD
Abstract: A method and system for the automatic determination of the behavioral profile of a program suspected of having worm-like characteristics includes analyzing data processing system resources required by the program and, if the required resources are not indicative of the program having worm-like characteristics, running the program in a controlled non-network environment while monitoring and logging accesses to system resources to determine the behavior of the program in the non-network environment. A logged record of the observed behavior is analyzed to determine if the behavior is indicative of the program having worm-like characteristics. The non-network environment may simulate the appearance of a network to the program, without emulating the operation of the network.
-
公开(公告)号:CA2436974A1
公开(公告)日:2002-07-11
申请号:CA2436974
申请日:2001-12-14
Applicant: IBM
Inventor: SEGAL ALLA , SWIMMER MORTON G , BOULAY JEAN-MICHEL
Abstract: A method is disclosed for automatically exercising a target application process having a Graphical User Interface (GUI), as is a system for implementing a method and a computer program, stored on a computer readable medium, that embodies the method. The method includes the computer executed steps of starting the target application process; detecting a presence of a first window opened by the target application process; processing the first window by determining a content of the first window, including a list of use r controls; exercising the user controls until all of the user controls have been exercised, with user controls likely to cause termination being identified and exercised after user controls that are less likely to cause termination; and closing the first window. The step of exercising includes steps of estimating a best order of execution of user controls and text to b e input to user input fields. If exercising a particular user control causes t he first window to close before all of the user controls have been exercised fo r the first window, the method further includes steps of reopening the first window; and exercising user controls other than the particular user control unless the particular user control is required to close the first window whe n all of the window s user controls have been exercised. If exercising a particular user control causes the second window to open, the method include s steps of determining a content of the second window, including a list of use r controls; exercising the user controls until all of the user controls of the second window have been exercised; closing the second window; and continuing the processing of the first window.
-
-
-
-
-
-
-
-