Abstract:
A method, apparatus, and computer instructions for updating a software component. A determination is made as to whether to update the software component (602). The software component is updated to form an updated software component in response to a determination to update the software component (606). The updated software component is automatically tested (612). A corrective action is performed in response to a failure in testing of the updated component (620).
Abstract:
A method is disclosed for automatically exercising a target application process having a Graphical User Interface (GUI), as is a system for implementing a method and a computer program, stored on a computer readable medium, that embodies the method. The method includes the computer executed steps of starting the target application process; detecting a presence of a first window opened by the target application process; processing the first window by determining a content of the first window, including a list of user controls; exercising the user controls until all of the user controls have been exercised, with user controls likely to cause termination being identified and exercised after user controls that are less likely to cause termination; and closing the first window. The step of exercising includes steps of estimating a best order of execution of user controls and text to be input to user input fields. If exercising a particular user control causes the first window to close before all of the user controls have been exercised for the first window, the method further includes steps of reopening the first window; and exercising user controls other than the particular user control unless the particular user control is required to close the first window when all of the window s user controls have been exercised. If exercising a particular user control causes the second window to open, the method includes steps of determining a content of the second window, including a list of user controls; exercising the user controls until all of the user controls of the second window have been exercised; closing the second window; and continuing the processing of the first window.
Abstract:
A method and system for the automatic determination of the behavioural profile of a program suspected of having worm-like characteristics includes analyzing data processing system resources required by the program and, if the required resources are not indicative of the program having worm-like characteristics, running the program in a controlled non-network environment while monitoring and logging accesses to system resources to determine the behaviour of the program in the non-network environment. A logged record of the observed behaviour is analyzed to determine if the behaviour is indicative of the program having worm-like characteristics. The non-network environment may simulate the appearance of a network to the program, without emulating the operation of the network.
Abstract:
PROBLEM TO BE SOLVED: To provide a system and method for providing tailored website versions to users according to a standard including users' skill levels of website design. SOLUTION: Users create, share, and build collaboration communities around tailored versions of the functional pages of a website, such as the pages used to select and purchase products, or the pages used to present course materials in an online-learning site. The tailored versions of the website are stored at the common website development website or at another server side location. Users access the tailored versions to select a tailored version for their own use and/or modification. COPYRIGHT: (C)2007,JPO&INPIT
Abstract:
Techniques are disclosed for the dynamic introduction of new components to be used during provisioning of solutions in data processing system environments such as service delivery environments. For example, in a provisioning system that manages provisioning of components in a data processing system, an automated method of dynamically provisioning one or more new components in the data processing system comprises the provisioning system performing the following steps. The provisioning system accepts a registration of a new component during a runtime period of the data processing system, wherein the new component has not been previously registered in the data processing system prior to the runtime period, and further wherein the registration comprises obtaining information relating to at least one of one or more prerequisites and a configuration associated with the new component. The provisioning system causes a modification to the data processing system by enabling use of the registered new component therein.
Abstract:
A method, apparatus, and computer instructions for updating a software component. A determination is made as to whether to update the software component (602). The software component is updated to form an updated software component in response to a determination to update the software component (606). The updated software component is automatically tested (612). A corrective action is performed in response to a failure in testing of the updated component (620).
Abstract:
A method, apparatus, and computer instructions for updating a software component. A determination is made as to whether to update the software component. The software component is updated to form an updated software component in response to a determination to update the software component. The updated software component is automatically tested. A corrective action is performed in response to a failure in testing of the updated component.
Abstract:
A method and system for the automatic determination of the behavioral profile of a program suspected of having worm-like characteristics includes analyzing data processing system resources required by the program and, if the required resources are not indicative of the program having worm-like characteristics, running the program in a controlled non-network environment while monitoring and logging accesses to system resources to determine the behavior of the program in the non-network environment. A logged record of the observed behavior is analyzed to determine if the behavior is indicative of the program having worm-like characteristics. The non-network environment may simulate the appearance of a network to the program, without emulating the operation of the network.
Abstract:
A method is disclosed for automatically exercising a target application process having a Graphical User Interface (GUI), as is a system for implementing a method and a computer program, stored on a computer readable medium, that embodies the method. The method includes the computer executed steps of starting the target application process; detecting a presence of a first window opened by the target application process; processing the first window by determining a content of the first window, including a list of use r controls; exercising the user controls until all of the user controls have been exercised, with user controls likely to cause termination being identified and exercised after user controls that are less likely to cause termination; and closing the first window. The step of exercising includes steps of estimating a best order of execution of user controls and text to b e input to user input fields. If exercising a particular user control causes t he first window to close before all of the user controls have been exercised fo r the first window, the method further includes steps of reopening the first window; and exercising user controls other than the particular user control unless the particular user control is required to close the first window whe n all of the window s user controls have been exercised. If exercising a particular user control causes the second window to open, the method include s steps of determining a content of the second window, including a list of use r controls; exercising the user controls until all of the user controls of the second window have been exercised; closing the second window; and continuing the processing of the first window.