Patent application number | Description | Published |
20130007010 | REQUIREMENTS EXTRACTION FROM EXTERNAL SOURCES FOR SOFTWARE LIFECYCLE MANAGEMENT - Embodiments of the present invention provide a method, system and computer program product for software requirements extraction from external sources for software development. In an embodiment of the invention, a method for software requirements extraction from external sources for software development includes retrieving content from over a computer communications network pertaining to a product. The content can include by way of example, a Web page, e-mail message, instant message, blog posting or social network posting, to name only a few. Within the content, a modal verb can be identified and text extracted that is proximate to the modal verb. Thereafter, a requirement can be generated for a revision of the product based upon the extracted text. Optionally, the requirement can be ranked according to the modal verb, for example, an imperative modal verb can correspond to a higher ranking than a suggestive modal verb. | 01-03-2013 |
20130332919 | AUTOMATED TIME-TO-VALUE MEASUREMENT - According to one aspect of the present disclosure, a method and technique for automated time-to-value (TTV) measurement is disclosed. The method includes: initiating an installation module of an application to install the application on a data processing system; responsive to initiating installation of the application via the installation module, monitoring, via a TTV module of the application, a time period associated with the installation of the application; and recording, by the TTV module, the time period corresponding to the installation of the application. | 12-12-2013 |
20150089297 | Using Crowd Experiences for Software Problem Determination and Resolution - An approach is provided to utilize experiences of a user community to identify software problems and communicate resolutions to such problems. Error reports are received from installed software systems in the user community. From these reports, a set of problematic usage patterns are generated, with each of the usage patterns having a confidence factor that is increased based on the number of problem reports that match the usage pattern. The problematic usage patterns are matched to sections of code corresponding to the installed software system with sections of code being identified with problematic usage patterns having confidence factors greater than a given threshold. | 03-26-2015 |
Patent application number | Description | Published |
20080228874 | Method and Apparatus for Collocating Application Monitoring Reports with Web Applications - A computer implemented method, apparatus, and computer usable program code to display a Web site with its corresponding monitoring information. A determination is made as to whether a user at a client data processing system is permitted access monitoring information for a Web site. The Web page is retrieved to form a retrieved Web page in response to a request for a Web page from the Web site. Monitoring information is associated with the retrieved Web page from associated monitoring information if the user is permitted to access the monitoring information to form collocated content. The collocated content is sent to the user at the client data processing system. | 09-18-2008 |
20080307418 | Enabling and Disabling Byte Code Inserted Probes Based on Transaction Monitoring Tokens - A method of enabling transaction probes used to monitor a transaction or modify a primary application handling the transaction. The method begins with retrieving a token associated with the transaction. The token contains information regarding which transaction probes from a plurality of transaction probes will be enabled with respect to the transaction. The token is then read to determine the set of transaction probes from the plurality of transaction probes that will be enabled. The determined set of transaction probes is then enabled. | 12-11-2008 |
20090037914 | AUTOMATIC CONFIGURATION OF ROBOTIC TRANSACTION PLAYBACK THROUGH ANALYSIS OF PREVIOUSLY COLLECTED TRAFFIC PATTERNS - A system and method which accesses or otherwise received collected performance data for at least one server application, where the server application capable of performing a plurality of transactions with client devices and the client devices are geographically dispersed from the server in known geographical locales, which automatically determines from the performance data which of the transactions are utilized by users of the client devices, which selects utilized transactions according to at least one pre-determined selection criteria, which automatically generates a transaction playback script for each of the selected transactions substituting test information in place of user-supplied or user-unique information in the transactions, which designates each script for execution from a geographical locale corresponding to the locale of the clients which execute said utilized transactions, which deploys the playback scripts to robotic agents geographically co-located with client devices according to the locale designation, and which executes the playback scripts from the robotic agents in order to exercise the server application across similar network topologies and under realistic conditions. | 02-05-2009 |
20090177692 | DYNAMIC CORRELATION OF SERVICE ORIENTED ARCHITECTURE RESOURCE RELATIONSHIP AND METRICS TO ISOLATE PROBLEM SOURCES - A potential multicomputer related problem is predicted and reported by determining a set of computer resources and relationships there between needed to complete a multicomputer business transaction, retrieving performance monitoring metrics for the computer resources during executions of the multicomputer transaction, dynamically deriving correlations between the resource relationships and the performance metrics, comparing a trend of the correlations to one or more service level requirements to predict one or more potential future violations of a business transaction requirement, including identification of one or more related resources likely to cause the violation, and reporting such prediction and likely case to an administrator. | 07-09-2009 |
20120323615 | OPTIMIZED MAINTENANCE SCHEDULES BASED ON SMART CITY MAINTENANCE PROFILES - An approach is provided in which a maintenance optimizer receives a policy change threshold that corresponds to a system. The maintenance optimizer monitors real-time condition data associated with the system, and determines whether the real-time condition data has reached the policy change threshold. If the real-time condition data has not reached the policy change threshold, the maintenance optimizer generates a maintenance operation notification based upon the real-time condition data according to a maintenance schedule policy. However, if the real-time condition data has reached the policy change threshold, the maintenance optimizer generates an alternate maintenance operation notification based upon the real-time condition data according to an alternate maintenance schedule policy. | 12-20-2012 |
20130024842 | SOFTWARE TEST AUTOMATION SYSTEMS AND METHODS - Described are a system and method for performing an automated quality assessment on a software program under test. A test automation system executes a test on a software program Data related to the test is automatically collected. The data includes first information determined by the test automation system in response to executing the test. The data further includes second information related to the test and received from a source other than the test automation system. The first information is analyzed. A quality assessment of the software program is generated from the analyzed first information and from the second information. | 01-24-2013 |
20130024847 | SOFTWARE TEST AUTOMATION SYSTEMS AND METHODS - Described are a system and method for performing an automated quality assessment on a software program under test. A test automation system executes a test on a software program Data related to the test is automatically collected. The data includes first information determined by the test automation system in response to executing the test. The data further includes second information related to the test and received from a source other than the test automation system. The first information is analyzed. A quality assessment of the software program is generated from the analyzed first information and from the second information. | 01-24-2013 |