402 patents
Utility
Enhancing data-analytic visualizations with machine learning
1 Aug 23
This document describes techniques and apparatuses for enhancing data-analytic visualizations of a data analytics system.
Tamir Mitelman
Filed: 14 Jul 20
Utility
Logically consistent archive with minimal downtime
1 Aug 23
A sub-archive is initiated.
Daniel S. Sanders, Peeyush Paliwal, Polina Alber
Filed: 25 Jan 21
Utility
Test script generation based on event data and video frames
18 Jul 23
In some examples, a system processes event data and video frames produced by a program during execution of the program, the event data representing user actions with respect to a graphical user interface (GUI) of the program.
Er-Xin Shang, Bin Zhou, Chao Lin Jiang
Filed: 11 Jan 19
Utility
Application tuning based on performance characteristics
11 Jul 23
According to examples, an apparatus may include a processor and a memory on which are stored machine-readable instructions that when executed by the processor, may cause the processor to receive information regarding a performance characteristic of an application during predetermined time periods.
Harish Kumar Somisetty
Filed: 1 Jul 21
Utility
Automated application testing of mutable interfaces
11 Jul 23
Applications under test (AUT) may be tested by automated testing systems utilizing machine vision to recognize visual elements presented by the AUT and apply inputs to graphical elements, just as a human would.
Peng-Ji Yin, Xiao-Fei Yu, Shuhui Fu, Yi-Bin Guo
Filed: 15 Mar 21
Utility
Recommending programmatic descriptions for test objects
11 Jul 23
A technique includes receiving, by a computer, user input representing creation of a first programmatic description of a first test object of source code to be tested.
Peng-Ji Yin, Cheng Hua, Jie Zhang
Filed: 28 Apr 18
Utility
Vulnerability scanning of attack surfaces
4 Jul 23
A method includes: identifying, by a runtime instrumentation agent of a web server, a plurality of attack surfaces of a web application executed on the web server; generating, by the runtime instrumentation agent, a plurality of hash values, where each hash value is generated based on one of the plurality of attack surfaces; and transmitting, by the runtime instrumentation agent, the plurality of hash values to an attack server external to the web server, where the attack server is to determine whether to scan each attack surface based on the plurality of hash values.
Ming Sum Sam Ng, Sasi Siddharth Muthurajan, Nidhi Govindram Kejriwal, Gerald E. Sullivan, II, Alexander Hoole
Filed: 31 Oct 17
Utility
Stateless password manager
23 May 23
A first application name is received.
Vamsi Krishna, Guruprasad Sathyamurthy
Filed: 12 May 21
Utility
Supporting record and replay for infinite scroll elements
16 May 23
Embodiments provide for automated testing of an Application Under Test (AUT) that utilizes an infinite scroll element.
Er-Xin Shang, Yun-Sheng Liu, Shuhui Fu, Yi-Bin Guo, Yun Yuan, Hua-Ming Zhai
Filed: 8 Jun 21
Utility
Generating hash values for input strings
25 Apr 23
A computing device includes a processor and a machine-readable storage storing instructions.
Timothy Roake, Luther Martin
Filed: 19 Dec 19
Utility
Push control
4 Apr 23
In some examples, push control may include generation of a learning-based decision model based on analysis of data associated with historical usage of an application.
Hashem Naara, Michael Rodov, Amir David
Filed: 31 Aug 17
Utility
Machine learning-based network device profiling
21 Mar 23
A method includes applying, by a computer, supervised machine learning to classify a network device that is associated with a security event occurring in a computer system based on data representing features of the network device.
Tamir Mitelman, Tammy Torbert
Filed: 31 May 19
Utility
Hierarchical service trees
21 Mar 23
A predefined hierarchical service tree can be stored that includes a top at a service category definition level and a bottom at a level of a number of devices, each of the number of devices selected to perform a specific service function.
Gil Tzadikevitch, Ran Biron, Oded Zilinsky
Filed: 29 Oct 13
Utility
Overcoming multi-factor authentication in user interface based automation script
14 Mar 23
A request is received from a browser (e.g., a tool that runs on top of or in a browser).
Eyal Jakob, Vladyslav Voloshyn, Constantine Adarchenko
Filed: 10 Feb 22
Utility
Load testing
7 Mar 23
Examples relate to load testing.
Ohad Assulin, Ilan Shufer, Amit Levin
Filed: 23 Dec 14
Utility
Low latency polling
28 Feb 23
A poll of a first database is initiated (e.g., a SOT database).
Vamsi Krishna, Kalyan Koka, Kamal Maheshwari
Filed: 5 Oct 20
Utility
Regression testing of computer systems using recorded prior computer system communications
14 Feb 23
A technique includes accessing, by at least one hardware processor, a recorded request and a recorded response associated with an integration test involving a first computer system and a second computer system.
Ilan Shufer, Salman Yaniv Sayers
Filed: 22 Aug 19
Utility
Using graphical image analysis for identifying image objects
7 Feb 23
An image of a graphical user interface is captured.
Er-Xin Shang, Hua-Ming Zhai, Yun-Sheng Liu, Tezeen Yu
Filed: 10 Nov 20
Utility
Dynamic tokenization table exchange
31 Jan 23
A first network device nonce is computed.
Douglas Max Grover, Vamsi Krishna
Filed: 9 Jul 21
Utility
Methods and systems to automatically deduce relationships among test steps
31 Jan 23
Embodiments of the disclosure provide systems and methods for executing a functional test on an application.
Hua-Ming Zhai, Er-Xin Shang, Kai Zhou
Filed: 18 Mar 21