Knibb
David Knibb, Winchester GB
Patent application number | Description | Published |
---|---|---|
20120331446 | USING RANGE VALIDATION IN ASSEMBLY LANGUAGE PROGRAMMING - Embodiments of the present invention provide a method, system and computer program product for USING range validation during assembly of an assembly language program. In an embodiment of the invention, a method for USING range validation during assembly of an assembly language program has been provided. The method can include parsing assembler language source code loaded for assembly in an assembler executing in memory of a computer. The method also can include identifying a USING statement in the source code establishing a base address as the content of a register. Finally, in response to additionally identifying a subsequent statement in the source code that modifies the content of the register, a warning of an invalid USING range can be generated. | 12-27-2012 |
David E. Knibb, Hull GB
Patent application number | Description | Published |
---|---|---|
20120246518 | OPERATING A COMPUTER SYSTEM - Trace data is periodically written to a trace table. A software trap is run. If the software trap does not fire, a run marker is set to a predefined distance behind a position of an old run marker in the trace table. The trace data is periodically written to the trace table, and, if necessary, earlier written trace table data is overwritten. Most recently written trace data is detected to have reached the run marker and the software trap is run. | 09-27-2012 |
20130152042 | AUTOMATED AND HEURISTICALLY MANAGED SOLUTION TO QUANTIFY CPU AND PATH LENGTH COST OF INSTRUCTIONS ADDED, CHANGED OR REMOVED BY A SERVICE TEAM - Embodiments of the present invention provide a method, system, and computer program product for qualifying changes to an instruction set in source code. In an embodiment of the invention, a method for quantifying changes to an instruction set in source code can be provided. The method can include receiving text in a code editor as an edit to source code of a computer program querying a data store of code change costs with at least a portion of the edit. The method additionally can include retrieving in response to the query a code change cost associated with the edit. Finally, the method can include displaying in the code editor the retrieved code change cost. | 06-13-2013 |
David Evans Knibb, Yorkshire GB
Patent application number | Description | Published |
---|---|---|
20090083708 | METHOD AND SYSTEM FOR ASPECT SCOPING IN A MODULARITY RUNTIME - A method and system are provided for aspect scoping in a modularity runtime. The method includes declaring a set of aspects of a bundle as public aspects in a first aspect configuration file, and filtering the aspect configuration files imported by a bundle to the files from bundles on which the importing bundle has a dependency. The method includes declaring a set of aspects of a bundle as private aspects in a second aspect configuration file. At weaving of aspects at a bundle, the weaving includes: any aspects defined as private aspects; any aspects defined as public aspects; any imported aspects; and any first configuration files from exporting bundles are declared. | 03-26-2009 |
20100211672 | METHOD AND SYSTEM FOR SIMULATING LATENCY BETWEEN LAYERS OF MULTI-TIER APPLICATIONS - A method, system and article of manufacture for simulating latency between software applications. There is provided a middleware component, e.g., a delay driver, within a multi-tier software product, the middleware component driver enables simulation of both latency and bandwidth restrictions experienced by the components in the multi-tier software product. The middleware component determines whether I/O request packets should be delayed, selects the number and types of I/O requests packets to be delayed and the amount of time to delay processing of the packets. Through the use of such a middleware component, a user is able to simulate various conditions experienced by the multi-tier software product. | 08-19-2010 |
James R. Knibb, Kirkland, WA US
Patent application number | Description | Published |
---|---|---|
20100186062 | PROTECTING CONTENT FROM THIRD PARTY USING CLIENT-SIDE SECURITY PROTECTION - Architecture that employs encryption and storage of encryption keys to protect trusted client message content from an untrusted third-party hosted service. Each trusted user machine is configured to optionally apply security to messages. Rules determine when automatic protection is applied and the level of protection to apply. The trusted client automatically downloads the rules (or rules policies) from a trusted rules service and caches the rules locally. During composition, the rules analyze the message and automatically apply security template(s) to the message. The security template(s) encrypt the body of the message, but not the headers or subject. The untrusted message service processes the header and delivers the message to the correct recipient. The hosted service cannot view the contents of the message body, and only intended recipients of the protected message can view the message body. Offline protection is supported, and the user can override protection by the rules. | 07-22-2010 |
20100306535 | Business To Business Secure Mail - Business to business secure mail may be provided. Consistent with embodiments of the invention, a protected message may be received. The recipient may request a token from a trust broker, submit the token to an authorization server associated with the sender, receive a user license from the authorization server; and decrypt the protected message using the user license. The protected message may restrict actions that may be taken by the recipient, such as forwarding to other users. | 12-02-2010 |