US20200225933A1 - Systems and methods of just-in-time proactive notification of a product release containing a software fix - Google Patents

Systems and methods of just-in-time proactive notification of a product release containing a software fix Download PDF

Info

Publication number
US20200225933A1
US20200225933A1 US16/829,565 US202016829565A US2020225933A1 US 20200225933 A1 US20200225933 A1 US 20200225933A1 US 202016829565 A US202016829565 A US 202016829565A US 2020225933 A1 US2020225933 A1 US 2020225933A1
Authority
US
United States
Prior art keywords
application
release
error
indication
end user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US16/829,565
Inventor
Manbinder Pal Singh
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Citrix Systems Inc
Original Assignee
Citrix Systems Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Citrix Systems Inc filed Critical Citrix Systems Inc
Priority to US16/829,565 priority Critical patent/US20200225933A1/en
Assigned to CITRIX SYSTEMS, INC. reassignment CITRIX SYSTEMS, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: SINGH, MANBINDER PAL
Publication of US20200225933A1 publication Critical patent/US20200225933A1/en
Assigned to WILMINGTON TRUST, NATIONAL ASSOCIATION reassignment WILMINGTON TRUST, NATIONAL ASSOCIATION SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CITRIX SYSTEMS, INC.
Assigned to WILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENT reassignment WILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENT PATENT SECURITY AGREEMENT Assignors: CITRIX SYSTEMS, INC., TIBCO SOFTWARE INC.
Assigned to GOLDMAN SACHS BANK USA, AS COLLATERAL AGENT reassignment GOLDMAN SACHS BANK USA, AS COLLATERAL AGENT SECOND LIEN PATENT SECURITY AGREEMENT Assignors: CITRIX SYSTEMS, INC., TIBCO SOFTWARE INC.
Assigned to BANK OF AMERICA, N.A., AS COLLATERAL AGENT reassignment BANK OF AMERICA, N.A., AS COLLATERAL AGENT PATENT SECURITY AGREEMENT Assignors: CITRIX SYSTEMS, INC., TIBCO SOFTWARE INC.
Assigned to WILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENT reassignment WILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENT PATENT SECURITY AGREEMENT Assignors: CITRIX SYSTEMS, INC., CLOUD SOFTWARE GROUP, INC. (F/K/A TIBCO SOFTWARE INC.)
Assigned to CITRIX SYSTEMS, INC., CLOUD SOFTWARE GROUP, INC. (F/K/A TIBCO SOFTWARE INC.) reassignment CITRIX SYSTEMS, INC. RELEASE AND REASSIGNMENT OF SECURITY INTEREST IN PATENT (REEL/FRAME 062113/0001) Assignors: GOLDMAN SACHS BANK USA, AS COLLATERAL AGENT
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0751Error or fault detection not based on redundancy
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0766Error or fault reporting or storing
    • G06F11/0769Readable error formats, e.g. cross-platform generic formats, human understandable formats
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/079Root cause analysis, i.e. error or fault diagnosis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0793Remedial or corrective actions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1415Saving, restoring, recovering or retrying at system level
    • G06F11/1433Saving, restoring, recovering or retrying at system level during software upgrading
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/302Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a software system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/901Indexing; Data structures therefor; Storage structures
    • G06F16/9014Indexing; Data structures therefor; Storage structures hash tables
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/542Event management; Broadcasting; Multicasting; Notifications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/34Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters 
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC

Definitions

  • Application developers typically create application programs for distribution to end users. Such distribution is often accomplished through the application developer's website or a public or private application store, from which end users can download and install desired application programs on their desktop computers, laptop computers, tablet computers, mobile devices, and/or any other suitable computers or computerized devices. Once an application program is downloaded and installed on an end user's computer or computerized device, the computer or computerized device can execute the application program on its operating system to perform functionality associated with the application program.
  • the application program may abnormally terminate (e.g., “crash”) or throw an exception.
  • the application program may crash in response to a programming error, or an error encountered by the operating system of the computer or computerized device.
  • the application program may throw an exception upon occurrence of an exceptional event, such as a null pointer exception, a divide-by-zero exception, a page fault exception, etc.
  • an exceptional event such as a null pointer exception, a divide-by-zero exception, a page fault exception, etc.
  • the application program may be allowed to gracefully recover and continue execution once an exception is thrown and caught by an exception handler, if the exception handler can successfully handle or service the exception.
  • an end user may wish to determine whether a subsequent release of the application program has addressed the particular error or exceptional event. For example, in a subsequent release of the application program, an application developer may have provided a software fix that makes the error less likely to be encountered, the exceptional event less likely to occur, or the error or exceptional event not likely to be encountered or occur at all.
  • obtaining information regarding whether such a subsequent release of the application program exists can be a lengthy and time-consuming process, during which the end user might perform multiple searches of the Internet and/or make multiple calls to customer service personnel in an effort to obtain the desired information.
  • the disclosed techniques can include proactively generating a signature that corresponds to an error event experienced during execution of an application program, and providing the signature, along with a component-specific data element that ties the signature to a program component of the application program in which the error event occurred, to one or more hosted services for use in determining whether a subsequent release of the application program exists containing a fix to correct the error event.
  • the disclosed techniques can further include, having determined that such a subsequent release of the application program exists, receiving a notification pertaining to the subsequent release of the application program, including information for downloading the subsequent release of the application program to an end user computer. In this way, notifications of software product releases that address particular errors or exceptional events experienced during execution of application programs can be provided to end users in a just-in-time (JIT) fashion for subsequent downloading of the software product releases to their respective end user computers.
  • JIT just-in-time
  • a method includes receiving, at a computing system, an indication of an error in execution of an application on an end user computer.
  • the received indication includes a data element that ties the indication to a component of the application and makes the indication unique for the component.
  • the method further includes obtaining, by the computing system using the received indication, information of a release of the application configured to correct the error, and sending a notification of the release of the application to the end user computer.
  • the method further includes comparing, by the computing system, the received indication to one or more indexes to determine a match between the indication and an entry of the one or more indexes.
  • the entry pertains to the release of the application.
  • the method further includes, having determined the match between the received indication and the entry of the one or more indexes, preparing, by the computing system from the information of the release of the application, the notification of the release of the application.
  • a correction of the error is included in a defect ticket.
  • the method further includes detecting the defect ticket stored on a defect management server computer.
  • the defect ticket contains information pertaining to the error for which the correction was provided.
  • the method further includes, having detected the defect ticket, accessing the information pertaining to the error from the defect ticket, and generating the indication based on the information pertaining to the error.
  • the defect ticket contains information pertaining to the component of the application in which the error occurred.
  • the method further includes, having detected the defect ticket, accessing the information pertaining to the component of the application from the defect ticket, and generating the data element based on the information pertaining to the component.
  • the defect ticket contains information of the release of the application.
  • the method further includes, having detected the defect ticket, accessing the information of the release of the application from the defect ticket, and preparing the notification based on the information of the release.
  • a method includes generating, by an end user computer, an indication of an error in execution of an application.
  • the generated indication includes a data element that ties the indication to a component of the application and makes the indication unique for the component.
  • the method further includes providing, by the end user computer, the generated indication to a computing system.
  • the computing system is configured to identify a release of the application that corrects the error.
  • the method further includes receiving, at the end user computer from the computing system, a notification of the release of the application. In certain arrangements, an exception is thrown upon occurrence of the error.
  • the method further includes, in response to the exception, generating stack trace information by the end user computer.
  • the method further includes generating the indication based on the stack trace information.
  • the method further includes generating, by the end user computer, the data element based on information pertaining to the component.
  • the method further includes, having received the notification of the release of the application at the end user computer, displaying the notification on the end user computer.
  • the notification is configured to enable an update of the application on the end user computer to prevent an occurrence of the error in the component during execution of the application.
  • a system includes at least one memory, and processing circuitry configured to execute program instructions out of the at least one memory to receive an indication of an error in execution of an application on an end user computer.
  • the received indication includes a data element that ties the indication to a component of the application and makes the indication unique for the component.
  • the processing circuitry is further configured to execute the program instructions out of the at least one memory to obtain, using the received indication, information of a release of the application configured to correct the error, and to send a notification of the release of the application to the end user computer.
  • the processing circuitry is further configured to execute the program instructions out of the at least one memory to compare the received indication to one or more indexes to determine a match between the indication and an entry of the one or more indexes.
  • the entry pertains to the release of the application.
  • the processing circuitry is further configured to execute the program instructions out of the at least one memory, having determined the match between the received indication and the entry of the one or more indexes, to prepare, from the information of the release of the application, the notification of the release of the application.
  • the processing circuitry is further configured to execute the program instructions out of the at least one memory to send the notification of the release of the application to the end user computer.
  • the notification is configured to enable an update of the application on the end user computer to prevent an occurrence of the error in the component during execution of the application.
  • a correction of the error is included in a defect ticket.
  • the processing circuitry is further configured to execute the program instructions out of the at least one memory to detect the defect ticket stored on a defect management server computer.
  • the defect ticket contains information pertaining to the error for which the correction was provided.
  • the processing circuitry is further configured to execute the program instructions out of the at least one memory, having detected the defect ticket, to access the information pertaining to the error from the defect ticket, and to generate the indication based on the information pertaining to the error.
  • the defect ticket contains information pertaining to the component of the application in which the error occurred.
  • the processing circuitry is further configured to execute the program instructions out of the at least one memory, having detected the defect ticket, to access the information pertaining to the component of the application from the defect ticket, and to generate the data element based on the information pertaining to the component.
  • the defect ticket contains information of the release of the application.
  • the processing circuitry is further configured to execute the program instructions out of the at least one memory, having detected the defect ticket, to access the information of the release of the application from the defect ticket, and to prepare the notification based on the information of the release.
  • FIG. 1 is a block diagram of an exemplary computer system environment, in which techniques can be practiced for providing notifications to end users of software product releases containing software fixes for particular errors or exceptional events experienced during execution of application programs;
  • FIG. 2 a is a block diagram of an exemplary end user computer, which can be employed in the computer system environment of FIG. 1 ;
  • FIG. 2 b is a block diagram of an exemplary application developer computer, which can be employed in the computer system environment of FIG. 1 ;
  • FIG. 3 is a flow diagram of an exemplary method of an end user computer for receiving an end user notification of a software product release containing a software fix for a particular error or exceptional event experienced during execution of an application program;
  • FIG. 4 is a flow diagram of an exemplary method of one or more hosted services for providing a notification to an end user of a software product release containing a software fix for a particular error or exceptional event experienced during execution of an application program.
  • the disclosed techniques can include (i) proactively generating a signature that corresponds to an error event experienced during execution of an application program, (ii) providing the signature, along with a component-specific data element that ties the signature to a program component of the application program in which the error event occurred, to one or more hosted services for use in determining whether a subsequent release of the application program exists containing a software fix to correct the error event, and (iii) having determined that such a subsequent release of the application program exists, receiving a notification pertaining to the subsequent release of the application program, including information for downloading the subsequent release of the application program to an end user computer.
  • notifications of software product releases that address particular errors or exceptional events experienced during execution of application programs can be provided to end users in a just-in-time (JIT) fashion for subsequent downloading of the software product releases to their respective end user computers.
  • JIT just-in-time
  • FIG. 1 depicts an illustrative embodiment of an exemplary computer system environment 100 , in which techniques can be practiced for providing notifications to end users of software product releases containing software fixes for particular errors or exceptional events experienced during execution of application programs.
  • the computer system environment 100 can include a plurality of end user computers 102 . 1 , 102 . 2 , . . . , 102 . n , each of which can be communicably coupled to a host computing system 106 to facilitate leveraging of services 107 (such as application services) hosted by the host computing system 106 .
  • the hosted services 107 can include a software product release data store service 110 , and a signature matching service 112 .
  • the host computing system 106 can be configured as a cloud platform accessible via a network.
  • the host computing system 106 can include one or more server computers for providing one or more terminal servers and/or workstation virtual machines.
  • Such a server computer(s) can be configured to host the services 107 in a remote location (such as in the “cloud” or at a centralized data processing facility), and to reside on a network wired or wirelessly coupled to the respective end user computers 102 . 1 , . . . , 102 . n .
  • a remote location such as in the “cloud” or at a centralized data processing facility
  • the computer system environment 100 can also include an application developer computer 104 , a defect management server computer 105 , and an on-premises computing system 114 , which can be configured to provide one or more application services such as a bug fix monitoring service 108 , and a signature generating service 109 .
  • the application developer computer 104 and/or the defect management server computer 105 can be located at the same premises where the on-premises computing system 114 is installed. Further, the on-premises computing system 114 can be wired or wirelessly coupled to the network upon which resides the server computer(s) hosting the services 107 .
  • the application developer computer 104 can be configured to run a defect management application 115 .
  • an application developer can provide detailed information pertaining to a software fix to correct a particular error or exceptional event (generally referred to herein as a “bug”) occurring during execution of an application program (such as an application program(s) 210 ; see FIG. 2 a ), and save the detailed information on the application developer computer 104 .
  • the defect management application 115 running on the application developer computer 104 can push the detailed information to the defect management server computer 105 , which can store the detailed information in a database (DB) 113 .
  • DB database
  • the bug fix monitoring service 108 provided by the on-premises computing system 114 can (i) poll the defect management server computer 105 for information pertaining to a software fix to correct a new bug or provide an update for correcting an existing bug, or (ii) receive a notification from the defect management server computer 105 when such software fix information pertaining to a new bug or an update for an existing bug has been received and stored in the DB 113 .
  • the bug fix monitoring service 108 can provide at least some of the software fix information to the signature generating service 109 provided by the on-premises computing system 114 .
  • the signature generating service 109 can generate a signature (e.g., a digital signature, a hash signature) based on the software fix information.
  • the bug fix monitoring service 108 can provide the generated signature, along with a component-specific data element that ties the signature to a program component of the application program, to the services 107 (i.e., the software product release data store service 110 , the signature matching service 112 ) hosted by the host computing system 106 for use in determining whether a subsequent release of the application program exists containing a software fix to correct the bug that occurred during execution of the application program. Once it is determined that such a subsequent release of the application program exists, one or more of the end user computers 102 . 1 , . . . , 102 .
  • n can receive a notification pertaining to the subsequent release of the application program from the host computing system 106 , including information for downloading the subsequent release of the application program to the respective end user computer(s) 102 . 1 , . . . , 102 . n . It is noted that further disclosure relating to operation of the host computing system 106 , including the hosted services 107 , can be found in the illustrative example described herein.
  • FIG. 2 a depicts a detailed view of an exemplary configuration of an end user computer 102 .
  • each of the plurality of end user computers 102 . 1 , . . . , 102 . n of FIG. 1 can be configured like the end user computer 102 of FIG. 2 a .
  • the end user computer 102 can include a network interface 202 , one or more processing units 204 , a display 205 , and a memory 206 .
  • the network interface 202 can be configured to connect the end user computer 102 to the host computing system 106 via a communications medium that includes one or more wired/wireless communications networks (e.g., local area network(s) (LAN(s)), metropolitan area network(s) (MAN(s)), wide area network(s) (WAN(s))), communications paths, and/or communications links.
  • the memory 206 can be configured to include volatile storage (e.g., dynamic random access memory (DRAM), static random access memory (SRAM)) and/or non-volatile storage (e.g., magnetic memory, flash memory).
  • the memory 206 can be further configured to store a variety of software constructs, including an operating system 208 , and the application program(s) 210 running on the operating system 208 .
  • each error/exception handler 214 can be configured to log or write, to one or more error/exception log files (e.g., text or data) 216 , descriptive and/or summary information pertaining to particular errors (e.g., programming errors, errors encountered by the operating system 208 ) and/or particular exceptional events (e.g., null pointer exceptions, divide-by-zero exceptions, page fault exceptions) related to the program component 212 that were experienced during execution of the application program 210 .
  • error/exception log files e.g., text or data
  • descriptive and/or summary information pertaining to particular errors (e.g., programming errors, errors encountered by the operating system 208 ) and/or particular exceptional events (e.g., null pointer exceptions, divide-by-zero exceptions, page fault exceptions) related to the program component 212 that were experienced during execution of the application program 210 .
  • the error/exception handler 214 can be further configured to generate, by one or more signature modules 218 , a unique signature (e.g., a digital signature, a hash signature) based on the logged information, as well as a data element that specifically ties the program component(s) 212 of the application program(s) 210 to the unique signature.
  • a unique signature e.g., a digital signature, a hash signature
  • the digital or hash signature can be made to be unique for a specified program component of the application program.
  • the processing unit(s) 204 can be configured to operate in accordance with the various software constructs stored in the memory 206 .
  • the processing unit(s) 204 can also be implemented in a variety of ways, using one or more processors running specialized software, one or more application specific integrated circuits (ASICs), one or more field programmable gate arrays (FPGAs), one or more discrete components, digital circuits, analog circuits, and so on, or any suitable combination thereof.
  • the display 205 can be configured as any suitable computer display capable of visually displaying character data, graphics data, and so on, to a human user.
  • FIG. 2 b depicts a detailed view of an exemplary configuration of the application developer computer 104 .
  • the application developer computer 104 can include one or more processing units 222 , and a memory 224 .
  • the memory 224 can be configured to include volatile storage (e.g., DRAM, SRAM) and/or non-volatile storage (e.g., magnetic memory, flash memory).
  • the memory 224 can be further configured to store a variety of software constructs, including an operating system 226 , and the defect management application 115 (see also FIG. 1 ) running on the operating system 226 .
  • the defect management application 115 can be provided as a web application service.
  • the defect management application 115 can be configured to update or otherwise provide a defect ticket (e.g., a text or data file) that contains descriptive and/or summary information pertaining to (i) a subsequent release of an application program, (ii) a particular error or exceptional event for which a software fix was provided in the subsequent release of the application program, and/or (iii) a program component of the application program in which the particular error or exceptional event occurred.
  • a defect ticket e.g., a text or data file
  • the processing unit(s) 222 can be configured to operate in accordance with the various software constructs stored in the memory 224 , and can be implemented in a variety of ways, using one or more processors running specialized software, one or more ASICs, one or more FPGAs, one or more discrete components, digital circuits, analog circuits, and so on, or any suitable combination thereof.
  • the disclosed techniques for providing notifications to end users of software product releases containing software fixes for particular errors or exceptional events experienced during execution of application programs will be further understood with reference to the following illustrative example.
  • one of the plurality of end user computers 102 . 1 , . . . , 102 . n embodied as the end user computer 102 (see FIG. 2 a ), is configured to execute a current release of the application program 210 , which has the program component 212 .
  • the application program 210 may be a Java® application program, or any other suitable application program.
  • a particular exceptional event occurs related to the program component 212 , causing an exception to be thrown within the application program 210 .
  • the exceptional event may correspond to a null pointer exception, a divide-by-zero exception, a page fault exception, or any other suitable exceptional event, occurring in the code of the program component 212 .
  • the operating system 208 of the end user computer 102 automatically generates a stack trace, or any other suitable report of the particular exceptional event occurring during execution of the application program 210 .
  • the stack trace can include a sequence of methods or procedures of the program component code that were called during execution of the application program 210 , at least up to the point where the particular exceptional event occurred. For example, if the particular exceptional event corresponds to a null pointer exception, then an exemplary representation of the stack trace may be expressed as illustrated in TABLE I:
  • the exemplary representation of the stack trace includes multiple stack frames (referenced by reference numerals (1), (2), and (3)), each of which includes a string of unstructured data relating to a name of the application program 210 , a method name, a file name, a line number, and so on.
  • the stack frame referenced by reference numeral (1) may include the application name “com.example.mydemo,” a method name “getName,” a file name “Team.java,” and a line number “12.”
  • the stack frame referenced by reference numeral (2) may include the application name “com.example.mydemo,” a method name “getTeamName,” a file name “Player.java,” and a line number “30.”
  • the stack frame referenced by reference numeral (3) may include the application name “com.example.mydemo,” a method name “main,” a file name “Bootstrap.java,” and a line number “21.” Accordingly, with regard to the stack trace of TABLE I, the sequence of methods of the program component 212 called during execution of the application program 210 , at least up to the point where the null pointer exception was thrown, includes the methods “main,” “get TeamName,” and “getName.”
  • the error/exception handler 214 logs or otherwise writes the stack trace to the error/exception log file 216 , and the signature module 218 generates a unique signature (e.g., a digital signature, a hash signature) based on the logged stack trace information.
  • a unique signature e.g., a digital signature, a hash signature
  • the signature module 218 can employ any suitable technique for generating the unique signature, so long as the resulting unique signature operates to identify the particular exceptional event occurring during execution of the application program 210 .
  • one technique for generating the unique signature for the particular exceptional event may include (i) parsing the stack trace to remove any arbitrary alphanumeric characters from the unstructured data, (2) using one or more regular expressions (regex) to identify pertinent information relating to the particular exceptional event in the unstructured data, and (3) applying a hash or digital signature algorithm, such as MDS, SHA1, SHA256, or any other suitable hash or digital signature algorithm, to the pertinent information to obtain the unique signature.
  • a hash or digital signature algorithm such as MDS, SHA1, SHA256, or any other suitable hash or digital signature algorithm
  • the signature module 218 further generates a data element that specifically ties the unique signature to the program component 212 of the application program 210 .
  • the data element can take the form of a prefix, an infix, or a suffix added to the unique signature.
  • the data element may be generated from the program component's version number, release number, release name, release date, and/or any other suitable component-specific information, so long as the resulting data element operates to identify the program component 212 .
  • the signature module 218 affixes, binds, appends, or otherwise associates the data element to the unique signature.
  • the application developer computer 104 (see FIG. 2 b ) is configured to provide a software fix for the particular exceptional event (e.g., the null pointer exception) in a subsequent release of the application program 210 .
  • the defect management application 115 running on the operating system 226 of the application developer computer 104 , updates or otherwise provides a defect ticket that contains information pertaining to (i) the subsequent release of the application program 210 , (ii) the particular exceptional event for which the software fix was provided, and (iii) the program component 212 in which the exception was thrown.
  • the information pertaining to the subsequent release of the application program 210 may include an identification of the subsequent release, and a hyperlink to a location where the subsequent release can be accessed for download to the end user computer 102 .
  • the information relating to the particular exceptional event e.g., the null pointer exception
  • the information pertaining to the program component 212 may include the program component's version number, release number, release name, release date, and/or any other suitable component-specific information.
  • the defect management application 115 pushes the defect ticket to the defect management server computer 105 , which stores the defect ticket in the DB 113 .
  • the bug fix monitoring service 108 provided by the on-premises computing system 114 detects the defect ticket (such as by polling the defect management server computer 105 , or by receiving a notification from the defect management server computer 105 ), accesses the information pertaining to the particular exceptional event (e.g., the null pointer exception) contained in the defect ticket (i.e., the stack trace), and provides the accessed information to the signature generating service 109 , which is also provided by the on-premises computing system 114 .
  • the particular exceptional event e.g., the null pointer exception
  • the bug fix monitoring and signature generating services 108 , 109 can be provided by separate computing systems.
  • the signature generating service 109 generates a hash or digital signature based on the stack trace information.
  • the bug fix monitoring and signature generating services 108 , 109 provided by the on-premises computing system 114 can service a number of specific software products, including the application program 210 . Because it is provided to specifically service the application program 210 , the signature generating service 109 employs a technique that is the same as that employed by the signature module 218 of the end user computer 102 to generate unique hash or digital signatures for exceptional events occurring during execution of the application program 210 . As a result, the hash or digital signature generated by the signature generating service 109 based on the stack trace information contained in the defect ticket is equal or equivalent to the unique signature generated by the signature module 218 based on the same stack trace information.
  • the signature generating service 109 generates a data element that specifically ties the (unique) hash or digital signature to the program component 212 of the application program 210 , based on the information pertaining to the program component 212 contained in the defect ticket, namely, the program component's version number, release number, release name, release date, and/or any other suitable component-specific information. Because it is provided to specifically service the application program 210 , the signature generating service 109 can generate a component-specific data element that is equal or equivalent to that generated by the signature module 218 .
  • the signature generating service 109 affixes, binds, appends, or otherwise associates the data element to the (unique) hash or digital signature.
  • the bug fix monitoring service 108 provides the (unique) hash or digital signature and its associated component-specific data element, as well as the information pertaining to the subsequent release of the application program 210 contained in the defect ticket, to the software product release data store service 110 hosted by the host computing system 106 , which stores the subsequent release information as a data store entry in a database (DB) 111 , effectively indexed by the (unique) hash or digital signature.
  • DB database
  • the end user computer 102 provides the unique signature to the signature matching service 112 hosted by the host computing system 106 , which determines whether the unique signature matches any of the signature indexes of data store entries stored in the DB 111 by the software product release data store service 110 .
  • the signature matching service 112 compares the unique signature to the respective signature indexes of data store entries in the DB 111 , and determines that the unique signature does indeed match the (unique) hash or digital signature index generated by the signature generating service 109 provided by the on-premises computing system 114 . Further, the signature matching service 112 derives an identification of a program component from the component-specific data element associated with the matching signature index, and determines that the identification is indicative of the program component 212 of the application program 210 .
  • the signature matching service 112 interacts with the software product release data store service 110 to obtain the subsequent release information for the application program 210 from the data store entry in the DB 111 indexed by the matching signature index.
  • the signature matching service 112 also prepares and sends a notification to the end user computer 102 that includes (i) information pertaining to the particular exceptional event (e.g., the null pointer exception) experienced during execution of the application program 210 , (ii) an identification of the subsequent release of the application program 210 containing the software fix for the particular exceptional event, and (iii) a hyperlink to a location where the subsequent release of the application program 210 can be accessed for download to the end user computer 102 .
  • the notification to the end user is displayed on the display 205 of the end user computer 102 , and has an exemplary format, as follows:
  • An exemplary method of an end user computer for receiving an end user notification of a software product release containing a software fix for a particular error or exceptional event experienced during execution of an application program is described herein with reference to blocks 302 , 304 , 306 , 308 , 310 , 312 , and 314 illustrated in FIG. 3 . It is noted that further disclosure relating to acts set forth in blocks 302 , 304 , 306 , 308 , 310 , 312 , and 314 of FIG. 3 can be found in the illustrative example described herein. As depicted in block 302 , a particular error or exceptional event occurring during execution of a current release of an application program is experienced on an end user computer.
  • information pertaining to the particular error or exceptional event is obtained by the end user computer.
  • a unique signature based on the information pertaining to the particular error or exceptional event is generated by the end user computer.
  • a component-specific data element that specifically ties the unique signature to a program component of the application program is generated and affixed to the unique signature by the end user computer.
  • the unique signature including the component-specific data element affixed thereto are provided to a signature matching service by the end user computer to determine whether the unique signature matches a signature index of a data store entry of a data store, in which the data store entry stores information pertaining to a subsequent release of the application program containing a software fix for the particular error or exceptional event.
  • the information pertaining to the subsequent release of the application program stored in the data store entry is received at the end user computer.
  • An exemplary method of one or more hosted services for providing a notification to an end user of a software product release containing a software fix for a particular error or exceptional event experienced during execution of an application program is described herein with reference to blocks 402 , 404 , 406 , 408 , 410 , 412 , 414 , 416 , 418 , 420 , and 422 illustrated in FIG. 4 . It is noted that further disclosure relating to acts set forth in blocks 402 , 404 , 406 , 408 , 410 , 412 , 414 , 416 , 418 , 420 , and 422 of FIG. 4 can be found in the illustrative example described herein.
  • a defect ticket is detected by a bug fix monitoring service, in which the defect ticket contains information pertaining to (i) a particular error or exceptional event occurring during execution of a current release of an application program for which a software fix was provided, (ii) a program component of the application program in which the particular error or exception occurred, and (iii) a subsequent release of the application program containing the software fix.
  • a signature index based on the information pertaining to the particular error or exceptional event contained in the defect ticket is generated by a signature generating service.
  • a component-specific data element based on the information pertaining to the program component in which the particular error or exception occurred is generated by the signature generating service.
  • the component-specific data element is affixed to the signature index by the signature generating service.
  • the signature index, the component-specific data element affixed thereto, and the information pertaining to the subsequent release of the application program contained in the defect ticket are provided to a software product release data store service by the signature generating service.
  • the information pertaining to the subsequent release of the application program is stored by the software product release data store service as a data store entry indexed by the signature index.
  • a unique signature having a component-specific data element affixed thereto is received at a signature matching service from an end user computer.
  • a determination is made by the signature matching service as to whether the unique signature matches any of multiple signature indexes of data store entries stored by the software product release data store service.
  • an identification of the program component of the application program is derived by the signature matching service from the component-specific data element associated with the matching signature index.
  • the subsequent release information for the application program is obtained by the signature matching service from the data store entry indexed by the matching signature index.
  • a notification is prepared and sent by the signature matching service to the end user computer, including (i) information pertaining to the particular error or exceptional event occurring during execution of the current release of the application program, (ii) an identification of the subsequent release of the application program containing the software fix for the particular error or exceptional event, and (iii) a hyperlink to a location where the subsequent release of the application program can be accessed for download to the end user computer.
  • the operating system of an end user computer could automatically generate a stack trace, and that a signature module running on the end user computer could generate a unique signature based on the stack trace information.
  • the signature module can be configured to generate a unique signature based on certain unstructured descriptive information pertaining to an error or exceptional event, unstructured information contained in a snapshot on a display screen at the time of the error or exceptional event, and/or any other suitable structured and/or unstructured information or artifacts pertaining to the error or exceptional event.
  • multiple signature modules can be provided that employ different techniques for generating unique signatures based on different types of errors or exceptional events experienced during execution of the application program, and/or different versions of the application program or program component(s) executing on the end user computer.
  • an end user computer could execute a current release of an application program having one or more program components.
  • the application program can be a local client-based application program, a remote server-based application program, a remote cloud-based application program, a web application program, a mobile device-based application program, or any other suitable application program.
  • the application program can have remotely based program components, locally based program components, or a hybrid of remotely and locally based program components.
  • a software product release data store could be provided as a hosted service.
  • the software product release data store can be configured as an off-line data store.
  • an end user computer can be configured to incorporate a local software product release data store, which can be periodically refreshed by an online (e.g., cloud-based) data store service.
  • one or more signature modules running on the end user computer can be periodically refreshed by an online (e.g., cloud-based) signature generating service.
  • an operating system of the end user computer could automatically generate a stack trace, including a sequence of methods or procedures of program component code that were called during execution of the application program.
  • the operating system of the end user computer can generate a complete stack trace, or a partial stack trace up to the point where the exception was thrown.
  • an error/exception handler directly associated with the application program can generate the complete or partial stack trace to avoid having any unknown stack frames (e.g., stack frames whose file path is unknown) in the stack trace.
  • such unknown stack frames in a stack trace may result from calls to an external shared library, such as a dynamic-link library (DLL).
  • DLL dynamic-link library
  • a unique signature could be generated that corresponds to a particular error or exceptional event experienced during execution of a current release of an application program, and that the unique signature could be provided to one or more hosted services for use in determining whether a subsequent release of the application program exists containing a software fix for the particular error or exceptional event.
  • the subsequent release of the application program can be obtained by effectively mapping the unique signature of the particular error or exceptional event to the subsequent release of the application program, or, more generally, effectively mapping a particular error or exceptional event to a resolution of the particular error or exceptional event.
  • a host computing system e.g., the host computing system 106 ; see FIG. 1
  • the host computing system can be configured as a private cloud platform accessible via a private network (e.g., a corporate network) protected by a firewall and/or gateway computer.
  • the gateway computer can be configured to perform functions of a proxy module (e.g., an ICA® proxy module) disposed between an end user computer and one or more hosted services (e.g., the hosted services 107 ; see FIG. 1 ) for carrying out the various techniques disclosed herein.
  • a proxy module may be configured to act as the respective hosted services to the end user computer, and to act as the end user computer to the respective hosted services.
  • a signature generating service of a host computing system could employ a technique that is the same as that employed by a signature module of an end user computer to generate a unique hash or digital signature for an error or exceptional event occurring during execution of an application program.
  • a unique hash or digital signature can be included in a defect ticket alongside error/exceptional event information to which the hash/digital signature pertains. In this way, the need for the signature generating service to generate the hash/digital signature can be avoided.
  • the signature generating service can generate the hash/digital signature based on the error/exceptional event information contained in the defect ticket, and can verify the generated hash/digital signature against the hash/digital signature provided in the defect ticket.
  • error/exceptional event information and/or other software bug details can be provided as attachments or hyperlinks to log files, and the host computing system can process such information and/or details to obtain a unique signature.
  • a signature matching service of a host computing system could prepare and send a notification to an end user computer that includes a hyperlink to a location where a subsequent release of an application program can be accessed for download to the end user computer.
  • a notification can include a hyperlink to a knowledge base (KB) or support article with details regarding how to download and/or install the subsequent release, as well as how to apply and/or configure the subsequent release.
  • KB knowledge base
  • the improvement or portions thereof may be embodied as a computer program product including one or more non-transient, computer-readable storage media, such as a magnetic disk, magnetic tape, compact disk (CD), digital versatile disk (DVD), optical disk, flash drive, solid state drive (SSD), secure digital (SD) chip or device, application specific integrated circuit (ASIC), field programmable gate array (FPGA), and/or the like. Any number of computer-readable media may be used.
  • the media may be encoded with instructions that, when executed on one or more computers or other processors, perform the process or processes described herein. Such media may be considered articles of manufacture or machines, and may be transportable from one machine to another.
  • the words “comprising,” “including,” “containing,” and “having” are intended to set forth certain items, steps, acts, elements, or aspects of something in an open-ended fashion.
  • the word “set” or “subset” means one or more of something. This is the case regardless of whether the phrase “set of” or “subset of” is followed by a singular or plural object, or whether it is conjugated with a singular or plural verb.
  • ordinal expressions such as “first,” “second,” “third,” and so on, may be used as adjectives herein, such ordinal expressions are used for identification purposes, and, unless specifically indicated, are not intended to imply any ordering or sequence.
  • a “second” event may take place before or after a “first event,” or even if no first event ever occurs.
  • an identification herein of a particular element, feature, or act as being a “first” such element, feature, or act should not be construed as requiring that there must also be a “second” or other such element, feature, or act. Rather, the “first” item may be the only one.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Quality & Reliability (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • Multimedia (AREA)
  • Power Engineering (AREA)
  • Computing Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Mathematical Physics (AREA)
  • Debugging And Monitoring (AREA)

Abstract

Techniques for providing notifications to users of software product releases that contain software fixes for errors or exceptional events experienced during execution of application programs. The techniques can include proactively generating a signature that corresponds to an error event experienced during execution of an application program, providing the signature to hosted services for determining whether a subsequent release of the application program exists containing a fix to correct the error event, and, having determined that a subsequent release of the application program exists, receiving a notification pertaining to the subsequent release, including information for downloading the subsequent release to a user computer. In this way, notifications of software product releases that address error events experienced during execution of application programs can be provided to users in a just-in-time (JIT) fashion for subsequent downloading of the software product releases to their respective computers.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application is a continuation of U.S. patent application Ser. No. 16/144,344 filed Sep. 27, 2018 entitled SYSTEMS AND METHODS OF JUST-IN-TIME PROACTIVE NOTIFICATION OF A PRODUCT RELEASE CONTAINING A SOFTWARE FIX.
  • BACKGROUND
  • Application developers typically create application programs for distribution to end users. Such distribution is often accomplished through the application developer's website or a public or private application store, from which end users can download and install desired application programs on their desktop computers, laptop computers, tablet computers, mobile devices, and/or any other suitable computers or computerized devices. Once an application program is downloaded and installed on an end user's computer or computerized device, the computer or computerized device can execute the application program on its operating system to perform functionality associated with the application program.
  • SUMMARY
  • From time to time during execution of an application program on a computer or computerized device, the application program may abnormally terminate (e.g., “crash”) or throw an exception. For example, the application program may crash in response to a programming error, or an error encountered by the operating system of the computer or computerized device. Further, the application program may throw an exception upon occurrence of an exceptional event, such as a null pointer exception, a divide-by-zero exception, a page fault exception, etc. While the application program may sometimes be incapable of recovering from certain errors encountered during its execution, the application program may be allowed to gracefully recover and continue execution once an exception is thrown and caught by an exception handler, if the exception handler can successfully handle or service the exception.
  • Having experienced a particular error or exceptional event during execution of a current release of an application program, an end user may wish to determine whether a subsequent release of the application program has addressed the particular error or exceptional event. For example, in a subsequent release of the application program, an application developer may have provided a software fix that makes the error less likely to be encountered, the exceptional event less likely to occur, or the error or exceptional event not likely to be encountered or occur at all. However, obtaining information regarding whether such a subsequent release of the application program exists can be a lengthy and time-consuming process, during which the end user might perform multiple searches of the Internet and/or make multiple calls to customer service personnel in an effort to obtain the desired information. Indeed, the customer service personnel themselves may be unable to determine whether a subsequent release of the application program contains a software fix that addresses a particular error or exceptional event, as such software product release information (including a complete list of software issues fixed in the application program) is generally not collected and maintained in a useful and systematic manner.
  • Techniques are disclosed herein for providing notifications to end users of software product releases that contain software fixes for particular errors or exceptional events experienced during execution of application programs. The disclosed techniques can include proactively generating a signature that corresponds to an error event experienced during execution of an application program, and providing the signature, along with a component-specific data element that ties the signature to a program component of the application program in which the error event occurred, to one or more hosted services for use in determining whether a subsequent release of the application program exists containing a fix to correct the error event. The disclosed techniques can further include, having determined that such a subsequent release of the application program exists, receiving a notification pertaining to the subsequent release of the application program, including information for downloading the subsequent release of the application program to an end user computer. In this way, notifications of software product releases that address particular errors or exceptional events experienced during execution of application programs can be provided to end users in a just-in-time (JIT) fashion for subsequent downloading of the software product releases to their respective end user computers.
  • In certain embodiments, a method includes receiving, at a computing system, an indication of an error in execution of an application on an end user computer. The received indication includes a data element that ties the indication to a component of the application and makes the indication unique for the component. The method further includes obtaining, by the computing system using the received indication, information of a release of the application configured to correct the error, and sending a notification of the release of the application to the end user computer.
  • In certain arrangements, the method further includes comparing, by the computing system, the received indication to one or more indexes to determine a match between the indication and an entry of the one or more indexes. The entry pertains to the release of the application.
  • In certain arrangements, the method further includes, having determined the match between the received indication and the entry of the one or more indexes, preparing, by the computing system from the information of the release of the application, the notification of the release of the application.
  • In certain arrangements, a correction of the error is included in a defect ticket. The method further includes detecting the defect ticket stored on a defect management server computer.
  • In certain arrangements, the defect ticket contains information pertaining to the error for which the correction was provided. The method further includes, having detected the defect ticket, accessing the information pertaining to the error from the defect ticket, and generating the indication based on the information pertaining to the error.
  • In certain arrangements, the defect ticket contains information pertaining to the component of the application in which the error occurred. The method further includes, having detected the defect ticket, accessing the information pertaining to the component of the application from the defect ticket, and generating the data element based on the information pertaining to the component.
  • In certain arrangements, the defect ticket contains information of the release of the application. The method further includes, having detected the defect ticket, accessing the information of the release of the application from the defect ticket, and preparing the notification based on the information of the release.
  • In certain embodiments, a method includes generating, by an end user computer, an indication of an error in execution of an application. The generated indication includes a data element that ties the indication to a component of the application and makes the indication unique for the component. The method further includes providing, by the end user computer, the generated indication to a computing system. The computing system is configured to identify a release of the application that corrects the error. The method further includes receiving, at the end user computer from the computing system, a notification of the release of the application. In certain arrangements, an exception is thrown upon occurrence of the error. The method further includes, in response to the exception, generating stack trace information by the end user computer.
  • In certain arrangements, the method further includes generating the indication based on the stack trace information.
  • In certain arrangements, the method further includes generating, by the end user computer, the data element based on information pertaining to the component.
  • In certain arrangements, the method further includes, having received the notification of the release of the application at the end user computer, displaying the notification on the end user computer. The notification is configured to enable an update of the application on the end user computer to prevent an occurrence of the error in the component during execution of the application.
  • In certain embodiments, a system includes at least one memory, and processing circuitry configured to execute program instructions out of the at least one memory to receive an indication of an error in execution of an application on an end user computer. The received indication includes a data element that ties the indication to a component of the application and makes the indication unique for the component. The processing circuitry is further configured to execute the program instructions out of the at least one memory to obtain, using the received indication, information of a release of the application configured to correct the error, and to send a notification of the release of the application to the end user computer.
  • In certain arrangements, the processing circuitry is further configured to execute the program instructions out of the at least one memory to compare the received indication to one or more indexes to determine a match between the indication and an entry of the one or more indexes. The entry pertains to the release of the application.
  • In certain arrangements, the processing circuitry is further configured to execute the program instructions out of the at least one memory, having determined the match between the received indication and the entry of the one or more indexes, to prepare, from the information of the release of the application, the notification of the release of the application.
  • In certain arrangements, the processing circuitry is further configured to execute the program instructions out of the at least one memory to send the notification of the release of the application to the end user computer. The notification is configured to enable an update of the application on the end user computer to prevent an occurrence of the error in the component during execution of the application.
  • In certain arrangements, a correction of the error is included in a defect ticket. The processing circuitry is further configured to execute the program instructions out of the at least one memory to detect the defect ticket stored on a defect management server computer.
  • In certain arrangements, the defect ticket contains information pertaining to the error for which the correction was provided. The processing circuitry is further configured to execute the program instructions out of the at least one memory, having detected the defect ticket, to access the information pertaining to the error from the defect ticket, and to generate the indication based on the information pertaining to the error.
  • In certain arrangements, the defect ticket contains information pertaining to the component of the application in which the error occurred. The processing circuitry is further configured to execute the program instructions out of the at least one memory, having detected the defect ticket, to access the information pertaining to the component of the application from the defect ticket, and to generate the data element based on the information pertaining to the component.
  • In certain arrangements, the defect ticket contains information of the release of the application. The processing circuitry is further configured to execute the program instructions out of the at least one memory, having detected the defect ticket, to access the information of the release of the application from the defect ticket, and to prepare the notification based on the information of the release.
  • Other features, functions, and aspects of the claimed features of this disclosure will be evident from the Detailed Description that follows.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The foregoing and other objects, features, and advantages will be apparent from the following description of particular embodiments of the disclosure, as illustrated in the accompanying drawings, in which like reference characters refer to the same parts throughout the different views.
  • FIG. 1 is a block diagram of an exemplary computer system environment, in which techniques can be practiced for providing notifications to end users of software product releases containing software fixes for particular errors or exceptional events experienced during execution of application programs;
  • FIG. 2a is a block diagram of an exemplary end user computer, which can be employed in the computer system environment of FIG. 1;
  • FIG. 2b is a block diagram of an exemplary application developer computer, which can be employed in the computer system environment of FIG. 1;
  • FIG. 3 is a flow diagram of an exemplary method of an end user computer for receiving an end user notification of a software product release containing a software fix for a particular error or exceptional event experienced during execution of an application program; and
  • FIG. 4 is a flow diagram of an exemplary method of one or more hosted services for providing a notification to an end user of a software product release containing a software fix for a particular error or exceptional event experienced during execution of an application program.
  • DETAILED DESCRIPTION
  • The disclosure of U.S. patent application Ser. No. 16/144,344 filed Sep. 27, 2018 entitled SYSTEMS AND METHODS OF JUST-IN-TIME PROACTIVE NOTIFICATION OF A PRODUCT RELEASE CONTAINING A SOFTWARE FIX is hereby incorporated herein by reference in its entirety.
  • Techniques are disclosed herein for providing notifications to end users of software product releases that contain software fixes for particular errors or exceptional events experienced during execution of application programs. The disclosed techniques can include (i) proactively generating a signature that corresponds to an error event experienced during execution of an application program, (ii) providing the signature, along with a component-specific data element that ties the signature to a program component of the application program in which the error event occurred, to one or more hosted services for use in determining whether a subsequent release of the application program exists containing a software fix to correct the error event, and (iii) having determined that such a subsequent release of the application program exists, receiving a notification pertaining to the subsequent release of the application program, including information for downloading the subsequent release of the application program to an end user computer. In this way, notifications of software product releases that address particular errors or exceptional events experienced during execution of application programs can be provided to end users in a just-in-time (JIT) fashion for subsequent downloading of the software product releases to their respective end user computers.
  • FIG. 1 depicts an illustrative embodiment of an exemplary computer system environment 100, in which techniques can be practiced for providing notifications to end users of software product releases containing software fixes for particular errors or exceptional events experienced during execution of application programs. As shown in FIG. 1, the computer system environment 100 can include a plurality of end user computers 102.1, 102.2, . . . , 102.n, each of which can be communicably coupled to a host computing system 106 to facilitate leveraging of services 107 (such as application services) hosted by the host computing system 106. In one embodiment, the hosted services 107 can include a software product release data store service 110, and a signature matching service 112. It is noted that the host computing system 106 can be configured as a cloud platform accessible via a network. The host computing system 106 can include one or more server computers for providing one or more terminal servers and/or workstation virtual machines. Such a server computer(s) can be configured to host the services 107 in a remote location (such as in the “cloud” or at a centralized data processing facility), and to reside on a network wired or wirelessly coupled to the respective end user computers 102.1, . . . , 102.n. As further shown in FIG. 1, the computer system environment 100 can also include an application developer computer 104, a defect management server computer 105, and an on-premises computing system 114, which can be configured to provide one or more application services such as a bug fix monitoring service 108, and a signature generating service 109. In one embodiment, the application developer computer 104 and/or the defect management server computer 105 can be located at the same premises where the on-premises computing system 114 is installed. Further, the on-premises computing system 114 can be wired or wirelessly coupled to the network upon which resides the server computer(s) hosting the services 107.
  • In one mode of operation, the application developer computer 104 can be configured to run a defect management application 115. Using the defect management application 115, an application developer can provide detailed information pertaining to a software fix to correct a particular error or exceptional event (generally referred to herein as a “bug”) occurring during execution of an application program (such as an application program(s) 210; see FIG. 2a ), and save the detailed information on the application developer computer 104. Having saved the detailed information pertaining to the software fix, the defect management application 115 running on the application developer computer 104 can push the detailed information to the defect management server computer 105, which can store the detailed information in a database (DB) 113. The bug fix monitoring service 108 provided by the on-premises computing system 114 can (i) poll the defect management server computer 105 for information pertaining to a software fix to correct a new bug or provide an update for correcting an existing bug, or (ii) receive a notification from the defect management server computer 105 when such software fix information pertaining to a new bug or an update for an existing bug has been received and stored in the DB 113.
  • Once the software fix information has been obtained from the defect management server computer 105, the bug fix monitoring service 108 can provide at least some of the software fix information to the signature generating service 109 provided by the on-premises computing system 114. The signature generating service 109 can generate a signature (e.g., a digital signature, a hash signature) based on the software fix information. Further, the bug fix monitoring service 108 can provide the generated signature, along with a component-specific data element that ties the signature to a program component of the application program, to the services 107 (i.e., the software product release data store service 110, the signature matching service 112) hosted by the host computing system 106 for use in determining whether a subsequent release of the application program exists containing a software fix to correct the bug that occurred during execution of the application program. Once it is determined that such a subsequent release of the application program exists, one or more of the end user computers 102.1, . . . , 102.n can receive a notification pertaining to the subsequent release of the application program from the host computing system 106, including information for downloading the subsequent release of the application program to the respective end user computer(s) 102.1, . . . , 102.n. It is noted that further disclosure relating to operation of the host computing system 106, including the hosted services 107, can be found in the illustrative example described herein.
  • FIG. 2a depicts a detailed view of an exemplary configuration of an end user computer 102. It is noted that each of the plurality of end user computers 102.1, . . . , 102.n of FIG. 1 can be configured like the end user computer 102 of FIG. 2a . As shown in FIG. 2a , the end user computer 102 can include a network interface 202, one or more processing units 204, a display 205, and a memory 206. The network interface 202 can be configured to connect the end user computer 102 to the host computing system 106 via a communications medium that includes one or more wired/wireless communications networks (e.g., local area network(s) (LAN(s)), metropolitan area network(s) (MAN(s)), wide area network(s) (WAN(s))), communications paths, and/or communications links. The memory 206 can be configured to include volatile storage (e.g., dynamic random access memory (DRAM), static random access memory (SRAM)) and/or non-volatile storage (e.g., magnetic memory, flash memory). The memory 206 can be further configured to store a variety of software constructs, including an operating system 208, and the application program(s) 210 running on the operating system 208. As shown in FIG. 2a , the respective application programs 210 can have one or more program components 212 (e.g., method(s), procedure(s), shared code/data), each of which can have its own error/exception handler 214. In one embodiment, each error/exception handler 214 can be configured to log or write, to one or more error/exception log files (e.g., text or data) 216, descriptive and/or summary information pertaining to particular errors (e.g., programming errors, errors encountered by the operating system 208) and/or particular exceptional events (e.g., null pointer exceptions, divide-by-zero exceptions, page fault exceptions) related to the program component 212 that were experienced during execution of the application program 210. The error/exception handler 214 can be further configured to generate, by one or more signature modules 218, a unique signature (e.g., a digital signature, a hash signature) based on the logged information, as well as a data element that specifically ties the program component(s) 212 of the application program(s) 210 to the unique signature. By affixing, binding, appending, or otherwise associating such a component-specific data element to a digital or hash signature generated based on the information logged or written to the error/exception log file(s) 216, the digital or hash signature can be made to be unique for a specified program component of the application program. The processing unit(s) 204 can be configured to operate in accordance with the various software constructs stored in the memory 206. The processing unit(s) 204 can also be implemented in a variety of ways, using one or more processors running specialized software, one or more application specific integrated circuits (ASICs), one or more field programmable gate arrays (FPGAs), one or more discrete components, digital circuits, analog circuits, and so on, or any suitable combination thereof. The display 205 can be configured as any suitable computer display capable of visually displaying character data, graphics data, and so on, to a human user.
  • FIG. 2b depicts a detailed view of an exemplary configuration of the application developer computer 104. Like the end user computer 102, the application developer computer 104 can include one or more processing units 222, and a memory 224. The memory 224 can be configured to include volatile storage (e.g., DRAM, SRAM) and/or non-volatile storage (e.g., magnetic memory, flash memory). The memory 224 can be further configured to store a variety of software constructs, including an operating system 226, and the defect management application 115 (see also FIG. 1) running on the operating system 226. In one embodiment, the defect management application 115 can be provided as a web application service. The defect management application 115 can be configured to update or otherwise provide a defect ticket (e.g., a text or data file) that contains descriptive and/or summary information pertaining to (i) a subsequent release of an application program, (ii) a particular error or exceptional event for which a software fix was provided in the subsequent release of the application program, and/or (iii) a program component of the application program in which the particular error or exceptional event occurred. The processing unit(s) 222 can be configured to operate in accordance with the various software constructs stored in the memory 224, and can be implemented in a variety of ways, using one or more processors running specialized software, one or more ASICs, one or more FPGAs, one or more discrete components, digital circuits, analog circuits, and so on, or any suitable combination thereof.
  • The disclosed techniques for providing notifications to end users of software product releases containing software fixes for particular errors or exceptional events experienced during execution of application programs will be further understood with reference to the following illustrative example. In this example, it is assumed that one of the plurality of end user computers 102.1, . . . , 102.n, embodied as the end user computer 102 (see FIG. 2a ), is configured to execute a current release of the application program 210, which has the program component 212. For example, the application program 210 may be a Java® application program, or any other suitable application program. During execution of the application program 210 on the operating system 208 of the end user computer 102, a particular exceptional event occurs related to the program component 212, causing an exception to be thrown within the application program 210. For example, the exceptional event may correspond to a null pointer exception, a divide-by-zero exception, a page fault exception, or any other suitable exceptional event, occurring in the code of the program component 212.
  • In this example, once the exception is thrown within the application program 210, the operating system 208 of the end user computer 102 automatically generates a stack trace, or any other suitable report of the particular exceptional event occurring during execution of the application program 210. In one embodiment, the stack trace can include a sequence of methods or procedures of the program component code that were called during execution of the application program 210, at least up to the point where the particular exceptional event occurred. For example, if the particular exceptional event corresponds to a null pointer exception, then an exemplary representation of the stack trace may be expressed as illustrated in TABLE I:
  • TABLE I
    Exception in thread 'main' java.lang.NullPointerException
    at com.example.mydemo.Team.getName(Team.java:12) (1)
    at com.example.mydemo.Player.getTeamName(Player.java:30) (2)
    at com.example.mydemo.Bootstrap.main(Bootstrapjava:21). (3)
  • As illustrated in TABLE I, the exemplary representation of the stack trace includes multiple stack frames (referenced by reference numerals (1), (2), and (3)), each of which includes a string of unstructured data relating to a name of the application program 210, a method name, a file name, a line number, and so on. For example, the stack frame referenced by reference numeral (1) may include the application name “com.example.mydemo,” a method name “getName,” a file name “Team.java,” and a line number “12.” Further, the stack frame referenced by reference numeral (2) may include the application name “com.example.mydemo,” a method name “getTeamName,” a file name “Player.java,” and a line number “30.” In addition, the stack frame referenced by reference numeral (3) may include the application name “com.example.mydemo,” a method name “main,” a file name “Bootstrap.java,” and a line number “21.” Accordingly, with regard to the stack trace of TABLE I, the sequence of methods of the program component 212 called during execution of the application program 210, at least up to the point where the null pointer exception was thrown, includes the methods “main,” “get TeamName,” and “getName.”
  • Once the stack trace is generated by the operating system 208 of the end user computer 102, the error/exception handler 214 logs or otherwise writes the stack trace to the error/exception log file 216, and the signature module 218 generates a unique signature (e.g., a digital signature, a hash signature) based on the logged stack trace information. It is noted that the signature module 218 can employ any suitable technique for generating the unique signature, so long as the resulting unique signature operates to identify the particular exceptional event occurring during execution of the application program 210. For example, one technique for generating the unique signature for the particular exceptional event may include (i) parsing the stack trace to remove any arbitrary alphanumeric characters from the unstructured data, (2) using one or more regular expressions (regex) to identify pertinent information relating to the particular exceptional event in the unstructured data, and (3) applying a hash or digital signature algorithm, such as MDS, SHA1, SHA256, or any other suitable hash or digital signature algorithm, to the pertinent information to obtain the unique signature.
  • Having generated the unique signature for the particular exceptional event, the signature module 218 further generates a data element that specifically ties the unique signature to the program component 212 of the application program 210. In one embodiment, the data element can take the form of a prefix, an infix, or a suffix added to the unique signature. For example, for the program component 212, the data element may be generated from the program component's version number, release number, release name, release date, and/or any other suitable component-specific information, so long as the resulting data element operates to identify the program component 212. Once the component-specific data element is generated, the signature module 218 affixes, binds, appends, or otherwise associates the data element to the unique signature.
  • In this example, the application developer computer 104 (see FIG. 2b ) is configured to provide a software fix for the particular exceptional event (e.g., the null pointer exception) in a subsequent release of the application program 210. Once the software fix for the particular exceptional event is provided in the subsequent release, the defect management application 115, running on the operating system 226 of the application developer computer 104, updates or otherwise provides a defect ticket that contains information pertaining to (i) the subsequent release of the application program 210, (ii) the particular exceptional event for which the software fix was provided, and (iii) the program component 212 in which the exception was thrown. For example, the information pertaining to the subsequent release of the application program 210 may include an identification of the subsequent release, and a hyperlink to a location where the subsequent release can be accessed for download to the end user computer 102. Further, the information relating to the particular exceptional event (e.g., the null pointer exception) may include a stack trace that is the same as that generated by the operating system 208 of the end user computer 102 (see TABLE I). In addition, the information pertaining to the program component 212 may include the program component's version number, release number, release name, release date, and/or any other suitable component-specific information.
  • Once the defect ticket is updated or otherwise provided by the defect management application 115 running on the application developer computer 104, the defect management application 115 pushes the defect ticket to the defect management server computer 105, which stores the defect ticket in the DB 113. Further, the bug fix monitoring service 108 provided by the on-premises computing system 114 detects the defect ticket (such as by polling the defect management server computer 105, or by receiving a notification from the defect management server computer 105), accesses the information pertaining to the particular exceptional event (e.g., the null pointer exception) contained in the defect ticket (i.e., the stack trace), and provides the accessed information to the signature generating service 109, which is also provided by the on-premises computing system 114. In one embodiment, the bug fix monitoring and signature generating services 108, 109 can be provided by separate computing systems. The signature generating service 109 generates a hash or digital signature based on the stack trace information. In one embodiment, the bug fix monitoring and signature generating services 108, 109 provided by the on-premises computing system 114 can service a number of specific software products, including the application program 210. Because it is provided to specifically service the application program 210, the signature generating service 109 employs a technique that is the same as that employed by the signature module 218 of the end user computer 102 to generate unique hash or digital signatures for exceptional events occurring during execution of the application program 210. As a result, the hash or digital signature generated by the signature generating service 109 based on the stack trace information contained in the defect ticket is equal or equivalent to the unique signature generated by the signature module 218 based on the same stack trace information.
  • In addition, the signature generating service 109 generates a data element that specifically ties the (unique) hash or digital signature to the program component 212 of the application program 210, based on the information pertaining to the program component 212 contained in the defect ticket, namely, the program component's version number, release number, release name, release date, and/or any other suitable component-specific information. Because it is provided to specifically service the application program 210, the signature generating service 109 can generate a component-specific data element that is equal or equivalent to that generated by the signature module 218. Having generated the (unique) hash or digital signature and the component-specific data element, the signature generating service 109 affixes, binds, appends, or otherwise associates the data element to the (unique) hash or digital signature. The bug fix monitoring service 108 provides the (unique) hash or digital signature and its associated component-specific data element, as well as the information pertaining to the subsequent release of the application program 210 contained in the defect ticket, to the software product release data store service 110 hosted by the host computing system 106, which stores the subsequent release information as a data store entry in a database (DB) 111, effectively indexed by the (unique) hash or digital signature.
  • Once the component-specific data element is affixed, bound, appended, or otherwise associated to the unique signature generated by the signature module 218, the end user computer 102 provides the unique signature to the signature matching service 112 hosted by the host computing system 106, which determines whether the unique signature matches any of the signature indexes of data store entries stored in the DB 111 by the software product release data store service 110. To that end, the signature matching service 112 compares the unique signature to the respective signature indexes of data store entries in the DB 111, and determines that the unique signature does indeed match the (unique) hash or digital signature index generated by the signature generating service 109 provided by the on-premises computing system 114. Further, the signature matching service 112 derives an identification of a program component from the component-specific data element associated with the matching signature index, and determines that the identification is indicative of the program component 212 of the application program 210.
  • Having determined that the derived identification is indicative of the program component 212 of the application program 210, the signature matching service 112 interacts with the software product release data store service 110 to obtain the subsequent release information for the application program 210 from the data store entry in the DB 111 indexed by the matching signature index. The signature matching service 112 also prepares and sends a notification to the end user computer 102 that includes (i) information pertaining to the particular exceptional event (e.g., the null pointer exception) experienced during execution of the application program 210, (ii) an identification of the subsequent release of the application program 210 containing the software fix for the particular exceptional event, and (iii) a hyperlink to a location where the subsequent release of the application program 210 can be accessed for download to the end user computer 102. In this example, the notification to the end user is displayed on the display 205 of the end user computer 102, and has an exemplary format, as follows:
      • Exception in program component of application “com.example.mydemo”
      • Fixed in release 2.0 of application “com.example.mydemo”
      • Click on download link: com.example.mydemo app release 2.0
  • By proactively generating a unique signature that corresponds to a particular error or exceptional event experienced during execution of a current release of an application program, providing the unique signature, along with a component-specific data element that ties the unique signature to a program component of the application program in which the particular error or exceptional event occurred, to one or more hosted services for use in determining whether a subsequent release of the application program exists containing a software fix for the particular error or exceptional event, and, having determined that such a subsequent release of the application program exists, receiving a notification pertaining to the subsequent release of the application program, including information for downloading the subsequent release of the application program to an end user computer, notifications of software product releases that address particular errors or exceptional events experienced during execution of application programs can be provided to end users in a just-in-time (JIT) fashion for subsequent downloading of the software product releases to their respective end user computers.
  • An exemplary method of an end user computer for receiving an end user notification of a software product release containing a software fix for a particular error or exceptional event experienced during execution of an application program is described herein with reference to blocks 302, 304, 306, 308, 310, 312, and 314 illustrated in FIG. 3. It is noted that further disclosure relating to acts set forth in blocks 302, 304, 306, 308, 310, 312, and 314 of FIG. 3 can be found in the illustrative example described herein. As depicted in block 302, a particular error or exceptional event occurring during execution of a current release of an application program is experienced on an end user computer. As depicted in block 304, information pertaining to the particular error or exceptional event is obtained by the end user computer. As depicted in block 306, a unique signature based on the information pertaining to the particular error or exceptional event is generated by the end user computer. As depicted in block 308, a component-specific data element that specifically ties the unique signature to a program component of the application program is generated and affixed to the unique signature by the end user computer. As depicted in block 310, the unique signature including the component-specific data element affixed thereto are provided to a signature matching service by the end user computer to determine whether the unique signature matches a signature index of a data store entry of a data store, in which the data store entry stores information pertaining to a subsequent release of the application program containing a software fix for the particular error or exceptional event. As depicted in block 312, once it is determined that the unique signature matches the signature index of the data store entry, the information pertaining to the subsequent release of the application program stored in the data store entry is received at the end user computer.
  • An exemplary method of one or more hosted services for providing a notification to an end user of a software product release containing a software fix for a particular error or exceptional event experienced during execution of an application program is described herein with reference to blocks 402, 404, 406, 408, 410, 412, 414, 416, 418, 420, and 422 illustrated in FIG. 4. It is noted that further disclosure relating to acts set forth in blocks 402, 404, 406, 408, 410, 412, 414, 416, 418, 420, and 422 of FIG. 4 can be found in the illustrative example described herein. As depicted in block 402, a defect ticket is detected by a bug fix monitoring service, in which the defect ticket contains information pertaining to (i) a particular error or exceptional event occurring during execution of a current release of an application program for which a software fix was provided, (ii) a program component of the application program in which the particular error or exception occurred, and (iii) a subsequent release of the application program containing the software fix. As depicted in block 404, a signature index based on the information pertaining to the particular error or exceptional event contained in the defect ticket is generated by a signature generating service. As depicted in block 406, a component-specific data element based on the information pertaining to the program component in which the particular error or exception occurred is generated by the signature generating service. As depicted in block 408, the component-specific data element is affixed to the signature index by the signature generating service. As depicted in block 410, the signature index, the component-specific data element affixed thereto, and the information pertaining to the subsequent release of the application program contained in the defect ticket are provided to a software product release data store service by the signature generating service.
  • As depicted in block 412, the information pertaining to the subsequent release of the application program is stored by the software product release data store service as a data store entry indexed by the signature index. As depicted in block 414, a unique signature having a component-specific data element affixed thereto is received at a signature matching service from an end user computer. As depicted in block 416, a determination is made by the signature matching service as to whether the unique signature matches any of multiple signature indexes of data store entries stored by the software product release data store service. As depicted in block 418, having determined that the unique signature matches one of the signature indexes of data store entries, an identification of the program component of the application program is derived by the signature matching service from the component-specific data element associated with the matching signature index. As depicted in block 420, having derived the identification of the program component of the application program, the subsequent release information for the application program is obtained by the signature matching service from the data store entry indexed by the matching signature index. As depicted in block 422, a notification is prepared and sent by the signature matching service to the end user computer, including (i) information pertaining to the particular error or exceptional event occurring during execution of the current release of the application program, (ii) an identification of the subsequent release of the application program containing the software fix for the particular error or exceptional event, and (iii) a hyperlink to a location where the subsequent release of the application program can be accessed for download to the end user computer.
  • Having described the foregoing illustrative embodiments, other alternative embodiments and/or variations may be made and/or practiced. For example, it was described herein that, once an exception is thrown within an application program, the operating system of an end user computer could automatically generate a stack trace, and that a signature module running on the end user computer could generate a unique signature based on the stack trace information. In an alternative embodiment, the signature module can be configured to generate a unique signature based on certain unstructured descriptive information pertaining to an error or exceptional event, unstructured information contained in a snapshot on a display screen at the time of the error or exceptional event, and/or any other suitable structured and/or unstructured information or artifacts pertaining to the error or exceptional event. In a further alternative embodiment, multiple signature modules can be provided that employ different techniques for generating unique signatures based on different types of errors or exceptional events experienced during execution of the application program, and/or different versions of the application program or program component(s) executing on the end user computer.
  • It was further described herein that an end user computer could execute a current release of an application program having one or more program components. In certain embodiments, the application program can be a local client-based application program, a remote server-based application program, a remote cloud-based application program, a web application program, a mobile device-based application program, or any other suitable application program. In certain further embodiments, the application program can have remotely based program components, locally based program components, or a hybrid of remotely and locally based program components.
  • It was also described herein that a software product release data store could be provided as a hosted service. In an alternative embodiment, the software product release data store can be configured as an off-line data store. In a further alternative embodiment, an end user computer can be configured to incorporate a local software product release data store, which can be periodically refreshed by an online (e.g., cloud-based) data store service. In another alternative embodiment, one or more signature modules running on the end user computer can be periodically refreshed by an online (e.g., cloud-based) signature generating service.
  • It was further described herein that, once an exception is thrown within an application program running on an end user computer, an operating system of the end user computer could automatically generate a stack trace, including a sequence of methods or procedures of program component code that were called during execution of the application program. In certain embodiments, the operating system of the end user computer can generate a complete stack trace, or a partial stack trace up to the point where the exception was thrown. In each such embodiment, an error/exception handler directly associated with the application program can generate the complete or partial stack trace to avoid having any unknown stack frames (e.g., stack frames whose file path is unknown) in the stack trace. For example, such unknown stack frames in a stack trace may result from calls to an external shared library, such as a dynamic-link library (DLL).
  • It was also described herein that a unique signature could be generated that corresponds to a particular error or exceptional event experienced during execution of a current release of an application program, and that the unique signature could be provided to one or more hosted services for use in determining whether a subsequent release of the application program exists containing a software fix for the particular error or exceptional event. In certain embodiments, the subsequent release of the application program can be obtained by effectively mapping the unique signature of the particular error or exceptional event to the subsequent release of the application program, or, more generally, effectively mapping a particular error or exceptional event to a resolution of the particular error or exceptional event.
  • It was further described herein that a host computing system (e.g., the host computing system 106; see FIG. 1) could be configured as a cloud platform accessible via a network. In one embodiment, the host computing system can be configured as a private cloud platform accessible via a private network (e.g., a corporate network) protected by a firewall and/or gateway computer. In such a configuration, the gateway computer can be configured to perform functions of a proxy module (e.g., an ICA® proxy module) disposed between an end user computer and one or more hosted services (e.g., the hosted services 107; see FIG. 1) for carrying out the various techniques disclosed herein. For example, such a proxy module may be configured to act as the respective hosted services to the end user computer, and to act as the end user computer to the respective hosted services.
  • It was also described herein that a signature generating service of a host computing system (e.g., the signature generating service 109; see FIG. 1) could employ a technique that is the same as that employed by a signature module of an end user computer to generate a unique hash or digital signature for an error or exceptional event occurring during execution of an application program. In an alternative embodiment, such a unique hash or digital signature can be included in a defect ticket alongside error/exceptional event information to which the hash/digital signature pertains. In this way, the need for the signature generating service to generate the hash/digital signature can be avoided. In a further alternative embodiment, the signature generating service can generate the hash/digital signature based on the error/exceptional event information contained in the defect ticket, and can verify the generated hash/digital signature against the hash/digital signature provided in the defect ticket. In another alternative embodiment, such error/exceptional event information and/or other software bug details can be provided as attachments or hyperlinks to log files, and the host computing system can process such information and/or details to obtain a unique signature.
  • It was further described herein that a signature matching service of a host computing system (e.g., the signature matching service 112; see FIG. 1) could prepare and send a notification to an end user computer that includes a hyperlink to a location where a subsequent release of an application program can be accessed for download to the end user computer. In an alternative embodiment, such a notification can include a hyperlink to a knowledge base (KB) or support article with details regarding how to download and/or install the subsequent release, as well as how to apply and/or configure the subsequent release.
  • Although features have been shown and described herein with reference to particular illustrative embodiments thereof, such features may be included and are hereby included in any of the disclosed embodiments and their variants. Thus, it is understood that features disclosed in connection with any embodiment are included as variants of any other embodiment. Further, the improvement or portions thereof may be embodied as a computer program product including one or more non-transient, computer-readable storage media, such as a magnetic disk, magnetic tape, compact disk (CD), digital versatile disk (DVD), optical disk, flash drive, solid state drive (SSD), secure digital (SD) chip or device, application specific integrated circuit (ASIC), field programmable gate array (FPGA), and/or the like. Any number of computer-readable media may be used. The media may be encoded with instructions that, when executed on one or more computers or other processors, perform the process or processes described herein. Such media may be considered articles of manufacture or machines, and may be transportable from one machine to another.
  • As used throughout this document, the words “comprising,” “including,” “containing,” and “having” are intended to set forth certain items, steps, acts, elements, or aspects of something in an open-ended fashion. Also, as used herein and unless a specific statement is made to the contrary, the word “set” or “subset” means one or more of something. This is the case regardless of whether the phrase “set of” or “subset of” is followed by a singular or plural object, or whether it is conjugated with a singular or plural verb. Further, although ordinal expressions, such as “first,” “second,” “third,” and so on, may be used as adjectives herein, such ordinal expressions are used for identification purposes, and, unless specifically indicated, are not intended to imply any ordering or sequence. Thus, for example, a “second” event may take place before or after a “first event,” or even if no first event ever occurs. In addition, an identification herein of a particular element, feature, or act as being a “first” such element, feature, or act should not be construed as requiring that there must also be a “second” or other such element, feature, or act. Rather, the “first” item may be the only one. Although certain embodiments are disclosed herein, it is understood that these are provided by way of example only, and that the disclosed systems, apparatus, and methods are not limited to these particular embodiments.
  • While various embodiments of the disclosed systems, apparatus, and methods have been particularly shown and described, it will be understood by those skilled in the art that various changes in form and/or details may be made therein, without departing from the scope of the disclosure.

Claims (20)

What is claimed is:
1. A method comprising:
receiving, at a computing system, an indication of an error in execution of an application on an end user computer, the indication including a data element that ties the indication to a component of the application and makes the indication unique for the component;
obtaining, by the computing system using the received indication, information of a release of the application, the release being configured to correct the error; and
sending a notification of the release of the application to the end user computer.
2. The method of claim 1 further comprising:
comparing, by the computing system, the received indication to one or more indexes to determine a match between the received indication and an entry of the one or more indexes, the entry pertaining to the release of the application.
3. The method of claim 2 further comprising:
having determined the match between the received indication and the entry of the one or more indexes, preparing, by the computing system from the information of the release of the application, the notification of the release of the application.
4. The method of claim 1 wherein a correction of the error is included in a defect ticket, and wherein the method further comprises:
detecting the defect ticket stored on a defect management server computer.
5. The method of claim 4 wherein the defect ticket contains information pertaining to the error for which the correction was provided, and wherein the method further comprises:
having detected the defect ticket, accessing the information pertaining to the error from the defect ticket; and
generating the indication based on the information pertaining to the error.
6. The method of claim 4 wherein the defect ticket contains information pertaining to the component of the application in which the error occurred, and wherein the method further comprises:
having detected the defect ticket, accessing the information pertaining to the component of the application from the defect ticket; and
generating the data element based on the information pertaining to the component.
7. The method of claim 4 wherein the defect ticket contains information of the release of the application, and wherein the method further comprises:
having detected the defect ticket, accessing the information of the release of the application from the defect ticket; and
preparing the notification based on the information of the release.
8. A method comprising:
generating, by an end user computer, an indication of an error in execution of an application, the indication including a data element that ties the indication to a component of the application and makes the indication unique for the component;
providing, by the end user computer, the generated indication to a computing system, the computing system being configured to identify a release of the application that corrects the error; and
receiving, at the end user computer from the computing system, a notification of the release of the application.
9. The method of claim 8 wherein an exception is thrown upon occurrence of the error, and wherein the method further comprises:
in response to the exception, generating stack trace information by the end user computer.
10. The method of claim 9 wherein the generating of the indication is based on the stack trace information.
11. The method of claim 8 further comprising:
generating, by the end user computer, the data element based on information pertaining to the component.
12. The method of claim 8 further comprising:
having received the notification of the release of the application at the end user computer, displaying the notification on the end user computer,
wherein the notification is configured to enable an update of the application on the end user computer to prevent an occurrence of the error in the component during execution of the application.
13. A system comprising:
at least one memory; and
processing circuitry configured to execute program instructions out of the at least one memory to:
receive an indication of an error in execution of an application on an end user computer, the indication including a data element that ties the indication to a component of the application and makes the indication unique for the component;
obtain, using the received indication, information of a release of the application configured to correct the error; and
send a notification of the release of the application to the end user computer.
14. The system of claim 13 wherein the processing circuitry is further configured to execute the program instructions out of the at least one memory to compare the received indication to one or more indexes to determine a match between the received indication and an entry of the one or more indexes, the entry pertaining to the release of the application.
15. The system of claim 14 wherein the processing circuitry is further configured to execute the program instructions out of the at least one memory, having determined the match between the received indication and the entry of the one or more indexes, to prepare, from the information of the release of the application, the notification of the release of the application.
16. The system of claim 15 wherein the processing circuitry is further configured to execute the program instructions out of the at least one memory to send the notification of the release of the application to the end user computer, and wherein the notification is configured to enable an update of the application on the end user computer to prevent an occurrence of the error in the component during execution of the application.
17. The system of claim 13 wherein a correction of the error is included in a defect ticket, and wherein the processing circuitry is further configured to execute the program instructions out of the at least one memory to detect the defect ticket stored on a defect management server computer.
18. The system of claim 17 wherein the defect ticket contains information pertaining to the error for which the correction was provided, and wherein the processing circuitry is further configured to execute the program instructions out of the at least one memory, having detected the defect ticket, to access the information pertaining to the error from the defect ticket, and to generate the indication based on the information pertaining to the error.
19. The system of claim 17 wherein the defect ticket contains information pertaining to the component of the application in which the error occurred, and wherein the processing circuitry is further configured to execute the program instructions out of the at least one memory, having detected the defect ticket, to access the information pertaining to the component of the application from the defect ticket, and to generate the data element based on the information pertaining to the component.
20. The system of claim 17 wherein the defect ticket contains information of the release of the application, and wherein the processing circuitry is further configured to execute the program instructions out of the at least one memory, having detected the defect ticket, to access the information of the release of the application from the defect ticket, and to prepare the notification based on the information of the release.
US16/829,565 2018-09-27 2020-03-25 Systems and methods of just-in-time proactive notification of a product release containing a software fix Abandoned US20200225933A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US16/829,565 US20200225933A1 (en) 2018-09-27 2020-03-25 Systems and methods of just-in-time proactive notification of a product release containing a software fix

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US16/144,344 US10635429B2 (en) 2018-09-27 2018-09-27 Systems and methods of just-in-time proactive notification of a product release containing a software fix
US16/829,565 US20200225933A1 (en) 2018-09-27 2020-03-25 Systems and methods of just-in-time proactive notification of a product release containing a software fix

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US16/144,344 Continuation US10635429B2 (en) 2018-09-27 2018-09-27 Systems and methods of just-in-time proactive notification of a product release containing a software fix

Publications (1)

Publication Number Publication Date
US20200225933A1 true US20200225933A1 (en) 2020-07-16

Family

ID=69947423

Family Applications (2)

Application Number Title Priority Date Filing Date
US16/144,344 Active US10635429B2 (en) 2018-09-27 2018-09-27 Systems and methods of just-in-time proactive notification of a product release containing a software fix
US16/829,565 Abandoned US20200225933A1 (en) 2018-09-27 2020-03-25 Systems and methods of just-in-time proactive notification of a product release containing a software fix

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US16/144,344 Active US10635429B2 (en) 2018-09-27 2018-09-27 Systems and methods of just-in-time proactive notification of a product release containing a software fix

Country Status (1)

Country Link
US (2) US10635429B2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111930366A (en) * 2020-10-12 2020-11-13 北京江融信科技有限公司 Rule engine implementation method and system based on JIT real-time compilation

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11042138B2 (en) * 2018-10-09 2021-06-22 Johnson Controls Technology Company Auto detection of signature and native reference changes from data sources
US11625315B2 (en) * 2019-05-29 2023-04-11 Microsoft Technology Licensing, Llc Software regression recovery via automated detection of problem change lists
US11308092B2 (en) * 2019-06-11 2022-04-19 Microsoft Technology Licensing, Llc Stream processing diagnostics
US11281519B2 (en) * 2019-07-15 2022-03-22 Microsoft Technology Licensing, Llc Health indicator platform for software regression reduction
US11588646B2 (en) * 2019-09-05 2023-02-21 Cisco Technology, Inc. Identity-based application and file verification
US11256603B2 (en) * 2019-10-14 2022-02-22 Microsoft Technology Licensing, Llc Generating and attributing unique identifiers representing performance issues within a call stack
US11537669B1 (en) 2021-06-09 2022-12-27 Citrix Systems, Inc. Preparation of signature fields within electronic documents
US11995461B2 (en) 2021-07-23 2024-05-28 VMware LLC Custom metadata collection for application components in a virtualized computing system
US11829285B2 (en) * 2021-10-26 2023-11-28 Sap Se Multiple application smoke test

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7062763B2 (en) * 2001-11-13 2006-06-13 Sun Microsystems, Inc. Method and apparatus for remote software code update
US20130047145A1 (en) * 2006-08-29 2013-02-21 Quan-Jie Cui Match analysis for encoding optimized update packages
US7814372B2 (en) 2007-09-07 2010-10-12 Ebay Inc. Method and system for exception detecting and alerting
US9218000B2 (en) 2009-04-01 2015-12-22 Honeywell International Inc. System and method for cloud computing
US9535818B2 (en) * 2012-10-16 2017-01-03 Microsoft Technology Licensing, Llc Identifying high impact bugs
US9471594B1 (en) * 2013-09-30 2016-10-18 Emc Corporation Defect remediation within a system
US9009539B1 (en) 2014-03-18 2015-04-14 Splunk Inc Identifying and grouping program run time errors
US9465719B2 (en) 2014-08-12 2016-10-11 Red Hat, Inc. Localized representation of stack traces
US9785537B2 (en) 2015-10-15 2017-10-10 International Business Machines Corporation Runtime exception and bug identification within an integrated development environment
US9871815B2 (en) 2015-12-14 2018-01-16 Joseph Nabil Ouchn Method and system for automated computer vulnerability tracking

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111930366A (en) * 2020-10-12 2020-11-13 北京江融信科技有限公司 Rule engine implementation method and system based on JIT real-time compilation

Also Published As

Publication number Publication date
US10635429B2 (en) 2020-04-28
US20200104110A1 (en) 2020-04-02

Similar Documents

Publication Publication Date Title
US20200225933A1 (en) Systems and methods of just-in-time proactive notification of a product release containing a software fix
KR102268355B1 (en) Cloud deployment infrastructure validation engine
US11847480B2 (en) System for detecting impairment issues of distributed hosts
US7664986B2 (en) System and method for determining fault isolation in an enterprise computing system
US7962788B2 (en) Automated treatment of system and application validation failures
US9471594B1 (en) Defect remediation within a system
US20140379669A1 (en) Feedback Optimized Checks for Database Migration
US11157390B2 (en) Automatic software defect repair
US9563499B2 (en) Processing run-time error messages and implementing security policies in web hosting
US10911447B2 (en) Application error fingerprinting
US10984109B2 (en) Application component auditor
KR20130122747A (en) Repairing corrupt software
KR20050120643A (en) Non-invasive automatic offsite patch fingerprinting and updating system and method
US20060026463A1 (en) Methods and systems for validating a system environment
US11113169B2 (en) Automatic creation of best known configurations
US11509677B2 (en) Automatically detecting vulnerability remediations and regressions
US9164857B2 (en) Scalable structured data store operations
US7673178B2 (en) Break and optional hold on failure
WO2014204470A1 (en) Generating a fingerprint representing a response of an application to a simulation of a fault of an external service
US7487181B2 (en) Targeted rules and action based client support
CN113342560A (en) Fault processing method, system, electronic equipment and storage medium
US10146664B2 (en) Virtual test environment for webpages with automation features
CN111884858A (en) Equipment asset information verification method, device, system and medium
US8621451B1 (en) Responsiveness of a computing device in connection with software distribution
US20220398188A1 (en) Testing automation for open standard cloud services applications

Legal Events

Date Code Title Description
STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

AS Assignment

Owner name: CITRIX SYSTEMS, INC., FLORIDA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SINGH, MANBINDER PAL;REEL/FRAME:052813/0734

Effective date: 20180927

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER

AS Assignment

Owner name: WILMINGTON TRUST, NATIONAL ASSOCIATION, DELAWARE

Free format text: SECURITY INTEREST;ASSIGNOR:CITRIX SYSTEMS, INC.;REEL/FRAME:062079/0001

Effective date: 20220930

AS Assignment

Owner name: WILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENT, DELAWARE

Free format text: PATENT SECURITY AGREEMENT;ASSIGNORS:TIBCO SOFTWARE INC.;CITRIX SYSTEMS, INC.;REEL/FRAME:062113/0470

Effective date: 20220930

Owner name: GOLDMAN SACHS BANK USA, AS COLLATERAL AGENT, NEW YORK

Free format text: SECOND LIEN PATENT SECURITY AGREEMENT;ASSIGNORS:TIBCO SOFTWARE INC.;CITRIX SYSTEMS, INC.;REEL/FRAME:062113/0001

Effective date: 20220930

Owner name: BANK OF AMERICA, N.A., AS COLLATERAL AGENT, NORTH CAROLINA

Free format text: PATENT SECURITY AGREEMENT;ASSIGNORS:TIBCO SOFTWARE INC.;CITRIX SYSTEMS, INC.;REEL/FRAME:062112/0262

Effective date: 20220930

STPP Information on status: patent application and granting procedure in general

Free format text: ADVISORY ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: CLOUD SOFTWARE GROUP, INC. (F/K/A TIBCO SOFTWARE INC.), FLORIDA

Free format text: RELEASE AND REASSIGNMENT OF SECURITY INTEREST IN PATENT (REEL/FRAME 062113/0001);ASSIGNOR:GOLDMAN SACHS BANK USA, AS COLLATERAL AGENT;REEL/FRAME:063339/0525

Effective date: 20230410

Owner name: CITRIX SYSTEMS, INC., FLORIDA

Free format text: RELEASE AND REASSIGNMENT OF SECURITY INTEREST IN PATENT (REEL/FRAME 062113/0001);ASSIGNOR:GOLDMAN SACHS BANK USA, AS COLLATERAL AGENT;REEL/FRAME:063339/0525

Effective date: 20230410

Owner name: WILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENT, DELAWARE

Free format text: PATENT SECURITY AGREEMENT;ASSIGNORS:CLOUD SOFTWARE GROUP, INC. (F/K/A TIBCO SOFTWARE INC.);CITRIX SYSTEMS, INC.;REEL/FRAME:063340/0164

Effective date: 20230410