Test case generation using fingerprinting

    公开(公告)号:US11989118B1

    公开(公告)日:2024-05-21

    申请号:US17541967

    申请日:2021-12-03

    CPC classification number: G06F11/3672

    Abstract: Systems, devices, and methods are provided for fingerprinting requests, such as transaction records. A transaction record or other suitable request may be parsed to identify a parameter values for a set of fields relevant to fingerprinting. A transaction record representation may be generated based on transaction input data, transaction output data, intermediate data, or combinations thereof. A fingerprint may be generated from the transaction record implementation. Fingerprints may be used to identify various test cases that can be used for regression testing.

    Highly available storage using independent data stores

    公开(公告)号:US11366801B1

    公开(公告)日:2022-06-21

    申请号:US16216529

    申请日:2018-12-11

    Abstract: Methods, systems, and computer-readable media for highly available storage using independent data stores are disclosed. A request to create a data object using an atomic operation is received. A selected data store is determined of a plurality of data stores comprising a first data store and a second data store. The data stores are mutually independent. An identifier assigned to the data object indicates the selected data store. An event associated with creation of the data object is generated. The event is associated with the identifier. The selected data store stores the data object and the event such that the event is consistent with the data object.

    Globally ordered event stream logging

    公开(公告)号:US10860457B1

    公开(公告)日:2020-12-08

    申请号:US16277898

    申请日:2019-02-15

    Abstract: Methods, systems, and computer-readable media for globally ordered event stream logging are disclosed. A first host of a plurality of hosts generates an additional chain of a stream comprising a plurality of chains and representing a globally ordered sequence of events. The first host sends information describing the additional chain to a second host. The second host receives a request to store a data object representing an event. The request is associated with a stream identifier of the stream. The second host stores, in the additional chain, the data object, a timestamp associated with the data object, and an identifier of the second host. The data object in the additional chain is associated with a position in the globally ordered sequence across the plurality of chains.

    Safe deployment of configurations to server fleets

    公开(公告)号:US11281459B2

    公开(公告)日:2022-03-22

    申请号:US16945435

    申请日:2020-07-31

    Abstract: Methods, systems, and computer-readable media for safe deployment of configurations to server fleets are disclosed. A host processes requests to a service according to a control versions of a first configuration and a second configuration. After receiving an experimental version of the first configuration, a host processes some requests to the service according to the control versions of the first configuration and the second configuration, and other requests according to the experimental version of the first configuration and the control version of the second configuration. The experimental version of the first configuration is approved or rejected based at least in part on performance of the service. The host then processes some requests to the service according to the experimental version of the first configuration and the control version of the second configuration, and other requests according to the experimental versions of the first configuration and the second configuration.

    Safe deployment of configurations to server fleets

    公开(公告)号:US10732967B1

    公开(公告)日:2020-08-04

    申请号:US16283572

    申请日:2019-02-22

    Abstract: Methods, systems, and computer-readable media for safe deployment of configurations to server fleets are disclosed. A host processes requests to a service according to a control versions of a first configuration and a second configuration. After receiving an experimental version of the first configuration, a host processes some requests to the service according to the control versions of the first configuration and the second configuration, and other requests according to the experimental version of the first configuration and the control version of the second configuration. The experimental version of the first configuration is approved or rejected based at least in part on performance of the service. The host then processes some requests to the service according to the experimental version of the first configuration and the control version of the second configuration, and other requests according to the experimental versions of the first configuration and the second configuration.

Patent Agency Ranking