Techniques for distributing information in a computer network related to a software anomaly
First Claim
1. A method of distributing information in a computer network related to a reported software anomaly, said method comprising:
- receiving information concerning said reported software anomaly (RSA);
identifying a controlling problematic functional characteristic included in said RSA, the controlling problematic functional characteristic being identified among a plurality of functional characteristics, each functional characteristic of the plurality of functional characteristics comprising an operational behavior that is expected to be demonstrated by operating the software, wherein the controlling problematic functional characteristic comprises an operational characteristic of the software to be investigated to determine a cause of the RSA;
ascertaining from a plurality of computer-readable addresses a sub-group of said computer-readable addresses that correspond to parties with information corresponding to said controlling problematic functional characteristic that are assigned to investigate the RSA;
storing on said computer network an investigation record having associated therewith data corresponding to said RSA;
transmitting to said sub-group a message perceivable by said parties when information changes in a status field of the investigation record stored on said computer network;
augmenting said investigation record with data including the cause of said controlling problematic functional characteristic;
generating, in response to augmenting said investigation record, a bug record;
identifying additional computer-readable addresses corresponding to additional parties having information related to the cause for removing the RSA; and
transmitting, to the additional computer-readable addresses, a second message perceivable by said additional parties indicating a location on said computer network of said bug record.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention is directed to methods and systems of distributing information in a computer network related to a report a software anomaly that includes receiving information concerning the reported software anomaly (RSA); identifying a problematic functional characteristic included in the RSA; ascertaining from a plurality of computer-readable addresses a sub-group of the computer-readable addresses that correspond to parties with information corresponding to the problematic functional characteristic; storing on the computer network an investigation record having associated therewith data corresponding to the RSA; and transmitting to the sub-group a message perceivable by the parties indicating a location on the computer network of the investigation record.
-
Citations
24 Claims
-
1. A method of distributing information in a computer network related to a reported software anomaly, said method comprising:
-
receiving information concerning said reported software anomaly (RSA); identifying a controlling problematic functional characteristic included in said RSA, the controlling problematic functional characteristic being identified among a plurality of functional characteristics, each functional characteristic of the plurality of functional characteristics comprising an operational behavior that is expected to be demonstrated by operating the software, wherein the controlling problematic functional characteristic comprises an operational characteristic of the software to be investigated to determine a cause of the RSA; ascertaining from a plurality of computer-readable addresses a sub-group of said computer-readable addresses that correspond to parties with information corresponding to said controlling problematic functional characteristic that are assigned to investigate the RSA; storing on said computer network an investigation record having associated therewith data corresponding to said RSA; transmitting to said sub-group a message perceivable by said parties when information changes in a status field of the investigation record stored on said computer network; augmenting said investigation record with data including the cause of said controlling problematic functional characteristic; generating, in response to augmenting said investigation record, a bug record; identifying additional computer-readable addresses corresponding to additional parties having information related to the cause for removing the RSA; and transmitting, to the additional computer-readable addresses, a second message perceivable by said additional parties indicating a location on said computer network of said bug record. - View Dependent Claims (2, 3, 4, 5, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
6. A computer product of the type comprising a non-transitory computer readable medium that contains a program to control a computer having a display, said computer product comprising:
-
computer code that receives information concerning a reported software anomaly (RSA); computer code that identifies a controlling problematic functional characteristic included in said RSA, the controlling problematic functional characteristic being identified among a plurality of functional characteristics, each functional characteristic of the plurality of functional characteristics comprising an operational behavior that is expected to be demonstrated by operating the software, wherein the controlling problematic functional characteristic comprises an operational characteristic of the software to be investigated to determine a cause of the RSA; computer code that ascertains from a plurality of computer-readable addresses a sub-group of said computer-readable addresses that correspond to parties with information corresponding to said controlling problematic functional characteristic that are assigned to investigate the RSA; computer code that stores on said computer network an investigation record having associated therewith data corresponding to said RSA; computer code that transmits to said sub-group a message perceivable by said parties when information changes in a status field of the investigation record stored on said computer network computer code that augments said investigation record with data including the cause of said controlling problematic functional characteristic; computer code that generates, in response to augmenting said investigation record, a bug record; computer code that identifies additional computer-readable addresses corresponding to additional parties having information related to the cause for removing the RSA; and computer code that transmits, to the additional computer-readable addresses, a second message perceivable by said additional parties indicating a location on said computer network of said bug record. - View Dependent Claims (7, 8, 9, 23)
-
-
10. An apparatus for testing computer-readable code, the apparatus comprising:
-
a processor; and one or more stored sequences of instructions which, when executed by the processor, cause the processor to carry out the steps of; receiving information concerning said reported software anomaly (RSA); identifying a controlling problematic controlling functional characteristic included in said RSA, the controlling problematic functional characteristic being identified among a plurality of functional characteristics, each functional characteristic of the plurality of functional characteristics comprising an operational behavior that is expected to be demonstrated by operating the software, wherein the controlling problematic functional characteristic comprises an operational characteristic of the software to be investigated to determine a cause of the RSA; ascertaining from a plurality of computer-readable addresses a sub-group of said computer-readable addresses that correspond to parties with information corresponding to said controlling problematic functional characteristic that are assigned to investigate the RSA; storing on said computer network an investigation record having associated therewith data corresponding to said RSA; transmitting to said sub-group a message perceivable by said parties when information changes in a status field of the investigation record stored on said computer network; augmenting said investigation record with data including the cause of said controlling problematic functional characteristic; generating, in response to augmenting said investigation record, a bug record; identifying additional computer-readable addresses corresponding to additional parties having information related to the cause for removing the RSA; and transmitting, to the additional computer-readable addresses, a second message perceivable by said additional parties indicating a location on said computer network of said bug record. - View Dependent Claims (11, 12, 13, 24)
-
Specification