The Latest Programming Innovations - Issue #9
Bas van Essen, Developer Advocate @ Jexia.com
Posted on July 12, 2018
By Jexia Experts • Monthly newsletter • Issue #9 • Subscribe here for free
In-depth research into software engineering. Leading to new tools, approaches and systems. Jexia expert engineers Joel Bryan Juliano and Mark Geller provide you with the latest articles.
Out of stealth mode:
1. Pulumi lets you manage your infrastructure with code
Pulumi wants to make it easier for developers and ops team to define their infrastructure by writing code.
2. Protected code even when you ignore security threats
Shiftleft says they are able to do that because they conduct a study of the code and all its dependencies before run time.
3. Zenaton lets you build and run workflows with ease
The French company Zenaton wants to take care of the most tedious part of your application — asynchronous jobs and background tasks.
Assessable through repos and papers:
4. Droix: automatically repair crashes in Android apps
Android apps are omnipresent, and frequently su?er from crashes — leading to poor UX and economic loss. Also read the paper.
5. Software development outsourcing in the blockchain
Scientists present ChainSoft - a platform for outsourcing software development and automatic payments between parties that distrust each other, by means of blockchain. Also read their paper.
6. Automatically reducing time spend on failure analysis
Testing and debugging are time-consuming. Aletheia helps devs and testers to reduce time on failure analysis. Also read its paper and watch the video.
Only assessable by reading the papers:
7. Automatically answering API-related questions
SOTU automatically finds answers for API-related natural language questions, from tutorials and Stack Overflow.
8. Quickly understanding source code changes
Developers often save multiple kinds of source code edits into a commit in a version control system, which is dif?cult to understand and revert. With a visualisation tool scientists show better details of the changes and align edits in a tree structure for expressing multiple groups of changes.
9. Le-git-imate: automatically verify Git Repositories
Web-based Git hosting services such as GitHub and GitLab are popular choices to manage and interact with Git repositories. However, they lack an important security feature — the ability to sign Git commits.
10. DWEN: detecting duplicate bug reports in repos
Capturing and tagging duplicate bug reports is crucial in order to avoid assignment of the same bug to di?erent developers.
11. Automatically assign a bug report to the best fixer
It is a very time-consuming task to assign a bug report to the most suitable fixer in large open source software projects.
12. D2Spec: automatically extract API specifications
API specs are machine-readable descriptions of APIs. In combination with related tooling, they simplify and support API use. However, despite the fast growing amount of APIs, specs are rare and their creation and maintenance now heavily rely on manual e?orts by third parties.
13. Automatically compare library quality by metrics
To perform a specific task, there is usually a large number of libraries that o?er the desired function. But selecting the appropriate library is not easy since developers are often unaware of their advantages and disadvantages.
14. Improve virtual assistance during dev's discussions
Scientists advance the state of virtual assistants in software engineering. Virtual assistant technology is growing fast, but applications in developing software are behind those in other areas. The researchers test automatic detection of speech act types in developer conversations about bug repair.
15. Assign similar vectors to snippets and their outlines
CODEnn jointly embeds code snippets and natural language descriptions into a high-dimensional vector space, in such a way that code snippet and its corresponding description have similar vectors.
Mark's special recommendations:
16. Spot humans through walls with a small transmitter
This paper demonstrates accurate human pose estimation through walls and occlusions. We leverage the fact that wireless signals in the WiFi frequencies traverse walls and reflect off the human body.
17. Spotting Image Manipulation with AI
Adobe researcher Vlad applies artificial intelligence and machine learning to more easily, reliably and quickly detect whether or not a part of a digital image has been manipulated, and if so, what aspects were modified.
18. Humans favour book story made by machine learning
Human judges prefer stories generated by algorithms, constructed by Facebook's AI researchers, to those from a strong non-hierarchical model.
Finally, Mark shares some additional wisdom:
Posted on July 12, 2018
Join Our Newsletter. No Spam, Only the good stuff.
Sign up to receive the latest update from our blog.
Related
October 6, 2024