News Column

Patent Application Titled "Source Control Inheritance Locking" Published Online

February 13, 2014



By a News Reporter-Staff News Editor at Computer Weekly News -- According to news reporting originating from Washington, D.C., by VerticalNews journalists, a patent application by the inventors DeLucca, Albert A. (Wantagh, NY); DeLuca, Lisa Seacat (San Francisco, CA); Jang, Soobaek (Hamden, CT); Volin, Troy Michael (Chapel Hill, NC), filed on September 6, 2012, was made available online on January 30, 2014.

The assignee for this patent application is International Business Machines Corporation.

Reporters obtained the following quote from the background information supplied by the inventors: "The present invention is in the field of methods and computer program products for source control inheritance locking

"Source code, also referred to as source or code, is any sequence of statements and/or declarations written in some human-readable computer programming language. Programming languages are artificial languages that can be used to control the behavior of a machine, particularly a computer. More specifically, a programming language is used to write computer programs, which instruct a computer to perform some kind of computation, and possibly control external devices.

"To ensure that a computer program is complete, precise and accurate, software development projects often employ hundreds of software developers to write and edit the program code. In such cases, it is common for multiple software developers to work on a program code at the same time such as, for example, editing different or the same sections of the program code."

In addition to obtaining background information on this patent application, VerticalNews editors also obtained the inventors' summary information for this patent application: "An embodiment of the invention provides a method for source control in a program, wherein the program includes a plurality of hierarchical files for execution of a plurality of processes, wherein the hierarchical files include parent files and child files. A revised process selected by a user on a graphical user interface is identified; and, files in the revised process are identified. The files in the revised process are locked with a source control processor. The locking of the files in the revised process includes disallowing revisions to the files in the revised process. One or more files that are descendents of a file in the revised process are identified. The one or more files that are descendents of a file in the revised process are locked with the source control processor. The locking of the one or more files that are descendents of a file in the revised process includes disallowing revisions to the one or more files that are descendents of a file in the revised process.

"Another embodiment of the invention provides a method for source control in a program, wherein the program includes a plurality of hierarchical nodes for execution of a plurality of processes, wherein the hierarchical nodes include parent nodes and child nodes. A revised process selected by a user on a graphical user interface is identified; and, nodes in the revised process are identified. The nodes in the revised process are locked with a source control processor. The locking of the nodes in the revised process includes disallowing revisions to the nodes in the revised process. One or more nodes that share a parent with a node in the revised process are identified. The one or more nodes that share a parent with a node in the revised process are locked with the source control processor. The locking of the one or more nodes that share a parent with a node in the revised process includes disallowing revisions to the one or more nodes that share a parent with a node in the revised process.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

"The present invention is described with reference to the accompanying drawings. In the drawings, like reference numbers indicate identical or functionally similar elements.

"FIG. 1 is a flow diagram illustrating a method for source control in a program according to an embodiment of the invention;

"FIG. 2 illustrates a program including hierarchy of files according to an embodiment of the invention; and

"FIG. 3 illustrates a computer program product according to an embodiment of the invention."

For more information, see this patent application: DeLucca, Albert A.; DeLuca, Lisa Seacat; Jang, Soobaek; Volin, Troy Michael. Source Control Inheritance Locking. Filed September 6, 2012 and posted January 30, 2014. Patent URL: http://appft.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&u=%2Fnetahtml%2FPTO%2Fsearch-adv.html&r=626&p=13&f=G&l=50&d=PG01&S1=20140123.PD.&OS=PD/20140123&RS=PD/20140123

Keywords for this news article include: Software, Programming Language, International Business Machines Corporation.

Our reports deliver fact-based news of research and discoveries from around the world. Copyright 2014, NewsRx LLC


For more stories covering the world of technology, please see HispanicBusiness' Tech Channel



Source: Computer Weekly News


Story Tools