Bot has learnd to find and correct build failures on Travis CI

29.10.18 в 15:00 Interesting 4510

A joint team of researchers from technology universities in France and Sweden are exploring the possibility of creating technology to quickly and efficiently fix software vulnerabilities. The bot, named Repairnator, was created as a part of the project, which equipped with an artificial intelligence that comes from advanced machine learning techniques. It is capable of correcting the bugs identified at a given moment by searching for - and adapting - solutions that previously have been used in order to repair similar errors.



Continuous integration is software development practice that consists of merging working copies into a main branch of development several times a day and performing frequent automated project builds to quickly identify potential defects and solve integration problems.”

Repairnator continuously monitors thousands of new versions of projects added to the GitHub platform and analyzes their respective assemblies to eliminate errors that occur during continuous integration. Every minute the bot starts the process of preliminary correction of errors that precede the intervention of specialists.

Researchers have been working on Repairnator since 2016. And this year, the program for the first time created patches that can be compared with ones created by humans. The bot patched the detected errors before the developers, and they were accepted by the system as a real contribution to the development of the project.

A total of five “patches” were eventually added to the code base.

The number of unsuccessful attempts to fix in the code is unknown. However, in the past, bot made 3551 attempts, but they were all less effective than made by people.

The original project developers who accepted requests from Repairnator did not know that the changes were proposed by the bot. In order to avoid prejudice against the bot, the creators of Repairnator filed an application to participate in the development of the project from the fictional GitHub’s user, engineer Luc Esape. Later, for ethical reasons, the true “face” of the bot was disclosed with each request for the inclusion of code in the project.

Continuous integration is software development practice that consists of merging working copies into a main branch of development several times a day and performing frequent automated project builds to quickly identify potential defects and solve integration problems.”

Source

Comments

Sign in to comment
Popular

Together with wide opportunities the Internet carries a number of dangers. First of all, when it comes to anonymity and security.

Initially, the World Wide Web was conceived as a space without borders, where you can get absolutely any information on an anonymous basis.

In today's world, it becomes more difficult to keep personal and corporate data in secret, so the issue of information security is becoming more acute every day.

In the recent past by the standards of the development of information technologies, in 2015 Google created artificial intelligence based on neural networks, which was able to analyze the condition around itself and draw conclusions about its further education. The name of the new offspring from Google was given in abbreviated from the term "deep Q-network" - DQN. The DQN started training in common arcade games (Pakman, Tennis, Space Invaiders, Boksing and other classics).

Good afternoon! Now we are talking about such an important topic in our time, as an opportunity to bypass the blocking of sites. The problem is very relevant in our country

New

If you want to be anonymous on the Internet, but you haven’t yet figured out what to pay attention to when choosing a proxy, then after reading this article, you will get all the basic information for a quick start in this area.

What is the Internet Protocol or IP and why is it essential for the Internet to function? What is the difference between IPv4 and IPv6 and how to stick to the newer protocol faster? We'll answer these and other questions in this article.

Anonymous proxies allow you to remain unnoticed on the Internet, but not all proxies can be a solid shield to hide behind. Proxy anonymity can range from full to zero. What should you choose anyway?

User-Agent plays an important role running web applications. In this article, we will explain why it is necessary to replace the real user agent and how to do it in Google Chrome and Opera browsers.

What is BitTorrent? Is it legal and safe to use BitTorrent trackers? How to protect yourself with a VPN and what should you know when choosing a high-quality VPN service? After reading this article, you will get answers to these questions and will be able to use this knowledge for secure file sharing.

Contact Us
Support
Vadim
Have you got any question?

Click here and we’ll answer