Bot has learnd to find and correct build failures on Travis CI

29.10.18 в 15:00 Interesting 6013

A joint team of researchers from technology universities in France and Sweden are exploring the possibility of creating technology to quickly and efficiently fix software vulnerabilities. The bot, named Repairnator, was created as a part of the project, which equipped with an artificial intelligence that comes from advanced machine learning techniques. It is capable of correcting the bugs identified at a given moment by searching for - and adapting - solutions that previously have been used in order to repair similar errors.



Continuous integration is software development practice that consists of merging working copies into a main branch of development several times a day and performing frequent automated project builds to quickly identify potential defects and solve integration problems.”

Repairnator continuously monitors thousands of new versions of projects added to the GitHub platform and analyzes their respective assemblies to eliminate errors that occur during continuous integration. Every minute the bot starts the process of preliminary correction of errors that precede the intervention of specialists.

Researchers have been working on Repairnator since 2016. And this year, the program for the first time created patches that can be compared with ones created by humans. The bot patched the detected errors before the developers, and they were accepted by the system as a real contribution to the development of the project.

A total of five “patches” were eventually added to the code base.

The number of unsuccessful attempts to fix in the code is unknown. However, in the past, bot made 3551 attempts, but they were all less effective than made by people.

The original project developers who accepted requests from Repairnator did not know that the changes were proposed by the bot. In order to avoid prejudice against the bot, the creators of Repairnator filed an application to participate in the development of the project from the fictional GitHub’s user, engineer Luc Esape. Later, for ethical reasons, the true “face” of the bot was disclosed with each request for the inclusion of code in the project.

Continuous integration is software development practice that consists of merging working copies into a main branch of development several times a day and performing frequent automated project builds to quickly identify potential defects and solve integration problems.”

Source

Comments

Sign in to comment
Popular

Together with wide opportunities the Internet carries a number of dangers. First of all, when it comes to anonymity and security.

Initially, the World Wide Web was conceived as a space without borders, where you can get absolutely any information on an anonymous basis.

In today's world, it becomes more difficult to keep personal and corporate data in secret, so the issue of information security is becoming more acute every day.

In the recent past by the standards of the development of information technologies, in 2015 Google created artificial intelligence based on neural networks, which was able to analyze the condition around itself and draw conclusions about its further education. The name of the new offspring from Google was given in abbreviated from the term "deep Q-network" - DQN. The DQN started training in common arcade games (Pakman, Tennis, Space Invaiders, Boksing and other classics).

Good afternoon! Now we are talking about such an important topic in our time, as an opportunity to bypass the blocking of sites. The problem is very relevant in our country

New

Proxy traffic can also be encrypted, just like a VPN. The TLS over Proxy technology is used for this purpose! You can read about how this works and why such proxies can be more convenient and efficient than VPN services in this article

Mobile proxy is a software and hardware complex that acts as an intermediary between the user and the Internet. The proxy function is to receive a signal from the device, assign a new IP address, and transmit it to the global network. As a result, the user uses one IP, and the Internet connection comes from a completely different one

In this article we'll talk about TOR and its place in ensuring anonymity on the Internet, and how to use Tor Browsers on Windows 10 and Android.

Not every place on the Internet is easily accessible nowadays. Many websites get blocked or they set restrictions on their visitors themselves. So how to retain access to the content you need? We'll explain it in this article.

This article explains why some American websites are unavailable to foreign users and how to circumvent these restrictions using American proxy servers.

Contact Us
Support
Vadim
Have you got any question?

Click here and we’ll answer