DEV Community

The Latest Programming Innovations - Issue #9

By Jexia Experts • Monthly newsletter • Issue #9 • Subscribe here for free

In-depth research into software engineering. Leading to new tools, approaches and systems. Jexia expert engineers Joel Bryan Juliano and Mark Geller provide you with the latest articles.

Out of stealth mode:

1. Pulumi lets you manage your infrastructure with code

Pulumi wants to make it easier for developers and ops team to define their infrastructure by writing code.

2. Protected code even when you ignore security threats

Shiftleft says they are able to do that because they conduct a study of the code and all its dependencies before run time.

3. Zenaton lets you build and run workflows with ease

The French company Zenaton wants to take care of the most tedious part of your application — asynchronous jobs and background tasks.

Assessable through repos and papers:

4. Droix: automatically repair crashes in Android apps

Android apps are omnipresent, and frequently su?er from crashes — leading to poor UX and economic loss. Also read the paper.

5. Software development outsourcing in the blockchain

Scientists present ChainSoft - a platform for outsourcing software development and automatic payments between parties that distrust each other, by means of blockchain. Also read their paper.

6. Automatically reducing time spend on failure analysis

Testing and debugging are time-consuming. Aletheia helps devs and testers to reduce time on failure analysis. Also read its paper and watch the video.

Only assessable by reading the papers:

7. Automatically answering API-related questions

SOTU automatically finds answers for API-related natural language questions, from tutorials and Stack Overflow. 

8. Quickly understanding source code changes

Developers often save multiple kinds of source code edits into a commit in a version control system, which is dif?cult to understand and revert. With a visualisation tool scientists show better details of the changes and align edits in a tree structure for expressing multiple groups of changes.

9. Le-git-imate: automatically verify Git Repositories

Web-based Git hosting services such as GitHub and GitLab are popular choices to manage and interact with Git repositories. However, they lack an important security feature — the ability to sign Git commits.

10. DWEN: detecting duplicate bug reports in repos

Capturing and tagging duplicate bug reports is crucial in order to avoid assignment of the same bug to di?erent developers.

11. Automatically assign a bug report to the best fixer

It is a very time-consuming task to assign a bug report to the most suitable fixer in large open source software projects.

12. D2Spec: automatically extract API specifications

API specs are machine-readable descriptions of APIs. In combination with related tooling, they simplify and support API use. However, despite the fast growing amount of APIs, specs are rare and their creation and maintenance now heavily rely on manual e?orts by third parties.

13. Automatically compare library quality by metrics

To perform a specific task, there is usually a large number of libraries that o?er the desired function. But selecting the appropriate library is not easy since developers are often unaware of their advantages and disadvantages.

14. Improve virtual assistance during dev's discussions

Scientists advance the state of virtual assistants in software engineering. Virtual assistant technology is growing fast, but applications in developing software are behind those in other areas. The researchers test automatic detection of speech act types in developer conversations about bug repair.

15. Assign similar vectors to snippets and their outlines

CODEnn jointly embeds code snippets and natural language descriptions into a high-dimensional vector space, in such a way that code snippet and its corresponding description have similar vectors. 

Mark's special recommendations:

16. Spot humans through walls with a small transmitter

This paper demonstrates accurate human pose estimation through walls and occlusions. We leverage the fact that wireless signals in the WiFi frequencies traverse walls and reflect off the human body.

17. Spotting Image Manipulation with AI

Adobe researcher Vlad applies artificial intelligence and machine learning to more easily, reliably and quickly detect whether or not a part of a digital image has been manipulated, and if so, what aspects were modified.

18. Humans favour book story made by machine learning

Human judges prefer stories generated by algorithms, constructed by Facebook's AI researchers, to those from a strong non-hierarchical model.

Finally, Mark shares some additional wisdom:

Top comments (0)