Patent application number | Description | Published |
20080209278 | INITIALIZING DIAGNOSTIC FUNCTIONS WHEN SPECIFIED RUN-TIME ERROR CRITERIA ARE SATISFIED - A run-time monitor allows defining sets of run-time error criteria and corresponding diagnostic action to take when the run-time error criteria is satisfied. One way to define the run-time error criteria is to take a baseline measurement of run-time errors that occur during normal processing conditions. A run-time error criteria may then be defined that is based on the baseline measurement. In this manner, a rate of run-time errors that normally occur may be ignored, while a rate of run-time errors in excess of the run-time error criteria could automatically initiate diagnostic action. In this manner, the ability of a programmer to debug run-time errors is significantly enhanced. | 08-28-2008 |
20080216054 | Storing and Restoring Snapshots of a Computer Process - A method to trace a variable or other expression through a computer program is disclosed. A user determines the variable and the conditions upon which activity of the variable will be monitored. As a result of the invention, every time that variable is referenced in a memory operation or other activity by the program and the conditions set forth by the user are satisfied, the state of that variable is saved as a snapshot without interrupting or stopping execution of the program. The snapshots are accumulated in a history table. The history table can be retrieved and the state of the variable in any given snapshot can be restored. Other variables and expressions can be attached to the trigger variable and the states of these other variables at the time of the activity of the trigger variable may also be saved in the snapshot. The method may be incorporated into a program as a tracing device or a program product separate from the logical processing device executing the program. | 09-04-2008 |
20080229191 | PROVIDING SPELLING ANALYSIS - A method, an article of manufacture and apparatus for providing user-specific error analysis for a document. Specifically, the invention provides for identifying user-specific proclivities for confusing particular words which, while grammatically correct, are not used as intended by the user. The proclivities are tracked by recording changes made by the user while editing a document. The information collected while tracking the changes is then used to identify problem words to the user at a later period in time. | 09-18-2008 |
20080237336 | METHOD, APPARATUS, AND ARTICLE OF MANUFACTURE FOR AUTOMATIC VERIFICATION OF TRANSACTIONS MADE OVER AN INSECURE NETWORK - An apparatus and method automatically verifies online transactions, such as credit card charges, made by a customer of a bank or financial institution. A browser “plug-in” is used to monitor a first party use of the internet to detect online transactions and create transaction data. The transaction data is forwarded to the financial institution to correlate with transaction data received independently from the other party in the transaction. The financial institution can provide the customer with alerts, such as online purchase warnings, if there are problems or discrepancies between the data from the first party and the data provided by the second party. The transaction data can also be used in other ways to provide information to the financial institution's customers. | 10-02-2008 |
20080263517 | Efficiently Developing Encoded Instructions by Tracking Multiple Unverified Instances of Repetitive Code Segments - A development environment tracks code sections which have been copied and pasted into a code module from a source code section which has not been subjected to certain verifications. In one aspect, if an error in a copied section is later found during a verification process, the programmer is allowed to perform a multi-edit operation, whereby an edited change to a single copy is automatically propagated to multiple copies. In another aspect, the programmer is warned when copying and pasting a code section which has not been verified. Preferably, verification is performed in the process of compiling source into executable object code. | 10-23-2008 |
20080281934 | Assisting the response to an electronic mail message - A method, article of manufacture and apparatus for assisting an electronic mail (e-mail) response message by providing e-mail messages related to an open e-mail message. Specifically, the method determines whether an available e-mail message is related to the open e-mail message. Available e-mail messages may include unopened, previously opened, or incoming e-mail messages. As such, the user is warned of all relevant e-mail messages before responding with a reply message or a forward message. | 11-13-2008 |
20080282176 | Dynamic web page arrangement - A browser renders a page for display according to user habits. When a user interacts with a page associated with a network address, an entry is made in a file that associates the element on the page of the user interaction with the network address. When the page is visited again, the file is checked to see if any entry exists. If an entry exists and the stored user interaction is still relevant for that page, the page is rendered so that the location the user interacted with is provided at the top of the display, or the element is re-arranged, as in the case of a table, or both re-positioning and re-arranging occurs. Such page rendering reduces the need for the user to scroll through the page to view the desired information. | 11-13-2008 |
20080301802 | Trust-Based Link Access Control - An apparatus, program product and method control access to linked documents on a computer based on a calculated determination of the trustworthiness of such linked documents, so that user navigation to untrusted documents from a document with which such untrusted documents are linked can be deterred. Basing link access control on document trustworthiness permits owners, authors, developers, publishers, etc. of documents, for example, to avoid potential difficulties such as embarrassment, confusion or legal liability as a result of the content of linked-to documents under the control of third parties. | 12-04-2008 |
20090029717 | NOTIFYING A USER OF A PORTABLE WIRELESS DEVICE - A method, apparatus and system for notifying a user of a portable communication device. In one embodiment, a location of a first portable communication device is determined for a first user and the location of a second portable communication device is determined for a second user. A determination is made as to whether the location of the second portable communication device is within a same region containing the first portable communication device. If the second portable communication device is within the same region as the first portable communication device, then the first user is notified of the presence of the second user. | 01-29-2009 |
20090044177 | METHOD AND APPARATUS FOR PROFILE ENHANCED SOURCE CODE ANALYZER RESULTS - A computer implemented method, apparatus, and computer program product for generating enhanced source code analyzer results. The process receives a plurality of results generated by a static code analysis for a computer program. Profile data associated with the computer program is received. A priority for each result in the plurality of results is identified to form prioritized results. A prioritized static analysis report is generated using the prioritized results. The prioritized static analysis report indicates the priority for each result in the plurality of results. | 02-12-2009 |
20090076894 | Advertising in Virtual Environments Based on Crowd Statistics - Embodiments of the invention may be used to place a targeted advertisement on a billboard (or other advertising location) in an immersive virtual environment by determining the interests of a group of users at a given location to calculate an advertisement matching the whole group. The selected advisement may be based not only on the sum of individual interests for the avatars present in the particular location, but also current interaction between the avatars. As groups of users communicate with one another within a virtual world, the substance of their communications may contribute to what advertisement is selected and presented to the avatars at the advertising location. | 03-19-2009 |
20090094581 | THREAD SWAP VISUAL INDICATION - A computer implemented method, apparatus, and computer usable program code for indicating thread swaps. A code is presented on a graphical user interface. A portion of the code is executed. A determination is made as to whether a change from an initial thread to a current thread occurred when execution of the portion of the code stops at a line of code in the portion of the code. A graphical indication is displayed identifying a thread swap in the graphical user interface in association with the line of code in which the thread swap occurred. | 04-09-2009 |
20090141047 | VIRTUAL WORLD COMMUNICATION DISPLAY METHOD - A method for displaying an instant message within a text box visible to a first avatar in a virtual world is disclosed. The instant message is sent from a second avatar to a third avatar. The method includes determining a distance within the virtual world between the first avatar and at least one of the second avatar and the third avatar, assigning a distance reduction factor to a word of the instant message based upon context of the word, and multiplying the distance by the distance reduction factor to thereby define a logical distance of the word. The logical distance is compared to a threshold value and a display option is selected for the word based upon the comparison. The instant message is displayed within the text box with the word having the selected display option. | 06-04-2009 |
20090150870 | Method, Apparatus, and Computer Program Product for Implementing Enhanced Template Debug - A template debug mechanism is provided for executing an operation on at least one breakpoint within a program that includes a template. In one embodiment, in response to a first selection, a breakpoint is set in all expansions of the template and a multiple breakpoints icon is displayed. Preferably, the user may request display of a breakpoint properties dialog box listing each of the template expansions in which the multiple breakpoints are set. In response to a second selection, a breakpoint is set in only the current expansion of the template that is active in the call stack, and a single breakpoint icon is displayed. In response to the third selection, any breakpoint set in any expansion of the template is removed. Preferably, the first, second and third selections are respectively made by the user with a first, second and third click of an input device. | 06-11-2009 |
20090164918 | SYSTEM FOR MANAGING ENCOUNTERS IN A VIRTUAL WORLD ENVIRONMENT - Embodiments of the invention provide techniques for providing information for avoiding specific users of an immersive virtual environment. Generally, a primary user may specify other users to be avoided in a blacklist. The blacklisted users may be specified to be avoided at all times, or may be specified to be avoided in certain situations. In one embodiment, a user may be added to the blacklist during a specific situation, resulting in the characteristics of the situation being automatically stored in the blacklist. Subsequently, the blacklist may be used to determine the locations of the blacklisted users matching the current situation. The primary user may then avoid the locations having the greatest probability of encountering blacklisted users. | 06-25-2009 |
20090164919 | GENERATING DATA FOR MANAGING ENCOUNTERS IN A VIRTUAL WORLD ENVIRONMENT - Embodiments of the invention provide techniques for providing information for avoiding specific users of an immersive virtual environment. Generally, a primary user may specify other users to be avoided in a blacklist. The blacklisted users may be specified to be avoided at all times, or may be specified to be avoided in certain situations. In one embodiment, a user may be added to the blacklist during a specific situation, resulting in the characteristics of the situation being automatically stored in the blacklist. Subsequently, the blacklist may be used to determine the locations of the blacklisted users matching the current situation. The primary user may then avoid the locations having the greatest probability of encountering blacklisted users. | 06-25-2009 |
20090172146 | Media Playlist Construction for Virtual Environments - Embodiments of the invention provide techniques for generating song playlists for use in an immersive virtual environment. Generally, playlists may be generated based on stored music preference data. The music preference data may be generated by storing user interactions with specific songs. The user interactions may be associated with characteristics of the user's situational context within the virtual world. The music preference data may be indexed by song name, and/or by musical properties. Subsequently, the music preference data may be used to generate a playlist adapted to the user's current situation within the virtual world. | 07-02-2009 |
20090172538 | Generating Data for Media Playlist Construction in Virtual Environments - Embodiments of the invention provide techniques for generating song playlists for use in an immersive virtual environment. Generally, playlists may be generated based on stored music preference data. The music preference data may be generated by storing user interactions with specific songs. The user interactions may be associated with characteristics of the user's situational context within the virtual world. The music preference data may be indexed by song name, and/or by musical properties. Subsequently, the music preference data may be used to generate a playlist adapted to the user's current situation within the virtual world. | 07-02-2009 |
20090172539 | Conversation Abstractions Based on Trust Levels in a Virtual World - Embodiments of the invention provide techniques for abstracting conversations between avatars within a virtual world. In one embodiment, the user of an avatar observing a conversation between other avatars may be presented with an abstracted version of the conversation. The abstraction may be performed so as to enable the user to determine the general topic or nature of the conversation, without receiving sensitive or detailed information included in the conversation. In one embodiment, the abstraction is performed by substituting words of the conversation with fewer words, or words having a more general meaning. The degree of abstraction performed may be based on a level of trust between the observer and the users engaged in conversation. | 07-02-2009 |
20090241049 | METHOD AND COMPUTER PROGRAM PRODUCT FOR IMPLEMENTING AUTOMATIC AVATAR STATUS INDICATORS - The exemplary embodiment of the present invention provides a means for the simulating of real world activities within a virtual environment. Information retrieved from locally executing applications (e.g., such as a screen saver, voice over IP phone system, etc.) or sensor information is utilized to deliver messages from a client application to the virtual environment in order to put an avatar in a state that visually indicates that a system user is busy. | 09-24-2009 |
20090245484 | ORDERING TELEPHONE MESSAGES LEFT FOR A USER - A method that associates the first telephone number of a first user with a second telephone number of a second user that has a relationship with the first user; tracks incoming and outgoing telephone calls; and stores a plurality of telephone messages received by the first user. For each telephone message, the method assigns such telephone message to one of first, second, and third groups; and sorts the plurality of telephone messages for playback. By doing so, the telephone messages may be prioritized such that the first user may be able to more quickly determine whether or not the first user should return a telephone message, often reducing the number of unnecessary telephone calls and improving efficiency. | 10-01-2009 |
20090319915 | METHOD FOR SPELL CHECK BASED UPON TARGET AND PRESENCE OF AVATARS WITHIN A VIRTUAL ENVIRONMENT - The exemplary embodiment of the present invention relates to the dynamic activation and deactivation of a spell check feature option for instant message chat session features within a virtual environment. As such, the spell check feature can be activated and deactivated within the virtual environment based upon the identity of an engaged party to chat session or the identities of other parties that are in proximity to the chat session parties within the virtual environment. | 12-24-2009 |
20100180216 | MANAGING INTERACTIONS IN A VIRTUAL WORLD ENVIRONMENT - Methods and apparatus associate a computed trust level to avatars that interact with one another in a simulated environment. The avatars may represent legitimate users of the virtual world or spammers. System monitoring of each avatar provides ability to recognize potential spammers and create an alternate indication of the spammers. A user index may be used to store data describing attributes of each avatar for analysis using programs stored in memory. | 07-15-2010 |
20110131239 | MEDIA PLAYLIST CONSTRUCTION FOR VIRTUAL ENVIRONMENTS - Embodiments of the invention provide techniques for generating song playlists for use in an immersive virtual environment. Generally, playlists may be generated based on stored music preference data. The music preference data may be generated by storing user interactions with specific songs. The user interactions may be associated with characteristics of the user's situational context within the virtual world. The music preference data may be indexed by song name, and/or by musical properties. Subsequently, the music preference data may be used to generate a playlist adapted to the user's current situation within the virtual world. | 06-02-2011 |
20120131558 | MANAGING BREAKPOINTS IN A MULTI-THREADED ENVIRONMENT - An electronic device is provided that, in an embodiment, saves a plurality of values for a variable specified by a condition after a respective plurality of encounters of a breakpoint by a program that modifies the variable. One of the plurality of values is selected based on a condition. A determination is made whether to stop execution of the program at the breakpoint based on the one of the plurality of the values. Execution of the program is stopped at the breakpoint if the determining is true. The program is allowed to continue to execute if the determining is false. | 05-24-2012 |
20140344725 | GENERATING DATA FOR MANAGING ENCOUNTERS IN A VIRTUAL WORLD ENVIRONMENT - Embodiments of the invention provide techniques for providing information for avoiding specific users of an immersive virtual environment. Generally, a primary user may specify other users to be avoided in a blacklist. The blacklisted users may be specified to be avoided at all times, or may be specified to be avoided in certain situations. In one embodiment, a user may be added to the blacklist during a specific situation, resulting in the characteristics of the situation being automatically stored in the blacklist. Subsequently, the blacklist may be used to determine the locations of the blacklisted users matching the current situation. The primary user may then avoid the locations having the greatest probability of encountering blacklisted users. | 11-20-2014 |