Patent application number | Description | Published |
20080218125 | Battery Charging System - A method and system are provided in which a charging process for rechargeable batteries is controlled in accordance with a recommended inactive or storage maximum battery charge level which is obtained from a battery manufacturer or other data source. In one embodiment, the battery charging system accesses a battery manufacturer's website in order to determine the manufacturer's recommended charging characteristics, including a maximum battery charge level for an inactive or storage status, for the particular battery being charged. When connected to a power source, the battery being charged is not permitted to be charged to a fully charged state but rather charged only to the lower storage charge level in order to increase the life span of the battery. | 09-11-2008 |
20080218126 | Conditional Battery Charging System - A method and system are provided in which a charging process for rechargeable batteries is controlled in accordance with selected predetermined variable conditions. In an exemplary embodiment, a user is enabled to select the predetermined conditions under which the charging of a battery is suspended until such conditions have changed. Such conditions include, for example, physical location of the battery being charged and/or the time and/or date when the battery is being charged. A user GUI is provided to enable a user to input selected times and/or dates and/or locations when the device containing the battery is likely to be away from a charging source and needs to be fully charged, and/or selected times and/or dates and/or locations when the device is likely to have access to a power source and the battery is enabled to be charged only to a storage level. | 09-11-2008 |
20080256618 | METHOD TO APPLY NETWORK ENCRYPTION TO FIREWALL DECISIONS - A system and related methods for providing a handler for requests to access a wireless network, operable by or separate from an enhanced personal firewall system, which obtains connection-related information from the operating system, network interface drivers, or both, and then provides that information to a controller which determines to allow or deny access. By collecting certain connection-related information, new levels and granularities of control are allowed and enabled. The process is equally well suited for implementation by a wireless device which may be in range of multiple servers or networks, such that the device may allow different levels of access to the device by the different servers or networks according to the collected connection-related information. | 10-16-2008 |
20080270883 | Method and Apparatus for Selecting Advertising for a Web Page - A computer implemented method, apparatus, and computer usable program code for identifying advertising for a web page. In response to receiving a universal resource locator containing identification information for selected text in the web page, the web page is retrieved to form a retrieved web page. The selected text in the web page is identified. Advertisements for the web page are identified using the selected text to form identified advertisements. The identified advertisements are placed in the web page. | 10-30-2008 |
20080270891 | Method and Apparatus for Selecting and Rendering a Section of a Web Page - A computer implemented method, apparatus, and computer usable program code for processing a web page. A selection of a section of text in a web page is received to form selected text. Identification information for the selected text is generated, wherein the identification information includes an identification of the selected text and a location of the selected text in the web page. The identification information is placed into a universal resource locator for the web page, wherein the universal resource locator is used to present the web page in a browser at the location. | 10-30-2008 |
20080294618 | SYSTEM AND METHOD FOR ADVANCED HANDLING OF MULTIPLE FORM FIELDS BASED ON RECENT OPERATOR BEHAVIOR - A method, system and computer program product for enhancing the usability of web browsers by analyzing the recent behavior of an operator while executing a search pattern on a computer network. In particular, a browser enhancement utility provides web browsers with the ability to store (for a limited time period) search terms used in a variety of web search patterns. The browser enhancement utility employs ranking algorithms to identify the relationships between searches and a ranking and matching algorithm to utilize stored search terms to find (text) matches in a web document. When the browser displays web pages after a search has occurred, the browser enhancement utility utilizes these matches in order to take actions to enhance document usability. These actions include: Highlighting terms that have been recently searched for; pre-selecting matching terms from drop down boxes or radio buttons; and focusing a web page to relevant sections of text. | 11-27-2008 |
20080294619 | SYSTEM AND METHOD FOR AUTOMATIC GENERATION OF SEARCH SUGGESTIONS BASED ON RECENT OPERATOR BEHAVIOR - A method, system and computer program product for enhancing the usability of web browsers by analyzing the recent behavior of an operator while executing a search pattern on a computer network. A search history and indexing datastore is defined and associated with the web document parser. The web document parser parses through each returned web page for significant terms that may be of later importance to the user. These terms are then forwarded to the datastore and indexed along with the search term to later provide a historical guide to identify the user's areas/topics of interest. When a search term is entered within the web browser, the search terms is compared against the index of terms for similar terms. The similar terms found are ranked according to closeness to the entered search term, and the ranked terms outputted to the user for possible selection in lieu of the search term. | 11-27-2008 |
20090037905 | METHOD FOR TRANSFERRING INVENTORY BETWEEN VIRTUAL UNIVERSES - The present invention provides a computer implemented method for transferring an item from a source virtual universe to a target virtual universe. A target virtual universe host opens a session between a source virtual universe host and itself. Next, it determines that the source virtual universe host is authorized to transmit the item to the target virtual universe host. Next, it receives a command from a client computer to transfer the item from the source virtual universe host to the target virtual universe host. Next, it receives item data in the target virtual universe host. | 02-05-2009 |
20090046094 | METHOD AND APPARATUS FOR PREDICTING AVATAR MOVEMENT IN A VIRTUAL UNIVERSE - The present invention provides a computer implemented method, apparatus, and computer useable program code to offer to move an avatar in a virtual universe. A computer predicts a location selection to form a prediction. The computer renders a first viewport in a computer display, based on the prediction. The first viewport includes a first user-control; a first coordinate; and a first attitude. The computer renders a second viewport comprising a second user-control, a second coordinate and a second attitude wherein at least one object is rendered in a computer display from a perspective distinct from a perspective of the first viewport. The computer receives an instruction corresponding to the first user-control. | 02-19-2009 |
20090046102 | METHOD AND APPARATUS FOR SPAWNING PROJECTED AVATARS IN A VIRTUAL UNIVERSE - The present invention provides a computer implemented method and apparatus to project a projected avatar associated with an avatar in a virtual universe. A computer receives a command to project the avatar, the command having a projection point. The computer transmits a request to place a projected avatar at the projection point to a virtual universe host. The computer renders a tab associated with the projected avatar. | 02-19-2009 |
20090046109 | METHOD AND APPARATUS FOR MOVING AN AVATAR IN A VIRTUAL UNIVERSE - A computer implemented method, apparatus, and computer usable program code for moving an avatar. A computer renders a first viewport in a computer display. The first viewport may comprise a first tab, a first coordinate, and a first attitude. A first object is rendered based on the first coordinate and the first attitude in a region. The computer renders a second tab. The computer receives a user selection corresponding to the second tab. Next, the computer renders a second viewport comprising a second coordinate and a second attitude. The computer renders the second object in a computer display from a perspective distinct from the first viewport. In addition, the computer registers the avatar as associated with the second coordinate and second attitude in the virtual universe, wherein the first tab is a visual indication of movement history. | 02-19-2009 |
20090052645 | TELECONFERENCE SYSTEM WITH PARTICIPANT FEEDBACK - A method, medium and implementing processing system are provided for facilitating teleconference-based meeting moderation by the addition of a “live feedback” feature, with instrumentation such as by means of an instant messaging systems when instant messaging conference systems equipped with this feature are used to supplement teleconferences, the participants provide instant feedback (anonymously, if desired) to the meeting moderator. The audience can let the moderator know their valuation of the current discussion. Based on feedback, the moderator can take appropriate action, such as to steer the conversation into areas that will be received favorably by the meeting participants. | 02-26-2009 |
20090094244 | METHOD FOR CREATING AND MODIFYING LISTS FOR ELECTRONIC DISTRIBUTION - An initial distribution list is dynamically modified using criteria determined from the current entries in the list. After an originator generates a distribution list and prior to submission of the message to entries on the generated list, the method of the present invention examines the entries in the created distribution list. From this list, the invention identifies features of the entries. From these features, the method generates criteria that can be used to generate additional entries that may be included in the list. In one approach, the generated criteria are presented to the user for review and approval. If the originator approves the criteria, the generated list is modified to add additional entries to the distribution based on the generated criteria. If the originator rejects the criteria, the initially generated list is submitted and the message is sent to the entries on the initial list. | 04-09-2009 |
20090094277 | AUTOMATIC OPTIMIZATION OF DISPLAY LAYOUT FOR MOBILE DEVICES - A computer implemented method, a computer program product, and a mobile device are disclosed for presenting a list of invokable actions to a user of the mobile device. Responsive to identifying the commencing of the invokable action, specific attributes of the invokable action are identified and stored in a corresponding data structure. From the specific attributes stored within the corresponding data structure, a most probable invokable action is identified. When the commencing of a subsequent invokable action is identified, the most probable invokable action is presented to the user. | 04-09-2009 |
20090106664 | PUBLIC STATUS DETERMINATION AND SECURITY CONFIGURATION OF A BROWSER - The illustrative embodiments described herein provide a computer implemented method, apparatus, and computer program product for dynamically identifying a publicly accessed system. A plurality of user profiles is generated for a plurality of users associated with a browser on a system. A set of unique user profiles is identified in the plurality of user profiles. The number of users associated with the set of unique user profiles is compared to a preconfigured threshold. Responsive to the number of users exceeding the preconfigured threshold, the system is identified as a publicly accessed system. | 04-23-2009 |
20090106835 | METHOD AND APPARATUS FOR PROTECTING SENSITIVE INFORMATION ON A PUBLICLY ACCESSED DATA PROCESSING SYSTEM - The illustrative embodiments described herein provide a computer implemented method, apparatus, and computer program product protecting sensitive information on a data processing system. A determination is made as to whether a data processing system is publicly accessed. Responsive to determining that a data processing system is publicly accessed, the system identifies sensitive information. The data processing system monitors for the presence of sensitive information. Responsive to detecting the presence of the sensitive information, the system presents a warning to a user of the data processing system. | 04-23-2009 |
20090113353 | CURSOR LOCATOR - Illustrative embodiments provide a computer implemented method, data processing system and a computer program product for indicating the location of a cursor within an application to a user. In one illustrative embodiment the computer implemented method comprises initiating a monitoring service to generate collected information regarding the location of the cursor within the application and comparing the collected information with a set of respective predetermined values to create a set of compared values. Responsive to a determination based on the set of compared values, presenting a visual cue indicating the location of the cursor to the user. | 04-30-2009 |
20090113446 | METHOD FOR CREATING ADAPTIVE DISTRIBUTIONS - A method to dynamically create an adaptive distribution list through an application of a combination of mathematical, logical and/or programmable operations to existing static distribution lists or user directories. This list is created as part of the information message sent to the entries on the distribution list. In this invention, the user or sender does not need to interface with the Group creation modification tool. Another feature of the invention is that the newly created distribution lists can be temporarily or permanently saved as designed by the sender. This invention eliminates the need to separately create distribution and then send messages to the entries on the distribution list. | 04-30-2009 |
20090113486 | METHOD AND SYSTEM OF ENABLING COMPLETE VIEWING CONTENT FOR SELECTED PROGRAMMING - A system for enabling complete viewing of selected programming content. In response to receiving an input data stream from a programming service provider, the input data stream is stored in a supplemental storage. In response to a user selecting a programming channel after a program starts to air, the input data stream is stored in a programming storage. Then, the stored data stream is outputted from the supplemental storage to a viewing device. | 04-30-2009 |
20090125819 | METHOD AND SYSTEM FOR SPLITTING VIRTUAL UNIVERSES INTO DISTINCT ENTITIES - Systems and methods for allowing an administrator or program to select a region or set of avatars in a virtual universe grid for splitting into another, separate and distinct virtual universe grid. If a region is selected, all of the avatars and virtual universe resources associated with the region are locked, their data is retrieved, and another separate virtual universe grid is commanded to create and insert the avatars and resources in it. If avatars are selected, all of the resources, scripts, histories, and information regarding the selected avatars are retrieved, and the avatars are locked in the source universe. Then, another, separate virtual universe grid is commanded to create universe user identifiers for the avatars, and they are inserted into the separate VU grid. Cleanup includes deleting the region and/or avatars from the first (source) virtual universe grid. | 05-14-2009 |
20090182820 | METHOD FOR AUTOMATICALLY MODIFYING ELECTROINIC DISTRIBUTION LISTS USING PREDEFINED RULES - An initial distribution list is dynamically modified using criteria determined from the current entries in the list. After an originator generates a distribution list and prior to submission of the message to entries on the generated list, the method of the present invention examines the entries in the created distribution list. From this list, the invention identifies features of the entries. From these features, the method generates criteria that can be used to generate additional entries that may be included in the list. In one approach, the generated criteria are presented to the user for review and approval. If the originator approves the criteria, the generated list is modified to add additional entries to the distribution based on the generated criteria. If the originator rejects the criteria, the initially generated list is submitted and the message is sent to the entries on the initial list. | 07-16-2009 |
20090198664 | METHOD AND SYSTEM FOR MERGING DISPARATE VIRTUAL UNIVERSES ENTITIES - A migration tool for merging disparate virtual universes by selecting a source region or source account, selecting a destination edge or destination account, retrieving and storing virtual universe information for the source region or account, inserting the virtual universe resources of the source region or account into the destination region or account, activating the inserted resources, and deleting the source resources from the source region or account. | 08-06-2009 |
20090222338 | Monitoring and Rewards Methodologies for "Green" Use of Vehicles - Energy-efficiency related data corresponding to dynamic energy-efficiency related operational parameters of a vehicle are collected from in-vehicle sensors and energy-efficiency parameters may be computed therefrom. The energy efficiency-related parameters and energy-efficiency parameters are then transmitted either directly of through a wireless and/or network link(s) to a station at which a transaction with a vehicle operator may be performed. An incentive based on efficiency of vehicle operation is computed and awarded to provide feedback to a vehicle operator to provide information concerning efficient vehicle operation and to encourage efficient and environmentally responsible vehicle operation. Both energy efficiency and environmental effects may be displayed at the station or substantially continuously and in substantially real time within the vehicle. | 09-03-2009 |
20090245095 | Voice Over Internet Protocol Clarity During Degradation - Illustrative embodiments provide a computer implemented method, a data processing system and a computer program product for improving voice over Internet Protocol clarity during degradation. In one illustrative embodiment, the computer implemented method comprises monitoring a call, determining whether degradation exists; and responsive to a determination that degradation exists, applying a corrective action. The computer implemented method further comprises determining whether a quality of the call has improved and responsive to determining that the quality of the call has improved, further monitoring the call to form a monitored quality. The computer implemented method further comprises, determining whether monitored quality is acceptable, and responsive to determining monitored quality acceptable, removing the corrective action. | 10-01-2009 |
20090247147 | Predictive Mobile Phone Service Disruption Service - Illustrative embodiments provide a computer implemented method, a data processing system and a computer program product for a predictive mobile phone service disruption service. In one illustrative embodiment, the computer implemented method comprises monitoring a cellular call of a caller, calculating a location and vector of the caller, and determining whether the caller is approaching a drop zone. The computer implemented method responsive to determining the caller is approaching a drop zone, estimates a duration of a loss of service, and responsive to determining the caller is approaching a drop zone, selectively notifying the caller. | 10-01-2009 |
20090267937 | FLOATING TRANSITIONS - A computer implemented method and apparatus for floating object transitions. In one embodiment, tracking data identifying a location of an avatar in relation to a range of an object in a virtual universe is received. The range comprises a viewable field. In response to the tracking data indicating an occurrence of a trigger condition, a set of flotation rules associated with the trigger condition is identified. An optimal location and orientation of the object is identified for each flotation action in a set of flotation actions associated with the set of flotation rules. The set of flotation actions are initiated to float the object above a surface. The object changes the location and orientation of the object in accordance with the set of flotation actions associated with the set of flotation rules. | 10-29-2009 |
20090267948 | OBJECT BASED AVATAR TRACKING - A computer implemented method, apparatus, and computer program product for object based avatar tracking. In one embodiment, a range for an object in a virtual universe is identified. The range comprises a viewable field of the object. Avatars in the viewable field of the object are capable of viewing the object. Avatars outside the viewable field of the object are incapable of viewing the object. In response to an avatar coming within the range of the object, an object avatar rendering table is queried for a session associated with the avatar unique identifier and the object unique identifier. The object avatar rendering table comprises a unique identifier of a set of selected objects and unique identifiers for each avatar in a range of a selected object in the set of selected objects. An object initiation process associated with the object is triggered. | 10-29-2009 |
20090267950 | FIXED PATH TRANSITIONS - A computer implemented method, apparatus, and computer program product for fixed path transitions in a virtual universe environment. In one embodiment, tracking data that identifies a location of an avatar in relation to a range of an object in a virtual universe is received. The range comprises a viewable field. In response to the tracking data indicating an occurrence of a trigger condition associated with a fixed path rule, a fixed path defined by the fixed path rule is identified. A speed of movement and an orientation of the object associated with the fixed path rule is identified. Movement of the object along the fixed path defined by the fixed path rule is initiated. The object then moves along the fixed path at the identified speed and with the orientation associated with the fixed path rule. | 10-29-2009 |
20090267960 | Color Modification of Objects in a Virtual Universe - A computer implemented method, apparatus, and computer program product for modifying an object. In one embodiment, the process obtains avatar tracking data that identifies a location of an avatar in relation to a range of an object. The range includes a viewable field. The process then calculates modified pixel color values to form a modified color in response to detecting a condition for triggering modification of the object. Thereafter, the process modifies a color of the object to form the modified color when the location of the set of avatars is within the range of the object. | 10-29-2009 |
20090271422 | Object Size Modifications Based on Avatar Distance - A computer implemented method, apparatus, and computer program product for modifying objects. In one embodiment, tracking data is obtained which identifies a location of a set of avatars in relation to a range of the object. The range of the object includes a viewable field. In response to determining that the object requires modification, a size of the object is compared with a set of size constraints to form a comparison. Thereafter, the size of the object is modified based on the comparison to form a set of size modifications. | 10-29-2009 |
20090310510 | FUTURE FORWARDING ZONES IN AD HOC NETWORKING SERVICE - A method, system, and computer program product for enabling the transmission of data from a mobile device to a target device via one or more carrier mobile devices, in a communication network. A proxy mobile carrier (PMC) utility facilitates transmission of data from the originating mobile device to a target device in a network which is inaccessible to the originating mobile device. The PMC utility employs a collection of enhanced transmission enabling components (ETECs) to enable the data transfer via one or more carrier mobile devices. The ETECs include a message creation component, a network zone identification component, a future forwarding zone prediction component, a message acceptor component, a storage component, an inter-node communication component, and a message delivery component. By initiating specific interactions between the ETECs, the PMC utility facilitates the transmission of data from the mobile device to the target device via carrier mobiles. | 12-17-2009 |
20090327219 | Cloning Objects in a Virtual Universe - In one embodiment, the process obtains avatar tracking data that identifies a location of an avatar in relation to a range of an object. The range includes a viewable field. In response to the location of the avatar being within the range of the object, the process queries a data structure storing cloning data for a record of a clone of the object. Thereafter, the process instantiates the clone of the object in response to the presence of the record of the clone of the object in the data structure. The process then invokes a set of object methods associated with the record of the clone in the data structure. | 12-31-2009 |
20100001993 | GEOMETRIC AND TEXTURE MODIFICATIONS OF OBJECTS IN A VIRTUAL UNIVERSE BASED ON REAL WORLD USER CHARACTERISTICS - A computer implemented method, apparatus, and computer usable program product for modifying objects in a virtual universe. A user priority controller determines a real world identity of a set of users controlling a set of avatars within a viewable field of an object in a virtual universe. The user priority controller receives user information describing characteristics of the set of users based on the real world identity of each user in the set of users. The user priority controller generates a temporary and dynamic rule to control modification of the object based on the user information. The user priority controller modifies the object in accordance with the temporary and dynamic rule to increase visibility of the object to an avatar in the set of avatars. The temporary and dynamic rule initiates implementation of geometric and texture modifications to modify the object in accordance with the temporary and dynamic rule. | 01-07-2010 |
20100005423 | Color Modifications of Objects in a Virtual Universe Based on User Display Settings - A computer implemented method, apparatus, and computer program product for modifying an object. In one embodiment, the process obtains avatar tracking data that identifies a location of an avatar in relation to a range of an object. The range includes a viewable field. The process then selects a data collection method based on the location of the set of avatars. In response to detecting an event for triggering modification of the object, the process calculates a set of color modifiers based on display setting data to form a modified color. Thereafter, the process renders the object using the modified color when the location of the set of avatars is within the range of the object. | 01-07-2010 |
20100094476 | ENERGY USAGE MONITORING METHOD AND SYSTEM - A monitoring method and system. The method includes monitoring by a monitoring apparatus, a power configuration for electrical devices and a status for power supplier entities. The monitoring apparatus re-balances a power usage for the electrical devices. The monitoring apparatus generates a first report indicating current loads associated with the electrical devices. The monitoring apparatus transmits the first report to the power supplier entities. The monitoring apparatus generates a group of reports indicating power consumption associated with the power supplier entities. The monitoring apparatus transmits each report of the group of reports to an associated power supplier entity of the power supplier entities. The monitoring apparatus generates a second report indicating updated power consumption associated with the power supplier entities. The monitoring apparatus stores the second report. | 04-15-2010 |
20100107047 | PREVENTING NOT FOUND ERROR (404) RESPONSES ON DYNAMICALLY LOADED MISSING IMAGES - A mechanism for determining if images exist before publishing to a web server, and replacing missing images with temporary images for the purpose of providing alternate content while eliminating web server error responses, which prevents needless alerts to site administrators. Upon detecting a modification to a web page, a determination is made as to whether the modification includes a link to an image that does not exist at a location specified by a path in the link to the image. Responsive to a determination that the modification includes a link to an image that does not exist at the location, an image placeholder is created for the image at the location. | 04-29-2010 |
20100107091 | PUBLISHING REQUESTS FOR DYNAMICALLY LOADED MISSING IMAGES - A mechanism for determining if images exist before publishing to a web server, and replacing missing images with temporary images for the purpose of providing alternate content while publishing a request for a replacement image. Upon detecting a modification to a web page, a determination is made as to whether the modification includes a link to an image that does not exist at a location specified by a path in the link to the image. Responsive to a determination that the modification includes a link to an image that does not exist at the location, an image placeholder is created for the image at the location. A request is then published for a replacement image for the image placeholder. Responsive to receiving a replacement image for the image placeholder, the image placeholder is replaced with the replacement image at the location. | 04-29-2010 |
20100177117 | CONTEXTUAL TEMPLATES FOR MODIFYING OBJECTS IN A VIRTUAL UNIVERSE - A computer implemented method, apparatus, and computer program product for modifying object styles in a virtual universe. An object is rendered in accordance with a first contextual style template from a plurality of contextual style templates. The first contextual style template comprises first geometric and texture data to display the object with a first style. In response to detecting a set of contextual changes associated with the object, a second contextual style template is identified from the plurality of contextual style templates. The set of contextual changes triggers implementation of the second contextual style template to change the first style of the object to a second style. The object is rendered in accordance with second geometric and texture data in the second contextual style template to form a modified object, wherein the modified object is displayed with the second style. | 07-15-2010 |
20100239222 | DIGITAL VIDEO RECORDER BROADCAST OVERLAYS - Displaying a secondary media stream within a primary media stream. In response to receiving a first user selection of two media streams for simultaneous viewing on a display device, a second user selection of a primary media stream and a secondary media stream from the two media streams selected for simultaneous viewing is received. A set of inset definitions is extracted from metadata in the secondary media stream. A third user selection of an inset definition from the set of inset definitions is received. A user input is received to crop the primary media stream to accommodate a size of the inset definition selected. The primary media stream is cropped to create an inset area for displaying the secondary media stream within the primary media stream based on the user input. The secondary media stream is displayed within the inset area of the cropped primary media stream for user viewing. | 09-23-2010 |
20100250118 | PORTABLE NAVIGATION DEVICE POINT OF INTEREST SELECTION BASED ON STORE OPEN PROBABILITY - A probability that a selected point of interest is accessible to customers for commercial transactions is determined. In response to receiving a mailing address of a selected candidate point of interest and a calculated estimated time of arrival, it is determined whether the mailing address of the selected candidate point of interest is stored in a data storage device. In response to determining that the mailing address of the selected candidate point of interest is stored in the data storage device, a percentage probability that the selected candidate point of interest is accessible to customers for commercial transactions at the calculated estimated time of arrival is assigned based on utility usage data and a confidence level associated with the utility usage data stored in the data storage device. The percentage probability that the selected candidate point of interest is accessible to customers for commercial transactions is sent via the network. | 09-30-2010 |
20100251337 | SELECTIVE DISTRIBUTION OF OBJECTS IN A VIRTUAL UNIVERSE - A method, product, and system are directed to selective distribution of a virtual universe in a virtual universe. In one embodiment, permission is granted to access the virtual universe, whereby a user navigates to a region. Metadata is detected in a user's profile. A virtual universe object is detected in the region. The virtual universe object includes a tag, which includes one or more fields. The tag and the metadata are compared. A level of similarity is detected between the tag and the metadata in the user's profile. Responsive to detecting the level of similarity between the fields included with the tag and the metadata in the user's profile, the virtual universe object is presented to the user. Either an acceptance or a rejection of the virtual universe object is received. Responsive to receiving an acceptance, the virtual universe object is included in the user's inventory. | 09-30-2010 |
20100272413 | Managing Digital Video Recorder Storage for a Plurality of Users - A computer implemented method and apparatus for managing digital video recorder storage for one or more users. Each user in the multi-user environment is assigned an amount of program storage in the digital video recorder. Responsive to receiving a request to record a new program from a user in the multi-user environment, an associated amount of program storage assigned to the use is determined. Responsive to a determination that addition of the new program will not exceed the associated amount of program storage assigned to the user, the new program is recorded to the program storage. | 10-28-2010 |
20110055344 | SYSTEM FOR CREATING AND MODIFYING LISTS FOR ELECTRONIC DISTRIBUTION - A system in which an initial distribution list is dynamically modified using criteria determined from the current entries in the list. After an originator generates a distribution list and prior to submission of the message to entries on the generated list, the entries in the created distribution list are examined. From this list, features of the entries are identified. From these features, criteria are generated that can be used to generate additional entries that may be included in the list. In one approach, the generated criteria are presented to the user for review and approval. If the originator approves the criteria, the generated list is modified to add additional entries to the distribution based on the generated criteria. If the originator rejects the criteria, the initially generated list is submitted and the message is sent to the entries on the initial list. | 03-03-2011 |
20110113018 | METHOD AND SYSTEM FOR MERGING DISPARATE VIRTUAL UNIVERSES ENTITIES - A migration tool for merging disparate virtual universes by selecting a source region or source account, selecting a destination edge or destination account, retrieving and storing virtual universe information for the source region or account, inserting the virtual universe resources of the source region or account into the destination region or account, activating the inserted resources, and deleting the source resources from the source region or account. | 05-12-2011 |
20110166958 | CONDUCTING ROUTE COMMERCE FROM A CENTRAL CLEARINGHOUSE - A method and system for managing route resources. After receiving a request for a route from a user, user-specified constraints, route supplier-specified constraints, and weights assigned to the constraints, a dynamic model of available routes is queried to generate proposed routes based on the constraints and weights. The model is updated according to the proposed routes. Current bids on related routes are retrieved. Prices of the proposed routes are determined and presented to the user. The prices are based on the updated model and the current bids on related routes. If no price is acceptable, the user modifies the constraints and a new set of proposed routes is generated. A bid from the user to purchase a selected proposed route is received. | 07-07-2011 |
20110179396 | Method and System for Software Reuse Utilizing Naive Group Annotation of Incomplete Software Descriptions Employing a Self-Reporting Element - Software reuse utilizing naive group annotation of incomplete software descriptions. A software code is decimated whereby the software code's attributes, such as variable, class and method names are obfuscated into non-informative forms. The decimated software code is then presented to two or more participants that include at least one naive and one informed participant. The naive participant(s) poses a predetermined number of question(s) to and receive answer(s) from the informed participant(s). After receiving the answer(s) posed to the informed participant(s), the naive participant(s) proceeds to guess the function of the presented decimated software code. The annotations, i.e., questions and answers, to the decimated software code under review are collected and stored in a database. | 07-21-2011 |
20120266088 | CONTEXTUAL TEMPLATES FOR MODIFYING OBJECTS IN A VIRTUAL UNIVERSE - A computer implemented method, apparatus, and computer program product for modifying object styles in a virtual universe. An object is rendered in accordance with a first contextual style template from a plurality of contextual style templates. The first contextual style template comprises first geometric and texture data to display the object with a first style. In response to detecting a set of contextual changes associated with the object, a second contextual style template is identified from the plurality of contextual style templates. The set of contextual changes triggers implementation of the second contextual style template to change the first style of the object to a second style. The object is rendered in accordance with second geometric and texture data in the second contextual style template to form a modified object, wherein the modified object is displayed with the second style. | 10-18-2012 |
20120321284 | MANAGING DIGITAL VIDEO RECORDER STORAGE FOR A PLURALITY OF USERS - A computer implemented method and apparatus for managing digital video recorder storage for one or more users. Each user in the multi-user environment is assigned an amount of program storage in the digital video recorder. Responsive to receiving a request to record a new program from a user in the multi-user environment, an associated amount of program storage assigned to the use is determined. Responsive to a determination that addition of the new program will not exceed the associated amount of program storage assigned to the user, the new program is recorded to the program storage. | 12-20-2012 |
20130208187 | DIGITAL VIDEO RECORDER BROADCAST OVERLAYS - A secondary media stream is displayed within a primary media stream. In response to receiving a first user selection of two media streams for simultaneous viewing on a display device, a second user selection of a primary media stream and a secondary media stream from the two media streams selected for simultaneous viewing is received. A set of inset definitions is extracted from metadata in the secondary media stream. A third user selection of an inset definition from the set of inset definitions is received. A user input is received to display the primary media stream to accommodate a size of the inset definition selected. The primary media stream is displayed to create an inset area for displaying the secondary media stream within the primary media stream based on the user input. The secondary media stream is displayed within the inset area of the displayed primary media stream for user viewing. | 08-15-2013 |
20140255010 | DIGITAL VIDEO RECORDER CONFLICT HANDLING EMPLOYING REBROADCAST REQUESTS - A conflict analysis (CA) information handling system (IHS) receives conflict information from a population of digital video recorder (DVR) IHSs. The conflict information indicates that a conflictee show is in conflict with a conflictor show in a DVR IHS. The conflict information may include a conflictee show identifier and open timeslots for each DVR IHS that transmits conflict information to the CA IHS. Using the conflictee show identifier and available timeslots received from the population of DVR IHSs, the CA IHS makes a recommendation to rebroadcast the conflictee show at a particular time when more than an predetermined threshold number of DVR IHSs are available to record a rebroadcast of the conflictee show. | 09-11-2014 |
20140282383 | Techniques for Providing Environmental Impact Information Associated With Code - A technique for providing environmental impact information associated with code includes determining, based on execution of the code on a computer system, an environmental impact of a code execution sequence included in the code. A section of the code that is associated with the code execution sequence is then annotated with environmental impact information associated with the environmental impact of the code execution sequence. | 09-18-2014 |