Patent application number | Description | Published |
20090310510 | FUTURE FORWARDING ZONES IN AD HOC NETWORKING SERVICE - A method, system, and computer program product for enabling the transmission of data from a mobile device to a target device via one or more carrier mobile devices, in a communication network. A proxy mobile carrier (PMC) utility facilitates transmission of data from the originating mobile device to a target device in a network which is inaccessible to the originating mobile device. The PMC utility employs a collection of enhanced transmission enabling components (ETECs) to enable the data transfer via one or more carrier mobile devices. The ETECs include a message creation component, a network zone identification component, a future forwarding zone prediction component, a message acceptor component, a storage component, an inter-node communication component, and a message delivery component. By initiating specific interactions between the ETECs, the PMC utility facilitates the transmission of data from the mobile device to the target device via carrier mobiles. | 12-17-2009 |
20100156899 | PRIORITIZED RENDERING OF OBJECTS IN A VIRTUAL UNIVERSE - An invention for prioritized rendering of objects in a virtual universe is provided. In one embodiment, there is a prioritization tool including a value component configured to assign a value to each of a set of items within an inventory of an avatar. A priority component is configured to compare a set of objects in the virtual universe to the value assigned to each of the set of items within the inventory of the avatar to determine a priority of each of the set of objects in the virtual universe. A rendering component is configured to render the set of objects in the virtual universe based on the priority of each of the set of objects in the virtual universe. | 06-24-2010 |
20100161906 | PRE-FETCHING VIRTUAL ENVIRONMENT IN A VIRTUAL UNIVERSE BASED ON PREVIOUS TRAVERSALS - An approach is provided for pre-fetching of virtual content in a virtual universe based on previous traversals. In one embodiment, there is a pre-fetching tool, including a ranking component configured to rank each of a plurality of parcels of locations previously visited by an avatar according to predefined ranking criteria. The pre-fetching tool further includes a pre-fetching component configured to pre-fetch a virtual content of said parcels of locations based on the ranking. | 06-24-2010 |
20100164947 | PRE-FETCHING VIRTUAL CONTENT IN A VIRTUAL UNIVERSE - An invention that pre-fetches virtual content in a virtual universe is provided. In one embodiment, there is a pre-fetching tool, including a ranking component configured to rank each of a plurality of members belonging to a social network of an avatar according to predefined ranking criteria. The pre-fetching tool further includes a pre-fetching component configured to pre-fetch a virtual content within a proximity of each of the plurality of members belonging to the social network of the avatar based on the ranking. | 07-01-2010 |
20100199047 | EXPIRING VIRTUAL CONTENT FROM A CACHE IN A VIRTUAL UNINERSE - An invention that expires cached virtual content in a virtual universe is provided. In one embodiment, there is an expiration tool, including an identification component configured to identify virtual content associated with an avatar in the virtual universe; an analysis component configured to analyze a behavior of the avatar in a region of the virtual universe; and an expiration component configured to expire cached virtual content associated with the avatar based on the behavior of the avatar in the region of the virtual universe. | 08-05-2010 |
20140059559 | INTELLEGENT TIERING - A method and system for intelligent tiering is provided. The method includes receiving a request for enabling a tiering process with respect to data. The computer processor retrieves a migration list indicating migration engines associated with the data. Additionally, an entity list of migration entities is retrieved and each migration entity is compared to associated policy conditions. In response, it is determined if matches exist between the migration entities and the associated policy conditions and a consolidated entity list is generated. | 02-27-2014 |
20140208037 | EXPIRING VIRTUAL CONTENT FROM A CHACHE IN A VIRTUAL UNIVERSE - Approaches for expiring cached virtual content in a virtual universe are provided. In one approach, there is an expiration tool, including an identification component configured to identify virtual content associated with an avatar in the virtual universe, an analysis component configured to analyze a behavior of the avatar in a region of the virtual universe, the behavior indicating a likely future location of the avatar, and an expiration component configured to expire cached virtual content associated with the avatar based on the behavior of the avatar in the region of the virtual universe, wherein the cached virtual content associated with the avatar in the future location is maintained in the cache longer than cached virtual content associated with the avatar in another region of the virtual universe. | 07-24-2014 |
Patent application number | Description | Published |
20080244253 | SYSTEM, METHOD AND PROGRAM FOR SELECTIVELY REBOOTING COMPUTERS AND OTHER COMPONENTS OF A DISTRIBUTED COMPUTER SYSTEM - Selectively rebooting components of a computer system. One or more tables which list respective costs to reboot the components and respective likelihoods that reboots of the respective components will correct respective problems with the computer system are generated. Each of the costs is based on a time to reboot or delays caused by the reboot of the respective component. In response to a subsequent problem with the computer system, an order to reboot components of the computer system is determined from the table based on the costs and likelihoods that the reboot will correct the problem, such that a component of the computer system characterized by a relatively low cost and high likelihood to correct the problem will be rebooted before another component characterized by a relatively high cost and low likelihood to correct the problem. The tables are updated through actual experience. | 10-02-2008 |
20110055267 | Virtual Universe Rendering Based on Prioritized Metadata Terms - After a change of location of an avatar in a virtual universe, an avatar is encouraged to remain at that location and avoid an immediate further or return change of location (e.g. by teleportation) by prioritizing rendering of objects such that objects most likely to be of interest to the avatar is performed prior to rendering of objects less likely to be of interest. Prioritization is performed by comparing metadata concerning objective(s) of the avatar and metadata of preferences of the avatar and objects in the avatar's inventory and/or implied from the avatar's activity history with metadata corresponding to objects at the location to which the avatar moves. Preferably, the metadata corresponding to the avatar is ranked in order of the number of occurrences of metadata terms and synonyms in metadata of the avatar. | 03-03-2011 |
20120143960 | RELATED MESSAGE DETECTION AND INDICATION - A method, a computer program product, and a computer system for managing requests to send messages are presented. Header information associated with a set of incoming messages on a server data processing system is retrieved in response to receiving a request to send a drafted message from a client data processing system to the server data processing system. The header information is searched to determine whether an incoming message in the set of incoming messages is related to the drafted message. An indication that the incoming message is related to the drafted message is presented at the client data processing system in response to determining that the incoming message is related to the drafted message. | 06-07-2012 |
20140176567 | PRIORITIZED RENDERING OF OBJECTS IN A VIRTUAL UNIVERSE - Approaches for prioritized rendering of objects in a virtual universe are provided. In one embodiment, there is a prioritization tool containing a plurality of components configured to: determine a priority of each of a set of objects in a commercial area of the virtual universe, the commercial area having a plurality of virtual retail stores; assign a priority to each of the plurality of virtual stores in the commercial area based on the priority of each of the set of objects in the virtual universe; and download and cache each of the objects from the set of virtual stores from the plurality of virtual stores in the virtual universe, that are outside a rendering radius of the avatar, based on the relative priorities of each of the set of the plurality of virtual stores in the virtual universe. | 06-26-2014 |
Patent application number | Description | Published |
20090094277 | AUTOMATIC OPTIMIZATION OF DISPLAY LAYOUT FOR MOBILE DEVICES - A computer implemented method, a computer program product, and a mobile device are disclosed for presenting a list of invokable actions to a user of the mobile device. Responsive to identifying the commencing of the invokable action, specific attributes of the invokable action are identified and stored in a corresponding data structure. From the specific attributes stored within the corresponding data structure, a most probable invokable action is identified. When the commencing of a subsequent invokable action is identified, the most probable invokable action is presented to the user. | 04-09-2009 |
20090106664 | PUBLIC STATUS DETERMINATION AND SECURITY CONFIGURATION OF A BROWSER - The illustrative embodiments described herein provide a computer implemented method, apparatus, and computer program product for dynamically identifying a publicly accessed system. A plurality of user profiles is generated for a plurality of users associated with a browser on a system. A set of unique user profiles is identified in the plurality of user profiles. The number of users associated with the set of unique user profiles is compared to a preconfigured threshold. Responsive to the number of users exceeding the preconfigured threshold, the system is identified as a publicly accessed system. | 04-23-2009 |
20090106835 | METHOD AND APPARATUS FOR PROTECTING SENSITIVE INFORMATION ON A PUBLICLY ACCESSED DATA PROCESSING SYSTEM - The illustrative embodiments described herein provide a computer implemented method, apparatus, and computer program product protecting sensitive information on a data processing system. A determination is made as to whether a data processing system is publicly accessed. Responsive to determining that a data processing system is publicly accessed, the system identifies sensitive information. The data processing system monitors for the presence of sensitive information. Responsive to detecting the presence of the sensitive information, the system presents a warning to a user of the data processing system. | 04-23-2009 |