Patent application number | Description | Published |
20080204450 | AVATAR-BASED UNSOLICITED ADVERTISEMENTS IN A VIRTUAL UNIVERSE - A system, method and program product for providing a virtual universe in which unsolicited advertisements are embodied in automated avatars. A system is provided that includes: a registration system for introducing an advertisement avatar into the virtual universe; a targeting system for targeting a user avatar for delivery of advertising content by the advertisement avatar; a movement system for defining how the advertisement avatar is to move within the virtual universe; and an advertisement delivery system for defining how the advertisement avatar is to deliver the advertising content to the user avatar. | 08-28-2008 |
20080208674 | TARGETING ADVERTISING CONTENT IN A VIRTUAL UNIVERSE (VU) - In general, the present invention allows advertising content to be targeted in a VU. Specifically, users' VU inventories that include visible assets are made available to an advertiser or other third party. This asset information is analyzed by the other party to determine the user's potential real world interests. Based on this analysis, the advertising content providers can target advertising content for real world goods and services. | 08-28-2008 |
20080208684 | INVOCATION OF ADVERTISEMENTS IN A VIRTUAL UNIVERSE (VU) - The present invention provides an approach to invoke advertisement(s) in a VU. Specifically, an advertisement is virtually associated with a user of the virtual space. The advertisement will then be visually referenced in the VU, and optionally distinguished/highlighted (e.g., using visual effects such as colors, icons, flashing icons, etc.). The advertisement will be invoked in response to a trigger occurring in the VU user in the). Once invoked, an action associated with the advertisement will be executed. The present invention can also allow for advertising user to be compensated for allowing their asset(s) to be associated with advertisement(s). Such compensation can be in the form of credits associated with the VU being provided to the advertising user and/or compensation to be provided to the user outside of the VU (e.g., in the real world in the form of money, gift certificates, goods and/or services, etc.). | 08-28-2008 |
20080208685 | ADVERTISEMENT PLANNING AND PAYMENT IN A VIRTUAL UNIVERSE (VU) - the present invention provides an approach for planning and paying for advertisements in a VU. Specifically, under the present invention, it is first determined which sections of a region of the VU (referred to herein as “portions” or the VU), and which avatars are most viewed. This data is the analyzed to plan and place advertisements. Once advertisements are placed, users coupled be compensated based on the frequency, time, etc. that associated advertisements are viewed. | 08-28-2008 |
20080219414 | Voice Recognition Dialing for Alphabetic Phone Numbers - Systems, methods and media for determining a phone number from a spoken alphabetic phone number are disclosed. Embodiments may include a method for determining a phone number that includes receiving spoken alphanumeric content from a user, the spoken alphanumeric content having one or more alphabetic characters, such as letters, numbers or words. The spoken alphanumeric content may include termination words or separation words in addition to alphabetic characters. The method may also include parsing the received spoken alphanumeric content to determine equivalent numbers for alphabetic characters in the alphanumeric content, such as by parsing spoken received spoken letters, numbers and/or words to determine their equivalent numbers. The method may also include determining the phone number based on the received spoken alphanumeric content and the determined equivalent numbers. Further embodiments may include dialing the determined phone number after determining the phone number. | 09-11-2008 |
20080222712 | User-Browser Interaction Analysis Authentication System - Systems, methods and media for authenticating a user based on user-browser interaction are disclosed. Embodiments of a method may include, during an e-commerce session with a user, receiving a request for an action from the user and determining whether the requested action requires additional authentication. Embodiments may also include requesting analysis of user-browser interaction for the session, receiving a pattern matching score for the session, and performing an action based on the pattern matching score and the requested action. The pattern matching score may provide an indication of a comparison between the user's interaction with a browser during the session and a user-browser interaction profile for the user. The performed action may include completing an e-commerce transaction, accessing or modifying information, changing a password, requesting additional information, denying the requested action, or other action. Further embodiments may provide for authenticating the user with a first-level authentication. | 09-11-2008 |
20080226041 | Phone Number Extraction System for Voice Mail Messages - Methods, apparatuses, and media for extracting phone numbers from voice mail messages are disclosed. Embodiments may include a method for determining a phone number in a voice mail message that includes analyzing a message and determining phone number(s) associated with the message based on the analysis. Embodiments of the method may also include generating a macro based on the determined phone number(s) and performing a macro action for at least one generated macro. In some embodiments, analyzing the message and determining phone number(s) associated with the message may include detecting a trigger word and parsing words in the message after the detected trigger word. In other embodiments, analyzing the message and determining one or more phone numbers associated with the message may include analyzing a voice-to-number dictionary and determining phone number(s) based on the dictionary. The macro action may include dialing, storing, deleting, etc. a phone number. | 09-18-2008 |
20080263636 | METHOD AND SYSTEM FOR VALIDATING ACTIVE COMPUTER TERMINAL SESSIONS - Systems, methods and program codes are provided wherein an analyzer analyzes input from a terminal device; ascertains human-like behavior; and terminates an active session, generates a time-out warning, manipulates an idle session timer or presents a challenge in response to a humanness likelihood determination or to a challenge result. In one aspect a keystroke analyzer and a command sequence analyzer determine whether the terminal device input is likely from a human user or from an automaton. In another aspect a Completely Automated Public Turing Test to tell Computers and Humans Apart challenge is presented. Timing characteristics include maximum generation rate, burstiness, and keystroke sequence delays, and command characteristics include a no-action-required characteristic and a query characteristic. A command sequence analyzer may have an affinity for a command line interface. Weighting algorithms or artificial intelligence routines may be applied to humanness likelihood outputs. | 10-23-2008 |
20080271117 | Cascading Authentication System - Generally speaking, systems, methods and media for authenticating a user to a server based on previous authentications to other servers are disclosed. Embodiments of a method for authenticating a user to a server may include receiving a request to authenticate the user to the server and determining whether authenticating the user requires matching an authentication plan. If a plan is required, the method may also include accessing a stored authentication plan with authentication records each having expected information relating to user access to a different server. The method may also include receiving an indication of the user's current authentication plan from an authentication store where the plan has authorization records each having current information relating to user access. Embodiments of the method may also include comparing the stored authentication plan with the received current authentication plan to determine whether they match and, in response to a match, authenticating the user. | 10-30-2008 |
20080320411 | METHOD OF TEXT TYPE-AHEAD - Methods and arrangements of text entry are discussed. Embodiments include transformations, code, state machines or other logic to enter text selecting text based upon the number of words in phrases of the text, upon the number of letters in words of the text, or upon other patterns of the text. The method may also involve indexing the selected text, matching text currently being entered by the user into an application to a portion of a segment of the indexed text, and entering a remaining portion of the segment of the indexed text into the application based upon the matching. In many embodiments, the text may be selected from the text entered into any of several applications. In a few embodiments, the text may be selected from sources specified by a user. In further embodiments, the sources may constitute data files. | 12-25-2008 |
20080320580 | SYSTEMS, METHODS, AND MEDIA FOR FIREWALL CONTROL VIA REMOTE SYSTEM INFORMATION - Generally speaking, systems, methods and media for implementing a firewall control system responsive to remote system information are disclosed. Embodiments of a method may include receiving a data request at a firewall where the data request is associated with a program and determining whether a remote system condition exists for the associated program, where the remote system condition includes a condition to be satisfied based on information received from a particular remote system. Embodiments may also include, in response to determining that a remote system condition exists, determining whether the remote system condition is satisfied based on information received from the particular remote system. Embodiments may also include, in response to determining whether the remote system condition is satisfied, performing one or more firewall actions. | 12-25-2008 |
20080320581 | SYSTEMS, METHODS, AND MEDIA FOR FIREWALL CONTROL VIA PROCESS INTERROGATION - Generally speaking, systems, methods and media for implementing a firewall control system responsive to process interrogations are disclosed. Embodiments of a method may include receiving a data request at a firewall where the data request is associated with a program and determining whether a process rule exists for the associated program, where the process rule includes a condition to be satisfied for a process of the user computer system. Embodiments may also include, in response to determining that a process rule does exist, determining a method for evaluating a status of the process and determining a current status of the process. Embodiments may also include determining whether the process rule is satisfied based on the current status of the process and using the determined evaluation method. Embodiments may also include, in response to determining whether the condition of the process rule is satisfied, performing one or more firewall actions. | 12-25-2008 |
20080320584 | FIREWALL CONTROL SYSTEM - Generally speaking, systems, methods and media for implementing a firewall control system responsive to user authentications are disclosed. Embodiments of a method may include receiving a data request at a firewall where the data request is associated with a program. Embodiments may include determining whether an authentication plan is required to be matched for the associated program and, if so, accessing a stored authentication plan associated with the program and having one or more authentication records each having expected information relating to user access to a particular server. Embodiments may include accessing a current authentication plan from an authentication store, the current authentication plan having one or more authentication records each having information relating to user access to a particular server. Embodiments may include comparing the stored authentication plan with the received current authentication plan to determine whether they match and, in response, performing one or more firewall actions. | 12-25-2008 |
20090006161 | SYSTEMS AND METHODS FOR MANAGING EVENTS OF EVENT SCHEDULING APPLICATIONS - Systems, methods, and computer program products for managing events in time management or event scheduling applications, such as calendar applications, are disclosed. Embodiments comprise analyzing event parameters, such as selections from input solicited from prospective meeting attendees that are associated with events of the meeting, determining an arrangement of the events based on the analysis of the event parameters, and proposing the arrangement. System embodiments generally comprise a list of events for the meeting, such as event items in a database, a constraint solver to analyze parameters of events of the list, and an arrangement module to select an arrangement of the events based on analysis by the constraint solver. | 01-01-2009 |
20090044140 | Intermediate Viewer for Transferring Information Elements via a Transfer Buffer to a Plurality of Sets of Destinations - A method for viewing and controlling data intermediately between source and destination by receiving from a graphical user interface a user designation of a plurality of sets of copy command destination positions within contents of a computer file, wherein each destination point is allowed to be included in more than one set of destination points; displaying to the user information elements contained in an operating system clipboard transfer buffer; receiving a user selection of information elements in the clipboard transfer buffer; receiving a user definition of a subset of the previously-designated copy command destination positions; and automatically copying the selected information elements to positions in the computer file corresponding according to the user defined subset of copy command destination positions. | 02-12-2009 |
20090054043 | Future Location Determination Using Social Networks - A computer-implemented method of predicting a future location of a mobile node can include determining a current location of a first mobile node, determining a location of at least a second mobile node, wherein the second mobile node is associated with the first mobile node via a social network, and generating a list including at least one candidate destination determined, at least in part, according to the location of the first mobile node and the location of the second mobile node. For each candidate destination on the list, a probability that the first mobile node is in route to that candidate destination location can be calculated. A candidate destination can be selected, according to the probabilities, from the list as a predicted future location of the first mobile node. The predicted future location of the first mobile node can be output. | 02-26-2009 |
20090054157 | INTELLECTUAL PROPERTY PROTECTION FOR CONTENT CREATED WITHIN A VIRTUAL UNIVERSE - An approach that protects intellectual property rights in content created by users of a virtual universe is described. In one embodiment, there is an intellectual property rights protection tool for use in a virtual universe. A receiving component is configured to receive a request to protect intellectual property rights in content created by a user of the virtual universe. A database is configured to store content created by users of the virtual universe that have intellectual property rights therein. A search component is configured to search the database for content created by users of the virtual universe that have intellectual property rights therein that is similar to the content created by the user. An analysis component is configured to determine whether any preexisting intellectual property rights in content stored in the database precludes intellectual property protection of the content created by the user. | 02-26-2009 |
20090055093 | PICTORIAL NAVIGATION METHOD, SYSTEM, AND PROGRAM PRODUCT - Methods, systems and program products provide pictorial information relevant to a geographic location, through selecting characteristics relevant to geographic locations, searching pictorial image databases for images having an embedded tags associated with the characteristics, retrieving image files from databases having embedded tags correlated to characteristics and visually depicting a physical appearance or an attribute of a location, analyzing characteristics image files and responsively selecting preferred image data, formatting preferred image data for presentation to a user, associating formatted preferred data with geographic locations, and presenting associated formatted data to a user in association with geographic locations. Characteristic include global positioning satellite coordinates. Image data may be selected having preferred image resolutions or perspectives. Formatting pictorial information may comprise synthesizing photographs into a constructs. Associated image data may indicate a distance and direction from a geographic location. Routing system applications are enabled to present pictorial information with each navigation route points. | 02-26-2009 |
20090055386 | System and Method for Enhanced In-Document Searching for Text Applications in a Data Processing System - A system and method for implementing enhanced searching within a document in a data processing system. A search manager receives an original search term, wherein the original search term includes at least two words. The search manager creates a set of alternate search terms by: retrieving from a predetermined thesaurus database at least one synonym for at least one word in the original search term; and inserting at least on wildcard between the at least two words within the original search term. The search manager performs at least one search utilizing the set of alternate search terms and the original search term. The search manager ranks the search results from the at least one search according to a predetermined priority order. The search manager outputs the ranked search results. | 02-26-2009 |
20090055799 | SYSTEM AND METHOD FOR SOURCE CODE SECTIONAL LOCKING FOR IMPROVED MANAGEMENT - A system and method of managing source code and, more particularly, a system and method for locking sections of source code to eliminate conflicts during concurrent use by multiple users. The method includes locking a first section of a file and at least a second section of the file to permit editing thereof by different users to the exclusion of other users. The method further includes merging edits of the locked first section with remaining sections of the file including any edits made to the at least second section without overwriting any edits. | 02-26-2009 |
20090077161 | MODIFYING TIME PROGRESSION RATES IN A VIRTUAL UNIVERSE - Described herein are processes and devices that intentionally modify time progression rates in a virtual universe. One of the devices described is a temporal variation device. The temporal variation device can determine an area, in a virtual universe, in which time progresses at a specific time progression rate. The temporal variation device can modify the time progression rate to be faster or slower in the area. By modifying the time progression rate in the area, rates at which action occur also change in a way that is correlated to the change in the time progression rate. The temporal variation device can maintain areas beyond the borders of the area at a time progression rate that is not modified. Therefore, the temporal variation device can create a relative time dilation between the determined area and other areas in the virtual universe outside of the determined area. | 03-19-2009 |
20090083560 | Computing Device Power Management - A system, method, and computer usable medium for computing device power management. The method includes identifying a correlation between active states of a computing device and active states of a connected device connected to the computing device through a network, the correlation indicating the desirability of the computing device being active; and providing an active state in the computing device based on the identified correlation. Providing an active state in the computing device based on the identified correlation may include preventing the computing device from entering a power-saving mode based on the identified correlation or waking the computing device. | 03-26-2009 |
20090083623 | CREATING DOCUMENTS FROM GRAPHICAL OBJECTS IN A VIRTUAL UNIVERSE - Described herein are processes and devices that create and manage documents in a virtual universe. One of the devices described is a virtual document converter. The virtual document converter analyzes a set of one or more graphical objects of a virtual document in a virtual universe. The virtual document presents document content. The virtual document converter determines format information for generating a document file. The virtual document converter parses the document content of the virtual document. The virtual document converter generates the document file with the parsed document content and the determined format information. | 03-26-2009 |
20090083624 | CREATING DOCUMENTS FROM OBJECTS WITH TEXT IN A VIRTUAL UNIVERSE - Described herein are processes and devices that create and manage documents in a virtual universe. One of the devices described is a virtual document converter. The virtual document converter can determine a plurality of text objects associated with a document graphic. The plurality of text objects present text, such as of a multiple page virtual document in a virtual universe. The virtual document converter generates a single, multi-page document file, for example, by encoding the text presented by the plurality of text objects into the document file. | 03-26-2009 |
20090089364 | ARRANGEMENTS FOR INTERACTIVITY BETWEEN A VIRTUAL UNIVERSE AND THE WORLD WIDE WEB - In one embodiment, a method for interaction between a web browser and virtual environment applications is disclosed. The method can include creating an attribute file or a cookie file in a virtual universe application and in browser applications, then sharing such files between these applications to enhance a user experience. Both the browser applications and the virtual universe applications can search for the attribute files in numerous locations including local memory, web based memory and even a third party service provider via the Internet. | 04-02-2009 |
20090089686 | Folding Text in Side Conversations - An example of a solution provided here comprises receiving a signal for sending in a side conversation, and in response to the signal for sending, sending a first portion of text, in a side conversation. The first portion of text is new, and the first portion of text is not necessarily revealed to some participants. | 04-02-2009 |
20090094088 | METHODS, SYSTEMS, AND APPARATUSES FOR AUTOMATED CONFIRMATIONS OF MEETINGS - Methods, systems, apparatuses, and computer program products for confirming attendance of prospective attendees to a meeting or events via time management or event scheduling applications, such as calendar applications, are disclosed. Various embodiments comprise scheduling the meeting, waiting for a period of time, and automatically sending confirmation requests to one or more prospective attendees of the meeting. Some embodiments also comprise sending invitations to and receiving acceptances by one or more prospective attendees. Some embodiments further comprise receiving one or more responses to the confirmation requests from the prospective attendees. Some embodiments may reschedule the meeting, or events of the meeting, based upon responses to the confirmation requests. Various embodiments may send or receive the confirmation requests and responses via instant messaging (IM) messages, e-mail messages, and short message service (SMS) messages. | 04-09-2009 |
20090100076 | CONTROLLING AND USING VIRTUAL UNIVERSE WISH LISTS - Described herein are processes and devices that control and use virtual universe wish lists. One of the devices described is a virtual wish list device. The virtual wish list device determines an item in a virtual universe that is a desired by an avatar. The virtual wish list device designates the item as a desired item in a wish list. The wish list may be stored in the avatar's virtual universe inventory. The wish list device determines details about the desired item, such as whether the item is desired in the virtual universe or in the real world. The wish list device stores the details about the desired item in the wish list. The virtual wish list device may use the details to conduct transactions related to the desired item. | 04-16-2009 |
20090106369 | DUPLICATE EMAIL ADDRESS DETECTION FOR A CONTACT - Methods, systems, and media are disclosed for managing multiple email addresses, each of which are associated with a known contact, e.g., a specific person. One embodiment includes selecting email addresses for an email to be sent through a computer system in communication with a mail server, wherein the email addresses comprise an email distribution list. Further, the method includes querying, before sending the email, for duplicate contacts associated with the email addresses in the email distribution list for the email. Further still, the method includes updating, after the querying, the email distribution list to the email addresses left in a remaining email distribution list produced through removal, if any, of the duplicate contacts identified by the querying. Finally, the method includes sending the email to contacts associated with each of the email addresses in the remaining email distribution list, wherein the contacts are in communication with the mail server. | 04-23-2009 |
20090109213 | ARRANGEMENTS FOR ENHANCING MULTIMEDIA FEATURES IN A VIRTUAL UNIVERSE - In one embodiment, a method for operating a virtual environment is disclosed. The method can include receiving an interactive virtual universe feed from a network in coordinate format. The method can also include displaying an interactive virtual universe and providing a trigger to a client application responsive to a user interaction. The trigger can change a mode of a user's computer where the computer receives and displays video data or pixel data. Thus, the client machine can display higher quality video. Other embodiments are also disclosed. | 04-30-2009 |
20090113524 | VIRTUAL UNIVERSE ACCOUNT PROTECTION - A protection mechanism(s) for a virtual universe account maintains integrity of the virtual universe account as well as the virtual universe. An avatar associated with a virtual universe account may be misappropriated and/or used inappropriately by a non-comporting user against the wishes or without the knowledge of the virtual universe account owner. A non-comporting user (i.e., a user not authorized to use the virtual universe account, an authorized user who misuses a virtual universe account, etc.) can use an avatar to perform potentially damaging and/or damaging activities in the virtual universe (e.g., destroy property, impact reputation associated with the virtual universe account, reduce value of the virtual universe account, etc.) Embodiments of the inventive subject matter detect when a user misappropriates and/or misuses a virtual universe account (i.e., detects a non-comporting user), and attempts to restore state of the virtual universe prior to the misuse and/or misappropriation. | 04-30-2009 |
20090175559 | MODIFYING SPACES IN VIRTUAL UNIVERSES - Methods arid arrangements of modifying spaces in virtual universes are discussed. Embodiments include transformations, code, state machines or other logic to receive data from a software agent in a virtual universe, directly or indirectly. The data may be based upon information automatically gathered from data stores outside the virtual universe, including account data and. user profile data. The embodiment may also involve developing a user profile of the user in the virtual universe, based upon the data received from the software agent. An embodiment may also involve automatically gathering information from data stores external to the virtual universe. The information may include user account data and user profile information. The embodiment may also include aggregating data for generating the user profile in the virtual universe, based upon the information; and transmitting the data directly or indirectly to the virtual universe. | 07-09-2009 |
20090189864 | SELF-ADAPTING VIRTUAL SMALL KEYBOARD APPARATUS AND METHOD - A method, apparatus and computer-usable medium for implementing a virtual keyboard for use with small input devices. A circular keyboard can be graphically displayed, in response to a user input by a user via a small input device. A circular and centrally located key can be graphically located and displayed within the center of the circular keyboard, wherein character keys radiate outward from the centrally located key (i.e., the “central key”). Character keys that are most commonly utilized by the user are preferably located closed to the circular and centrally located key within the circular keyboard. Character keys least commonly utilized by the user are preferably located at the edges of the keyboard, thereby permitting the circular keyboard to function as a self-adapting virtual keyboard for use with small input devices based on the usage of the keyboard by the user. | 07-30-2009 |
20090207982 | METHOD AND SYSTEM FOR VOICE MAIL PAUSING - A method and system for automatically pausing a remote voicemail recording to answer an incoming call and to notify an incoming caller of a user voicemail interaction. A command to pause the voicemail recording can be determined by the user prior to establishing the voicemail recording. Upon receiving an incoming call the user can be notified of the incoming call prior to terminating the voicemail recording. The command for pausing voicemail recording can be sent to a voicemail system to pause the voicemail recording if the user opts to receive the incoming call. When the call is concluded, the user can be returned to the voicemail system with options such as resume recording, playback, delete, or cancel the message. | 08-20-2009 |
20090210513 | ASYNCHRONOUS AUTOMATED ROUTING OF USER TO OPTIMAL HOST - A system and method of automatically routing a user to an optimal data center of a host. A method includes transmitting a web page having measurement code and modification code from one of a plurality of data centers to a computing device. The measurement code determines an optimal data center of the plurality of data centers for the computing device, and the modification code alters at least one link in the web page to point to the optimal data center. | 08-20-2009 |
20090210806 | METHOD AND SYSTEM FOR PREDICTIVE BROWSING - A method for automatically navigating potential websites for predictive browsing based on user activities along with efficiency of verifying content updates. A Uniform Resource Locator (URL) of websites and its associated attributes that a user visits can be recorded and stored in a storage engine. The potential sites can be predicted by a predictive engine component based upon a past browsing history and various environmental factors that are recorded in the storage engine. A dynamic content detection engine component examines each potential websites and detects if the site has been updated. The predictive engine enables the user to navigate to the potential websites thereby permitting the user to browse websites faster. | 08-20-2009 |
20090217171 | METHOD TO MONITOR USER TRAJECTORIES WITHIN A VIRTUAL UNIVERSE - The present invention is directed to a method to monitor user trajectories within a virtual universe. A method for monitoring a user trajectory of any avatar in a virtual universe may include recording an activity of an avatar within a virtual universe, and then rendering the recording as a visible path. The activity may include movement, duration at a coordinate, time between coordinates, and/or angle of positioning of the avatar. The invention, for example, reminds an avatar a reminder as to where he/she has traversed in the past; shows paths that their team or family members have traversed; and/or gives an indication of popular paths taken by avatars. | 08-27-2009 |
20090222274 | PREVENTING FRAUD IN A VIRTUAL UNIVERSE - A solution for preventing frauds in a virtual universe is disclosed. A user interface may be deployed to a user of the virtual universe which enables the user to report a fraudulent activity of a virtual entity. Such a report is processed by an administration center, and the fraudulent virtual entity may be publically tagged such that further frauds can be prevented. | 09-03-2009 |
20090235360 | DETECTING A PHISHING ENTITY IN A VIRTUAL UNIVERSE - An invention for detecting a phishing virtual entity in a virtual universe is disclosed. A virtual entity may be registered as authentic and be identified with multiple physical characteristics thereof. Another virtual entity will be monitored to detect whether it includes a physical characteristic that is sufficiently similar to that of a registered virtual entity to cause confusion. A phishing virtual entity is detected based on the monitoring and phishing prevention processes may be implemented on the phishing virtual entity. | 09-17-2009 |
20090245486 | METHOD AND SYSTEM FOR IN-PROGRESS VOICEMAIL TRANSFER BASED ON IDENTITY - A method, system and computer-usable medium for terminating an in-progress voicemail and immediately connecting callers to each other based on identity. A telephone system can be enabled to detect that a calling party (e.g., subscriber “A”) receives no answer from a called party (e.g., subscriber “B”) and if the calling party is a current voicemail recipient from the called party then the voicemail message can be discarded by the telephone system. Such an approach enables an immediate connection between the calling party and the called party to each other by a call switching component. The incomplete voicemail message in the voicemail system is automatically discarded. A command to discard and/or erase the voicemail message can be predetermined by the telephone system. | 10-01-2009 |
20090249061 | CERTIFYING A VIRTUAL ENTITY IN A VIRTUAL UNIVERSE - An invention for certifying a virtual entity in a virtual universe is disclosed. A virtual business may opt to register with a security certificate administration center to obtain a security certificate. A user of another virtual entity is provided with an ability to initiate a verifying process to check whether a security certificate symbol or a graphic resembling a security certificate symbol represents a valid security certificate. Virtual universe client and server software may be modified to enable a secured connection between the user and the security certificate administration center for the verification. | 10-01-2009 |
20090259948 | SURROGATE AVATAR CONTROL IN A VIRTUAL UNIVERSE - The present invention is directed to providing surrogate avatar control in a virtual universe. The invention enables one resident of the virtual universe to take over the avatar of a second resident. A method for controlling an avatar may include providing the avatar in the virtual universe, where the avatar is controlled by a first entity and then supplying a token that allows for permission for a second entity to control some aspect of the first entity's avatar. | 10-15-2009 |
20090265435 | Email Server Cooperative Management for Automatic Routing of Emails Based on Preferences - Methods, systems, and media are disclosed for managing the routing of an email at the server level to an email client by preferences set in a routing application located on the server. One embodiment includes querying, by a routing application located on a server and associated with an email system, the email by comparison to conditions for each preference set in the routing application, wherein a preference comprises a routing action. Further, the method includes identifying, based on the querying and by the routing application, a match between the email and at least one of the conditions. Further still, the method includes performing, based on the match and by the routing application, the preference associated with the at least one of the conditions of the email, whereby the email is transmitted to an email client. | 10-22-2009 |
20090265755 | FIREWALL METHODOLOGIES FOR USE WITHIN VIRTUAL ENVIRONMENTS - In some embodiments a method comprises receiving a virtual universe request, and determining properties of the virtual universe request. The method can also comprise determining a virtual universe firewall security policy, wherein the virtual universe firewall security policy identifies allowable properties associated with the virtual universe request. The method can also include comparing the properties of the virtual universe request to the properties of the virtual universe firewall security policy, and blocking the virtual universe request based on the comparison of the virtual universe request's properties to the virtual universe firewall security policy's allowable properties. | 10-22-2009 |
20090271700 | TEXT TYPE-AHEAD - Methods and arrangements of text entry are discussed. Embodiments include transformations, code, state machines or other logic to index segments of text from multiple sources and receive segments of text being entered into text-entry applications in a floating application. The embodiments may also involve matching the segments of text to indexed segments of text and entering completions of the received segments of text into the text-entry applications. The completions may be based upon the matching, and the completion of a segment may be entered into the text-entry application from which it was received. | 10-29-2009 |
20090276649 | METHOD, SYSTEM, AND PRODUCT FOR COMPUTATIONAL DEVICE POWER-SAVINGS - A user may invoke energy savings in the operation of a computational device performing a processing task. The device performs the processing task in the invoked energy savings mode and determines an energy amount expended by the device in performing the processing task in the energy savings mode, creating a net energy savings value as a difference between the energy amount expended and a standard energy expenditure amount predicted as required for the computational device to perform the processing task in high-performance mode. The device displays the net energy savings value to the user, with the user continuing the invoking of the energy savings mode or engaging another performance mode for the computational device as a function of the displaying. | 11-05-2009 |
20090276707 | DIRECTED COMMUNICATION IN A VIRTUAL ENVIRONMENT - The present invention is directed to directed communication in a virtual environment. A method for method for providing directed communication between avatars in a virtual environment in accordance with an embodiment of the present invention includes: determining a relative location of a first avatar and a second avatar in a virtual environment; and adjusting an aspect of a communication between the first avatar and the second avatar based on the relative location. | 11-05-2009 |
20090278841 | MANAGING USE LIMITATIONS IN A VIRTUAL UNIVERSE RESOURCE CONSERVATION REGION - A virtual universe can include regions that conserve natural resource usage. A virtual universe natural resource conservation system (“system”) can determine that an avatar is accessing a natural resource conservation region in a virtual universe. The natural resource conservation region is supported with one or more devices that adhere to restrictions on natural resource usage. The system can also apply one or more virtual universe restrictions while the avatar is accessing the natural resource conservation region. | 11-12-2009 |
20090281743 | MANAGING ENERGY USAGE BY DEVICES ASSOCIATED WITH A VIRTUAL UNIVERSE RESOURCE CONSERVATION - A virtual universe can include regions that conserve natural resource usage. A virtual universe natural resource conservation system can determine a measure of comprehensive energy usage of a plurality of devices associated with a controlled energy use region in a virtual universe. The system can determine that the measure of comprehensive energy usage approaches a usage threshold for the controlled energy use region. The system can also impose one or more conservation limitations on at least one of the plurality of devices to maintain the comprehensive energy usage within the usage threshold. | 11-12-2009 |
20090282075 | SYSTEM AND METHOD FOR IDENTIFYING AND BLOCKING AVATAR-BASED UNSOLICITED ADVERTISING IN A VIRTUAL UNIVERSE - A system and a method for use in a virtual universe (VU) system for identifying offering avatars that may send unsolicited advertisements to receiving avatars is described. The system and method further may allow receiving avatars to reject offerings from such offering avatars. The system and method may utilize reputations of the offering avatars. Receiving avatars may identify spam to the VU system that may record spam information about the identified offering avatar for future processing and may for make the spam information available to other avatars for their use. | 11-12-2009 |
20090282327 | METHOD AND SYSTEM FOR EFFICIENT WEB PAGE RENDERING - Web page annotation instructions comprise efficient and alternative instructions for rendering object data to a web page viewer, wherein the efficient instruction renders the object data to a web page viewer with less resource expenditure. An efficient rendering choice may be visually indicated and selectable by a viewer. Annotation instructions may indicate a relevance value of object data determinative of displaying object data. Efficient instructions may instruct a server device to not allocate new central processing units to serve requests to view the web page. Annotations may comprise first and second hypertext resource reference for a data object, wherein using the first results in rendering object data with a smaller resource expenditure than using the second, for example through divergent server efficiencies or divergent referenced object resolution properties. A resource contemplates energy and resource expenditures; generated waste, pollution and heat quantities and environmental impact. | 11-12-2009 |
20090282472 | SECURE COMMUNICATION MODES IN A VIRTUAL UNIVERSE - The present invention is directed to a system, method and program product for providing secure communications in a virtual universe. A system is disclosed that includes a system for allowing a first avatar to request a secure communication mode and for allowing a second avatar to accept the secure communication mode. Once accepted, a secure session is initiated within the virtual universe between the first avatar and the second avatar and at least one feature of the virtual universe is altered to effectuate the secure communication mode. | 11-12-2009 |
20090284548 | DIFFERENTIAL RESOURCE APPLICATIONS IN VIRTUAL WORLDS BASED ON PAYMENT AND ACCOUNT OPTIONS - A system and method for enhancing the rendering of one or more objects based on payment and account options. The system comprises a computer infrastructure configured to control enhancement rendering of an object in a virtual universe by providing at least one augmentation attribute to a tag of the object. The method comprises providing enhancement rendering of an object in a virtual universe by augmenting the object based on a status of a user viewing the object. | 11-19-2009 |
20090286605 | EVENT DETERMINATION IN A VIRTUAL UNIVERSE - An approach that determines events in a virtual universe is described. In one embodiment, there is a method for automatically determining an occurrence of an event in a virtual universe. The method includes monitoring a plurality of regions within the virtual universe and determining an occurrence of an event within at least one of the plurality of regions according to locations of avatars that are on-line in the virtual universe and fields of view that the avatars have from each of the locations. | 11-19-2009 |
20090287614 | DYNAMIC TRANSFERRING OF AVATARS BETWEEN VIRTUAL UNIVERSES - Interruption and degradation of service within a virtual universe leads to an unsatisfactory experience for users of the virtual universe. Dissatisfaction with service of a virtual universe may lead users to see alternate universes providing higher levels of service. Functionality can be implemented to identify alternate virtual universes that meet a user's service requirements and dynamically move the user's avatar from one virtual universe to another. | 11-19-2009 |
20090287640 | PROVIDING NOTIFICATION OF A REAL-WORLD EVENT TO A VIRTUAL UNIVERSE USER - An approach that provides transmission and notification of a real-world event to a virtual universe user is described. In one embodiment, there is a method for notifying a resident that is on-line in a virtual universe of an occurrence of a real-world event. The method includes receiving an indication of the occurrence of the real-world event, mapping the indication of the real-world event into one of a plurality of communication representations, and notifying the resident in the virtual universe in accordance with the mapped communication representation. | 11-19-2009 |
20090287758 | CREATING A VIRTUAL UNIVERSE DATA FEED AND DISTRIBUTING THE DATA FEED BEYOND THE VIRTUAL UNIVERSE - Business transactions are becoming more prevalent in virtual universes. Functionality can be implemented within a VU to allow syndication of data feeds to subscribers outside the VU. Feeds collect and serve data from one or more VU objects and locations based on changes made to the VU either by the VU itself, or by avatars in the VU. A location in a virtual universe can be an area defined by at least three coordinates, as an example. Data feeds from a VU can be used to create a VU application with and/or using the data feeds, to derive data from the data feeds, to monitor use of objects or space and billing for such use based on the data feeds, etc. | 11-19-2009 |
20090287765 | VIRTUAL UNIVERSE DESKTOP EXPLORATION FOR RESOURCE ACQUISITION - The present invention is directed to a system, method and program product that allows a user to acquire resources from a local computer during a session with a virtual universe. Disclosed is a system that allows a user to: invocate a local operating system session that displays an operating system interface onto a client computer during a virtual universe session; navigate the operating system interface using an avatar; and acquire resources from the client computer via the operating system interface using the avatar. | 11-19-2009 |
20090287806 | METHOD, SYSTEM, AND PRODUCT FOR COMPARATIVE EFFICIENCY DECISIONS IN PRINT OPERATIONS - Methods, devices, services and program products are provided for selecting a printer from a plurality of printers as a function of a printer resource consumption attribute where there is a network environment comprising a plurality of printers, each of the plurality of printers having a resource consumption attribute value. A user invokes a print operation through the network environment and a processing means compares weighted resource consumption attribute values for each of the plurality of printers. Processing means automatically select at least one destination printer from the plurality of printers having a lower resource usage requirement for performing a print operation relative to at least one unselected printer of the plurality of printers. Processing means also automatically choose a destination printer as a function of an availability of each of the destination printers. | 11-19-2009 |
20090288001 | TRIGGER EVENT BASED DATA FEED OF VIRTUAL UNIVERSE DATA - Business owners in a virtual universe may want to create a data source that transmits a data feed when certain parameters are met. Functionality can be implemented within a virtual universe to create a data feed when a trigger event occurs. The data feed may include data about the trigger event itself and/or about an avatar that caused the trigger. Triggered data feeds can be used to derive statistics, monitor use of objects and space and bill for such use, etc. In such cases, the user may be notified, such as via email, of the new data feed, as well as instructions on how to subscribe to it in their RSS reader or other client. Alternatively, users may be given individual feeds wherein additional feeds are distributed as separate categories of the user's feed as opposed to creating a separate feed. | 11-19-2009 |
20090288002 | VIRTUAL UNIVERSE TELEPORTATION SUGGESTION SERVICE - The present invention is directed to a system, method and program product for providing teleportation suggestions to avatars in a virtual universe. A service is provided that determines the set of teleportation suggestions for the avatar based on at least one of: an inventory analysis of the avatar, a historical teleportation analysis of the avatar, a motion analysis of the avatar, a social network analysis of the avatar, or a ratings analysis of locations within the virtual universe. | 11-19-2009 |
20090299988 | APPLICATION OF USER CONTEXT TO SEARCHES IN A VIRTUAL UNIVERSE - An approach that applies user context to searches in a virtual universe is described. In one embodiment, there is an enhanced virtual universe search tool that includes a receiving component configured to receive a query from an avatar that is online in the virtual universe. A scanning component is configured to scan a collection of avatar data describing attributes that are relevant to behavioral, search and informational needs of the avatar. A resource search component is configured to return search results for the query that are in accordance with the scanned collection of avatar data. | 12-03-2009 |
20090300059 | System, Method, and Computer Readable Media for Replicating Virtual Universe Objects - A system, a method and a computer readable media for replicating virtual universe objects are provided. In one exemplary embodiment, the method includes determining a first set of VU objects associated with a first user. The method further includes determining replication priority values for the first set of VU objects utilizing predetermined priority value rules. Each VU object of the first set of VU objects has a replication priority value. The method further includes determining a second set of VU objects from the first set of VU objects based on the replication priority values associated with the first set of VU objects. The method further includes replicating the second set of VU objects from a primary VU computer server to a first device. | 12-03-2009 |
20090300493 | EXPLICIT USE OF USER CONTEXT OBJECTS IN A VIRTUAL UNIVERSE - An approach that facilitates explicit use of user context objects in a virtual universe is described. In one embodiment, there is a user context object tool that includes a user context object retrieving component configured to retrieve the plurality of user context objects for presentation to the avatar. A user context object selection and modification component is configured to receive a user context object selection and any desired modifications made to the user context object selection. A user context object permissions component is configured to permit the avatar to interact with the virtual universe in accordance with the user context object selection. | 12-03-2009 |
20090300639 | RESOURCE ACQUISITION AND MANIPULATION FROM WITHIN A VIRTUAL UNIVERSE - The present invention is directed to a system, method and program product that allows a user to access resources on a local computer during a session with a virtual universe. Disclosed is a system that obtains an inventory of resources from the client computer and generates renderings of the resources in the virtual universe. Also included is a resource interaction system for allowing an avatar to interact with the resources in the virtual universe, wherein the resource interaction system provides a transport facility for loading resources from the client computer to the virtual universe. | 12-03-2009 |
20090306935 | PRODUCT REPAIR ASSISTANCE USING A VIRTUAL UNIVERSE - An approach that provides product repair assistance using a virtual universe is described. In one embodiment, there is a method for providing repair assistance for a real-world product in a virtual universe. The method includes receiving diagnostic information relating to the real-world product, ascertaining repair assistance information for the real-world product from the received diagnostic information, and generating a rendition of the real-world product along with the repair assistance information for display to a resident on-line in the virtual universe. | 12-10-2009 |
20090306998 | DESKTOP ACCESS FROM WITHIN A VIRTUAL UNIVERSE - An approach that provides desktop access from within a virtual universe is described. In one embodiment, there is a desktop invocation component configured to invoke a client computer desktop from within a virtual universe in response to receiving a request to access the client computer desktop from within the virtual universe. A rendering component is configured to generate a rendition of the client computer desktop in the virtual universe in response to the invoking thereof. An interaction component is configured to permit interaction with the client computer desktop from the rendition in the virtual universe. | 12-10-2009 |
20090307023 | PRODUCT CUSTOMER SUPPORT IN A VIRTUAL UNIVERSE - The present invention relates to virtual universe product customer support. A method for providing customer service in a virtual universe in accordance with an embodiment of the present invention includes: determining that a real-world product may have a problem; collecting information associated with the product; analyzing the collected information at a support location service in the virtual universe to determine a land location within the virtual universe of a product support center for the product; and providing an avatar with a teleportation invitation to the product support center. | 12-10-2009 |
20090307620 | SYSTEM FOR CONCURRENTLY MANAGING MULTIPLE AVATARS - An approach for cloning and merging avatars that are online in a virtual universe is described. In one embodiment, there is an avatar identification component which is configured to create an identification number associated with a second avatar, a GUI partitioning component configured to partition the graphic user interface of a virtual universe, an avatar rendering component configured to render a second avatar, a communication channel component configured to manage the second avatar's communication channel, and an inventory management component configured to manage the second avatar's inventory. | 12-10-2009 |
20090312080 | AUTOMATIC TRANSFORMATION OF INVENTORY ITEMS IN A VIRTUAL UNIVERSE - An approach that automatically transforms an inventory item of an avatar that is online in a virtual universe without requiring manual changes is described. In one embodiment, there is an avatar locator component configured to locate an avatar that is online in the virtual universe. An inventory item transforming component is configured to automatically transform an inventory item associated with the located avatar that is visual, functional, security or linguistic in nature. | 12-17-2009 |
20090313145 | ALLOCATING CARBON OFFSETS FOR PRINTING TASKS - Methods, services, program products and devices are provided for correlating carbon offsetting and printing. Methods comprise a requester initiating a print job on a printing device; analyzing the print job; identifying at least one print job metric relevant to the print job as a function of the analyzing, the metric associated with a carbon offset value; calculating a total amount of carbon offset from the identified at least one metric; printing the print job; and transferring the carbon offset total amount to a carbon offsetting entity for debiting or crediting against a printing entity as a function of the printing. Systems and devices and articles of manufacture comprising a computer usable medium having a computer readable program in said medium are provided. Service methods comprise deploying applications for correlating carbon offsetting and printing. | 12-17-2009 |
20090313556 | REDISTRIBUTION OF LICENSED ITEMS IN A VIRTUAL UNIVERSE - An approach that redistributes licensed items in a virtual universe is described. In one embodiment, there is a marketplace facilitation tool for use in a virtual universe. A database is configured to store information relating to the virtual universe. A receiving component is configured to receive a request for an item within the virtual universe. An inventory search component is configured to search the database for other avatars within the virtual universe that may possess the requested item. A transfer component is configured to establish a transfer of the item between at least one avatar determined to have possession of the requested item and an avatar requesting the item after there has been a manifestation of an assent to transfer the item. An intellectual property enforcement component is configured to specify and enforce any intellectual property rights restrictions with the item to the transfer component for the transfer to the avatar requesting the item. | 12-17-2009 |
20090316147 | METHOD AND APPARATUS FOR FAILURE DETECTION IN LIGHTING SYSTEMS - A method and apparatus for continuous monitoring of a light bulb or group of light bulbs. The light emission of a light bulb is compared with known emission failure values for similar types of light bulbs, and a determination of a near failure status for the bulb is made. | 12-24-2009 |
20090319668 | COMMUNICATION INTEGRATION BETWEEN A VIRTUAL UNIVERSE AND AN EXTERNAL DEVICE - An approach that provides real-time communication integration between a virtual universe and an external source is described. In one embodiment, there is a real-time communication integration interface tool that provides real-time communication integration between a virtual universe and a communication device external to the virtual universe. In this embodiment, there is a communication request component configured to receive a request to initiate a communication between a first resident that is on-line in the virtual universe and a second resident that is logged out of the virtual universe via the communication device. A communication link component is configured to establish a communication link between the virtual universe and the communication device in response to receiving the request. | 12-24-2009 |
20090327775 | USER IMPOSED POWER CONSTRAINTS ON WEB SERVER BASED ON USER PREFERENCES - Web application users are able to specify power constraints for remote web servers. These may be based on individual performance needs and energy-conservation desires. They enable the user to exercise control over the amount of energy that the web server expends in serving the needs of the user. The invention may employ such features as vertical scaling using power capacity on demand (CUoD) type functionality. The method includes providing a user-interactive interface to enable the user to indicate a preference for power restrictions with respect to its web requests. The user then instructs the web site provider to reduce power consumption in response to the user's request. The user specifies a reduction in overall power consumption for the user's needs, such as instructing the web service provider to use an energy-conserving server to handle the user's web requests, or specifying a acceptable delay or fulfilling the user's web requests. | 12-31-2009 |
20100017242 | POWER STANDARD COMPLIANCE METHOD AND SYSTEM - Methods, systems, devices and program products are provided for effecting compliance with power usage specifications through positive feedback to a monitoring entity. A power usage specification is provided for a device for a task performed by the device using the device to perform the task, embodiments monitoring power used by the device to perform the task to generate power usage data, comparing the power usage data to the power usage specification, and if the power usage data exceeds the power usage specification, automatically providing a reward to a device end-user selected as a function of a value of the specification exceeding and an agreement with the end-user or a third party. Power usage specifications may comprise predicted power usage values and requirements for the device to perform the task during a first power rate period having a lower energy or resource cost than a second power rate period. | 01-21-2010 |
20100017283 | DYNAMIC ADVERTISING SYSTEMS AND METHODS FOR VIRTUAL UNIVERSES - A system and method implemented in a computer infrastructure having computer executable code, includes receiving bids for dynamic product placement advertisements in a virtual universe (VU) and performing a bid resolution for the received bids. Additionally, the system and method include rendering an object in the VU as a product placement advertisement by replacing a default texture of the object with a product placement texture based on the bid resolution. | 01-21-2010 |
20100017360 | SYSTEM AND METHOD TO CONTROL EMAIL WHITELISTS - A system and method to control email whitelists by collecting one or more website email addresses parsed from a web page, detecting whether one or more of the user's email addresses are included in a webform of the web page, confirming whether the collected one or more website email addresses are to be added to one or more email whitelists, and updating the configuration of the one or more whitelists in response to a confirmation to add the one or more site email addresses to the one or more email whitelists. | 01-21-2010 |
20100017428 | System, Method, and Computer Readable Media for Identifying and Rating Virtual Universe Objects - A system, a method, and a computer readable media for identifying and rating a VU object in a virtual universe are provided. The method includes displaying first and second VU objects in a region of the virtual universe on a display device at a first time for a first user. The method further includes identifying the second VU object which modifies a view of the first VU object. The method further includes inputting first rating information associated with the second VU object that identifies a user perception of the second VU object. The method further includes inputting user view preference information indicating rating information for selecting VU objects to be displayed in the region of the virtual universe to the first user. The method further includes displaying the first VU object in the region of the virtual universe on the display device for the first user at a second time after the first time, while not displaying the second VU object based on both the first rating information associated with the second VU object, and the rating information of the user view preference information. | 01-21-2010 |
20100027051 | METHOD, APPARATUS, AND PRODUCT FOR EFFICIENT PRINT OPERATIONS - A method, apparatus, and product for reducing resource footprints for printer operation outputs, comprising: specifying a print job rendering criteria; receiving a request to print a print job having a page number amount; and automatically selecting and printing a portion of the print job as a function of the print job rendering criteria, wherein the portion has a page number amount smaller than the print job page number amount. The print job rendering criteria may comprise a set maximum number of pages to print during one printing session, where the portion to print is less than or equal to the maximum number of pages. Where the print job comprises a plurality of document components, automatically selecting and printing a portion of the document may comprise selecting a subset of the plurality of components as a function of the identified component relevance to each selected component and printing the representation. | 02-04-2010 |
20100034363 | Telephonic Repeat Method - A method, system and computer program product for assigning one or more conditions to a telephonic communication system to enable recording, replaying, and pausing of a telephone conversation. Recording of a telephone conversation may be manually or dynamically initiated during the telephone conversation. Dynamic replay of a telephone conversation is automatically initiated when a conversation experiences insufficient call quality, an interruption to the telephone service is detected, the user is distracted, a displacement of the user's phone is detected, or the user toggles between listening modes. A pause mode is automatically entered into during the telephone conversation when a section of the telephone conversation is replayed. An automated pause alert may be played during repeat of the telephone conversation to inform one or more parties that the user is temporarily unavailable. Real-time access to the telephone conversation is resumed when the replaying of the recorded telephone conversation has ended. | 02-11-2010 |
20100035583 | MANAGING WIRELESS TRANSMISSIONS UPON UNINTENTIONAL DISCONNECTION OF SERVICE - Disclosed are a method, system and computer program product for managing unintentional disconnection of a communication device. A system detects a first device to a transmission has been unintentionally disconnected from an ongoing communication with a second communication device. The connected second device is signaled regarding the disconnection. Recording of a disconnection voicemail message for the disconnected first communication device is enabled before disconnecting the second communication device. The second device may set an expiration time on the disconnection voicemail message. Upon resumption of service, the disconnected first device is informed of a new voicemail message left by the second device during the disconnection. A disconnection-specific voicemail greeting may be recorded by a user of the disconnected first device's system for use when a disconnection occurs. The disconnection-specific voicemail greeting is played to the connected second device when disconnection occurs. | 02-11-2010 |
20100035584 | Managing Voicemail Greeting Based On Location of Wireless Communication Device - Disclosed are a method, system and computer program product for managing voicemail greetings on a wireless communication device based on the device's location. A user records location-specific voicemail greetings on the user's wireless communication device, and associates the greetings with specific locations. When an authorized caller calls the user's wireless communication device, the location of the user's wireless communication device is detected, and location information of the user's device is sent to a call switching component. The call switching component presents the caller with the voicemail greeting associated with the location of the user's wireless communication device. The date and time the user's wireless communication device entered the location can be provided via a timestamp and presented to the caller along with the location-specific voicemail greeting, to enable the caller to determine when the user may be available to communicate, based on the combination of the information in the greeting and the timestamp information. | 02-11-2010 |
20100035585 | Managing Voicemail Messages Based On Location of Caller's Wireless Communication Device - Disclosed are a method, system and computer program product for processing voicemail messages to a user's wireless communication device based on a location of a caller's wireless communication device. Call answering protocols are assigned for implementation based on the location of the caller's wireless communication device at a time a call is received from the caller's device. Call answering protocol entries are received via a wireless communication device. When a call is received, a location of the caller's wireless communication device is detected. Location information regarding the caller's wireless communication device is received at a call switching component. The call is processed at the call switching component based on the call answering protocol for handling a caller's call received from the location of the caller's wireless communication device. | 02-11-2010 |
20100036604 | ROUTE NAVIGATION FOR OPTIMAL MOBILE COVERAGE - A utility within a mobile device or other device computes and provides an optimal mobile coverage route. The device receives a stating point/location and a destination point/location. The mobile device downloads a provider's mobile coverage information, accesses historical data stored by the mobile device, and obtains user feedback from the provider. The optimal mobile coverage route is then computed at the device, and the optimal mobile coverage route is provided via one of the following: a web site, or a text message (SMS) to, a voice operated feed, or any direct feed to the user of the mobile device. The computed optimal mobile coverage route is then used by the user of the mobile device when communicating with another mobile device while travelling from the starting point to the end point. | 02-11-2010 |
20100036687 | MOBILE TRANSPORT SELECTION AND ACQUISITION - A method, system, and computer program product for improving transportation selection and acquisition. A computer transmits historical fare and rating data of one or more public transportation vehicles (PTVs) within range of a user operating a mobile telecommunication device (MTD). The user may, via the MTD, select a PTV based on the provided historical fare or ratings data. Alternatively, the user may select a PTV based on personal preferences. In response to receiving a PTV selection from the MTD, the computer issues instructions to cause the selected PTV to be dispatched to the user's location. The computer may also receive user feedback for the selected PTV from the user in the form of a rating or as a textual comment. Customer feedback and may be used to update historical record information of a corresponding database entry for the selected PTV. This information may then be referenced by future customers. | 02-11-2010 |
20100036718 | METHOD AND SYSTEM FOR AUTOMATIC OPTIMAL ADVERTISING DETERMINATION WITHIN A VIRTUAL UNIVERSE - A method implemented in a computer infrastructure having computer executable code includes receiving advertising criteria, collecting advertisement cost data, and detecting virtual universe (VU) data. Additionally, the method includes determining optimal advertisement parameters based on the advertising criteria, the advertisement cost data and the VU data, and at least one of displaying the optimal advertisement parameters and invoking an advertisement in the VU in accordance with the optimal advertisement parameters. | 02-11-2010 |
20100036729 | IMMERSIVE ADVERTISEMENTS IN A VIRTUAL UNIVERSE - The invention generally relates to systems and methods for advertising, and, more particularly, to systems and methods for providing immersive advertising in a virtual universe. In one aspect of the invention, there is a method for presenting a virtual universe advertisement (VU-ad) in a virtual universe (VU), receiving input from a user associated with a user avatar of the VU, and altering the VU-ad in response to the input. | 02-11-2010 |
20100036735 | TRIGGERING IMMERSIVE ADVERTISEMENTS IN A VIRTUAL UNIVERSE - The invention generally relates to systems and methods for advertising, and, more particularly, to systems and methods for triggering immersive advertising in a virtual universe. In an embodiment, a method includes: obtaining tolerance data about a user who triggers a virtual universe advertisement (VU-ad) in a virtual universe (VU); and presenting a variation of the VU-ad to the user based upon the tolerance data. | 02-11-2010 |
20100037160 | MANAGING EPHEMERAL LOCATIONS IN A VIRTUAL UNIVERSE - Systems and methods for advertising, and, more particularly, systems and methods for managing ephemeral locations in a virtual universe. A method for managing ephemeral locations in a virtual universe (VU) includes causing a computer infrastructure to: render an ephemeral location upon a triggering in the VU; teleport a VU user avatar to the ephemeral location; permit the user avatar to interact in the ephemeral location; teleport the user avatar out of the ephemeral location; and un-render the ephemeral location. | 02-11-2010 |
20100050180 | METHOD AND SYSTEM FOR GREEN COMPUTING INTERCHANGE SWITCHING FUNCTION - Systems, methods, devices and program products are provided for enabling users of a computing system to measure and compare the green efficiency of a set of resources used in a computing task. With the use of this information, the user can select a desired set of resources to be employed in the computing task to minimize the environmental impact of computing tasks in relation to requirements. In some embodiments, the invention creates metrics for measuring the greenness of a computing task. The metrics are calculated through analysis of the resource computation, energy consumption, consequence of computation, and dimensional characteristics of a computing task. The metrics could be beneficial or other metrics that permit the user or a processing system to make scheduling and execution decisions. | 02-25-2010 |
20100054193 | METHOD AND SYSTEM FOR CONTROLLING THE DELIVERY OF MESSAGES TO A MOBILE CLIENT - A method, system and computer usable-medium for prioritizing and controlling the delivery of messages to a mobile client capable of connecting to a network. Data can be collected utilizing an agent associated with a messaging application for the delivery of a message to the mobile client, wherein the data is indicative of one or more characteristics of a network to which the mobile client is currently connected, one or more characteristics of the message itself, and one or more characteristics of the mobile client. The data can be then analyzed, and thereafter a delivery decision is rendered with respect to the message, in response to analyzing such data in order to efficiently control the delivery of the message to the mobile client. | 03-04-2010 |
20100056226 | TELEPHONE RING EXTENDER SYSTEM AND METHOD - A system and method to extend a ring of a telephone using presence detection of a user of a telecommunication device, and/or motion detection of a mobile telecommunication device. Presence detection and a ring control system are used to extend the ring of the telecommunication device based on user presence senor detection output signals and user preferences. Device motion detection and a ring control system are used to extend the ring of the mobile telecommunication device based on device motion detection output signals and user preferences. | 03-04-2010 |
20100057478 | SYSTEM AND METHOD FOR TRIGGERING AND PERFORMING SCANS TO PROTECT VIRTUAL ENVIRONMENTS - A system and method in a virtual universe system for triggering scans of virtual items and inventories of virtual items and for scanning the virtual items and inventories wherein the scans may be triggered by an avatar moving or teleporting from one region to another, or by an avatar picking up, dropping off, or accepting or purchasing an item. The degree of scanning may depend upon factors such as location where these scan triggers occur. The signature of the item may be identified by the scan process. The item signature may be compared against signatures of known malicious items stored in an inventory item signatures database and a summary of the signature comparison may be sent to a resident and stored in the resident's inventory. | 03-04-2010 |
20100058183 | METHOD, SYSTEM, AND PROGRAM PRODUCT FOR ALLOCATING VIRTUAL UNIVERSE CUSTOMER SERVICE - Virtual universe customer service representatives axe cloned and assigned as a function of observing customer behavior, retrieving historical data and creating a customer profile Preferential subavatar assignment parameters are determined for a customer as a function of the customer profile, choosing a subavatar from a plurality of subavatars as a function of a correlation of a subavatar performance characteristic with the preferential subavatar assignment parameter and a store objective, and the clone is populated with the chosen subavatar Choosing a subavatar may comprise preferentially rating subavatars and determining an appropriateness threshold as a function of the subavatar assignment parameter, the performance characteristics and the stole objective. Some embodiments reset a threshold in response to time-in-queue or to repetitively observing customer behavior, retrieving customer data, determining a subavatar assignment parameter and choosing a highest-rated available subavatar meeting a revised threshold. Subavatars may comprise automated, customer service representative-controlled and jointly-controlled subavatars. | 03-04-2010 |
20100067718 | MODIFICATIONS OF AUDIO COMMUNICATIONS IN AN ONLINE ENVIRONMENT - A system and method to modify audio communications in an online environment and, in particular, to modifying audio communications using one or more parameters. The system includes a module configured to detect one or more parameters applicable to an incoming audio communication and a weighing engine configured to weigh the one or more parameters and obtain a weighted volume. The system further includes a module configured to transmit the weighted volume to a user participating in a virtual universe. The method determines whether one or more parameters apply to an incoming communication, weighs the incoming communication based on the one or more parameters to determine a weighted volume of the incoming communication, and transmits the incoming communication to a user at the weighted volume. | 03-18-2010 |
20100070807 | SYSTEM AND METHOD FOR MANAGING SERVER PERFORMANCE DEGRADATION IN A VIRTUAL UNIVERSE - A system and method for managing server performance degradation in a virtual universe environment having avatars has a server load detection unit for detecting server load and a failure notification unit for notifying the avatars of imminent server failure. The server load detection unit measures the wall time of the server for determining performance. A memory stores acceptable performance parameters so that if the server is performing unacceptably, the failure notification unit may notify the avatars. | 03-18-2010 |
20100070883 | VIRTUAL UNIVERSE SUBJECT MATTER EXPERT ASSISTANCE - Methods, devices and systems are provided for enabling virtual universe users to find and engage subject matter experts within a virtual universe by defining a virtual universe subject matter expert conduit within the virtual universe. A virtual universe user avatar engages the conduit and a user indicates a subject matter expert search term. A data storage is searched for a tag relevant to the search term, and an expert-avatar is identified and located through the relevant tag. The user is enabled to directly communicate with the identified expert-avatar through a conduit communication medium entirely within the virtual universe, without requiring the user to engage a resource outside of the virtual universe or without requiring the user to engage an interface outside of the virtual universe. | 03-18-2010 |
20100085155 | LIQUID EXPOSURE DETECTION METHOD, SYSTEM, AND PROGRAM PRODUCT - Methods, systems and program products are provided for monitoring an article for fluid exposure. A plurality of liquid sensors is incorporated into an article beneath an outer layer in a furnishing installation. In response to a fluid-detected or no-fluid-detected state, polling the sensors and sometimes other data, a processor component determines fluid exposure, sensor failure and tampering events and stores event data in a memory. Pairs of the sensors are sometimes provided within expected liquid exposure saturation footprint areas. GPS coordinate, weather condition data and structural component positioning data may also be associated with event data. | 04-08-2010 |
20100085193 | RECORDING STORING, AND RETRIEVING VEHICLE MAINTENANCE RECORDS - A variety of sensors, such as mechanical triggers, light sensors and motion sensors, magnetic sensors, and radio frequency identification tags, are strategically placed throughout a motor vehicle to detect service and maintenance activities relating to the vehicle during the lifetime of the vehicle. A sensed activity then activates a suitable recording device, such as a video recorder, to record the activity. The completion of the activity likewise is sensed and causes deactivation of the recording device. The recorded activity is typically retained in a non-erasable, indexed storage device from which it can be easily retrieved. The sensors may also be used for tamper detection and vehicle motion detection. | 04-08-2010 |
20100085198 | IMMERSION DETECTION METHOD, SYSTEM, AND PROGRAM PRODUCT - A fluid detection system comprises a liquid sensor, an air pump and an atmospheric pressure sensor encased within an air and water permeable casing defining an enclosed air space. The pressure sensor acquires pressure samples within the casing, the air pump expelling additional gas into the casing. In response to determining a flood-status or a non-flood-status state of the fluid detection system and comparing the samples, a failure of the fluid detection system or an immersion of the fluid detection system in fluid is determined. In some embodiments, failure is determined if a second sample is greater than a first sample in a non-flooded state, and in others immersion is determined if a second sample is greater than a first sample value and the determined state is flooded. In some examples, gas is expelled across a liquid detection surface and a third sample value is acquired. | 04-08-2010 |
20100087983 | TRACKING VEHICLE MAINTENANCE USING SENSOR DETECTION - Radio frequency identification is used in cooperation with the computer system aboard a motor vehicle to track service and maintenance activities relating to the vehicle. Each component or part of the vehicle that may require maintenance is provided with a unique passive identification tag. The output data from the tag is read by a reader placed in proximity to the tag, and the data is transmitted to an on-board computer module where it is processed, and the service record is updated. A data stream converter may be used to process the information read by the reader into a format that is acceptable to the on-board computer. The data from the on-board computer is stored in a device external to the computer. Provisions are included for notification to the user, the auto dealer or service other agency as needed. | 04-08-2010 |
20100087985 | DETECTION OF VEHICLE OPERATION UNDER ADVERSE CONDITIONS - Details relating to the operation of a vehicle under adverse conditions are recorded and collected. This data is particularly useful to forestall catastrophic failures, and to provide valuable information for potential buyers of used vehicles. Among the operating conditions that are considered are high levels of air contaminants, operation in extreme hot or cold temperatures, hauling heavy loads, as well as hard braking, turning and acceleration. In addition to the detection and recording of data, prorated maintenance schedules are recalculated and adjusted to accommodate for the operation of the vehicle under these adverse or less than ideal conditions. Typically, the data is stored in the on-board computers present in most vehicles. Periodic off loading of the data to the dealer and service providers is also provided. | 04-08-2010 |
20100104005 | VIDEO SCENE MATCHING ON RETURN FROM VIRTUAL RENDERING IN A CONSUMER DIGITAL VIDEO RECORDING DEVICE - A method, system and computer program provide a mechanism for smoothing the transition back from a virtual (computer generated) scene to a related video stream. An event such as a user input or timeout is received triggering a return to display of the video stream from a virtual scene related to content of the video stream. A number of time points and/or camera angles are either presented to the user or are automatically searched for the best match. The list may be presented in order according to an automatically detected matching criteria. The virtual scene may a scene constructed locally within a computer or digital video recorder (DVR) and the matching performed locally based on angle and time information provided from a content provider such as a server, or the virtual scene generation and matching may be performed at a remote location such as the content server. | 04-29-2010 |
20100106982 | ADAPTIVE COMPUTING RESPONSIVE TO ENVIRONMENTAL CONDITIONS - Methods, including service methods, articles of manufacture, systems, articles and programmable devices are provided for adapting the power consumption of a computational device in response to environmental conditions. Operating environmental condition data relevant to the generation of electric power is acquired from an operating environment feed and analyzed to determine a high electric power demand indication. If the analyzing determines a high electric power demand indication, then a computational device automatically reduces an amount of electric power consumption. | 04-29-2010 |
20100107171 | COMPUTING TASK CARBON OFFSETING - Methods, systems, services and program products are provided for implementing carbon offset computing. During performance of a specified computing task data concerning resource consumption regarding that specified computing task is gathered and stored. Upon completion of the specified computing task, the amount of carbon offset required to compensate for resource consumption associated with performance of the completed specified computing task is calculated based upon stored or known resource consumption data. The calculated amount of carbon offset information may be transmitted to a carbon offset function provider, and a carbon offset function provider implements the specified amount of carbon offset based upon the calculated amounts communicated for the completed specified computing task. | 04-29-2010 |
20100114417 | VEHICLE FLUID REPLACEMENT TRACKING METHOD, SYSTEM, AND PROGRAM PRODUCT - The present invention provides a system, method, and program product for sensing and tracking vehicle fluid replacement in a vehicle by sensing information indicative of a first fluid draining from a fluid reservoir and/or a second fluid entering the fluid reservoir, recording fluid drain and fill events based on the information, and generating a fluid replacement history based on the recorded events. | 05-06-2010 |
20100114423 | LOCATION-BASED VEHICLE MAINTENANCE SCHEDULING METHOD, SYSTEM, AND PROGRAM PRODUCT - The present invention provides a system, method, and program product for scheduling vehicle maintenance by identifying a future location at which a vehicle is available for a service and electronically providing at least the future location, a time and time duration that the vehicle is estimated to be at the future location, and the identified service to a mechanic. | 05-06-2010 |
20100114426 | MECHANIC CERTIFICATION TRACKING METHOD, SYSTEM, AND PROGRAM PRODUCT - The present invention provides a system, method, and program product for tracking mechanic certification information. In one instance, information related to the certification of the mechanic is received and compared with stored authorized mechanic certification information. If a match is found, indicia indicating that the mechanic is an authorized mechanic is stored with the type of service. | 05-06-2010 |
20100114437 | ADAPTIVE VEHICLE CONFIGURATION - Methods, including service methods, program products and systems are provided for sensing vehicle loads and responsively and automatically configuring a vehicle. Vehicle-mounted load sensors sense vehicle loads, a vehicle processing means calculating a load imparted to the vehicle and comparing imparted loads to load capacity ratings or thresholds and responsively adjusting a vehicle cooling, transmission, braking, suspension or engine system into a revised operating mode. Modifying a component may entail revising a load capacity rating or threshold and repeating sensing, calculating, comparing and adjusting until the revised rating or threshold is met, or progressively adjusting in proportion to a change in a historic sensed load. Adjusting of the vehicle system may be biased to a performance characteristic or a load distribution. A supervisory entity may override automatic adjustment. | 05-06-2010 |
20100121551 | METHOD, SYSTEM, AND PROGRAM PRODUCT FOR FACILITATING VEHICLE FUELING BASED ON VEHICLE STATE - A system, method, and program product for facilitating fueling a vehicle includes sensing a state of the ignition of a vehicle and affecting fueling of the vehicle based on the state of the ignition. In one instance, the system, method, and program product are part of a computing system of the vehicle. In another instance, the system, method, and program product are part of a fuel pump employed to add fuel to the vehicle. In another aspect, the state of one or more of the fuel cap and the fuel pump are used to affect the state of the ignition. The state of the ignition may also be used to affect the state of another device external to the vehicle. | 05-13-2010 |
20100127868 | Method and System for Carbon Value Tracking and Labeling - A solution for tracking the carbon footprint value of an object as the object is manufactured and/or transported. This value may be stored in a tag associated with the object. Thus, the object can track its own carbon footprint, e.g., using the tag. Alternatively, the values are stored in a database with an entry associated with a particular object. The final composite value, e.g., the sum of the intermediate values associated with manufacturing steps, components, transportation steps, and disposal, may be used, e.g., seen, by the consumer or retail store. The store may use such values to arrange objects by footprint value on a shelf or in a store, or for other purposes. Therefore, the disclosure enables manufactures of products to track the carbon footprint for their products as the products are being produced and transported. | 05-27-2010 |
20100141431 | VEHICLE METHOD, SYSTEM, AND PROGRAM PRODUCT FOR MANAGING ELECTRICAL DEVICE POWER STATE - A system, method, and program product that manages the power state of a portable electrical device located within a monitored region about a vehicle. Information about the portable electrical device such as the power state of the portable electrical device is obtained and used to identify an action for the portable electrical device. Suitable actions include, but are not limited to, transitioning the power state of the portable electrical device and/or providing a notification about the portable electrical device. Other information such as the state of the ignition of the vehicle and/or the proximity of the driver and/or a passenger(s) with respect to the vehicle may additionally or alternatively be used to determine the action. | 06-10-2010 |
20100145563 | METHOD, SYSTEM, AND PROGRAM PRODUCT FOR CONTROLLING VEHICLE OPERATIONS BASED ON OBJECT PRESENCE - A system, method, and program product controls an operation of a vehicle based on the presence of one or more foreign objects within one or more monitored zones about the vehicle. One or more transceivers receive information about the one or more foreign objects. Based on the received information and the one or more corresponding zones, one or more controllers identify a response, which may include notifying the user about the foreign object and/or generating a signal that inhibits the ignition from turning on. The system, method, and program product also control an operation of a vehicle based on the absence of an object of the vehicle. Likewise, the one or more controllers identify a response, which may include notifying the user about the missing object and/or generating a signal that inhibits the ignition from turning on. | 06-10-2010 |
20100145609 | ENERGY AND EMISSION RESPONSIVE ROUTING FOR VEHICLES - Methods, including service methods, articles of manufacture, systems, articles and programmable devices are provided for vehicle route planning as a function of vehicle type. A plurality of different routes for travel by a vehicle from a trip origin to a destination is determined, and the vehicle identified as either an internal combustion engine vehicle type or a hybrid vehicle type. A programmable device is caused to recommend a route of the determined plurality of routes to an operator of the identified vehicle as a function of the identified vehicle type, wherein a route recommended to the identified internal combustion engine vehicle type is different from a route recommended to the identified hybrid vehicle type. In some examples, identifying the vehicle as configured to generate operative energy through a regenerative braking energy component results in recommending a route will cause more breaking over a faster route. | 06-10-2010 |
20100145797 | SYSTEM AND METHOD FOR VIRTUAL UNIVERSE RELOCATION THROUGH AN ADVERTISING OFFER - The present invention is directed to a system and method for providing an advertising offer that is configured to relocate an avatar within the virtual environment. The system is configured to ascertain one or more advertisements for display based on at least one of: an inventory analysis of an avatar, a historical teleportation analysis of the avatar, a motion analysis of the avatar, a social network analysis of the avatar, and a ratings analysis of the one or more advertisements within a virtual universe. The system also includes an advertisement display system structured to display the one or more advertisements to the avatar. | 06-10-2010 |
20100145833 | AUTOMATED TRANSACTIONAL CARBON OFFSETTING - Methods, including service methods, articles of manufacture, systems, articles and programmable devices are provided for linking and utilizing monetary and carbon credit accounts through a programmable arbitrating device providing a transaction interface to the buyer. A composite price is set for an item having a monetary portion and a carbon credit portion, a buyer executing a purchase of the item through an input to the arbitrating device transaction interface, the arbitrating device automatically charging a monetary payments from the buyer's monetary account, carbon credit payments from the buyer's carbon credit account, a difference between the payments and the composite price debited to the buyer's carbon credit account balance for a monetary value of the difference as a function of a monetary-carbon exchange rate, or to the buyer's monetary account for a carbon credit value of the difference as a function of the monetary-carbon exchange rate. | 06-10-2010 |
20100146402 | SYSTEM AND METHOD FOR VIRTUAL ENVIRONMENT PRESERVATION BASED ON AUTOMATED ITEM REDUCTION - A method implemented in a computer infrastructure having computer executable code, includes detecting one of an absence of a virtual universe (VU) occurrence in a VU within a predetermined time period, a special event in the VU and a change of real world status from a previous real world status. Additionally, the method includes determining a VU asset of a VU resident relevant to the VU occurrence, the special event or the previous real world status. Further, the method includes performing an automated asset reduction of the VU asset based on the determining. | 06-10-2010 |
20100146406 | ASYNCHRONOUS IMMERSIVE COMMUNICATIONS IN A VIRTUAL UNIVERSE - The present invention provides asynchronous immersive communication in a virtual universe. In one embodiment, there is a method for transmitting an asynchronous immersive communication in a virtual universe. The method includes receiving an asynchronous immersive communication created by a resident of a virtual universe, transmitting the asynchronous immersive communication to a recipient and enabling the recipient to access the asynchronous immersive communication. | 06-10-2010 |
20100146408 | SYSTEM AND METHOD TO MODIFY AUDIO COMPONENTS IN AN ONLINE ENVIRONMENT - A system and method to modify audio components in an online environment based on avatar characteristics and/or inventory items. The system includes a component to allow one or more audio modification algorithms to be selected. The system also includes a component to identify one or more avatar characteristics and a component to identify one or more avatar inventory items. The system further comprises a component to modify an audio communication in a virtual universe based on at least one of the one or more audio modification algorithms, the one or more avatar characteristics, and the one or more avatar inventory items. | 06-10-2010 |
20100146419 | SYSTEM AND METHOD FOR ITEM INQUIRY AND INFORMATION PRESENTATION VIA STANDARD COMMUNICATION PATHS - A method and system is provided for item inquiry and information presentation via standard communication paths. More particularly, the method and system detects an item associated with an avatar of a virtual universe (VU) user in a VU and determine information associated with the item. Additionally, the method and system are operable to display the information in the VU in a high-resolution component of the VU. | 06-10-2010 |
20100150320 | HANDLING COMMUNICATION SESSION DISCONNECTION AND RECONNECTION - A method, system and computer program product records missed information that is communicated between one or more connected communication terminals during a disconnection period and replays the missed information when a temporarily-disconnected communication terminal reconnects to the active communication session. The method comprises: detecting disconnection of the communication terminal from the active communication session; in response to detecting the disconnection, automatically recording the missed information exchanged between the one or more connected communication terminals remaining in the active communication session; detecting reconnection of the disconnected terminal to the active communication session; and delivering the recorded information exchange to the reconnected terminal, in response to detecting the reconnection. | 06-17-2010 |
20100161413 | VIRTUAL UNIVERSE EXCHANGES BASED ON REAL-WORLD TRANSACTIONS - An invention that establishes a virtual universe benefit based on a real-world transaction is provided. In one embodiment, there is a benefit establishing tool, including a linking component configured to link a user of a virtual universe with a business entity. The benefit establishing tool further includes a benefit component configured to establish a virtual universe benefit to the user based on a real-world transaction between the user and the business entity. | 06-24-2010 |
20100161439 | ASSET DISCOVERY AND TRANSFER WITHIN A VIRTUAL UNIVERSE - An invention for discovery and transfer of assets in a virtual universe is provided. In one embodiment, there is an asset transfer utility, including an inventory component configured to display to a user within a virtual universe an inventory containing a plurality of assets owned by other users within the virtual universe, each of the plurality of assets listed anonymously. A search component is configured to search the inventory containing the plurality of assets. A selection component is configured to select a set of assets from the plurality of assets based on the search. A transfer component is configured to transfer the set of assets between the user and an owner of each of the set of assets. | 06-24-2010 |
20100162403 | SYSTEM AND METHOD IN A VIRTUAL UNIVERSE FOR IDENTIFYING SPAM AVATARS BASED UPON AVATAR MULTIMEDIA CHARACTERISTICS - A system and method in a virtual universe (VU) system for identifying spam avatars based upon the avatars' multimedia characteristics may have a table that stores multimedia characteristics of known spam avatars. It further may have an analysis unit that compares the multimedia characteristics of avatars against the multimedia characteristics of known spam avatars to determine if the avatar has known spam avatar characteristics. It may further have a scoring system to calculate a spam score based upon the similarities of the comparison and identifying the avatar as a spam avatar based upon the calculated spam score. It may further compare the calculated spam score with a spam score threshold wherein the avatar is identified as a spam avatar if the calculated spam score is equal to or greater than the calculated spam score. Multimedia characteristics include graphics, audio, movement, interactivity, voice, etc. | 06-24-2010 |
20100162404 | IDENTIFYING SPAM AVATARS IN A VIRTUAL UNIVERSE (VU) BASED UPON TURING TESTS - A virtual universe system has a system and method for identifying spam avatars based upon the avatar's behavior characteristics through the use of Turing tests. The system may provide a Turing test unit for performing Turing tests and an analysis unit that compares the behavior characteristics of new or newly changed avatars against the behavior characteristics of known spam avatars to determine if the avatar has known spam avatar characteristics. It may further have a scoring system to calculate a spam score based upon similarities of the comparison and identifying the avatar as a spam avatar based upon the calculated spam score. It may further compare the calculated spam score with a spam score threshold wherein the avatar is identified as a spam avatar if the calculated spam score is equal to or greater than the calculated spam score. | 06-24-2010 |
20100169184 | COMMUNICATION INTEGRATION BETWEEN USERS IN A VIRTUAL UNIVERSE - An invention for communication integration between users of a virtual universe is provided. In one embodiment, there is a communication integration interface tool that provides communication integration between users within the virtual universe. In this embodiment, there is a response component for identifying an object of interest in the virtual universe, the object of interest comprising at least one of the following: a first user, or an asset associated with the first user that is within the virtual universe, and generating a response from the object of interest in the virtual universe. The communication integration interface tool further includes a communication link component for establishing a communication link between a second user and at least at least one of the following: the first user, a representative of the first user, or a third user in the virtual universe associated with the asset based on the generated response. | 07-01-2010 |
20100220097 | ALTERING AVATAR APPEARANCES BASED ON AVATAR POPULATION IN A VIRTUAL UNIVERSE - An invention for the alteration of avatar appearances based on avatar population in a virtual universe is provided. In one embodiment, there is a degradation tool, including an identification component configured to count an amount of a plurality of avatars within a region of a virtual universe. The degradation tool further comprises a modification component configured to degrade the appearance of a set of avatars from the plurality of avatars in the virtual universe based on the amount of the plurality of avatars within the region of the virtual universe. | 09-02-2010 |
20100298998 | Dynamic Specification of Power Supply Sources - A method, a system and a computer program product for specifying the source of power and provider of carbon offsets for an electrical device or service. A power supply specification (PSS) utility enables a user or program to specify a preferred blend of power sources and preferred carbon offset provider via a set of programmable requirements and the utility dynamically configures the electrical device or service, based on those requirements. The PSS utility determines the instantaneous power consumption of the device based on the outputs of sensors that measure voltages and currents associated with the operation of the device. The PSS utility compares the device's power consumption with the power from available power generating sources against the set of programmable requirements. When the available power is unable to satisfy the programmable requirements and/or is not sufficient to fully power the device, the PSS utility automatically places the device into a reduced power state. The PSS utility reports information about the device's power consumption to the power supplier. | 11-25-2010 |
20100306675 | PEER-TO-PEER BASED CONTENT DELIVERY IN A VIRTUAL UNIVERSE - The present invention permits performance adjustment in a virtual universe. In particular, the invention proposes a mixed server-based/peer-to-peer approach, in which transmission responsibilities are shifted towards peer-to-peer computing as the number of avatars within a region increases. The invention may foster fluid business transactions (e.g., sales) during times of high avatar load. | 12-02-2010 |
20100306737 | Techniques for Providing Environmental Impact Information Associated With Code - A technique for providing environmental impact information associated with code includes determining, based on execution of the code on a computer system, an environmental impact of a code execution sequence included in the code. A section of the code that is associated with the code execution sequence is then annotated with environmental impact information associated with the environmental impact of the code execution sequence. | 12-02-2010 |
20100306853 | PROVIDING NOTIFICATION OF SPAM AVATARS - The system monitors activities, movements, and other behavior patterns necessary to determine whether an avatar is a spam advertisement. A storing mechanism stores a “black list” and a black list score consisting of a list of spam avatar identifications (UUIDs) matching avatars that have been flagged as confirmed or suspected spam advertisers. Another mechanism allows the owner to redraw or otherwise re-render a distinguishing mark or other audible signature when an avatar has been detected as being a spam advertiser. Yet another mechanism signals to the owner an offending avatar that they have been added to the black list or had a report filed against them, and a reason as to why (the methods used to identify them). Another mechanism allows for a black listed avatar to be removed from the black list, and scores to be decreased and for the virtual universe and users to utilize the black list and score. | 12-02-2010 |
20100313145 | CONTEXTUAL DATA CENTER MANAGEMENT UTILIZING A VIRTUAL ENVIRONMENT - Contextual data center management utilizing a virtual environment is described. In one embodiment, there is a data center management tool for managing a physical data center from a representation of the physical data center operating in a virtual universe. The data center management tool includes a data center contextual object component configured to obtain a data center contextual object that describes operational information of the physical data center in the virtual universe. An operational change component is configured to implement at least one operational change to the representation of the physical data center in the virtual universe. The at least one operational change is implemented as a function of the data center contextual object. A management component is configured to manage the physical data center pursuant to a result obtained from implementing the at least one operational change. | 12-09-2010 |
20100318620 | Instant Messaging Monitoring and Alerts - Systems, methods, and articles of manufacture embodied as computer program products for facilitating the avoiding of sending a message to an unintended recipient. In some embodiments of the invention, in an instant messaging (IM) environment, the relatedness of a first entry in a first IM session to previous entries in the first IM session is determined. In response to the entry not meeting a first pre-determined relatedness threshold, an alert is issued. In one embodiment, the relatedness of the first entry to previous entries in a second IM session is determined, in response to the entry meeting a second pre-determined relatedness threshold, an alert is issued. In one implementation, relatedness is determined based on a matching of keywords between the first entry and the previous entries. In another implementation, relatedness is determined based on a matching of topics associated with one or more IM sessions, which topics can be associated with keywords. | 12-16-2010 |
20100332997 | RULE-BASED CONTENT FILTERING IN A VIRTUAL UNIVERSE - A system that enables individuals or companies to allow an avatar's transits and communications within a virtual universe. The system enables the selection of regions and/or content. Additionally, companies can use this system to prevent accidental communication of proprietary material. Also provided are a method and a computer readable medium containing a program product including the method to enable individuals or companies to allow an avatar's transits and communications within a virtual universe. | 12-30-2010 |
20100333031 | MANAGING MULTIPLE VIRTUAL WORLD ACCOUNTS FROM A SINGLE VIRTUAL LOBBY INTERFACE - A virtual lobby client automatically interfaces with multiple virtual world instances, each provided by a separate virtual world provider from among a plurality of virtual world providers, each interfaced with to access a separate one from among a plurality of virtual world accounts, to retrieve a separate selection of inventory items from each of the plurality of virtual world accounts. The virtual lobby client renders an inventory directory index of each separate selection of inventory items collectively within a single lobby interface of the virtual lobby client with at least one selectable option for managing each of the items in the inventory directory from the single lobby interface. The virtual lobby client renders, within the single lobby interface, a separate graphical portal from among a plurality of graphical portals for each of the plurality of virtual accounts, wherein entry of each of the separate graphical portals from the single lobby interface triggers the virtual lobby client to automatically open a virtual world specific interface window into a particular virtual world instance from among the plurality of virtual world instances provided under the particular virtual world account associated with the entered graphical portal. | 12-30-2010 |
20110010270 | CONTROLLING AND USING VIRTUAL UNIVERSE WISH LISTS - Described herein are processes and devices that control and use virtual universe wish lists. One of the devices described is a virtual wish list device. The virtual wish list device determines an item in a virtual universe that is a desired by an avatar. The virtual wish list device designates the item as a desired item in a wish list. The wish list may be stored in the avatar's virtual universe inventory. The wish list device determines details about the desired item, such as whether the item is desired in the virtual universe or in the real world. The wish list device stores the details about the desired item in the wish list. The virtual wish list device may use the details to conduct transactions related to the desired item. | 01-13-2011 |
20110010309 | INTELLECTUAL PROPERTY ASSESSMENTS BASED ON COMPONENT BUSINESS MODELS - An embodiment of the invention provides a method for IP assessment based on a component business model (CBM). The method assesses components in the CBM via a component assessment module, which interrogates an entity (e.g., a user, a third party consultant, and an information database) with questions. Output (including answers to the questions) from the component assessment module is sent to a component detection module. Scores (e.g., numerical scores and/or low, medium, or high scores) are assigned to the components via the component detection module based on the output from the component assessment module. The output from the component assessment module and/or the scores are analyzed to determine whether a gap, a duplication, a conflict, and/or an over-investment exists in at least one of the components. | 01-13-2011 |
20110010636 | SPECIFICATION OF A CHARACTERISTIC OF A VIRTUAL UNIVERSE ESTABLISHMENT - An approach that provides personalized control of a characteristic of a virtual universe establishment is described. In one embodiment, there is a virtual universe establishment characteristics control tool that comprises an establishment characteristic preference component configured to receive from a visiting resident a specified establishment characteristic preference for interacting with the virtual universe establishment. The virtual universe establishment characteristics control tool further comprises an establishment characteristic change component configured to change the establishment characteristic of the virtual universe establishment in accordance with the received establishment characteristic preference. | 01-13-2011 |
20110026828 | ENHANCED SCREEN CAPTURE FOR FORM MANIPULATION - According to one embodiment of the present invention, a method for processing forms based on an image is presented. A form is captured in an image, and a number of field values within the form in the image are detected. The number of field values is stored in the image metadata | 02-03-2011 |
20110054918 | PREVENTING PROPAGATION OF MALICIOUS CONTENT IN A VIRTUAL UNIVERSE - An invention for preventing propagation of malicious content within a virtual universe is provided. In one embodiment, a malicious content propagation prevention tool provides this capability. The malicious content propagation prevention tool includes a scanning component configured to scan a plurality of inventory items within a virtual universe. An identification component is configured to identify a set of malicious inventory from the plurality of inventory items. The malicious content propagation prevention tool further comprises an assurance component configured to prevent propagation of malicious content within the virtual universe by performing at least one of the following: isolating the set of malicious inventory items, and modifying a malicious behavior caused by the set of malicious inventory items. | 03-03-2011 |
20110055726 | PROVIDING ALTERNATIVE REPRESENTATIONS OF VIRTUAL CONTENT IN A VIRTUAL UNIVERSE - An invention for automatically reducing a load on a server functioning with a virtual universe is provided. In one embodiment, there is an alternative representation tool, including a detection component configured to detect a load on a server, and a determination component configured to determine whether the load on the server exceeds a predefined threshold. The alternative representation tool further comprises a rendering component configured to provide an alternative representation of a virtual content renderable in the virtual universe to reduce the load on the server in the case that the load on the server exceeds the predefined threshold. | 03-03-2011 |
20110055733 | System and Method for Locating Missing Items in a Virtual Universe - The present invention provides a system and method for tagging Virtual Universe items as owned by a particular user and to use such tags to enable users and/or system administrators to locate lost or stolen items in a Virtual Universe. When items identified are located, the user/owners may be notified of the location or missing items; alternatively, the items may be automatically returned to the user/owners' inventories. By enabling differentiation between items that may be lost, stolen, or left intentionally in a Virtual Universe, the present invention addresses difficulties that may arise in managing the various items that populate a Virtual Universe, especially as a Virtual Universe expands or as Multiple Virtual Universes expand and partner with additional Virtual Universes. | 03-03-2011 |
20110055919 | System and Method for the Designation of Items in a Virtual Universe - The present invention enables items in a Virtual Universe to be tagged as available for pickup by one or more designated users. The present invention permits a designated user to be alerted that there is an item designated for that user/avatar and available for pick-up at a location in the Virtual Universe. A user may designate another user (or user's avatar), for example, a minor for whom the designating user has responsibility, as an “item” to be tracked. For privacy and other reasons, this and other features may be implemented on an opt-in basis. | 03-03-2011 |
20110055927 | UPDATING ASSETS RENDERED IN A VIRTUAL WORLD ENVIRONMENT BASED ON DETECTED USER INTERACTIONS IN ANOTHER WORLD - A virtual world controller receives an identifier of a detected interaction by a user within another world, separate from a particular virtual world environment accessible by the user, from a device that detects and reports user interactions within the other world. The virtual world controller identifies at least one particular trigger tag name assigned to the identifier of the detected interaction from among a plurality of separate detectable user interactions in a trigger tag database. The virtual world controller identifies at least one particular asset class from among a plurality of asset classes specified with the particular trigger tag name within a particular trigger asset coupling from among at least one trigger asset coupling in a trigger asset coupling database. The virtual world controller accesses at least one particular asset assigned to the at least one particular asset class in an asset class database. The virtual world controller renders the at least one particular asset within the particular virtual world environment in a virtual location within the particular virtual world triggered by the particular trigger asset coupling. | 03-03-2011 |
20110078170 | Routing a Teleportation Request Based on Compatibility with User Contexts - A teleportation proxy and teleportation proxy service which monitors the usage of a networked computer or terminal to determine contextual metadata for a user reflecting current usage of the networked computer or terminal. A search engine then searches metadata of virtual universe locations in accordance with at least a portion of said contextual metadata and candidate matches are compared against the contextual metadata to determine suggested teleportation destinations in a virtual universe. | 03-31-2011 |
20110131226 | SYSTEM AND METHOD FOR ABSTRACTION OF OBJECTS FOR CROSS VIRTUAL UNIVERSE DEPOLYMENT - A system and method for abstracting objects in a virtual universe (VU) deployment is provided. The system and method abstracts VU objects for editing in a common abstraction utility and for deploying to one or more VU grids containing one or more VU architectures and/or platforms (servers). The method can be implemented in a computer infrastructure having programming instructions operable to: obtain an object associated with a first virtual universe server; translate the object with syntax specific to at least a second virtual universe server, the syntax being different than that used with the first virtual universe server; and deploy the translated object to the second virtual universe server. | 06-02-2011 |
20110137999 | TAGGING COMMUNICATION FILES BASED ON HISTORICAL ASSOCIATION OF TAGS - To associate an email with a tag, an email client may receive a tag corresponding to an email attribute, wherein the email attribute is an historical email tag. The email client stores the tag to a record keyed by the email attribute, and receives an email tag request, the email tag request having a word attribute, and looks up at least one record based on the word attribute to find the tag. The email client presents the tag of the at least one record to a user. The email client receives a user selection of the tag to form a selected tag, and sends an email having the selected tag as part of the email header, wherein the email comprises the email tag request. | 06-09-2011 |
20110138000 | APPLYING TAGS FROM COMMUNICATION FILES TO USERS - A method, data processing system, and computer program product for associating tags with a person or user. A computer receives a communication file. The computer determines a tag for the communication file to form a communication file association of the tag with the communication file. The computer identifies contact information for a user from the communication file. The computer forms a user association between the user and the tag. | 06-09-2011 |
20110167173 | Optimal Compression Process Selection Methods - A mechanism for determining an optimal compression technique for each data file when creating a computer archive file from a set of data files. A local archiving application receives an instruction to archive a set of data files and determines the file type and size of a data file in the set of data files. An optimal compression method for the data file is selected based on the file type and size of the data file. The archiving application compresses the data file using the optimal compression method. The archiving application updates meta data associated with the compressed file to include a meta compression format identifier of the optimal compression method used to compress the data file. The archiving application then repeats the determining, selecting, compressing, and updating for each data file in the set of data files to create an archive of the set of data files. | 07-07-2011 |
20110225276 | ENVIRONMENTALLY SUSTAINABLE COMPUTING IN A DISTRIBUTED COMPUTER NETWORK - Implementation of environmentally sustainable computing in a distributed computer network is provided. A method includes receiving a request from a node in the network to perform a computational task and identifying nodes in the network having resources to facilitate performance of the task. Using an environmental impact rating for each of the identified nodes, selecting one or more transmission paths in the network and/or at least one of the identified nodes to facilitate performance of the task based on corresponding environmental impact ratings and applied performance efficiency criteria. Selected identified nodes represent those having the lowest environmental impact rating while meeting the applied performance efficiency criteria. The method further includes executing the task on the node via the transmission paths and/or selected identified nodes. | 09-15-2011 |
20110225593 | INTERFACE-BASED ENVIRONMENTALLY SUSTAINABLE COMPUTING - Implementation of interface-based environmentally sustainable computing is provided. A method includes retrieving usage characteristics of a process scheduled to execute on a computer system and determining an environmental impact of the process on the computer system by mapping the usage characteristics of the process to corresponding environmental costs of the usage characteristics. The method also includes implementing an action on the computer system in response to the environmental impact. The actions are pre-configured for administration based upon a threshold level of environmental impact associated with the process and/or user selection. | 09-15-2011 |
20110252366 | DISCRIMINATING AMONG RESOURCES TO SHARE - An activity tracker defines a context for a screen sharing session, wherein the context includes at least one term of metadata. The activity tracker establishes a shared link to a second computer, comprising authenticating the second computer. The activity tracker shares at least a first resource rendered by a first application, wherein the first application renders data of the first resource. The activity tracker receives a preliminary user input to access a second resource, wherein the preliminary user input to access is a command to render a resource. The activity tracker or sharing controller renders the second resource to form a rendered second resource, wherein a computer environment comprises the first resource and the second resource. The activity tracker determines that the second resource fails to satisfy the context. | 10-13-2011 |
20120007794 | FEEDBACK MECHANISM - A feedback application may be executing on a data processing system to transmit a screen update to at least two computers. The feedback application receives an indication of completion from a first computer, in response to transmitting the screen update. The feedback application updates a completion gauge to indicate a partial completion among participants, in response to receiving the indication of completion from the first computer. The feedback application receives a second indication of completion from a second computer, in response to transmitting the screen update. The feedback application updates the completion gauge to indicate a completion among participants, in response to receiving the indication of completion from the second computer. | 01-12-2012 |
20120011451 | SELECTIVE SCREEN SHARING - A privilege discriminator selects a first user to be in a first group of participants to participate in a screen sharing session. The privilege discriminator selects at least one second user to be in a second group of participants to participate in a screen sharing session. The privilege discriminator selects a first screen region for sharing to at least the first group of participants and selects a second screen region for sharing only to the second group of participants. The privilege discriminator shares the first screen region with at least the first group of participants, wherein the sharing is selecting a device authenticated as being used by one of the first group of participants. The presentation privilege discriminator sharing the second screen region with only the second group, based on selecting the second screen region and selecting the second group, excludes the first group from receiving the second screen region. | 01-12-2012 |
20120030341 | Transparent Header Modification for Reducing Serving Load Based on Current and Projected Usage - A method and system for dynamically altering the delivery of web content to end users based on server load. Responsive to receiving a client request for web content, utilization metrics are collected from each device involved in delivering the web content. A device load level is determined for each device based on the utilization metrics, a system load level is determined for a subset of the devices having the same device type based on the device load levels, and a service level to provide to the client is determined based on the system load level. The request header is modified to specify the service level to provide to the client, wherein the service level indicates the web content variant to deliver. The request is sent with the modified header to a selected device which serves the web content according to the service level to the client. | 02-02-2012 |
20120066290 | CLIENT/SUBSCRIBER ROTATION FOR SERVER RESILIENCY - A computer implemented method, system, and computer program product for managing client connections to a server among a plurality of clients. A messaging server detects, by a first server, an attribute of a client connection that exceeds a threshold, wherein the attribute is a select write operation. The messaging server selects a client that connects to a server, responsive to detecting the attribute of the client exceeding the threshold of select write calls. The messaging server selects a connect mechanism of a second server, responsive to selecting the client. The messaging server transmits a migrate message to the client, the migrate message comprising at least a uniform resource identifier (URI). | 03-15-2012 |
20120079477 | Applying Social Computing Paradigm to Software Installation and Configuration - A method for installation and configuration of a software product includes installing a software product and determining configuration settings of the software product based upon a social network of peers. A system for installation and configuration of at least one software product includes at least one client install package capable of utilizing a social network for at least one of installing software; transmitting configuration settings; transmitting post-installation configuration settings; or responding to post-installation configuration modifications; and a server that stores and aggregates the configuration settings of a plurality of users, forming at least one social network. | 03-29-2012 |
20120124562 | Application Programming Interface Naming Using Collaborative Services - A method, computer system, and computer program product for improving application programming interface naming. An alternate name is received for a target application programming interface feature from a consumer developer. In addition, an indirection to the application programming interface feature is generated based on the alternate name. Then, the indirection to the application programming interface feature is transmitted to an indirections repository. | 05-17-2012 |
20120137217 | SYSTEM AND METHOD FOR ADJUSTING INACTIVITY TIMEOUT SETTINGS ON A DISPLAY DEVICE - In general, embodiments of the invention provide an approach to proactively adjust timeout settings on a display device based on user activity. Specifically, a system and method are presented to adaptively adjust the inactivity timeout settings on a display device based on the application being used, the content being displayed on the device, and an analysis of the user's history with the application. The present invention calculates an inactivity timeout modifier which is utilized to modify the default operating system timeout value. | 05-31-2012 |
20120143960 | RELATED MESSAGE DETECTION AND INDICATION - A method, a computer program product, and a computer system for managing requests to send messages are presented. Header information associated with a set of incoming messages on a server data processing system is retrieved in response to receiving a request to send a drafted message from a client data processing system to the server data processing system. The header information is searched to determine whether an incoming message in the set of incoming messages is related to the drafted message. An indication that the incoming message is related to the drafted message is presented at the client data processing system in response to determining that the incoming message is related to the drafted message. | 06-07-2012 |
20120144317 | Social Network Relationship Mapping - Methods, systems, and computer program products are provided for social network relationship mapping. In an embodiment, a method is disclosed that includes identifying one or more terms within content displayed to a user; for each identified term: transmitting the identified term to one or more social networking servers supporting a social networking application, in response to transmitting the identified term to the social networking servers, receiving from the social networking servers a list of people that correspond with the identified term, directing a display device to display the list of people that correspond with the identified term, and in response to user input, adding an identification of a person from the list of people to a mapping clipboard; directing the display device to display a relationship graph that indicates how people identified in the mapping clipboard are connected to each other in the social networking application. | 06-07-2012 |
20120158886 | BEHAVIOR BASED CLIENT SELECTION FOR DISPARATE TREATMENT - Embodiments for server connection optimization in a persistently connected publish/subscribe environment are provided. A computer assigns an initial activity category for a client. The computer logs, into a log file, one or more select operations of a connection between a client and a first server. The computer calculates a ratio of a number of the select operations to a check time of the first server, wherein the check time is a period of time that has elapsed since a previous review of logged data. The computer sets a second activity category for the client based on a look-up of the ratio in a schedule of ratio ranges in a control file, wherein the second activity category is not the initial activity category. The computer transfers the client from the first server to a second server, in response to setting the second activity category. | 06-21-2012 |
20120166035 | DETECTION OF VEHICLE OPERATION UNDER ADVERSE CONDITIONS - Details relating to the operation of a vehicle under adverse conditions are recorded and collected. This data is particularly useful to forestall catastrophic failures, and to provide valuable information for potential buyers of used vehicles. Among the operating conditions that are considered are high levels of air contaminants, operation in extreme hot or cold temperatures, hauling heavy loads, as well as hard braking, turning and acceleration. In addition to the detection and recording of data, prorated maintenance schedules are recalculated and adjusted to accommodate for the operation of the vehicle under these adverse or less than ideal conditions. Typically, the data is stored in the on-board computers present in most vehicles. Periodic off loading of the data to the dealer and service providers is also provided. | 06-28-2012 |
20120174235 | DETECTING A PHISHING ENTITY IN A VIRTUAL UNIVERSE - An invention for detecting a phishing virtual entity in a virtual universe is disclosed. A virtual entity may be registered as authentic and be identified with multiple physical characteristics thereof. Another virtual entity will be monitored to detect whether it includes a physical characteristic that is sufficiently similar to that of a registered virtual entity to cause confusion. A phishing virtual entity is detected based on the monitoring and phishing prevention processes may be implemented on the phishing virtual entity. | 07-05-2012 |
20120179331 | MECHANIC CERTIFICATION TRACKING VALIDATION - Embodiments receive information indicative of a certification of a mechanic performing a service on a vehicle, and responsively determine whether the certification is validated. If validated, service on the vehicle by the mechanic is facilitated by placing the vehicle in a service state and generates a signal that causes an unlocking of a vehicle door, hood, or trunk. If not validated, service on the vehicle is inhibited by disabling a vehicle electrical sub-system and generating a signal that causes a locking of the vehicle door, hood, or trunk, wherein a vehicle owner authorization of the mechanic may supersede and facilitate service by instead placing the vehicle in a service state for executing diagnostic software and generating a signal that causes unlocking of the vehicle door, hood, or trunk. | 07-12-2012 |
20120198489 | DETECTING FRAUD USING SET-TOP BOX INTERACTION BEHAVIOR - A processor can receive user interaction data indicative of interactions between a user and a set-top box device. The processor can compare a behavior pattern in the received user interaction data and a behavior pattern in previously stored data contained within a user profile for a human. The processor can generate a score indicative of a likelihood that the behavior pattern in the received data matches the behavior pattern in the previously stored data. Responsive to the generated score being below a threshold, the processor can generate an indication of a possible fraudulent action due to the user having a high likelihood of not being the human. | 08-02-2012 |
20120198491 | TRANSPARENTLY VERIFIYING USER IDENTITY DURING AN E-COMMERCE SESSION USING SET-TOP BOX INTERACTION BEHAVIOR - A set-top box device can detect a user interaction associated with a remote control proximate to the set-top box device. The set-top box device can store the user interaction within a storage device as user interaction data. The set-top box device can convey the user interaction data to a remotely located server. The set-top box device can receive a response from the remotely located server indicating that a behavior pattern in the interaction data is substantially equivalent to a behavior pattern in previously stored interaction data of a behavior profile. The response can verify the identity of the user. | 08-02-2012 |
20120204257 | DETECTING FRAUD USING TOUCHSCREEN INTERACTION BEHAVIOR - A processor can receive data indicative of interactions between a user and a touchscreen-equipped electronic device. The processor can compare a behavior pattern in the received data and a behavior pattern in previously stored data contained within a user profile for a human. The processor can generate a score indicative of a likelihood that the behavior pattern in the received data matches the behavior pattern in the previously stored data. Responsive to the generated score being below a threshold, the processor can generate an indication of a possible fraudulent action due to the user having a high likelihood of not being the human. | 08-09-2012 |
20120209451 | CONTROLLING VEHICLE OPERATIONS BASED ON OBJECT PRESENCE - Operation of a vehicle is controlled based on the presence of or absence of one or more identified foreign objects within one or more monitored zones about the vehicle. One or more transceivers receive information about the one or more foreign objects. Based on the received information and the one or more corresponding zones, one or more controllers identify a response, which may include notifying the user about the foreign object and/or generating a signal that inhibits the ignition from turning on. Controllers identify a response, which may include notifying a user about a present or absent object or generating a signal that inhibits the ignition from turning on. | 08-16-2012 |
20120212483 | CONTROLLING AND USING VIRTUAL UNIVERSE WISH LISTS - Described herein are examples of a virtual universe wish list as well as its control and use. Some embodiments are directed to determining a selection of an object in a virtual universe that is a desired by a user, which user is represented by a first avatar. Some embodiments are further directed to designating the object as a desired item in a wish list for the first avatar. The wish list may be stored in the avatar's virtual universe inventory. Some embodiments are further directed to determining a second avatar in the virtual universe that possesses an instance of the virtual object. Some embodiments are further directed to generating an advertisement to obtain the instance of the virtual object from the second avatar on behalf of the first avatar. | 08-23-2012 |
20120221194 | TRACKING VEHICLE MAINTENANCE USING SENSOR DETECTION - Radio frequency identification is used in cooperation with the computer system aboard a motor vehicle to track service and maintenance activities relating to the vehicle. Each component or part of the vehicle that may require maintenance is provided with a unique passive identification tag. The output data from the tag is read by a reader placed in proximity to the tag, and the data is transmitted to an on-board computer module where it is processed, and the service record is updated. A data stream converter may be used to process the information read by the reader into a format that is acceptable to the on-board computer. The data from the on-board computer is stored in a device external to the computer. Provisions are included for notification to the user, the auto dealer or service other agency as needed. | 08-30-2012 |
20120246008 | IMPLEMENTING COMPUTER INTERACTION RESPONSE TESTS - Embodiments of the present invention provide an approach for enhancing computer interaction challenge-response tests (e.g., Completely Automatic Public Turing Test to Tell Computers and Humans Apart, or CAPTCHA). Furthermore, embodiments of the present invention provide an approach for introducing advertising in such challenge-response tests, such that users are presented with opportunities to learn about or reinforce brands. In a typical embodiment, when a user attempts to access content (e.g., web content), the user will be presented with a CAPTCHA test. The CAPTCHA test typically includes an advertisement (e.g., logo, label, etc.) and an associated question for the user to answer. Along these lines, the advertisement is generally selected based on the user's demographics (e.g., interests, gender, age, etc.). If the user successfully responds to the question and/or responds within a certain amount of time, a reward can be determined (e.g., access to the content, preferred placement in a queue for computing resources, etc.). In one embodiment, a cumulative points total can be maintained for the user based on cumulative responses to CAPTCHA tests. In this embodiment, the CAPTCHA tests presented to the user can have increasing levels of difficulty with corresponding rewards. | 09-27-2012 |
20120297453 | SYSTEM AND METHOD FOR ABSTRACTION OF OBJECTS FOR CROSS VIRTUAL UNIVERSE DEPLOYMENT - A system and method for abstracting objects in a virtual universe (VU) deployment is provided. The system and method abstracts VU objects for editing in a common abstraction utility and for deploying to one or more VU grids containing one or more VU architectures and/or platforms (servers). The method can be implemented in a computer infrastructure having programming instructions operable to: obtain an object associated with a first virtual universe server; translate the object with syntax specific to at least a second virtual universe server, the syntax being different than that used with the first virtual universe server; and deploy the translated object to the second virtual universe server. | 11-22-2012 |
20120311464 | System and Method for Virtual Environment Preservation Based on Automated Item Reduction - A method implemented in a computer infrastructure having computer executable code, includes detecting one of an absence of a virtual universe (VU) occurrence in a VU within a predetermined time period, a special event in the VU and a change of real world status from a previous real world status. Additionally, the method includes determining a VU asset of a VU resident relevant to the VU occurrence, the special event or the previous real world status. Further, the method includes performing an automated asset reduction of the VU asset based on the determining. | 12-06-2012 |
20120314886 | MODIFICATIONS OF AUDIO COMMUNICATIONS IN AN ONLINE ENVIRONMENT - A system and method to modify audio communications in an online environment and, in particular, to modifying audio communications using one or more parameters. The system includes a module configured to detect one or more parameters applicable to an incoming audio communication and a weighing engine configured to weigh the one or more parameters and obtain a weighted volume. The system further includes a module configured to transmit the weighted volume to a user participating in a virtual universe. The method determines whether one or more parameters apply to an incoming communication, weighs the incoming communication based on the one or more parameters to determine a weighted volume of the incoming communication, and transmits the incoming communication to a user at the weighted volume. | 12-13-2012 |
20120323736 | ALLOCATING VIRTUAL UNIVERSE CUSTOMER SERVICE - Virtual universe customer service representatives are cloned and assigned as a function of observing customer behavior, retrieving historical data and creating a customer profile. Preferential subavatar assignment parameters are determined for a customer as a function of the customer profile, choosing a subavatar from a plurality of subavatars as a function of a correlation of a subavatar performance characteristic with the preferential subavatar assignment parameter and a store objective, and the clone is populated with the chosen subavatar. Choosing a subavatar may comprise preferentially rating subavatars and determining an appropriateness threshold as a function of the subavatar assignment parameter, the performance characteristics and the store objective. Some embodiments reset a threshold in response to time-in-queue or to repetitively observing customer behavior, retrieving customer data, determining a subavatar assignment parameter and choosing a highest-rated available subavatar meeting a revised threshold. Subavatars may comprise automated, customer service representative-controlled and jointly-controlled subavatars. | 12-20-2012 |
20120331414 | ARRANGEMENTS OF TEXT TYPE-AHEAD - A method and system of text entry. An attribute of text entered by a user into an application is determined. The entered text is matched to a single portion of each attribute segment of one or more indexed segments of text, based upon a determined attribute of each attribute segment and the determined attribute of the entered text. Each attribute segment consists of the single portion and a remaining portion. After the entered text is matched to a single portion of each attribute segment, a selection of a single attribute segment selected from the one or more indexed segments of text by the user is received. The remaining portion of the selected single attribute segment is entered into the application. | 12-27-2012 |
20120331541 | SYSTEMS, METHODS, AND MEDIA FOR FIREWALL CONTROL VIA REMOTE SYSTEM INFORMATION - A method and system for controlling a firewall for a user computer system. One or more processors of the user computer system receive a control request to control a program of the user computer system by the firewall. The control request includes a condition pertaining to at least one process of a remote computer system. The at least one process is configured to be executed on the remote computer system. The firewall protects the user computer system from external threats. The processors store a remote system condition associated with the program of the user computer system. The remote system condition includes the condition pertaining to the at least one process. The processors ascertain whether the remote system condition is satisfied. The processors direct the firewall to block or allow the transmission of data if it is ascertained that the remote system condition is not satisfied or satisfied, respectively. | 12-27-2012 |
20130006465 | TRACKING VEHICLE MAINTENANCE USING SENSOR DETECTION - Radio frequency identification is used in cooperation with the computer system aboard a motor vehicle to track service and maintenance activities relating to the vehicle. Each component or part of the vehicle that may require maintenance is provided with a unique passive identification tag. The output data from the tag is read by a reader placed in proximity to the tag, and the data is transmitted to an on-board computer module where it is processed, and the service record is updated. A data stream converter may be used to process the information read by the reader into a format that is acceptable to the on-board computer. The data from the on-board computer is stored in a device external to the computer. Provisions are included for notification to the user, the auto dealer or service other agency as needed. | 01-03-2013 |
20130014034 | MANAGING MULTIPLE VIRTUAL WORLD ACCOUNTS FROM A SINGLE VIRTUAL LOBBY INTERFACE - A virtual lobby client automatically interfaces with multiple virtual world instances, each provided by a separate virtual world provider from among multiple virtual world providers, each interfaced with to access a separate virtual world account, to retrieve a separate selection of inventory items from each virtual world account. The virtual lobby client renders an inventory directory index of each separate selection of inventory items within a single lobby interface with at least one selectable option for managing each of the items in the inventory directory from the single lobby interface. The virtual lobby client renders, within the single lobby interface, a separate graphical portal for each virtual account, wherein entry of each of the separate graphical portals triggers the virtual lobby client to automatically open a virtual world specific interface window into a particular virtual world instance provided under the particular virtual world account associated with the entered graphical portal. | 01-10-2013 |
20130018579 | PICTORIAL NAVIGATION - Pictorial information is provided relevant to a geographic location through selecting characteristics relevant to geographic locations, searching pictorial image databases for images having an embedded tags associated with the characteristics, retrieving image files from databases having embedded tags correlated to characteristics and visually depicting a physical appearance or an attribute of a location, analyzing characteristics image files and responsively selecting preferred image data, formatting preferred image data for presentation to a traveler, associating formatted preferred data with geographic locations, and presenting associated formatted data to the traveler in association with geographic locations. Characteristics include global positioning satellite coordinates. Image data may be selected having preferred image resolutions or perspectives. Formatting pictorial information may comprise synthesizing photographs into a constructs. Associated image data may indicate a distance and direction from a geographic location. Routing system applications are enabled to present pictorial information with navigation route points. | 01-17-2013 |
20130061157 | UPDATING ASSETS RENDERED IN A VIRTUAL WORLD ENVIRONMENT BASED ON DETECTED USER INTERACTIONS IN ANOTHER WORLD - A controller receives an identifier of a detected interaction by a user within another world, separate from a virtual world environment accessible by the user, from a device that detects and reports user interactions within the other world. The controller identifies at least one trigger tag name assigned to the identifier of the detected interaction from among separate detectable user interactions in a trigger tag database. The controller identifies at least one asset class from among asset classes specified with the trigger tag name within a particular trigger asset coupling in a trigger asset coupling database. The controller accesses at least one asset assigned to the at least one asset class in an asset class database. The controller renders the at least one asset within the virtual world environment in a virtual location within the virtual world triggered by the particular trigger asset coupling. | 03-07-2013 |
20130167064 | SELF-ADAPTING KEYPAD - A method, apparatus and computer-usable medium for implementing a virtual keyboard for use with small input devices. A circular keyboard can be graphically displayed, in response to a user input by a user via a small input device. A circular and centrally located key can be graphically located and displayed within the center of the circular keyboard, wherein character keys radiate outward from the centrally located key (i.e., the “central key”). Character keys that are most commonly utilized by the user are preferably located closed to the circular and centrally located key within the circular keyboard. Character keys least commonly utilized by the user are preferably located at the edges of the keyboard, thereby permitting the circular keyboard to function as a self-adapting virtual keyboard for use with small input devices based on the usage of the keyboard by the user. | 06-27-2013 |
20130174002 | Database Field Extraction for Contextual Collaboration - In a method for automated hyperlinking, a computer receives user input specifying a set of character sequence columns in a table to use for character sequence comparison. The computer detects whether a character sequence entered into an electronic communication in a user interface on a display matches one or more character sequences in fields of the set of character sequence columns. Responsive to the character sequence matching a single character sequence of the one or more character sequences in the fields of the set of character sequence columns, the computer retrieves, from an associated link field in the table, a hyperlink associated with the single character sequence. The computer inserts the hyperlink into the electronic communication. | 07-04-2013 |
20130179278 | SYSTEM AND METHOD FOR ITEM INQUIRY AND INFORMATION PRESENTATION VIA STANDARD COMMUNICATION PATHS - A method and system is provided for item inquiry and information presentation via standard communication paths. More particularly, the method and system detects an item associated with an avatar of a virtual universe (VU) user in a VU and determine information associated with the item. Additionally, the method and system are operable to display the information in the VU in a high-resolution component of the VU. | 07-11-2013 |
20130204920 | TRANSFERRING SESSION DATA BETWEEN NETWORK APPLICATIONS - In a method for transferring session data from a first application accessible via at least one DNS name in a first DNS domain to a second application accessible via at least one DNS name in a second DNS domain, a computer receives via the first application a first HTTP request from an HTTP client, and in response, the computer establishes a first session with the HTTP client. The computer receives, from the HTTP client, a second HTTP request comprising an identifier of the second application, and in response, the computer stores in a memory a data structure identifiable by a data structure identifier and containing data pertaining to the first session. Responsive to storing the data structure, the computer transmits, to the HTTP client, an HTTP response comprising the data structure identifier, a redirection status code, and a URI comprising a DNS name in the second DNS domain. | 08-08-2013 |
20130247059 | CALCULATING AND COMMUNICATING LEVEL OF CARBON OFFSETTING REQUIRED TO COMPENSATE FOR PERFORMING A COMPUTING TASK - During performance of a specified computing task data concerning resource consumption regarding that specified computing task is gathered and stored. Upon completion of the specified computing task, the amount of carbon offset required to compensate for resource consumption associated with performance of the completed specified computing task is calculated based upon stored or known resource consumption data. The calculated amount of carbon offset information may be transmitted to a carbon offset function provider, and a carbon offset function provider implements the specified amount of carbon offset based upon the calculated amounts communicated for the completed specified computing task. | 09-19-2013 |
20130254043 | CONTROLLING AND USING VIRTUAL UNIVERSE WISH LISTS - Described herein are examples of a virtual universe wish list as well as its control and use. Some embodiments are directed to determining a selection of an object in a virtual universe that is a desired by a user, which user is represented by a first avatar. Some embodiments are further directed to designating the object as a desired item in a wish list for the first avatar. The wish list may be stored in the avatar's virtual universe inventory. Some embodiments are further directed to determining a second avatar in the virtual universe that possesses an instance of the virtual object. Some embodiments are further directed to generating an advertisement to obtain the instance of the virtual object from the second avatar on behalf of the first avatar. | 09-26-2013 |
20130254336 | SYSTEM AND METHOD FOR ABSTRACTION OF OBJECTS FOR CROSS VIRTUAL UNIVERSE DEPLOYMENT - A system and method for abstracting objects in a virtual universe (VU) deployment is provided. The system and method abstracts VU objects for editing in a common abstraction utility and for deploying to one or more VU grids containing one or more VU architectures and/or platforms (servers). The method can be implemented in a computer infrastructure having programming instructions operable to: obtain an object associated with a first virtual universe server; translate the object with syntax specific to at least a second virtual universe server, the syntax being different than that used with the first virtual universe server; and deploy the translated object to the second virtual universe server. | 09-26-2013 |
20130263111 | Applying Social Computing Paradigm to Software Installation and Configuration - A method for installation and configuration of a software product includes installing a software product and determining configuration settings of the software product based upon a social network of peers. A system for installation and configuration of at least one software product includes at least one client install package capable of utilizing a social network for at least one of installing software; transmitting configuration settings; transmitting post-installation configuration settings; or responding to post-installation configuration modifications; and a server that stores and aggregates the configuration settings of a plurality of users, forming at least one social network. | 10-03-2013 |
20130283150 | PROVIDING ARCHIVED WEB PAGE CONTENT IN PLACE OF CURRENT WEB PAGE CONTENT - In accordance with the present disclosure a user can return to a previously viewed/archived version of a web-page when the content of the currently available webpage is different from the archived content. To facilitate such an interaction, a browser can archive displayed versions of web pages and their network address and when a user makes new request for the web page, the browser can determine that there is an archived version with the requested network address. When an archived version of the web page exists, the browser can prompt the user to determine if the user wants to “re-display” the contents of a previously displayed web page or if the user wants to display the current contents provided by the website server. | 10-24-2013 |
20130283191 | GEOMETRIC AND TEXTURE MODIFICATIONS OF OBJECTS IN A VIRTUAL UNIVERSE BASED ON REAL WORLD USER CHARACTERISTICS - A computer implemented method, apparatus, and computer usable program product modify objects in a virtual universe. The virtual universe includes a viewable field, a detection area that is adjacent to the viewable field, and an outside area that is outside the viewable field and the detection area. Each avatar in a set of avatars is incapable of viewing the objects while the avatar is within either the detection area or the outside area. In response to an entrance of a first particular avatar of the set of avatars into the detection area, one of the objects is prepared for display to the first particular avatar of the set of avatars, without displaying, by buffering content associated with the one of the objects. If a particular one of the objects is determined to be adjacent to an obstructing one of the objects, a focal point of the viewable field is set at a location that is a different location than a location of the particular one of the objects. | 10-24-2013 |
20130305134 | ENHANCED SCREEN CAPTURE FOR FORM MANIPULATION - Processing a form in an image is provided. A plurality of data fields is detected within the form in the image. One or more of the data fields that contain private data and a plurality of the data fields that do not contain private data are detected. Contents of the plurality of data fields that do not contain private data are stored as metadata for the image and contents of the one or more data fields that contain private data are not stored as metadata for the image. | 11-14-2013 |
20130339365 | INTEGRATED DEVELOPMENT ENVIRONMENT-BASED REPOSITORY SEARCHING IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for integrated development environment (IDE)-based repository searching (e.g., for library elements such as classes and/or functions) in a networked computing environment. In a typical embodiment, a first program code file is received from a first integrated development environment (IDE). The first program file may be associated with a set of attributes as stored in an annotation, header, or the like. Regardless, the first program file may be parsed and indexed into a repository based on the set of attributes. A search request may then be received from a second IDE. Based on the search request and the set of attributes, a matching program code file may then be identified as stored in the repository. Once identified, the matching program code file may be transmitted/communicated to the second IDE to fulfill the search request. | 12-19-2013 |
20130339920 | INSTANTIATING A CODING COMPETITION TO DEVELOP A PROGRAM MODULE IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention relate to the instantiation of a coding competition to address problems in program modules. In a typical embodiment, a first annotation will be detected in a program code file having a set of program modules. The first annotation generally indicates a need for a functionality associated with at least one program module of the set of program modules. Responsive to a lack of an existing library comprising the solution, an indication to instantiate a coding competition among a set of developers will be received to provide the solution. In response to the indication, a second annotation will be inserted into the program code file. The coding competition may then be instantiated to identify a set of developer libraries having a potential to provide the solution. Based on the coding competition, the solution may then be identified and implemented. | 12-19-2013 |
20140018061 | ROUTE NAVIGATION FOR OPTIMAL MOBILE COVERAGE - A utility within a mobile device or other device computes and provides an optimal mobile coverage route. The device receives a stating point/location and a destination point/location. The mobile device downloads a provider's mobile coverage information, accesses historical data stored by the mobile device, and obtains user feedback from the provider. The optimal mobile coverage route is then computed at the device, and the optimal mobile coverage route is provided via one of the following: a web site, or a text message (SMS) to, a voice operated feed, or any direct feed to the user of the mobile device. The computed optimal mobile coverage route is then used by the user of the mobile device when communicating with another mobile device while travelling from the starting point to the end point. | 01-16-2014 |
20140019567 | On Demand Email Response - An improvement to an electronic mail program is disclosed. In particular, the improved electronic mail program enables a user to mark individual action items within a message and set attributes for each action item. In the preferred embodiment, attributes include priority, deadline, abstract, and responsibility. The electronic mail program stores the action items and associated attributes in a database and sends the message to one or more recipients. The electronic mail program then displays the message and action items to the recipients. Message recipients then navigate through the list of action items to read descriptions and to determine the priority and nature of the actions necessary. The responsibility attribute further indicates which recipient should respond to the action item. The improved electronic mail program updates the status of each action item in the database as recipients respond. | 01-16-2014 |
20140026082 | METHOD AND SYSTEM FOR PREDICTIVE BROWSING - A method for automatically navigating potential websites for predictive browsing based on user activities along with efficiency of verifying content updates. A Uniform Resource Locator (URL) of websites and its associated attributes that a user visits can be recorded and stored in a storage engine. The potential sites can be predicted by a predictive engine component based upon a past browsing history and various environmental factors that are recorded in the storage engine. A dynamic content detection engine component examines each potential websites and detects if the site has been updated. The predictive engine enables the user to navigate to the potential websites thereby permitting the user to browse websites faster. | 01-23-2014 |
20140040782 | VIRTUAL UNIVERSE DESKTOP EXPLORATION FOR RESOURCE ACQUISITION - The present invention is directed to a system, method and program product that allows a user to acquire resources from a local computer during a session with a virtual universe. Disclosed is a system that allows a user to: invocate a local operating system session that displays an operating system interface onto a client computer during a virtual universe session; navigate the operating system interface using an avatar; and acquire resources from the client computer via the operating system interface using the avatar. | 02-06-2014 |
20140067560 | SYSTEM AND METHOD FOR ITEM INQUIRY AND INFORMATION PRESENTATION VIA STANDARD COMMUNICATION PATHS - A method and system is provided for item inquiry and information presentation via standard communication paths. More particularly, the method and system detects an item associated with an avatar of a virtual universe (VU) user in a VU and determine information associated with the item. Additionally, the method and system are operable to display the information in the VU in a high-resolution component of the VU. | 03-06-2014 |
20140068730 | AUTHENTICATION BASED ON PREVIOUS AUTHENTICATIONS - A method and system for authenticating a user to a target server. A request is received from a user computer system to authenticate the user for access to a target server at level N of N levels (N≧2). Each record of a stored authentication plan associated with the user has authentication records each having expected information relating to authentication of the user for access to the N−1 target servers at respective levels 1 through N−1. Each record of a received current authentication plan for the user has authentication records each having current information relating to authentication of the user for access to the N−1 target servers at respective levels 1 through N−1. It is determined that that there is at least a partial match between the stored and current authentication plans, and in response, the user is authenticated for access to the target server at level N. | 03-06-2014 |
20140099069 | ACTIVITIES DUPLICATION VIA RECORDED VIDEO - A method, system, and computer program product for activities duplication via recorded video are provided in the illustrative embodiments. A playback is performed of a video with control and input data, which includes a recording of video data of a set of activities performed on a second computer, a recording of a set of control data corresponding to the set of activities, and a recording of a set of input data corresponding to the set of activities. Control data from the set of control data is applied to the computer. Applying the control data to the computer changes a state of a process in the computer. Input data from the set of input data is applied to the computer. Applying the input data provides an attribute of the input data to the process in the computer. | 04-10-2014 |
20140118383 | DIFFERENTIAL RESOURCE APPLICATION IN VIRTUAL WORLDS BASED ON PAYMENT AND ACCOUNT OPTIONS - A system and method for enhancing the rendering of one or more objects based on payment and account options. The system includes a computer infrastructure configured to control enhancement rendering of an object in a virtual universe by providing at least one augmentation attribute to a tag of the object. The method includes providing enhancement rendering of an object in a virtual universe by augmenting the object based on a status of a user viewing the object. | 05-01-2014 |
20140137229 | PROVIDING NOTIFICATION OF SPAM AVATARS - Provided are approaches for monitoring activities, movements, and other behavior patterns necessary to determine whether an avatar is a spam advertisement. A storing mechanism stores a “black list” and a black list score consisting of a list of spam avatar identifications (UUIDs) matching avatars that have been flagged as confirmed or suspected spam advertisers. Another mechanism allows the owner to redraw or otherwise re-render a distinguishing mark when an avatar has been detected as being a spam advertiser. Yet another mechanism signals to the owner of an offending avatar that they have been added to the black list or had a report filed against them. Another mechanism allows for a black listed avatar to be removed from the black list, and scores to be decreased and for the virtual universe and users to utilize the black list and score. | 05-15-2014 |
20140149834 | WEB BROWSER ADAPTED TO INVOKER - Exemplary embodiments of the present invention disclose a method and system for configuring a web browser executing in a computer to render a web page for display at the computer. A first hyperlink request is received from a first program executing in the computer to obtain and render a first web page corresponding to the first hyperlink. In response, the web browser obtains the first web page, and renders the first web page according to a first set of web page configuration parameters. A second hyperlink request is received from a second program executing in the computer to obtain and render a second web page corresponding to the second hyperlink. In response, the web browser obtains the second web page, and renders the second web page according to a second set of web page configuration parameters that differs in part from the first set of web page configuration parameters. | 05-29-2014 |
20140165029 | REPLACING ANNOTATED PROGRAM CODE IN A NETWORKED COMPUTING ENVIRONMENT - An approach for replacing one program code library (or method(s) thereof) with another program code library (or method(s) thereof) during execution is provided. Specifically, an annotation (e.g., comprising a runtime optimization request and associated performance/measurement criteria) within a program code file will be detected, analyzed, and used to monitor/assess the performance of a running set of methods of the program code file or the like (e.g., a set of initial/original methods). As this is occurring, a set of substitute methods will be identified from a program code library (e.g., based on similarities to the original set of methods) and likewise monitored/assessed. Based on the monitored performance, one or more alternate method(s) may be substituted for the original method(s) in the program code file. Such a capability allows for methods to be evaluated during runtime, and for performance to be optimized by utilizing the highest performing methods. | 06-12-2014 |
20140165031 | PROGRAM CODE LIBRARY CONSOLIDATION IN AN INTEGRATED DEVELOPMENT ENVIRONMENT - An approach for integrated development environment (IDE)-based program code library consolidation in a networked computing environment (e.g., a cloud computing environment) is provided. Under this approach, it may be determined whether to consolidate a first set of program code libraries in an integrated development environment (IDE). The determination may be based on consolidation criteria applicable to the first set of program code libraries. Based on the determination, the first set of program code libraries may be consolidated based on a set of consolidation preferences and a set of consolidation rules to yield a second set of program code libraries. An ordered list identifying the second set of program code libraries may then be generated. | 06-12-2014 |
20140165032 | PROGRAM CODE LIBRARY SEARCHING AND SELECTION IN A NETWORKED COMPUTING ENVIRONMENT - An approach for integrated development environment (IDE)-based program code library searching and selection in multiple programming languages in a networked computing environment is provided. In a typical embodiment, a search request (e.g., to locate a desired program code library) will be received in an IDE and parsed. The search request generally includes a set of annotations corresponding to at least one of: a primary program code language of the program code library, an alternate program code language of the program code library, or a method pair associated with the program code library. A search of at least one program code library repository will then be conducted based on the set of annotations, and a set of matching results will be generated. The set of matching results may include one or more program code libraries, and may be provided to a device hosting the IDE. | 06-12-2014 |
20140165034 | PROGRAM CODE LIBRARY SELECTION IN AN INTEGRATED DEVELOPMENT ENVIRONMENT - An approach for integrated development environment (IDE)-based program code library selection in a networked computing environment (e.g., a cloud computing environment) is provided. Under this approach, a search results file is received in a library selection IDE from a library searching IDE. It may then be determined whether to perform a micro-benchmarking on the at least one method and the at least one class. Based on the determination, the micro-benchmarking may then be performed on the at least one method and the at least one class. A set of code style similarity scores may then be calculated that indicate a similarity between the at least one method and the at least one class with the methods and classes of a second program code file. An ordered list of the methods and classes of the second program code file may then be provided. | 06-12-2014 |
20140189668 | PROCESSING PROPOSED PROGRAM CODE LIBRARIES IN A NETWORKED COMPUTING ENVIRONMENT - An integrated development environment (IDE)-based approach for processing/analyzing proposed program code libraries as a replacement for existing program code libraries in a networked computing environment is provided. A set of annotations associated with a set of program code files and a proposed (e.g., new, modified, etc.) program code library are received in an integrated development environment (IDE). It may then be determined whether the proposed program code library is an excluded program code library based on the set of annotations. It may also be determined whether the proposed program code library meets one or more thresholds for replacing an existing program code library. If the proposed program code library is not excluded and meets the threshold(s), the proposed program code library may then be provided to a computer device hosting the IDE (e.g., for implementation). | 07-03-2014 |
20140208240 | UPDATING ASSETS RENDERED IN A VIRTUAL WORLD ENVIRONMENT BASED ON DETECTED USER INTERACTIONS IN ANOTHER WORLD - A virtual world controller receives an identifier of a detected interaction by a user within another world, separate from a particular virtual world environment accessible by the user, from a device that detects and reports user interactions within the other world. The virtual world controller identifies at least one particular trigger tag name assigned to the identifier of the detected interaction from among a plurality of separate detectable user interactions in a trigger tag database. The virtual world controller identifies at least one particular asset class from among a plurality of asset classes specified with the particular trigger tag name within a particular trigger asset coupling from among at least one trigger asset coupling in a trigger asset coupling database. The virtual world controller accesses at least one particular asset assigned to the at least one particular asset class in an asset class database. The virtual world controller renders the at least one particular asset within the particular virtual world environment in a virtual location within the particular virtual world triggered by the particular trigger asset coupling. | 07-24-2014 |
20140222844 | MANAGING THE STORAGE OF MEDIA CONTENT - A method for managing media storage. The method includes determining, by a computer, that storage space is needed on a storage device, wherein the storage device stores one or more media files. The method includes determining a likely viewing device for a media file selected from the one or more media files and converting the media file from a first format to a second format, based on the determined likely viewing device. | 08-07-2014 |
20140222845 | MANAGING THE STORAGE OF MEDIA CONTENT - A method for managing media storage. The method includes determining, by a computer, that storage space is needed on a storage device, wherein the storage device stores one or more media files. The method includes determining a likely viewing device for a media file selected from the one or more media files and converting the media file from a first format to a second format, based on the determined likely viewing device. | 08-07-2014 |
20140368543 | DIRECTED COMMUNICATION IN A VIRTUAL ENVIRONMENT - The present invention relates to directed communication between avatars in a virtual environment controlled by end-users from outside the virtual environment. A method in accordance with an embodiment includes: determining a relative location of a first avatar and a second avatar in a virtual environment, wherein at least one end-user of the first avatar and the second avatar wears a headset configured to track head movements thereof, wherein the head movements of the end-user translate to their avatar and influence volume of voice communication from their avatar; adjusting aspects of a voice communication between the first avatar and the second avatar based on the relative location and the track head movements; referring to a list of avatars whose audio characteristics are to be portrayed differently in a voice communication; and further adjusting the audio characteristics of one of the first avatar and the second avatar in accordance with the list. | 12-18-2014 |
20150074169 | TRANSFERRING SESSION DATA BETWEEN NETWORK APPLICATIONS - In a method for transferring session data from a first application accessible via at least one DNS name in a first DNS domain to a second application accessible via at least one DNS name in a second DNS domain, a computer receives via the first application a first HTTP request from an HTTP client, and in response, the computer establishes a first session with the HTTP client. The computer receives, from the HTTP client, a second HTTP request comprising an identifier of the second application, and in response, the computer stores in a memory a data structure identifiable by a data structure identifier and containing data pertaining to the first session. Responsive to storing the data structure, the computer transmits, to the HTTP client, an HTTP response comprising the data structure identifier, a redirection status code, and a URI comprising a DNS name in the second DNS domain. | 03-12-2015 |