摘要:
Methods, program products, services and devices are provided for protecting a protected avatar from actions of a second avatar within a virtual universe. Protection is implemented for a protected avatar from a second avatar within a virtual universe, including identifying an activity of the second avatar and disqualifying the second avatar from engaging in the identified activity within the virtual universe as a function of a relation of the identified activity to the protected avatar. A protective action is defined, associated with the identified activity and executable against the protected avatar or the second avatar. Activity of the protected avatar or the second avatar is monitored within the virtual universe for an occurrence of the identified activity, and the protective action is executed against the protected avatar or the second avatar in response to detecting the occurrence of the identified activity.
摘要:
Methods, program products, services and devices are provided for protecting a protected avatar from actions of a second avatar within a virtual universe. Protection is implemented for a protected avatar from a second avatar within a virtual universe, including identifying an activity of the second avatar and disqualifying the second avatar from engaging in the identified activity within the virtual universe as a function of a relation of the identified activity to the protected avatar. A protective action is defined, associated with the identified activity and executable against the protected avatar or the second avatar. Activity of the protected avatar or the second avatar is monitored within the virtual universe for an occurrence of the identified activity, and the protective action is executed against the protected avatar or the second avatar in response to detecting the occurrence of the identified activity.
摘要:
Methods, program products, services and devices are provided for protecting a protected avatar from actions of a second avatar within a virtual universe. Protection is implemented for a protected avatar from a second avatar within a virtual universe, including identifying an activity of the second avatar and disqualifying the second avatar from engaging in the identified activity within the virtual universe as a function of a relation of the identified activity to the protected avatar. A protective action is defined, associated with the identified activity and executable against the protected avatar or the second avatar. Activity of the protected avatar or the second avatar is monitored within the virtual universe for an occurrence of the identified activity, and the protective action is executed against the protected avatar or the second avatar in response to detecting the occurrence of the identified activity.
摘要:
Methods, program products, services and devices are provided for protecting a protected avatar from actions of a second avatar within a virtual universe. Protection is implemented for a protected avatar from a second avatar within a virtual universe, including identifying an activity of the second avatar and disqualifying the second avatar from engaging in the identified activity within the virtual universe as a function of a relation of the identified activity to the protected avatar. A protective action is defined, associated with the identified activity and executable against the protected avatar or the second avatar. Activity of the protected avatar or the second avatar is monitored within the virtual universe for an occurrence of the identified activity, and the protective action is executed against the protected avatar or the second avatar in response to detecting the occurrence of the identified activity.
摘要:
An approach that provides a seamless conversation service between interacting environments is described. In one embodiment, there is a seamless conversation service tool that includes a conversation commencement component configured to facilitate commencement of a conversation between two or more parties occurring over a communication path in one of two or more interacting environments. A user context monitoring component is configured to monitor a user context associated with the conversation. A user context change identification component is configured to identify a change in the user context of the conversation. A conversation transfer component is configured to transfer the conversation between the two or more interacting environments in response to the identified change in the user context, while maintaining a transparency of functionality of the communication path.
摘要:
A method implemented in a computer infrastructure having computer executable code, includes detecting one of an absence of a virtual universe (VU) occurrence in a VU within a predetermined time period, a special event in the VU and a change of real world status from a previous real world status. Additionally, the method includes determining a VU asset of a VU resident relevant to the VU occurrence, the special event or the previous real world status. Further, the method includes performing an automated asset reduction of the VU asset based on the determining.
摘要:
A method implemented in a computer infrastructure having computer executable code, includes detecting one of an absence of a virtual universe (VU) occurrence in a VU within a predetermined time period, a special event in the VU and a change of real world status from a previous real world status. Additionally, the method includes determining a VU asset of a VU resident relevant to the VU occurrence, the special event or the previous real world status. Further, the method includes performing an automated asset reduction of the VU asset based on the determining.
摘要:
An approach that facilitates explicit use of user context objects in a virtual universe is described. In one embodiment, there is a user context object tool that includes a user context object retrieving component configured to retrieve the plurality of user context objects for presentation to the avatar. A user context object selection and modification component is configured to receive a user context object selection and any desired modifications made to the user context object selection. A user context object permissions component is configured to permit the avatar to interact with the virtual universe in accordance with the user context object selection.
摘要:
An approach that provides a seamless conversation service between interacting environments is described. In one embodiment, there is a seamless conversation service tool that includes a conversation commencement component configured to facilitate commencement of a conversation between two or more parties occurring over a communication path in one of two or more interacting environments. A user context monitoring component is configured to monitor a user context associated with the conversation. A user context change identification component is configured to identify a change in the user context of the conversation. A conversation transfer component is configured to transfer the conversation between the two or more interacting environments in response to the identified change in the user context, while maintaining a transparency of functionality of the communication path.
摘要:
Contextual data center management utilizing a virtual environment is described. In one embodiment, there is a data center management tool for managing a physical data center from a representation of the physical data center operating in a virtual universe. The data center management tool includes a data center contextual object component configured to obtain a data center contextual object that describes operational information of the physical data center in the virtual universe. An operational change component is configured to implement at least one operational change to the representation of the physical data center in the virtual universe. The at least one operational change is implemented as a function of the data center contextual object. A management component is configured to manage the physical data center pursuant to a result obtained from implementing the at least one operational change.