摘要:
An avatar behavior rule is customized within a virtual universe environment as a function of individual avatar data. It is determined whether the activity of an avatar is relevant to a behavior rule for a virtual universe. If the activity is determined to be relevant to the rule, the rule is customized for the avatar as a function of individual avatar data associated with the avatar, and it is determined whether the activity exceeds a violation threshold of the customized rule. If the activity is determined to exceed the customized rule violation threshold, an appropriate action is taken as specified by the customized rule.
摘要:
In response to a teleport request, teleport destination characteristics are determined and compared against preferences, characteristics and restrictions of an avatar as indicated by metadata or tags to determine if the teleport destination is suitable for teleportation of that avatar. If the destination is found unsuitable, a search is conducted, preferably based on unmatched metadata of the avatar or the destination to suggest or directly substitute a suitable teleportation destination. Metadata for the avatar and the destination can include metadata which is dynamic (such as destination occupancy or processing capacity) adaptively developed or based on current or historical usage and virtual universe system status.
摘要:
A method for communication management includes receiving at least one keyword and receiving a replay time span input. Further, the method includes receiving a plurality of communication inputs including at least a first communication input and a second communication input, monitoring at least the first communication input and second communication input for the at least one keyword, and determining an instantiation of the at least one keyword in at least one of the first communication input and second communication input. Additionally, the method includes associating the determined instantiation with one of the first communication input and second communication input, and providing at least a portion of the communication associated with the determined instantiation based on the replay time span input responsive to the instantiation.
摘要:
A method to authenticate an identity of a responder. The method includes receiving a request and determining, by one or more computer processors, a reviewer for the request. A custom key is generated for the reviewer and the request, and at least one URL is generated that contains the custom key. At least one URL is sent, along with the request, to the reviewer. Upon receiving a response to the request that includes a selection of one URL, it is determined whether the response was received from the determined reviewer for the request.
摘要:
A system and method to interact with business systems through the use of automated agents and provide context for an automated agent to service multiple avatars within a virtual universe. The system comprises a chat engine, a communications subsystem, and a channelizer configured to mediate one or more communications between the chat engine and the communications subsystem. The channelizer is further configured to map at least one channel to an application.
摘要:
Systems and methods for the formation and rearrangement of ad hoc networks and more particularly to systems and methods for sharing bandwidth in ad hoc networks. The method comprises broadcasting a table to at least one potential lender requesting pertinent lender information and receiving the table from the at least one potential lender with the pertinent lender information. The method further includes selecting one or more lenders of the at least one potential lender which meet preset criteria and establishing an ad hoc network with the one or more lenders based on the selecting.
摘要:
Method and system for optimizing selection of a network. The method includes identifying available lenders and existing networks within a vicinity of a borrower, selecting an optimization technique for completing a task of the borrower, calculating, for a plurality of network options, a value for completing the borrower's task according to the optimization technique, and selecting an optimum network option to complete the borrower's task. The plurality of network options includes forming a heterogeneous network composed of both a peer-to-peer network and a multiplexed network.
摘要:
A method, system and program product for transmitting configuration item data by a network object within a network. The steps include the network object detecting a change; the network object detecting an amount of traffic within the network; the network object transmitting configuration item data to the network at a level based on the amount of traffic present within the network. If all of the configuration item data was not sent and the network object detects that the amount of network traffic within the network is below a determined amount, the network object transmits remaining configuration item data to the network; and if all configuration item data was sent, returns to the step of the network object detecting a change.
摘要:
Methods and systems for associating a standardized electronic icon with a user and displaying the icon with electronic communications of the user are disclosed. A computer implemented method includes: determining one or more icons to associate with an individual when the individual creates an electronic message; and at least one of selectively and automatically appending at least one of the one or more icons that are associated with the individual to the electronic message. The at least one of the one or more icons is subsequently displayed with the electronic message to a recipient to provide information about the individual to the recipient.
摘要:
Embodiments of the present invention provide an approach to prioritize jobs (e.g., within a cloud computing environment) so as to maximize positive financial impacts (or to minimize negative financial impacts) for cloud service providers, while not exceeding processing capacity or failing to meet terms of applicable Service Level Agreements (SLAs). Specifically, under the present invention a respective income (i.e., a cost to the customer), a processing need, and set of SLA terms (e.g., predetermined priorities, time constraints, etc.) will be determined for each of a plurality of jobs to be performed. The jobs will then be prioritized in a way that: maximizes cumulative/collective income; stays within the total processing capacity of the cloud computing environment; and meets the SLA terms.