Abstract:
Generating recommendations for an individual based on a mood of the individual. Receiving information corresponding to one or more activities associated with an individual over a period of time. The received information corresponding to the one or more activities associated with the individual is processed to detect a mood of the individual. A recommendation is generated for the individual based on the detected mood of the individual and a future event associated with the individual. The future event has an occurrence at a later time instance.
Abstract:
Embodiments include methods, systems and computer program products for managing content disclosure on social networking sites. In some embodiments, labels associated with a social network connection of a user can be associated with the social network connection based on the reactions of the social network connection to different social network posts. Content from a user device associated with the user can be received. The content can be processed to identify content types to associate with the content. A recommendation can be generated to share or not share the content with the social network connection based on the reactions to content posted by the user. An indication from the user to share the content with the social network connection can be received. The content can be shared with the social network connection based on the indication.
Abstract:
Systems, methods, and computer program products are disclosed for authenticating access to a user device using tactile-based feedback provided to a user of the device. A user device may include a display layer and a tactile layer. The user device may be configured to selectively activate portions of the tactile layer to cause opposing regions of a surface of the display layer to become raised relative to other regions of the display surface. A user may be required to specify a sequence of directional movements corresponding to a correct passcode pattern by traversing a path along the raised regions. The particular arrangement of raised regions may change each time access to the user device is requested by activating different portions of the tactile layer, thereby giving the appearance to a third party that a different passcode pattern is being entered each time, and thus, minimizing likelihood of unauthorized passcode detection.
Abstract:
Techniques are provided for performing automated operations to assign virtual values to virtual items in a virtual world based on real-world commodity pricing. A request is received for a valuation within the virtual world of a first virtual item that includes a respective quantity of one or more virtual components. For each of the virtual components included in the first virtual item, a real-world commodity price of a real-world commodity associated with the virtual component is determined. Based at least in part on the determined real-world commodity prices and on the respective quantities of the virtual components included in the first virtual item, a virtual value is assigned to the first virtual item, and an indication is provided to the user of that assigned virtual value.
Abstract:
An approach is provided for securing a network-accessible site such as a bank, financial institution, or a user's home system. A request is received from a user of the network-accessible site. While the request is from a user, the system further verifies that the user is the authorized user and not an imposter, such as a hacker. To this end, the approach transmits a state inquiry to a wearable device registered to the user. The current state of the user is received from the wearable device, such as whether the user is sitting, standing, walking, sleeping, etc. If the system determines that the current user state allows the action to be performed at the site by the user, then the action is performed. Likewise, if the system determines that the current user state disallows the action, then the system inhibits, or otherwise prevents, the action from being performed.
Abstract:
A method, computer program product, and computer system for identifying attribute information of at least a first wearable associated with an outfit of a user. Information about an event may be received. An electronic message may be sent about whether at least a portion of the outfit is recommended for wearing at the event based upon, at least in part, the attribute information of at least the first wearable and the information about the event.
Abstract:
Embodiments are directed to a computer-implemented method of identifying an imposter web page. The method includes extracting, using a processor system, visited web page data from a visited web page. The method further includes determining, using the processor system, that the visited web page is an imposter web page, based at least in part on determining, using the processor system, that website location data of the visited web page does not match website location data of at least one legitimate web page, as well as determining that text data associated with image data of the visited web page matches text data associated with image data of the at least one legitimate web page.
Abstract:
An approach is provided for selecting variable message signs (VMS). More particularly, this disclosure relates to personalized VMS delivered to a driver of a vehicle via an on-board display. The approach monitors driver behavior to form a driver behavior history and an analytic analysis is applied to the driver behavior history to determine characteristics of the driver. When a wireless notification is received from an external data provider, the notification is modified based on the determined driver characteristics, and the modified notification is displayed to the driver on a display device visible within the vehicle that is being operated by the driver.
Abstract:
According to one exemplary embodiment, a method for personalizing a game executed by an electronic device is provided. The method may include collecting a plurality of user data. The method may also include determining at least one input/output option. The method may then include selecting a game template from a plurality of available game templates based on the collected plurality of user data and the determined at least one input/output option. The method may further include configuring the electronic game based on the selected game template, the collected plurality of user data, and the determined plurality of input/output options. The method may also include executing, by the electronic device, the configured electronic game.
Abstract:
A system or computer usable program product for representing a piece of a road as a first ordered series of line segments connected in an end-to-end fashion; representing the piece of the road as a second ordered series of line segments connected in an end-to-end fashion; for each given pair of two consecutive points of the second ordered series of points, determining a corresponding plurality of in-between points from the first ordered series of points; for each given line segment of the second ordered series of line segments, determining a first traffic characteristic value corresponding to the given line segment and a portion of the piece of the road which the given line segment represents; and presenting a visual representation of the piece of the road.