摘要:
Web application users are able to specify power constraints for remote web servers. These may be based on individual performance needs and energy-conservation desires. They enable the user to exercise control over the amount of energy that the web server expends in serving the needs of the user. The invention may employ such features as vertical scaling using power capacity on demand (CUoD) type functionality. The method includes providing a user-interactive interface to enable the user to indicate a preference for power restrictions with respect to its web requests. The user then instructs the web site provider to reduce power consumption in response to the user's request. The user specifies a reduction in overall power consumption for the user's needs, such as instructing the web service provider to use an energy-conserving server to handle the user's web requests, or specifying a acceptable delay or fulfilling the user's web requests.
摘要:
Systems, methods and program codes are provided wherein an analyzer analyzes input from a terminal device; ascertains human-like behavior; and terminates an active session, generates a time-out warning, manipulates an idle session timer or presents a challenge in response to a humanness likelihood determination or to a challenge result. In one aspect a keystroke analyzer and a command sequence analyzer determine whether the terminal device input is likely from a human user or from an automaton. In another aspect a Completely Automated Public Turing Test to tell Computers and Humans Apart challenge is presented. Timing characteristics include maximum generation rate, burstiness, and keystroke sequence delays, and command characteristics include a no-action-required characteristic and a query characteristic. A command sequence analyzer may have an affinity for a command line interface. Weighting algorithms or artificial intelligence routines may be applied to humanness likelihood outputs.
摘要:
A protection mechanism(s) for a virtual universe account maintains integrity of the virtual universe account as well as the virtual universe. An avatar associated with a virtual universe account may be misappropriated and/or used inappropriately by a non-comporting user against the wishes or without the knowledge of the virtual universe account owner. A non-comporting user (i.e., a user not authorized to use the virtual universe account, an authorized user who misuses a virtual universe account, etc.) can use an avatar to perform potentially damaging and/or damaging activities in the virtual universe (e.g., destroy property, impact reputation associated with the virtual universe account, reduce value of the virtual universe account, etc.) Embodiments of the inventive subject matter detect when a user misappropriates and/or misuses a virtual universe account (i.e., detects a non-comporting user), and attempts to restore state of the virtual universe prior to the misuse and/or misappropriation.
摘要:
The present invention is directed to a system, method and program product for providing secure communications in a virtual universe. A system is disclosed that includes a system for allowing a first avatar to request a secure communication mode and for allowing a second avatar to accept the secure communication mode. Once accepted, a secure session is initiated within the virtual universe between the first avatar and the second avatar and at least one feature of the virtual universe is altered to effectuate the secure communication mode.
摘要:
A computer-implemented method of predicting a future location of a mobile node can include determining a current location of a first mobile node, determining a location of at least a second mobile node, wherein the second mobile node is associated with the first mobile node via a social network, and generating a list including at least one candidate destination determined, at least in part, according to the location of the first mobile node and the location of the second mobile node. For each candidate destination on the list, a probability that the first mobile node is in route to that candidate destination location can be calculated. A candidate destination can be selected, according to the probabilities, from the list as a predicted future location of the first mobile node. The predicted future location of the first mobile node can be output.
摘要:
An embodiment of the invention provides a method for IP assessment based on a component business model (CBM). The method assesses components in the CBM via a component assessment module, which interrogates an entity (e.g., a user, a third party consultant, and an information database) with questions. Output (including answers to the questions) from the component assessment module is sent to a component detection module. Scores (e.g., numerical scores and/or low, medium, or high scores) are assigned to the components via the component detection module based on the output from the component assessment module. The output from the component assessment module and/or the scores are analyzed to determine whether a gap, a duplication, a conflict, and/or an over-investment exists in at least one of the components.
摘要:
An invention that degrades avatar appearances in a virtual universe is provided. In one embodiment, there is a degradation tool, including a visual obstruction component configured to: identify an object in the virtual universe as an object of interest, and determine whether a set of avatars within the virtual universe is likely to cause a visual obstruction of the object of interest to an avatar. The degradation tool further comprises a modification component configured to degrade an appearance of at least one of the set of avatars within the virtual universe if the set of avatars within the virtual universe is likely to cause a visual obstruction of the object of interest to the avatar.
摘要:
Methods, systems, services and program products are provided for implementing carbon offset computing. During performance of a specified computing task data concerning resource consumption regarding that specified computing task is gathered and stored. Upon completion of the specified computing task, the amount of carbon offset required to compensate for resource consumption associated with performance of the completed specified computing task is calculated based upon stored or known resource consumption data. The calculated amount of carbon offset information may be transmitted to a carbon offset function provider, and a carbon offset function provider implements the specified amount of carbon offset based upon the calculated amounts communicated for the completed specified computing task.
摘要:
Methods, including service methods, articles of manufacture, systems, articles and programmable devices are provided for adapting the power consumption of a computational device in response to environmental conditions. Operating environmental condition data relevant to the generation of electric power is acquired from an operating environment feed and analyzed to determine a high electric power demand indication. If the analyzing determines a high electric power demand indication, then a computational device automatically reduces an amount of electric power consumption.
摘要:
A system and method to modify audio communications in an online environment and, in particular, to modifying audio communications using one or more parameters. The system includes a module configured to detect one or more parameters applicable to an incoming audio communication and a weighing engine configured to weigh the one or more parameters and obtain a weighted volume. The system further includes a module configured to transmit the weighted volume to a user participating in a virtual universe. The method determines whether one or more parameters apply to an incoming communication, weighs the incoming communication based on the one or more parameters to determine a weighted volume of the incoming communication, and transmits the incoming communication to a user at the weighted volume.