摘要:
The present invention pre-fetches objects, textures and scripts (collectively referred to herein as items) through analysis of the communications of an avatar. Furthermore, if an object, texture or script is not pre-fetched upon arrival to a region the virtual universe's object, texture and script download system is augmented to prioritize objects the user may be interested in based on the avatar's communications and previously stated priorities. The present invention may improve user experience of virtual world by prioritizing the download and caching of objects, textures, and scripts that are likely to interest the user. Such a prioritization enhances the user experience by reducing wait times for the rendering of objects of interest.
摘要:
A computer program product, apparatus and system are disclosed for managing a manual assembly sequence by electronically referencing unique identifiers associated with physical components to be assembled in the sequence. Certain embodiments facilitate management of an assembly of a consumer product. In one embodiment, RFID tags are used as unique identifiers. Such embodiments may use RFID tags to determine the presence of the components before each assembly step in the assembly sequence and to determine that the components are being assembled in sequence. Other embodiments determine whether the components are properly assembled after being assembled, that the distance between the components falls within a predetermined range, and/or that the components for an assembly steps is properly orientation with respect to other components.
摘要:
Disclosure is related to idea tracking and management. The disclosure invokes a method and system for displaying and tracking ideas from a database. The invention accesses a data repository via a data connection, displays the data from the data repository, and allows the displayed data to be characterized as scheduling data, statistical data, action items, current status, and listing of individuals.
摘要:
A teleportation proxy and teleportation proxy service which monitors the usage of a networked computer or terminal to determine contextual metadata for a user reflecting current usage of the networked computer or terminal. A search engine then searches metadata of virtual universe locations in accordance with at least a portion of said contextual metadata and candidate matches are compared against the contextual metadata to determine suggested teleportation destinations in a virtual universe.
摘要:
Systems, methods, media, and apparatuses for disabling camera functionality in a portable device are disclosed. Embodiments of the method may include establishing a connection with a camera-enabled portable device and transmitting to the portable device a request for permission to disable camera functionality. Embodiments of the method may also include receiving a response from the portable device relating to permission to disable camera functionality. Further embodiments of the method may include, in response to receiving permission to disable camera functionality, transmitting to the portable device a command to disable camera functionality or, in response to receiving an indication that the user refused permission, displaying a notification message. The command to disable camera functionality may include a command to disable camera functionality for a prescribed period, while the portable device is located within a secure geographical location, partially or fully disable camera functionality, and/or other methodology.
摘要:
A computer program product for providing an intelligent event notification system includes instructions for implementing a method. The method includes selecting a type of event notification for an event. Determining the type of event notification is based in part on information elements associated with the event. The method also includes determining at least one optimal alert system to receive an event notification corresponding to the type of event notification selected. The determination is based in part on information elements associated with the event. The method further includes associating an alert trigger with the event notification and transmitting the event notification to the at least one optimal alert system upon activation of the alert trigger. The event notification type includes a supplemental information notification specifying activities to be performed in advance of, or in preparation for, the event.
摘要:
A radio frequency identification (RFID) inventory device attached to a container for tracking quantities of objects stored in the container having an antenna supporting wireless interrogation by an external RFID reader, a RFID chip coupled to the antenna having an embedded unique identifier and a memory element, where the RFID chip is adapted to store in the memory element at least one quantity value and to allow an external reader to wirelessly collect the identifier and at least one quantity value in response to said wireless interrogation, and one or more sensors coupled to the RFID chip, where the sensors are configured to send at least one signal to the RFID chip in response to a change in quantities of objects in the container and where the RFID chip is configured to update at least one quantity value stored in response to a signal from the sensors.
摘要:
A method for installation and configuration of a software product includes installing a software product and determining configuration settings of the software product based upon a social network of peers. A system for installation and configuration of at least one software product includes at least one client install package capable of utilizing a social network for at least one of installing software; transmitting configuration settings; transmitting post-installation configuration settings; or responding to post-installation configuration modifications; and a server that stores and aggregates the configuration settings of a plurality of users, forming at least one social network.
摘要:
A removable digital data storage device has a programmable memory controller, a data storage medium and a data destruction means. The memory controller is encoded with a firmware program to provide a computer device driver interface, wherein the firmware program further configures the memory controller to secure data on the medium by querying for a hardware code in response to a data operation request by a computer through the interface and either granting access in response to a hardware code input or, independent of an operational status of the requesting computer, directly instructing the data destruction means to render data residing on the data storage medium unreadable in response to a failure to receive the first hardware code input through the interface.
摘要:
The Automatic RFID Tuner has one or more RF repeaters that can travel in the x, y and z axes through a densely packed pallet of goods. The RF repeater identifies dead spots where RF signals from an RFID transceiver do not penetrate the dense packaging. The RF repeater calculates a position that ensures the RF signal will reach all passive RFID tags in the dense packaging. The RF repeater moves to the calculated position so that the RFID transceiver's signal will read all passive RFID tags in the dense packaging.