摘要:
The present invention provides a method, system, and program product for creating a custom tutorial comprising the controller inputs associated with the controller manipulations that cause an action observed by a player during game play. Controller inputs are saved during game play. In response to a first player performing an action to create a tutorial, controller inputs from a tagged player are captured. A custom tutorial is created for performing game actions performed by the tagged player's avatar comprising the captured controller inputs. The tutorial is sent to a memory device accessible by the first player.
摘要:
A start offset and an end offset can be identified within unfiltered content that is to be filtered. This unfiltered content can include HTML content. A corresponding start offset and an end offset of the unfiltered content can be matched against a set of content objects contained in a content cache. Each of the content objects can be associated with rule metadata. At least one filter rule can be extracted from metadata of a matching cache object. A programmatic action can be performed based upon the extracted filter rule. Computer readable output can result from the programmatic action. The output can include content that has been filtered in accordance with the extracted filter rule.
摘要:
The eviction candidate sorting tool (ECST) is used with existing eviction algorithms that utilize a database for tracking objects stored in a cache. Rather than storing all the metadata associated with an object in a cache, the ECST extracts only certain attributes from the metadata, creating an “evict table” listing all the cached objects and the chosen attributes, or “classes.” The table can be sorted by class based on an eviction algorithm. An eviction mechanism can use the sorted table to identify candidates for eviction.
摘要:
A method of proactively monitoring the coherency of a distributed cache. A cache comparison utility selects a set of cache keys from a replica cache connected to a main cache via a network. The cache comparison utility selects a first cache key from the set of cache keys and fetches a first cache value from the replica cache that corresponds to the first cache key. The cache comparison utility generates a first checksum value corresponding to the first cache value and the first cache key and stores the first checksum value in a first checksum table. The cache comparison utility creates a first total checksum value that corresponds to the first checksum table and compares the first total checksum value with multiple total checksum values that correspond to the main cache and one or more additional replica caches, thereby identifying replica caches that are not identical to the main cache.
摘要:
An image acquisition system has a computer and one or more imaging devices coupled thereto. Each imaging device has a device memory and is capable of capturing and storing a digital image in its memory. An image device manager is implemented in software on the computer to control imaging device operation. The image device manager presents a user interface (UI) within the familiar graphical windowing environment. The UI has a context space to a particular imaging context (e.g., scanning, photography, and video). The UI also has a persistently-visible imaging menu positioned within the context space that lists options particular to the imaging context. The image acquisition system also includes a set of application program interfaces (APIs) that enable applications to manage loading and unloading of imaging devices, monitor device events, query device information properties, create device objects, capture images using the devices, and store or manipulate the captured images.
摘要:
An image acquisition system has a computer and one or more imaging devices coupled thereto. Each imaging device has a device memory and is capable of capturing and storing a digital image in its memory. An image device manager is implemented in software on the computer to control imaging device operation. The image device manager presents a user interface (UI) within the familiar graphical windowing environment. The UI has a context space to a particular imaging context (e.g., scanning, photography, and video). The UI also has a persistently-visible imaging menu positioned within the context space that lists options particular to the imaging context. The image acquisition system also includes a set of application program interfaces (APIs) that enable applications to manage loading and unloading of imaging devices, monitor device events, query device information properties, create device objects, capture images using the devices, and store or manipulate the captured images.
摘要:
Electronic multi-user forms are provided. The use of these forms may include displaying the forms to more than one user, receiving population data from one or more user, and selectively displaying the population data to each user. The population data may be displayed to the various users based on the security authorization of the user seeing the form. Upon completion of the form by the users, the form may be further completed and submitted for processing or approval.
摘要:
An approach is provided in a fake check-in event is received at a software application corresponding to a user of the software application. Fake check-ins are initiated on behalf of the user in response to the fake check-in event. The software application posts a set of fake check-in entries on behalf of the user while the user is away. The posted fake check-ins are visible by other users of the software application and are used to obfuscate others that the user is out-of-town. In one embodiment, check-in entries that are received from the user after fake check-ins have been initiated are cached. In this embodiment, a local check-in event is received when the user is within the user's geographical local area and the cached check-in entries are posted so that they are now visible by the other users of the software application.
摘要:
An approach is provided in a fake check-in event is received at a software application corresponding to a user of the software application. Fake check-ins are initiated on behalf of the user in response to the fake check-in event. The software application posts a set of fake check-in entries on behalf of the user while the user is away. The posted fake check-ins are visible by other users of the software application and are used to obfuscate others that the user is out-of-town. In one embodiment, check-in entries that are received from the user after fake check-ins have been initiated are cached. In this embodiment, a local check-in event is received when the user is within the user's geographical local area and the cached check-in entries are posted so that they are now visible by the other users of the software application.
摘要:
Embodiments can include instructions or steps, which when carried out, detect that copy operations are being performed on website data displayed to a user. Further to this detection, a co-browsing query for display to a user may be generated, an instruction to associate a co-browsing invitation with website data copied by the user may also be generated and a co-browsing invitation and pasted website data may be sent to an invitee.