摘要:
Embodiments of the present invention provide a method, system and computer program product for a low power data transfer mode for mobile computing devices. In an embodiment of the invention, a method for low power data transfer in a battery powered computing device can be provided. The method can include powering up a battery powered computing device, booting into a primary personal computing operating system in the device and storing a document into fixed storage for the device, and subsequently re-booting into an auxiliary low-power consumption operating system in the device, establishing a short range radio frequency communications link between the battery powered computing device and an external pervasive device, and transmitting the stored document to the pervasive device over the short range radio frequency communications link.
摘要:
A method, computer program product, and data processing system for exchanging information regarding software source code among a team of developers is disclosed. In a preferred embodiment of the present invention, a developer associates commentary with a particular code feature, such as a function or object class. A list of intended recipients or readers of the commentary is obtained from the developer. Additional settings regarding such things as an expiration date for the commentary are also obtained from the developer. The source code with associated commentary is then made available to the intended readers. If desired, the source code with associated commentary may be transmitted the intended recipients via e-mail or an “instant message” or other form of notification can be transmitted to the intended recipients to notify them of the commentary to be read.
摘要:
A method, computer program product, and apparatus for determining whether newly installed software is malicious software are presented. In one illustrative embodiment, software is installed on a computer system to produce newly installed software running in a secured part of the computer system. The newly installed software is only permitted to access a subset of resources in the computer system when running in the secured part. The newly installed software is run on the computer system until a selected event occurs. The newly installed software running on the computer system is monitored until the selected event occurs. The monitoring creates information used to evaluate the software for malicious behavior. The information is presented on a display to a user after the selected event has occurred, wherein the presented information comprises a recommendation of whether to provide the software access to the resources in the computer system outside the subset of resources.
摘要:
Generally speaking, systems, methods and media for providing a pack avatar for sharing inventory in a virtual universe are disclosed. Embodiments of a method may include receiving a request to create a pack avatar carrying one or more shared inventory items in a virtual universe and creating a pack avatar based on the received requests. Embodiments may include rendering the pack avatar in the virtual universe. Embodiments may also include, in response to receiving a request from a virtual universe user to borrow one or more shared inventory items carried by the pack avatar, accessing the one or more requested shared inventory items and rendering the one or more requested shared inventory items in the virtual universe. Further embodiments may include associating the pack avatar with a user and moving the pack avatar within the virtual universe.
摘要:
An apparatus and system are disclosed for regulating emails in an enterprise email system by marking, demarcating and referencing a content-context field in the header of the email. The content-context field designates the email as business or non-business in nature. Non-business emails are rejected, relayed elsewhere, or destroyed in response to positively identifying the email as non-business. The claimed invention prevents intermingling of non-business emails with business emails in business environments, and helps avoid potential liabilities that may result from associating business matters with personnel non-business matters.
摘要:
A method, digital video display and digital video recording (DVR) device/system and computer program provide a mechanism for controlling an amount of differing types of media viewed by users. A number of time quotas are set for various media types and/or programs and viewing or recording of video media is monitored to determine whether any of the quotas has been exceeded. If a quota is exceeded, the viewing or recording can be immediately halted, or a warning or alert can be issued. If an absolute limit is exceeded after an alert is issue, further viewing or recording can be halted.
摘要:
A system and method implemented in a computer infrastructure having computer executable code, includes receiving one or more bids for at least one of an enhanced rendering quality and an enhanced rendering order of an object in a virtual universe (VU) and performing a bid resolution for the received one or more bids. Additionally, the method includes rendering one or more objects in the VU with the at least one of the enhanced rendering quality and the enhanced rendering order based on the bid resolution.
摘要:
The present invention relates to relates to the management of virtual universe item returns. A method for in accordance with an embodiment of the present invention includes: initiating a return of a item by a user in a virtual universe; granting control of the return of the item to a return agency, the return agency submitting a return request on behalf of the user to a vendor associated with the item; upon approval of the return request by the vendor, sending instructions to the user to destroy the item; and upon confirmation of the destruction of the item by the user, crediting the user for the return.
摘要:
A method, system and computer program product for maintaining federated name context bindings in a name space is disclosed. A reference within a first name space of a first system is bound with a durable subscription to a second name space on a second system. The binding of the first reference to the second name space is administered with a graphical user interface. A durable subscription is established with the second system for the binding utilizing communication with the second system over a network. Notification of a change affecting the bindings from the second system is received and the reference is rebound in the first name space.
摘要:
The enhanced power supply adds a control circuit and rechargeable battery to the prior art transformer. The enhanced power supply uses an internal rechargeable battery in standby mode, so that the power supply does not draw AC power when the attached device is not in use. Control contacts on the power supply receptacle act as a communication channel allowing the attached device to power requirements to the power supply. The power supply has the ability to detect the power draw and switch between power modes, even when there is no communication with the attached device.