摘要:
Embodiments of the present invention relate to the instantiation of a coding competition to address problems in program modules. In a typical embodiment, a first annotation will be detected in a program code file having a set of program modules. The first annotation generally indicates a need for a functionality associated with at least one program module of the set of program modules. Responsive to a lack of an existing library comprising the solution, an indication to instantiate a coding competition among a set of developers will be received to provide the solution. In response to the indication, a second annotation will be inserted into the program code file. The coding competition may then be instantiated to identify a set of developer libraries having a potential to provide the solution. Based on the coding competition, the solution may then be identified and implemented.
摘要:
Embodiments of the present invention provide an approach for integrated development environment (IDE)-based repository searching (e.g., for library elements such as classes and/or functions) in a networked computing environment. In a typical embodiment, a first program code file is received from a first integrated development environment (IDE). The first program file may be associated with a set of attributes as stored in an annotation, header, or the like. Regardless, the first program file may be parsed and indexed into a repository based on the set of attributes. A search request may then be received from a second IDE. Based on the search request and the set of attributes, a matching program code file may then be identified as stored in the repository. Once identified, the matching program code file may be transmitted/communicated to the second IDE to fulfill the search request.
摘要:
An invention for detecting a phishing virtual entity in a virtual universe is disclosed. A virtual entity may be registered as authentic and be identified with multiple physical characteristics thereof. Another virtual entity will be monitored to detect whether it includes a physical characteristic that is sufficiently similar to that of a registered virtual entity to cause confusion. A phishing virtual entity is detected based on the monitoring and phishing prevention processes may be implemented on the phishing virtual entity.
摘要:
A method for installation and configuration of a software product includes installing a software product and determining configuration settings of the software product based upon a social network of peers. A system for installation and configuration of at least one software product includes at least one client install package capable of utilizing a social network for at least one of installing software; transmitting configuration settings; transmitting post-installation configuration settings; or responding to post-installation configuration modifications; and a server that stores and aggregates the configuration settings of a plurality of users, forming at least one social network.
摘要:
A system and method to modify audio communications in an online environment and, in particular, to modifying audio communications using one or more parameters. The system includes a module configured to detect one or more parameters applicable to an incoming audio communication and a weighing engine configured to weigh the one or more parameters and obtain a weighted volume. The system further includes a module configured to transmit the weighted volume to a user participating in a virtual universe. The method determines whether one or more parameters apply to an incoming communication, weighs the incoming communication based on the one or more parameters to determine a weighted volume of the incoming communication, and transmits the incoming communication to a user at the weighted volume.
摘要:
Virtual universe customer service representatives axe cloned and assigned as a function of observing customer behavior, retrieving historical data and creating a customer profile Preferential subavatar assignment parameters are determined for a customer as a function of the customer profile, choosing a subavatar from a plurality of subavatars as a function of a correlation of a subavatar performance characteristic with the preferential subavatar assignment parameter and a store objective, and the clone is populated with the chosen subavatar Choosing a subavatar may comprise preferentially rating subavatars and determining an appropriateness threshold as a function of the subavatar assignment parameter, the performance characteristics and the stole objective. Some embodiments reset a threshold in response to time-in-queue or to repetitively observing customer behavior, retrieving customer data, determining a subavatar assignment parameter and choosing a highest-rated available subavatar meeting a revised threshold. Subavatars may comprise automated, customer service representative-controlled and jointly-controlled subavatars.
摘要:
A method and apparatus for continuous monitoring of a light bulb or group of light bulbs. The light emission of a light bulb is compared with known emission failure values for similar types of light bulbs, and a determination of a near failure status for the bulb is made.
摘要:
An approach that provides real-time communication integration between a virtual universe and an external source is described. In one embodiment, there is a real-time communication integration interface tool that provides real-time communication integration between a virtual universe and a communication device external to the virtual universe. In this embodiment, there is a communication request component configured to receive a request to initiate a communication between a first resident that is on-line in the virtual universe and a second resident that is logged out of the virtual universe via the communication device. A communication link component is configured to establish a communication link between the virtual universe and the communication device in response to receiving the request.
摘要:
A virtual universe can include regions that conserve natural resource usage. A virtual universe natural resource conservation system (“system”) can determine that an avatar is accessing a natural resource conservation region in a virtual universe. The natural resource conservation region is supported with one or more devices that adhere to restrictions on natural resource usage. The system can also apply one or more virtual universe restrictions while the avatar is accessing the natural resource conservation region.
摘要:
In general, embodiments of the invention provide an approach to proactively adjust timeout settings on a display device based on user activity. Specifically, a system and method are presented to adaptively adjust the inactivity timeout settings on a display device based on the application being used, the content being displayed on the device, and an analysis of the user's history with the application. The present invention calculates an inactivity timeout modifier which is utilized to modify the default operating system timeout value.