摘要:
In general, embodiments of the invention provide an approach to proactively adjust timeout settings on a display device based on user activity. Specifically, a system and method are presented to adaptively adjust the inactivity timeout settings on a display device based on the application being used, the content being displayed on the device, and an analysis of the user's history with the application. The present invention calculates an inactivity timeout modifier which is utilized to modify the default operating system timeout value.
摘要:
Approaches for designating and/or selecting broker systems in a publication-subscription (pub-sub) messaging environment are provided. In one approach, a subscriber system may be designated as a broker system based on a capability of the subscriber system to function as a broker system for its peers. In another approach, a broker system may be selected from among a plurality of broker systems based upon a cache directory that identifies the content/messages that each broker system may have cached. If a particular broker system has previously cached content that is at least similar to an intended message, that particular broker system may be selected for distributing the intended message to a set of subscriber systems.
摘要:
An invention for automatically reducing a load on a server functioning with a virtual universe is provided. In one embodiment, there is an alternative representation tool, including a detection component configured to detect a load on a server, and a determination component configured to determine whether the load on the server exceeds a predefined threshold. The alternative representation tool further comprises a rendering component configured to provide an alternative representation of a virtual content renderable in the virtual universe to reduce the load on the server in the case that the load on the server exceeds the predefined threshold.
摘要:
An approach for caching potentially repetitive message data in a publication/subscription messaging environment is provided. Specifically, when a message is received on a broker system from a publisher system, the broker system analyzes the message for potentially repetitive data. Once such a set of data has been identified, a unique identifier/key corresponding thereto will be sent back to the publisher system and the set of data will be stored in a (data) cache. Upon receipt, the publisher system will cache/store the unique identifier in a (key) cache. Then, when the publisher system generates a future message that would contain the same set of data, the publisher system will substitute the unique identifier (as retrieved from the key cache) for the set of data to yield an abbreviated/truncated message.
摘要:
A method for providing virtual world functionality to a user of a base virtual world having base virtual world functionality and a base world list of base virtual world users, includes providing a virtual world layer, communicating to the base virtual world that the virtual world layer will overlay the base virtual world and adding the virtual world layer to the base world list in order to register the virtual world layer with the base virtual world.
摘要:
Embodiments of the invention include a method that comprises recording broadcasted television content and determining if one or more segments of the content is corrupted. The method can also present a notification if the content is corrupted, where the notification can include indicia such as a pop-up window, an icon or symbol in a program guide screen or program recorded content screen, and/or an indicator on the DVR unit. The method can also acquire uncorrupted content to replace one or more segments of the corrupted content.
摘要:
A method and a system for replacement of programs on a video recorder based on preferences and size constraints of a video recorder. The video recorder compares recorded programs in the computer readable storage media and a schedule of programs to be recorded to a plurality of global preferences and program specific preferences specifying preferred recording quality. For each recorded program whose quality does not match a global preference or program specific preference, a listing of future programs is examined for alternate versions of the program which do match a global preference or program specific preference.
摘要:
Embodiments of the present invention provide an approach for aggregating Internet addresses (e.g., Uniform Resource Locators (URLs)) in a networked computing environment. In a typical embodiment, a set of URLs is received (e.g., by a system/engine). Upon receipt, a composite URL comprising at least portions of each received URL is generated and associated with a newly generated web page. The received set of URLs are displayed on the web page in a list, or the like, that may be sorted according to a set of criteria.
摘要:
Embodiments of the present invention provide an approach for confirming/verifying an identity of a test taker using a biometric analysis. For example, in the medical field, it is desirous to ensure that a given test is being administered to a correct individual (e.g., “test taker’). By comparing a given/submitted identity against a biometric-based identity, such verification can be performed. In one embodiment, the individual will submit biometric information via a biometric reader or the like coupled to a testing apparatus. The identity submitted by or on behalf of the individual (referred to herein as a “submitted identity”) will then be confirmed against the individual's identity as determined based on the biometric reading (referred to herein as a “biometric-based identity”). If the submitted identity and the biometric-based identity match, results of the test will be accepted. If the two identities do not match, then results of the test will be denied. Alternatively, if the identities do not match, then the testing apparatus could refuse to commence or complete the test.
摘要:
An approach for allocating computing resources based on a confidence level associated with responses to queries is provided. In a typical embodiment, a query is received from a querying user, and a search for a response to the query is conducted. A confidence level associated with the response is then determined. If the confidence level of the response does not meet a predetermined threshold, additional computing resources are allocated, and the search and corresponding response are updated (e.g., iteratively). An updated confidence level based on the updated response is then determined. Once the predetermined threshold has been met by the confidence level of the response, the response can be returned to the querying user.