摘要:
The present disclosure details a method and system used for turning human participants who control avatars in a virtual world setting into real life marketing leads. In one embodiment, a virtual location is presented within a virtual world to facilitate interaction with an avatar. The avatar is identified within a master data management system, and a profile of the human behind the avatar is created or retrieved. To encourage the human user to provide real-world information through the avatar within the virtual world, an incentive is offered and awarded as necessary. The real-world information about the human user, such as address or demographic information about the human user is collected and stored in the profile, and eventually synchronized with a CRM system. As appropriate, the data collected and compiled in the CRM system may be used to launch marketing campaigns.
摘要:
In an embodiment of the invention, a method for data profiling incorporating an enterprise service bus (ESB) coupling the target and source systems following an extraction, transformation, and loading (ETL) process for a target system and a source system is provided. The method includes receiving baseline data profiling results obtained during ETL from a source application to a target application, caching the updates, determining current data profiling results within the ESB for cached updates, and triggering an action if a threshold disparity is detected upon the current data profiling results and the baseline data profiling results.
摘要:
Embodiments of the present invention provide a method, system and computer program product for automated social networking for e-meetings. In an embodiment of the invention, a method for automated social networking for e-meetings is provided. The method includes monitoring content provided to an e-meeting managed by an e-meeting server executing in memory of a host computer. The method further includes detecting a name in the monitored content and comparing the detected name to names in a contact list for a social networking system executing externally to the e-meeting. Finally, the method includes triggering generation of a social networking introduction for the name to different participants to the e-meeting in response to matching the detected name to a name in the contact list.
摘要:
A computer implemented method, computer program product and system for data quality monitoring includes measuring a data quality of loaded data relative to a predefined data quality metric. The measuring the data quality includes identifying delta changes in at least one of the loaded data and the data quality rules relative to a previous measurement of the data quality of the loaded data. Logical calculus defined in the data quality rules is applied to the identified delta changes.
摘要:
Systems, methods and articles of manufacture are disclosed for splitting an avatar a split point in a virtual world. In one embodiment, a location in the virtual world may be designated as the split point. It may be determined that a first avatar has encountered the split point. The user may be prompted to specify whether to split the first avatar in a virtual world. Responsive to a request to split the first avatar, a second avatar may be created from the first avatar. The first avatar and the second avatar may be controlled independently in the virtual world and in response to user input. A user may also request to merge the first avatar and the second avatar. A third avatar may be created from the first avatar and the second avatar, responsive to the request to merge. The third avatar may include assets of both the first avatar and the second avatar.
摘要:
A method for identity mediation in an enterprise service bus is provided in the illustrative embodiments. A security information is received at the enterprise service bus from a first application executing in a first data processing system. The security information is a part of a request for service from a second application executing in a second data processing system. A part of the security information is identified to be transformed such that the part upon transformation is usable for handling the request by the second application. A security policy applicable to the identified part is selected and the identified part is transformed according to the security policy. The transforming results in a transformed security information. The transformed security information is sent to the second application.
摘要:
A method includes providing a columnar database comprising a plurality of columnar data structures associated with one column attribute; providing first data records having a plurality of first attribute-value pairs comprising counting information indicative of a number of first data records having the respective first attribute-value pair; providing mask data structures comprising one or more second attribute-value pairs; selecting second data records by intersecting the columnar data structures and the mask data structures; selecting one of the column attributes and one value contained in the column data structure associated with said selected column attribute as the destination attribute-value pair; creating one second rule for each first attribute-value pair; calculating, for each second rule, a co-occurrence-count between its respective source attribute-value pair and its destination attribute-value pair; and specifically selecting one or more of said second rules as the first rules in dependence on the calculated co-occurrence-count.
摘要:
The invention relates to a method for carrying out predictive analysis relating to nodes of a communication network. The method comprises the steps of providing communication event information for a first set of nodes and a second set of nodes of the communication network, providing a set of attributes for the nodes of the first set, using said attributes and said communication event information for determining a set of groups among the first set of nodes, assigning each node of the second set to at least one group of the set of groups based at least on the communication event information available for the second group, the assigning resulting in membership information of the nodes of the second set as well as deriving or applying a prediction model for the second set of nodes based on the communication event information for the second set and the membership information.
摘要:
A method, system, and computer usable program product for identity mediation in an enterprise service bus are provided in the illustrative embodiments. A security information is received at the enterprise service bus from a first application executing in a first data processing system. The security information is a part of a request for service from a second application executing in a second data processing system. A part of the security information is identified to be transformed such that the part upon transformation is usable for handling the request by the second application. A security policy applicable to the identified part is selected and the identified part is transformed according to the security policy. The transforming results in a transformed security information. The transformed security information is sent to the second application.
摘要:
The present disclosure details a method and system used for turning human participants who control avatars in a virtual world setting into real life marketing leads. In one embodiment, a virtual location is presented within a virtual world to facilitate interaction with an avatar. The avatar is identified within a master data management system, and a profile of the human behind the avatar is created or retrieved. To encourage the human user to provide real-world information through the avatar within the virtual world, an incentive is offered and awarded as necessary. The real-world information about the human user, such as address or demographic information about the human user is collected and stored in the profile, and eventually synchronized with a CRM system. As appropriate, the data collected and compiled in the CRM system may be used to launch marketing campaigns.