摘要:
A method and implementing computerized system are provided for enhancing a viewing experience by automatically modifying a displayed presentation, such as those used by computer monitors and other related technologies, in response to detected positional attributes of one or more human viewers.
摘要:
A computer implemented method, apparatus, and computer program product for modifying an object. In one embodiment, the process obtains avatar tracking data that identifies a location of an avatar in relation to a range of an object. The range includes a viewable field. The process then calculates modified pixel color values to form a modified color in response to detecting a condition for triggering modification of the object. Thereafter, the process modifies a color of the object to form the modified color when the location of the set of avatars is within the range of the object.
摘要:
A computer implemented method, apparatus, and computer program product for modifying objects. In one embodiment, tracking data is obtained which identifies a location of a set of avatars in relation to a range of the object. The range of the object includes a viewable field. In response to determining that the object requires modification, a size of the object is compared with a set of size constraints to form a comparison. Thereafter, the size of the object is modified based on the comparison to form a set of size modifications.
摘要:
A computer implemented method, apparatus, and computer program product for object based avatar tracking. In one embodiment, a range for an object in a virtual universe is identified. The range comprises a viewable field of the object. Avatars in the viewable field of the object are capable of viewing the object. Avatars outside the viewable field of the object are incapable of viewing the object. In response to an avatar coming within the range of the object, an object avatar rendering table is queried for a session associated with the avatar unique identifier and the object unique identifier. The object avatar rendering table comprises a unique identifier of a set of selected objects and unique identifiers for each avatar in a range of a selected object in the set of selected objects. An object initiation process associated with the object is triggered.
摘要:
A computer implemented method, apparatus, and computer program product for modifying objects. In one embodiment, tracking data is obtained which identifies a location of a set of avatars in relation to a range of the object. The range of the object includes a viewable field. In response to determining that the object requires modification, a size of the object is compared with a set of size constraints to form a comparison. Thereafter, the size of the object is modified based on the comparison to form a set of size modifications.
摘要:
Systems and methods for allowing an administrator or program to select a region or set of avatars in a virtual universe grid for splitting into another, separate and distinct virtual universe grid. If a region is selected, all of the avatars and virtual universe resources associated with the region are locked, their data is retrieved, and another separate virtual universe grid is commanded to create and insert the avatars and resources in it. If avatars are selected, all of the resources, scripts, histories, and information regarding the selected avatars are retrieved, and the avatars are locked in the source universe. Then, another, separate virtual universe grid is commanded to create universe user identifiers for the avatars, and they are inserted into the separate VU grid. Cleanup includes deleting the region and/or avatars from the first (source) virtual universe grid.
摘要:
The present invention provides a computer implemented method for transferring an item from a source virtual universe to a target virtual universe. A target virtual universe host opens a session between a source virtual universe host and itself. Next, it determines that the source virtual universe host is authorized to transmit the item to the target virtual universe host. Next, it receives a command from a client computer to transfer the item from the source virtual universe host to the target virtual universe host. Next, it receives item data in the target virtual universe host.
摘要:
A method and system are provided in which a charging process for rechargeable batteries is controlled in accordance with a recommended inactive or storage maximum battery charge level which is obtained from a battery manufacturer or other data source. In one embodiment, the battery charging system accesses a battery manufacturer's website in order to determine the manufacturer's recommended charging characteristics, including a maximum battery charge level for an inactive or storage status, for the particular battery being charged. When connected to a power source, the battery being charged is not permitted to be charged to a fully charged state but rather charged only to the lower storage charge level in order to increase the life span of the battery.
摘要:
Modifying display of an object in a display of part of a virtual universe is provided. In one embodiment, the process obtains avatar tracking data that identifies a location of an avatar in relation to a range of the object. The range includes a viewable field. The process then selects a data collection method based on the location of the set of avatars. In response to detecting an event for triggering modification of the object, the process calculates a set of color modifiers based on display setting data to form a modified color. Thereafter, the process renders the object using the modified color when the location of the set of avatars is within the range of the object.
摘要:
A system and related methods for providing a handler for requests to access a wireless network, operable by or separate from an enhanced personal firewall system, which obtains connection-related information from the operating system, network interface drivers, or both, and then provides that information to a controller which determines to allow or deny access. By collecting certain connection-related information, new levels and granularities of control are allowed and enabled. The process is equally well suited for implementation by a wireless device which may be in range of multiple servers or networks, such that the device may allow different levels of access to the device by the different servers or networks according to the collected connection-related information.