摘要:
A system, method and computer program product for monitoring availability of end user devices needed for performing tasks. The system comprises a first network including one or more devices associated with an end user, at least one device adapted for communicating with a service provider over a second network, the service provider providing network-based services in the system. The system includes a memory storage device for maintaining information of tasks associated with an end user, the information including recommended end-user devices adapted to perform the tasks, the information being accessible to at least one end-user device. At least one end-user device detects non-availability or performance deficiencies of any end-user device required in performing end-user tasks, and communicates with the service provider for invoking network-based services to facilitate correcting non-availability of any end-user device. Such a system, method and computer program product enables students to receive these reminders and alerts, to order the necessary upgrades from suppliers via web services, and to monitor delivery from a single user interface provided on one of their devices.
摘要:
A system, method and computer program product for monitoring availability of end user devices needed for performing tasks. The system comprises a first network including one or more devices associated with an end user, at least one device adapted for communicating with a service provider over a second network, the service provider providing network-based services in the system. The system includes a memory storage device for maintaining information of tasks associated with an end user, the information including recommended end-user devices adapted to perform the tasks, the information being accessible to at least one end-user device. At least one end-user device detects non-availability or performance deficiencies of any end-user device required in performing end-user tasks, and communicates with the service provider for invoking network-based services to facilitate correcting non-availability of any end-user device. Such a system, method and computer program product enables students to receive these reminders and alerts, to order the necessary upgrades from suppliers via web services, and to monitor delivery from a single user interface provided on one of their devices.
摘要:
The present invention provides an approach to invoke advertisement(s) in a VU. Specifically, an advertisement is virtually associated with a user of the virtual space. The advertisement will then be visually referenced in the VU, and optionally distinguished/highlighted (e.g., using visual effects such as colors, icons, flashing icons, etc.). The advertisement will be invoked in response to a trigger occurring in the VU user in the). Once invoked, an action associated with the advertisement will be executed. The present invention can also allow for advertising user to be compensated for allowing their asset(s) to be associated with advertisement(s). Such compensation can be in the form of credits associated with the VU being provided to the advertising user and/or compensation to be provided to the user outside of the VU (e.g., in the real world in the form of money, gift certificates, goods and/or services, etc.).
摘要:
A virtual universe system has a system and method for identifying spam avatars based upon the avatar's behavior characteristics through the use of Turing tests. The system may provide a Turing test unit for performing Turing tests and an analysis unit that compares the behavior characteristics of new or newly changed avatars against the behavior characteristics of known spam avatars to determine if the avatar has known spam avatar characteristics. It may further have a scoring system to calculate a spam score based upon similarities of the comparison and identifying the avatar as a spam avatar based upon the calculated spam score. It may further compare the calculated spam score with a spam score threshold wherein the avatar is identified as a spam avatar if the calculated spam score is equal to or greater than the calculated spam score.
摘要:
A system and method in a virtual universe (VU) system for identifying spam avatars based upon the avatars' multimedia characteristics may have a table that stores multimedia characteristics of known spam avatars. It further may have an analysis unit that compares the multimedia characteristics of avatars against the multimedia characteristics of known spam avatars to determine if the avatar has known spam avatar characteristics. It may further have a scoring system to calculate a spam score based upon the similarities of the comparison and identifying the avatar as a spam avatar based upon the calculated spam score. It may further compare the calculated spam score with a spam score threshold wherein the avatar is identified as a spam avatar if the calculated spam score is equal to or greater than the calculated spam score. Multimedia characteristics include graphics, audio, movement, interactivity, voice, etc.
摘要:
A system, method and program product for providing a virtual universe in which unsolicited advertisements are embodied in automated avatars. A system is provided that includes: a registration system for introducing an advertisement avatar into the virtual universe; a targeting system for targeting a user avatar for delivery of advertising content by the advertisement avatar; a movement system for defining how the advertisement avatar is to move within the virtual universe; and an advertisement delivery system for defining how the advertisement avatar is to deliver the advertising content to the user avatar.
摘要:
A system and method to enhance user accessibility in a virtual universe and, in particular, to enhance user accessibility by providing information and/or actions to users participating in the virtual universe. The system comprises an assignment engine configured to assign an accessibility unit to an item within a virtual universe and a detection engine configured to detect a triggering event, which triggers the accessibility unit. The system also comprises an accessibility action engine configured to provide at least one of information and an action to a user when the accessibility unit is triggered.
摘要:
A system and article of manufacture for electronic communication warning and modification include automatically detecting an emotional state of a sender of an electronic communication, encoding the detected emotional state of the sender, using input from at least one additional source, as metadata, embedding the metadata in the electronic communication to create an annotated version of the electronic communication, and transmitting the annotated version of the electronic communication to a recipient.
摘要:
Business owners in a virtual universe may want to create a data source that transmits a data feed when certain parameters are met. Functionality can be implemented within a virtual universe to create a data feed when a trigger event occurs. The data feed may include data about the trigger event itself and/or about an avatar that caused the trigger. Triggered data feeds can be used to derive statistics, monitor use of objects and space and bill for such use, etc. In such cases, the user may be notified, such as via email, of the new data feed, as well as instructions on how to subscribe to it in their RSS reader or other client. Alternatively, users may be given individual feeds wherein additional feeds are distributed as separate categories of the user's feed as opposed to creating a separate feed.
摘要:
A system and method in a virtual universe system for triggering scans of virtual items and inventories of virtual items and for scanning the virtual items and inventories wherein the scans may be triggered by an avatar moving or teleporting from one region to another, or by an avatar picking up, dropping off, or accepting or purchasing an item. The degree of scanning may depend upon factors such as location where these scan triggers occur. The signature of the item may be identified by the scan process. The item signature may be compared against signatures of known malicious items stored in an inventory item signatures database and a summary of the signature comparison may be sent to a resident and stored in the resident's inventory.