摘要:
A method, apparatus, and program product are provided for using watermarks to embed security features on avatars in a virtual world. A watermark engine receives security information for an avatar in a virtual world. The watermark engine creates a watermark for the avatar using the security information and associates the watermark with the avatar. The watermark may comprise at least one of: security preferences for the avatar, contact information for an owner of the avatar, and graphical information to cause alteration of the avatar when the avatar is recorded.
摘要:
A method, apparatus, and program product are provided for using watermarks to embed security features on avatars in a virtual world. A watermark engine receives security information for an avatar in a virtual world. The watermark engine creates a watermark for the avatar using the security information and associates the watermark with the avatar. The watermark may comprise at least one of: security preferences for the avatar, contact information for an owner of the avatar, and graphical information to cause alteration of the avatar when the avatar is recorded.
摘要:
A method, article of manufacture and apparatus for graphically summarizing the data in an initial query result set, including when rows are removed from the result set by applying a data quality standard is disclosed. When a user selects to change the data quality standard, a group of target rows are identified and removed from the user's display. A bitmap is generated to graphically represent the location of each row in the initial result set, including removed rows. A bitmap to summarize the data values for one or more columns in the initial result set may also be created. Thus, a user may quickly obtain an intuitive view of what the data looks like, without the need for complex analysis or graphing packages.
摘要:
An apparatus and method provide simple and secure financial transactions in an instant messaging (IM) environment. Two users may engage in an IM session (chat session), with negotiations for a product or service taking place during the chat session. One or both of the users may activate an IM financial transaction mechanism during the chat session. The IM financial transaction mechanism analyzes the chat text, and presents a draft transaction to both buyer and seller, with options based on the analyzed chat text. The draft transaction may be modified by both buyer and seller, who both confirm the draft transaction when all of the details are correct. The confirmed transaction is then sent to a web server that includes an interface to the buyer's online account, and payment is made by transferring the funds for the confirmed transaction from the buyer's online account to an account for the seller.
摘要:
A method, apparatus, system, and signal-bearing medium that in an embodiment save presented clips of a program and delete unpresented clips of the program. Meta-data associated with the program or embedded in the program to delineate the presented clips. The meta-data are created in response to commands that cause or end the presentation of the program, such as play, slow motion, skip, fast forward, or rewind commands.
摘要:
A method, article of manufacture and apparatus for graphically summarizing the data in an initial query result set, including when rows are removed from the result set by applying a data quality standard is disclosed. When a user selects to change the data quality standard, a group of target rows are identified and removed from the user's display. A bitmap is generated to graphically represent the location of each row in the initial result set, including removed rows. A bitmap to summarize the data values for one or more columns in the initial result set may also be created. Thus, a user may quickly obtain an intuitive view of what the data looks like, without the need for complex analysis or graphing packages.
摘要:
A client-server computing system suited particularly for clients of varying functional capabilities. Information handling capabilities are provided at the client and server on a customized, as-needed basis. When a service is needed by a client, the server determines a number of factors that may be relevant to the manner in which the service is to be provided. Then, the server selects from between two or more services having different executable code, and uploads the selected service to the client. Thus, the code may be tailored to the client's capabilities, or other aspects of its function. Services are not permanently retained by a client; rather, the client performs an analysis to determine whether services should be retained or purged. Also, state information is not permanently retained by a client; the server retains the information and uploads that information to the client. The server also manages its resources by loading service components on an as-needed basis.
摘要:
Embodiments of the invention provide techniques for optimizing the processing of abstract rules. In general, the results of executing an abstract query may be used as data inputs for processing an abstract rule. In one embodiment, query results may be sorted according to input field values required for processing a deterministic abstract rule. If a record of the sorted query results includes the same input values as a preceding record, then the rule output of the preceding record may be reused, rather than processing the abstract rule again. Accordingly, the demand load placed on a rule engine may be reduced.
摘要:
Embodiments of the invention provide a technique for finding anomalous values for fields with temporal autocorrelation, without resorting to complex query writing. When composing an abstract query a query interface may be provided for a user to input a temporal correlation conditions. The temporal correlation conditions may include a type of change, a delta value, and a time frame within which two data values must occur to be identified as an anomalous value. The time correlation conditions are then passed to a query builder configured to generate and execute a database query configured to identify anomalous values based on the time correlation conditions.
摘要:
Embodiments of the invention provide techniques for optimizing the processing of abstract rules included in rule set containers. In one embodiment, a first abstract rule may be identified as having an effect on a second abstract rule of the rule set container. A predicate and an action of the first abstract rule may be used in translating the second abstract rule into an executable rule. The executable rule performs the functionality included in the first and second abstract rules, while only requiring one rule execution in a rule engine. In another embodiment, the first abstract rule may be translated into a rejection query configured to return a rejection set. The second abstract rule may be translated into an executable rule that includes a condition that excludes any records included in the rejection set.