Patent application number | Description | Published |
20100081508 | AVATAR PROTECTION WITHIN A VIRTUAL UNIVERSE - Methods, program products, services and devices are provided for protecting a protected avatar from actions of a second avatar within a virtual universe. Protection is implemented for a protected avatar from a second avatar within a virtual universe, including identifying an activity of the second avatar and disqualifying the second avatar from engaging in the identified activity within the virtual universe as a function of a relation of the identified activity to the protected avatar. A protective action is defined, associated with the identified activity and executable against the protected avatar or the second avatar. Activity of the protected avatar or the second avatar is monitored within the virtual universe for an occurrence of the identified activity, and the protective action is executed against the protected avatar or the second avatar in response to detecting the occurrence of the identified activity. | 04-01-2010 |
20100313145 | CONTEXTUAL DATA CENTER MANAGEMENT UTILIZING A VIRTUAL ENVIRONMENT - Contextual data center management utilizing a virtual environment is described. In one embodiment, there is a data center management tool for managing a physical data center from a representation of the physical data center operating in a virtual universe. The data center management tool includes a data center contextual object component configured to obtain a data center contextual object that describes operational information of the physical data center in the virtual universe. An operational change component is configured to implement at least one operational change to the representation of the physical data center in the virtual universe. The at least one operational change is implemented as a function of the data center contextual object. A management component is configured to manage the physical data center pursuant to a result obtained from implementing the at least one operational change. | 12-09-2010 |
20110010316 | PROVIDING A SEAMLESS CONVERSATION SERVICE BETWEEN INTERACTING ENVIRONMENTS - An approach that provides a seamless conversation service between interacting environments is described. In one embodiment, there is a seamless conversation service tool that includes a conversation commencement component configured to facilitate commencement of a conversation between two or more parties occurring over a communication path in one of two or more interacting environments. A user context monitoring component is configured to monitor a user context associated with the conversation. A user context change identification component is configured to identify a change in the user context of the conversation. A conversation transfer component is configured to transfer the conversation between the two or more interacting environments in response to the identified change in the user context, while maintaining a transparency of functionality of the communication path. | 01-13-2011 |
20110087522 | METHOD FOR DEPLOYING A PROBING ENVIRONMENT FOR PROVISIONED SERVICES TO RECOMMEND OPTIMAL BALANCE IN SERVICE LEVEL AGREEMENT USER EXPERIENCE AND ENVIRONMENTAL METRICS - A system and method of determining performance metrics for inclusion in a Service Level Agreement (SLA) between a customer and a host computing service provider. The method comprises: receiving a provisioning request from a customer including receiving computing performance requirement parameters and environmental parameters for inclusion in the SLA from the customer; deploying discovery tools to identify relevant infrastructure components based on performance metrics. Based on identification of the customer's relevant infrastructure components, probes are deployed and installed. Then, data is obtained from the probes while changing infrastructure components for simulating and assessing impact of one or more different customer scenarios for different performance policies. In one aspect, the obtained data is used to identify and implement an a priori risk sharing agreement between the customer and service provider. In a further aspect, the data obtained for simulating and assessing impact of one or more different customer policies include data for simulating and assessing different environmental policies. | 04-14-2011 |
20110138000 | APPLYING TAGS FROM COMMUNICATION FILES TO USERS - A method, data processing system, and computer program product for associating tags with a person or user. A computer receives a communication file. The computer determines a tag for the communication file to form a communication file association of the tag with the communication file. The computer identifies contact information for a user from the communication file. The computer forms a user association between the user and the tag. | 06-09-2011 |
20120270620 | AVATAR PROTECTION WITHIN A VIRTUAL UNIVERSE - Methods, program products, services and devices are provided for protecting a protected avatar from actions of a second avatar within a virtual universe. Protection is implemented for a protected avatar from a second avatar within a virtual universe, including identifying an activity of the second avatar and disqualifying the second avatar from engaging in the identified activity within the virtual universe as a function of a relation of the identified activity to the protected avatar. A protective action is defined, associated with the identified activity and executable against the protected avatar or the second avatar. Activity of the protected avatar or the second avatar is monitored within the virtual universe for an occurrence of the identified activity, and the protective action is executed against the protected avatar or the second avatar in response to detecting the occurrence of the identified activity. | 10-25-2012 |
Patent application number | Description | Published |
20080282356 | METHODS AND ARRANGEMENTS FOR DETECTING AND MANAGING VIEWABILITY OF SCREENS, WINDOWS AND LIKE MEDIA - In the context of screens, windows and like media, arrangements for automatically detecting when a recipient has entered or left a public setting so that privacy configuration changes can be automatically invoked. Also broadly contemplated herein is an arrangement for selectively displaying messages on the recipient's screen but deferring the messages from being visible on a remote hardware device or software display which is publicly visible. Furthermore, there is broadly contemplated herein a secure arrangement for revealing and responding to deferred messages. More generally, there is broadly contemplated herein a new approach to the provision of application notifications and to alarm control during a desktop screen sharing mode, based on the automatic detection of a screen sharing state and on notifying registered applications of the screen sharing in a unified, consistent manner. | 11-13-2008 |
20080313000 | SYSTEM AND METHOD FOR FACILITATING SKILL GAP ANALYSIS AND REMEDIATION BASED ON TAG ANALYTICS - This invention includes a workforce management system having a system bus, at least one database in communication with the system bus that includes data representative of workforce employees, and social networking data associated with the employees. A matching functional unit includes a text mining function for mining contextual information from the at least one database to generate context labels for an employee, a clustering function for generating concept labels for an employee, and a matching function that sorts and matches employees by the labels in accordance with a matching criteria. A user interface provides user input to the support operation of the workforce management system. | 12-18-2008 |
20090299988 | APPLICATION OF USER CONTEXT TO SEARCHES IN A VIRTUAL UNIVERSE - An approach that applies user context to searches in a virtual universe is described. In one embodiment, there is an enhanced virtual universe search tool that includes a receiving component configured to receive a query from an avatar that is online in the virtual universe. A scanning component is configured to scan a collection of avatar data describing attributes that are relevant to behavioral, search and informational needs of the avatar. A resource search component is configured to return search results for the query that are in accordance with the scanned collection of avatar data. | 12-03-2009 |
20090300493 | EXPLICIT USE OF USER CONTEXT OBJECTS IN A VIRTUAL UNIVERSE - An approach that facilitates explicit use of user context objects in a virtual universe is described. In one embodiment, there is a user context object tool that includes a user context object retrieving component configured to retrieve the plurality of user context objects for presentation to the avatar. A user context object selection and modification component is configured to receive a user context object selection and any desired modifications made to the user context object selection. A user context object permissions component is configured to permit the avatar to interact with the virtual universe in accordance with the user context object selection. | 12-03-2009 |
20100146402 | SYSTEM AND METHOD FOR VIRTUAL ENVIRONMENT PRESERVATION BASED ON AUTOMATED ITEM REDUCTION - A method implemented in a computer infrastructure having computer executable code, includes detecting one of an absence of a virtual universe (VU) occurrence in a VU within a predetermined time period, a special event in the VU and a change of real world status from a previous real world status. Additionally, the method includes determining a VU asset of a VU resident relevant to the VU occurrence, the special event or the previous real world status. Further, the method includes performing an automated asset reduction of the VU asset based on the determining. | 06-10-2010 |
20120311464 | System and Method for Virtual Environment Preservation Based on Automated Item Reduction - A method implemented in a computer infrastructure having computer executable code, includes detecting one of an absence of a virtual universe (VU) occurrence in a VU within a predetermined time period, a special event in the VU and a change of real world status from a previous real world status. Additionally, the method includes determining a VU asset of a VU resident relevant to the VU occurrence, the special event or the previous real world status. Further, the method includes performing an automated asset reduction of the VU asset based on the determining. | 12-06-2012 |
20130179455 | COLLABORATION DATA ORGANIZER - A system and method for organizing information relevant to a collaboration. An example method includes automatically calculating by a computer processor a relevance value of user-encountered information respective to the collaboration. The method also includes distributing to at least one attendee of the collaboration the user-encountered information if the relevance value is beyond a relevance threshold. | 07-11-2013 |
20130204653 | CONFLICTING MEETING SCHEDULER - A system and method for scheduling meetings at conflicting times. The method includes receiving from a meeting requestor a request to schedule a proposed meeting at a time interval. The method also includes determining that the time interval includes a conflicting meeting in an electronic calendar of at least one proposed meeting invitee. The method further includes automatically calculating by a computer processor a free-time probability value for the conflicting meeting based on at least one non-temporal attribute of the conflicting meeting or the proposed meeting. Additionally, the method includes automatically scheduling the proposed meeting if the free-time probability value is beyond a free-time probability threshold. | 08-08-2013 |
20130245855 | PEER-TO-PEER VEHICLE COMMUNICATOR - A system and method for communicating information between vehicle operators. The method includes receiving a request from a send vehicle operator to communicate a vehicle information message from a send vehicle. The method also includes generating the vehicle information message at the send vehicle. The method further includes sending the vehicle information message from the send vehicle to a receive vehicle. | 09-19-2013 |
20130311644 | MANAGING A SERVICE CATALOG THROUGH CROWDSOURCING - A method, system, and computer program product for managing a plurality of services in a service catalog. Metadata is received about one or more services. The metadata is analyzed to determine whether to perform a management activity on the service catalog, the management activity including recommending one or more services in the service catalog or coupling two or more services in the service catalog. If it is determined that the received metadata is insufficient, a signal is generated to gather additional metadata within a time period the metadata is determined to be insufficient. | 11-21-2013 |
20140067578 | LISTING A CANDIDATE SERVICE IN A SERVICE CATALOG - A method for listing a service in a service catalog. Feedback is received about a candidate service that is used to determine a score for the candidate service. It is determined whether the score for the candidate service exceeds a first threshold. If the score for the candidate service exceeds the first threshold, the candidate service is listed as a published service in the service catalog. Feedback is received about the published service that is used to determine a score for the published service. It is determined whether the score for the published service exceeds a second threshold. If the score for the published service exceeds the second threshold, a signal is sent to a service actualization unit to actualize the published service. | 03-06-2014 |
20140067579 | LISTING A CANDIDATE SERVICE IN A SERVICE CATALOG - A system and computer program product for listing a service in a service catalog. Feedback is received about a candidate service that is used to determine a score for the candidate service. It is determined whether the score for the candidate service exceeds a first threshold. If the score for the candidate service exceeds the first threshold, the candidate service is listed as a published service in the service catalog. Feedback is received about the published service that is used to determine a score for the published service. It is determined whether the score for the published service exceeds a second threshold. If the score for the published service exceeds the second threshold, a signal is sent to a service actualization unit to actualize the published service. | 03-06-2014 |
20140105407 | REDUCING NOISE IN A SHARED MEDIA SESSSION - A method for reducing noise in a shared media session. An indication is received from one or more of the participants in the shared media session. If the received indication is a first indication that indicates a background noise is present in the shared media session, the following steps are performed: a first counter is incremented for each of the first indications received from one or more of the plurality of participants, it is determined whether a background noise is present in the shared media session if the first counter exceeds a first threshold, an the shared media session is selectively muted such that the background noise is reduced if the background noise is determined to be present in the shared media session. | 04-17-2014 |
20140160224 | TRACKING PARTICIPATION IN A SHARED MEDIA SESSION - A system, method, and computer program product for tracking user participation in a shared media session. A shared media session is connected to, where the shared media session includes a plurality of participants. A first identity is determined for a first participant with a first confidence level. The first participant is identified as the first identity if the first confidence level is above a first threshold. An amount of participation is tracked for the first identity. The amount of participation by the first identity is displayed on an electronic calendar for the shared media session to the plurality of participants. | 06-12-2014 |
20140164501 | TRACKING PARTICIPATION IN A SHARED MEDIA SESSION - A method for tracking user participation in a shared media session. A shared media session is connected to, where the shared media session includes a plurality of participants. A first identity is determined for a first participant with a first confidence level. The first participant is identified as the first identity if the first confidence level is above a first threshold. An amount of participation is tracked for the first identity. The amount of participation by the first identity is displayed on an electronic calendar for the shared media session to the plurality of participants. | 06-12-2014 |
20140195944 | MANAGEMENT OF RESOURCES FOR TASKS WITH VIRTUAL COMPOSITE SERVICE AGENTS - A system, method and computer product for managing resources for tasks. An example system includes a rules database storing requirements and restrictions associated with a task. A graphical user interface contains resource icons of resources that can, at least partially, fulfill the requirements of the task and a virtual service agent (VSA) icon of a VSA associated with the task. When a resource icon is attempted to be dragged and dropped onto the VSA icon, the graphical user interface permits or prohibits the dragging and dropping responsive to a rules-checking module that checks violations of the restrictions. Furthermore, an agent-checking module ensures that at least one resource includes a software agent configured to answer natural language questions. The software agent queries data repositories and applies language processing, information retrieval, and machine learning to arrive at a conclusion. | 07-10-2014 |
20140195946 | MANAGEMENT OF RESOURCES FOR TASKS WITH VIRTUAL COMPOSITE SERVICE AGENTS - A system, method and computer product for managing resources for tasks. An example system includes a rules database storing requirements and restrictions associated with a task. A graphical user interface contains resource icons of resources that can, at least partially, fulfill the requirements of the task and a virtual service agent (VSA) icon of a VSA associated with the task. When a resource icon is attempted to be dragged and dropped onto the VSA icon, the graphical user interface permits or prohibits the dragging and dropping responsive to a rules-checking module that checks violations of the restrictions. Furthermore, an agent-checking module ensures that at least one resource includes a software agent configured to answer natural language questions. The software agent queries data repositories and applies language processing, information retrieval, and machine learning to arrive at a conclusion. | 07-10-2014 |
20140379403 | MODIFYING SERVICE LEVELS IN ONLINE MEETING SYSTEM - Systems, methods and computer program products for modifying of service levels based on contextual data of meeting entries in electronic calendars. An example system includes an electronic calendar module executed by a central processing unit. The electronic calendar module is configured to store a meeting entry for a scheduled meeting. The meeting entry includes contextual data for the scheduled meeting. A context-determining module is configured to determine a context for the scheduled meeting based on the contextual data. A service-modifying module is configured to automatically modify a service level of the scheduled meeting based on the context of the scheduled meeting. | 12-25-2014 |
20140379405 | MODIFYING SERVICE LEVELS IN ONLINE MEETING SYSTEM - Systems, methods and computer program products for modifying of service levels based on contextual data of meeting entries in electronic calendars. An example system includes an electronic calendar module executed by a central processing unit. The electronic calendar module is configured to store a meeting entry for a scheduled meeting. The meeting entry includes contextual data for the scheduled meeting. A context-determining module is configured to determine a context for the scheduled meeting based on the contextual data. A service-modifying module is configured to automatically modify a service level of the scheduled meeting based on the context of the scheduled meeting. | 12-25-2014 |