Patent application number | Description | Published |
20100306652 | PRE-FETCHING ITEMS IN A VIRTUAL UNIVERSE BASED ON AVATAR COMMUNICATIONS - The present invention pre-fetches objects, textures and scripts (collectively referred to herein as items) through analysis of the communications of an avatar. Furthermore, if an object, texture or script is not pre-fetched upon arrival to a region the virtual universe's object, texture and script download system is augmented to prioritize objects the user may be interested in based on the avatar's communications and previously stated priorities. The present invention may improve user experience of virtual world by prioritizing the download and caching of objects, textures, and scripts that are likely to interest the user. Such a prioritization enhances the user experience by reducing wait times for the rendering of objects of interest. | 12-02-2010 |
20100306675 | PEER-TO-PEER BASED CONTENT DELIVERY IN A VIRTUAL UNIVERSE - The present invention permits performance adjustment in a virtual universe. In particular, the invention proposes a mixed server-based/peer-to-peer approach, in which transmission responsibilities are shifted towards peer-to-peer computing as the number of avatars within a region increases. The invention may foster fluid business transactions (e.g., sales) during times of high avatar load. | 12-02-2010 |
20100306853 | PROVIDING NOTIFICATION OF SPAM AVATARS - The system monitors activities, movements, and other behavior patterns necessary to determine whether an avatar is a spam advertisement. A storing mechanism stores a “black list” and a black list score consisting of a list of spam avatar identifications (UUIDs) matching avatars that have been flagged as confirmed or suspected spam advertisers. Another mechanism allows the owner to redraw or otherwise re-render a distinguishing mark or other audible signature when an avatar has been detected as being a spam advertiser. Yet another mechanism signals to the owner an offending avatar that they have been added to the black list or had a report filed against them, and a reason as to why (the methods used to identify them). Another mechanism allows for a black listed avatar to be removed from the black list, and scores to be decreased and for the virtual universe and users to utilize the black list and score. | 12-02-2010 |
20100313145 | CONTEXTUAL DATA CENTER MANAGEMENT UTILIZING A VIRTUAL ENVIRONMENT - Contextual data center management utilizing a virtual environment is described. In one embodiment, there is a data center management tool for managing a physical data center from a representation of the physical data center operating in a virtual universe. The data center management tool includes a data center contextual object component configured to obtain a data center contextual object that describes operational information of the physical data center in the virtual universe. An operational change component is configured to implement at least one operational change to the representation of the physical data center in the virtual universe. The at least one operational change is implemented as a function of the data center contextual object. A management component is configured to manage the physical data center pursuant to a result obtained from implementing the at least one operational change. | 12-09-2010 |
20100332997 | RULE-BASED CONTENT FILTERING IN A VIRTUAL UNIVERSE - A system that enables individuals or companies to allow an avatar's transits and communications within a virtual universe. The system enables the selection of regions and/or content. Additionally, companies can use this system to prevent accidental communication of proprietary material. Also provided are a method and a computer readable medium containing a program product including the method to enable individuals or companies to allow an avatar's transits and communications within a virtual universe. | 12-30-2010 |
20110010636 | SPECIFICATION OF A CHARACTERISTIC OF A VIRTUAL UNIVERSE ESTABLISHMENT - An approach that provides personalized control of a characteristic of a virtual universe establishment is described. In one embodiment, there is a virtual universe establishment characteristics control tool that comprises an establishment characteristic preference component configured to receive from a visiting resident a specified establishment characteristic preference for interacting with the virtual universe establishment. The virtual universe establishment characteristics control tool further comprises an establishment characteristic change component configured to change the establishment characteristic of the virtual universe establishment in accordance with the received establishment characteristic preference. | 01-13-2011 |
20110054918 | PREVENTING PROPAGATION OF MALICIOUS CONTENT IN A VIRTUAL UNIVERSE - An invention for preventing propagation of malicious content within a virtual universe is provided. In one embodiment, a malicious content propagation prevention tool provides this capability. The malicious content propagation prevention tool includes a scanning component configured to scan a plurality of inventory items within a virtual universe. An identification component is configured to identify a set of malicious inventory from the plurality of inventory items. The malicious content propagation prevention tool further comprises an assurance component configured to prevent propagation of malicious content within the virtual universe by performing at least one of the following: isolating the set of malicious inventory items, and modifying a malicious behavior caused by the set of malicious inventory items. | 03-03-2011 |
20110055726 | PROVIDING ALTERNATIVE REPRESENTATIONS OF VIRTUAL CONTENT IN A VIRTUAL UNIVERSE - An invention for automatically reducing a load on a server functioning with a virtual universe is provided. In one embodiment, there is an alternative representation tool, including a detection component configured to detect a load on a server, and a determination component configured to determine whether the load on the server exceeds a predefined threshold. The alternative representation tool further comprises a rendering component configured to provide an alternative representation of a virtual content renderable in the virtual universe to reduce the load on the server in the case that the load on the server exceeds the predefined threshold. | 03-03-2011 |
20110137999 | TAGGING COMMUNICATION FILES BASED ON HISTORICAL ASSOCIATION OF TAGS - To associate an email with a tag, an email client may receive a tag corresponding to an email attribute, wherein the email attribute is an historical email tag. The email client stores the tag to a record keyed by the email attribute, and receives an email tag request, the email tag request having a word attribute, and looks up at least one record based on the word attribute to find the tag. The email client presents the tag of the at least one record to a user. The email client receives a user selection of the tag to form a selected tag, and sends an email having the selected tag as part of the email header, wherein the email comprises the email tag request. | 06-09-2011 |
20110138000 | APPLYING TAGS FROM COMMUNICATION FILES TO USERS - A method, data processing system, and computer program product for associating tags with a person or user. A computer receives a communication file. The computer determines a tag for the communication file to form a communication file association of the tag with the communication file. The computer identifies contact information for a user from the communication file. The computer forms a user association between the user and the tag. | 06-09-2011 |
20110145042 | VEHICLE FUEL EFFICIENCY OPTIMIZATION BASED ON VEHICLE USAGE PATTERNS - An invention for indicating a vehicle fuel efficiency for at least one vehicle usage pattern is provided. The invention analyzes vehicle usage patterns to discern if the vehicle is being operated in a fuel-efficient manner. Patterns of inefficient operation are detected and conveyed to the user to inform the user of the impact of his/her inefficient operation. In these embodiments, a fuel efficiency tool provides this capability. Specifically, the fuel efficiency tool comprises: an analysis component configured to analyze a set of vehicle usage patterns of a vehicle, and a calculation component configured to calculate a vehicle fuel efficiency for each of the set of vehicle usage patterns. The fuel efficiency tool further comprises a notification component configured to provide a notification to a user of the vehicle indicating a vehicle fuel efficiency calculated for at least one of the set of vehicle usage patterns. | 06-16-2011 |
20110161837 | VIRTUAL WORLD PRESENTATION COMPOSITION AND MANAGEMENT - Embodiments of the present invention provide a method, system and computer program product for composing and managing a presentation in a virtual world. In an embodiment of the invention, a method for composing and managing a presentation in a virtual world can include arranging a set of slides in a presentation, selecting a location in a portion of a virtual world for displaying the slides and also for attendee avatars viewing the slides, composing movements and gestures of a presenter avatar in coordination with a display of slide content of the slides, and presenting the presentation in the location of the virtual world at the location selected for displaying the slides for the attendee avatars placed the selected location for the attendee avatars while applying the composed movements and gestures of the presenter avatar coordinated with a display of slide content of the slides. | 06-30-2011 |
20110167173 | Optimal Compression Process Selection Methods - A mechanism for determining an optimal compression technique for each data file when creating a computer archive file from a set of data files. A local archiving application receives an instruction to archive a set of data files and determines the file type and size of a data file in the set of data files. An optimal compression method for the data file is selected based on the file type and size of the data file. The archiving application compresses the data file using the optimal compression method. The archiving application updates meta data associated with the compressed file to include a meta compression format identifier of the optimal compression method used to compress the data file. The archiving application then repeats the determining, selecting, compressing, and updating for each data file in the set of data files to create an archive of the set of data files. | 07-07-2011 |
20110225016 | CONSTRAINED RESOURCE MANAGEMENT - Implementation of resource management services is provided. A method includes setting a price, per unit of a resource, for a defined time period and based upon a collective projected resource demand corresponding to resource consumption entities (RCEs). For the duration of the time period, the method includes iteratively performing: monitoring actual usage of the resource for each of the RCEs. If, in response to the monitoring, it is determined that a projected shortage exists for an RCE and a projected surplus exists for another RCE, the method includes re-allocating a number of projected surplus units of the resource from the RCE having the projected surplus to the other RCE having the projected shortage. If, in response to the monitoring, it is determined that a projected shortage exists for an RCE and no projected surplus exists for any of the other RCEs, the method includes acquiring additional units of the resource. | 09-15-2011 |
20110225276 | ENVIRONMENTALLY SUSTAINABLE COMPUTING IN A DISTRIBUTED COMPUTER NETWORK - Implementation of environmentally sustainable computing in a distributed computer network is provided. A method includes receiving a request from a node in the network to perform a computational task and identifying nodes in the network having resources to facilitate performance of the task. Using an environmental impact rating for each of the identified nodes, selecting one or more transmission paths in the network and/or at least one of the identified nodes to facilitate performance of the task based on corresponding environmental impact ratings and applied performance efficiency criteria. Selected identified nodes represent those having the lowest environmental impact rating while meeting the applied performance efficiency criteria. The method further includes executing the task on the node via the transmission paths and/or selected identified nodes. | 09-15-2011 |
20110225593 | INTERFACE-BASED ENVIRONMENTALLY SUSTAINABLE COMPUTING - Implementation of interface-based environmentally sustainable computing is provided. A method includes retrieving usage characteristics of a process scheduled to execute on a computer system and determining an environmental impact of the process on the computer system by mapping the usage characteristics of the process to corresponding environmental costs of the usage characteristics. The method also includes implementing an action on the computer system in response to the environmental impact. The actions are pre-configured for administration based upon a threshold level of environmental impact associated with the process and/or user selection. | 09-15-2011 |
20110252366 | DISCRIMINATING AMONG RESOURCES TO SHARE - An activity tracker defines a context for a screen sharing session, wherein the context includes at least one term of metadata. The activity tracker establishes a shared link to a second computer, comprising authenticating the second computer. The activity tracker shares at least a first resource rendered by a first application, wherein the first application renders data of the first resource. The activity tracker receives a preliminary user input to access a second resource, wherein the preliminary user input to access is a command to render a resource. The activity tracker or sharing controller renders the second resource to form a rendered second resource, wherein a computer environment comprises the first resource and the second resource. The activity tracker determines that the second resource fails to satisfy the context. | 10-13-2011 |
20110299834 | PROGRAM REVIEW ON ALTERNATE DISPLAY DEVICES - A system and a method of recording a branch of a program being viewed on a primary viewing device coupled to a video recorder for playback of the branch on a secondary viewing device including the steps of creating a branch point in a program responsive to receiving a signal through an interface of the video recorder; recording a branch of the program from the branch point onward in the readable storage media; and sending the recorded branch to the secondary viewing device for viewing. | 12-08-2011 |
20110299836 | REPLACE CONTENT WITH LIKE CONTENT TO ENHANCE PROGRAM EXPERIENCE - A method and a system for replacement of programs on a video recorder based on preferences and size constraints of a video recorder. The video recorder compares recorded programs in the computer readable storage media and a schedule of programs to be recorded to a plurality of global preferences and program specific preferences specifying preferred recording quality. For each recorded program whose quality does not match a global preference or program specific preference, a listing of future programs is examined for alternate versions of the program which do match a global preference or program specific preference. | 12-08-2011 |
20120007794 | FEEDBACK MECHANISM - A feedback application may be executing on a data processing system to transmit a screen update to at least two computers. The feedback application receives an indication of completion from a first computer, in response to transmitting the screen update. The feedback application updates a completion gauge to indicate a partial completion among participants, in response to receiving the indication of completion from the first computer. The feedback application receives a second indication of completion from a second computer, in response to transmitting the screen update. The feedback application updates the completion gauge to indicate a completion among participants, in response to receiving the indication of completion from the second computer. | 01-12-2012 |
20120011451 | SELECTIVE SCREEN SHARING - A privilege discriminator selects a first user to be in a first group of participants to participate in a screen sharing session. The privilege discriminator selects at least one second user to be in a second group of participants to participate in a screen sharing session. The privilege discriminator selects a first screen region for sharing to at least the first group of participants and selects a second screen region for sharing only to the second group of participants. The privilege discriminator shares the first screen region with at least the first group of participants, wherein the sharing is selecting a device authenticated as being used by one of the first group of participants. The presentation privilege discriminator sharing the second screen region with only the second group, based on selecting the second screen region and selecting the second group, excludes the first group from receiving the second screen region. | 01-12-2012 |
20120030341 | Transparent Header Modification for Reducing Serving Load Based on Current and Projected Usage - A method and system for dynamically altering the delivery of web content to end users based on server load. Responsive to receiving a client request for web content, utilization metrics are collected from each device involved in delivering the web content. A device load level is determined for each device based on the utilization metrics, a system load level is determined for a subset of the devices having the same device type based on the device load levels, and a service level to provide to the client is determined based on the system load level. The request header is modified to specify the service level to provide to the client, wherein the service level indicates the web content variant to deliver. The request is sent with the modified header to a selected device which serves the web content according to the service level to the client. | 02-02-2012 |
20120066290 | CLIENT/SUBSCRIBER ROTATION FOR SERVER RESILIENCY - A computer implemented method, system, and computer program product for managing client connections to a server among a plurality of clients. A messaging server detects, by a first server, an attribute of a client connection that exceeds a threshold, wherein the attribute is a select write operation. The messaging server selects a client that connects to a server, responsive to detecting the attribute of the client exceeding the threshold of select write calls. The messaging server selects a connect mechanism of a second server, responsive to selecting the client. The messaging server transmits a migrate message to the client, the migrate message comprising at least a uniform resource identifier (URI). | 03-15-2012 |
20120098640 | BIOMETRIC-BASED IDENTITY CONFIRMATION - Embodiments of the present invention provide an approach for confirming/verifying an identity of a test taker using a biometric analysis. For example, in the medical field, it is desirous to ensure that a given test is being administered to a correct individual (e.g., “test taker’). By comparing a given/submitted identity against a biometric-based identity, such verification can be performed. In one embodiment, the individual will submit biometric information via a biometric reader or the like coupled to a testing apparatus. The identity submitted by or on behalf of the individual (referred to herein as a “submitted identity”) will then be confirmed against the individual's identity as determined based on the biometric reading (referred to herein as a “biometric-based identity”). If the submitted identity and the biometric-based identity match, results of the test will be accepted. If the two identities do not match, then results of the test will be denied. Alternatively, if the identities do not match, then the testing apparatus could refuse to commence or complete the test. | 04-26-2012 |
20120122566 | ACCESS CONTROL FOR ELECTRONIC ENTERTAINMENT SYSTEMS - Systems and methods are provided for controlling the use of electronic systems based upon monitored physical activity. The method can be implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The program instructions are operable to: provision rules associated with a user and at least one of health metrics and physical activity of the user; monitor the at least one health metrics and physical activity of the user over a predetermined time; and manage access to any of a plurality of electronic systems based on the monitored at least one health metrics and physical activity being in compliance or non-compliance with the provisioned rules. | 05-17-2012 |
20120124562 | Application Programming Interface Naming Using Collaborative Services - A method, computer system, and computer program product for improving application programming interface naming. An alternate name is received for a target application programming interface feature from a consumer developer. In addition, an indirection to the application programming interface feature is generated based on the alternate name. Then, the indirection to the application programming interface feature is transmitted to an indirections repository. | 05-17-2012 |
20120137217 | SYSTEM AND METHOD FOR ADJUSTING INACTIVITY TIMEOUT SETTINGS ON A DISPLAY DEVICE - In general, embodiments of the invention provide an approach to proactively adjust timeout settings on a display device based on user activity. Specifically, a system and method are presented to adaptively adjust the inactivity timeout settings on a display device based on the application being used, the content being displayed on the device, and an analysis of the user's history with the application. The present invention calculates an inactivity timeout modifier which is utilized to modify the default operating system timeout value. | 05-31-2012 |
20120143960 | RELATED MESSAGE DETECTION AND INDICATION - A method, a computer program product, and a computer system for managing requests to send messages are presented. Header information associated with a set of incoming messages on a server data processing system is retrieved in response to receiving a request to send a drafted message from a client data processing system to the server data processing system. The header information is searched to determine whether an incoming message in the set of incoming messages is related to the drafted message. An indication that the incoming message is related to the drafted message is presented at the client data processing system in response to determining that the incoming message is related to the drafted message. | 06-07-2012 |
20120158886 | BEHAVIOR BASED CLIENT SELECTION FOR DISPARATE TREATMENT - Embodiments for server connection optimization in a persistently connected publish/subscribe environment are provided. A computer assigns an initial activity category for a client. The computer logs, into a log file, one or more select operations of a connection between a client and a first server. The computer calculates a ratio of a number of the select operations to a check time of the first server, wherein the check time is a period of time that has elapsed since a previous review of logged data. The computer sets a second activity category for the client based on a look-up of the ratio in a schedule of ratio ranges in a control file, wherein the second activity category is not the initial activity category. The computer transfers the client from the first server to a second server, in response to setting the second activity category. | 06-21-2012 |
20120221649 | PEER-TO-PEER COLLABORATION OF PUBLISHERS IN A PUBLISH-SUBSCRIPTION ENVIRONMENT - Embodiments of the present invention provide an approach for an enhanced pub/sub environment whereby a peer group of publishers is defined and can collaborate to determine when to cache data being sent to a common broker or brokers. Specifically, in a typical embodiment, configuration data or the like will be read to define a peer group among the publisher systems in the pub/sub messaging environment. Once such a group has been identified, communication therebetween will be established. Once cacheable data has been identified, a unique identifier/set of cache keys will be generated corresponding thereto and associated with the set of data. A message comprising the set of data and corresponding unique identifier will then be sent to a broker system (e.g., from the publisher system(s)), which will store (or have stored) the set of data in a cache, and pass the underlying message along to applicable subscriber system(s). | 08-30-2012 |
20120251084 | REPLACE CONTENT WITH LIKE CONTENT TO ENHANCE PROGRAM EXPERIENCE - A method and a system for replacement of programs on a video recorder based on preferences and size constraints of a video recorder. The video recorder compares recorded programs in the computer readable storage media and a schedule of programs to be recorded to a plurality of global preferences and program specific preferences specifying preferred recording quality. For each recorded program whose quality does not match a global preference or program specific preference, a listing of future programs is examined for alternate versions of the program which do match a global preference or program specific preference. | 10-04-2012 |
20130044996 | INTELLIGENT RECORDING - An audio/video recording method and system is provided. The method includes receiving by a processor of an audio/video recording device, a request for recording broadcast audio/video data. The processor analyzes audio/video presentation capabilities for audio/video presentation devices and formats of a first group of broadcast audio/video files associated with the broadcast audio/video data. Results of the analyses are compared and in response a first audio/video file is selected from the first group of broadcast audio/video files. The first audio/video file includes a first format requiring a first amount of storage space within a storage device of the audio/video recording device. The first format is associated with the audio/video presentation capabilities of a first audio/video presentation device and the first audio/video file is recorded. | 02-21-2013 |
20130066552 | POWER USAGE PLANNING FOR A VEHICLE - A method for providing route plans for a plug-in hybrid electric vehicle (PHEV) includes: receiving a destination from a user of the PHEV; determining a route from a current location of the PHEV to the destination; determining locations of one or more external power sources that can provide power to recharge batteries of the PHEV and that are located along the route; forming, with a computing device, a travel plan that includes at least one of: planned recharging stops selected from the locations, modes of operation for the PHEV along the route, and an order in which power provided by the external sources is used by the PHEV. | 03-14-2013 |
20130138671 | AUTOMATICALLY RECOMMENDING ASYNCHRONOUS DISCUSSION FORUM POSTS DURING A REAL-TIME COLLABORATION - An approach for augmenting a real-time collaboration is presented. Content of a real-time collaboration is received. A key word which is included in the content or a theme of the content is determined. A match between the key word or theme of the real-time collaboration content and a theme of post(s) in a threaded discussion forum is determined. Based on the match, a display, on a monitor used for the real-time collaboration, of link(s) to the post(s) is initiated. | 05-30-2013 |
20130151063 | ACTIVE AND STATEFUL HYPERSPECTRAL VEHICLE EVALUATION - A system, method and program product for evaluating a vehicle. A system is disclosed that includes: a plurality of hyperspectral sensors located in the vehicle; a system for fusing hyperspectral sensor data with user data into a feature vector; a support vector machine having a set of models, wherein the support vector machine implements a selected model based on the feature vector and outputs an evaluation based on data in the feature vector and the selected model; and a system for training the set of models. | 06-13-2013 |
20130174002 | Database Field Extraction for Contextual Collaboration - In a method for automated hyperlinking, a computer receives user input specifying a set of character sequence columns in a table to use for character sequence comparison. The computer detects whether a character sequence entered into an electronic communication in a user interface on a display matches one or more character sequences in fields of the set of character sequence columns. Responsive to the character sequence matching a single character sequence of the one or more character sequences in the fields of the set of character sequence columns, the computer retrieves, from an associated link field in the table, a hyperlink associated with the single character sequence. The computer inserts the hyperlink into the electronic communication. | 07-04-2013 |
20130185361 | TRANSMITTAL OF BLOCKED MESSAGE NOTIFICATION - A method according to one embodiment is for transmitting a message. In one embodiment, one or more processor of a messaging system identifies a certain message of the messaging system, the certain message being a blocked message intended for transmission to a certain user of the messaging system. In one embodiment, the one or more processor further determines one or more of a popularity of content of the certain message and a relevance of content of the certain message to the certain user, the certain user being a prospective recipient of a message. In one embodiment, the one or more processor transmits a message to the certain user responsively to a result of the determining of the one or more of a popularity of content of the certain message and a relevance of content of the certain message to the certain user of the messaging system. | 07-18-2013 |
20130204920 | TRANSFERRING SESSION DATA BETWEEN NETWORK APPLICATIONS - In a method for transferring session data from a first application accessible via at least one DNS name in a first DNS domain to a second application accessible via at least one DNS name in a second DNS domain, a computer receives via the first application a first HTTP request from an HTTP client, and in response, the computer establishes a first session with the HTTP client. The computer receives, from the HTTP client, a second HTTP request comprising an identifier of the second application, and in response, the computer stores in a memory a data structure identifiable by a data structure identifier and containing data pertaining to the first session. Responsive to storing the data structure, the computer transmits, to the HTTP client, an HTTP response comprising the data structure identifier, a redirection status code, and a URI comprising a DNS name in the second DNS domain. | 08-08-2013 |
20130219272 | MONITORING AND GUIDING USER INPUT AMONG MULTIPLE COMPUTER PROGRAM USER INTERFACES - An example method includes a device recording a user input as a recorded user input associated with a first computer program user interface, and providing a display output comprising a first display output for the first computer program user interface and a second display output for a second computer program user interface. The device receives a current user input via a user input device while the second user interface is currently configured to receive user inputs, and while the first user interface is not currently configured to receive user inputs. The device determines that the current user input matches the recorded user input, and in response, the device prevents the current user input from being received by the second computer program user interface and provides the current user input to the first computer program user interface. | 08-22-2013 |
20130254374 | RESOURCE ALLOCATION BASED ON SOCIAL NETWORKING TRENDS IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for allocating computing resources based on social networking/media trends in a networked computing environment (e.g., a cloud computing environment). In a typical embodiment, a baseline computing resource allocation will be determined for the networked computing environment based upon historical computing resource data (e.g., stored in at least one computer storage device). Social networking trend data corresponding to usage of a set of social networking websites may be received and analyzed to determine a forecasted computing resource allocation (e.g., based on social networking trends). The baseline computing resource allocation may be compared to the forecasted computing resource allocation to identify any difference therebetween. A computing resource allocation protocol/plan may then be determined based on the comparison (e.g., to address the difference). | 09-26-2013 |
20140055458 | RESOURCE PROVISIONING USING PREDICTIVE MODELING IN A NETWORKED COMPUTING ENVIRONMENT - An approach is provided for allowing a network computing (e.g., cloud computing) infrastructure to modify its resource allocation plan (e.g., an instance count) by using a Kth derivative vector plot, which may be generated using historical logs. Among other things, this approach enables an infrastructure to project an allocation forecast for a specified duration and adapt to changes in network traffic. | 02-27-2014 |
20140133826 | INTELLIGENT RECORDING - An audio/video recording method and system is provided. The method includes analyzing audio/video presentation capabilities for audio/video presentation devices and formats of a first group of broadcast audio/video files associated with the broadcast audio/video data. Results of the analyses are compared and in response a first audio/video file is selected from the first group of broadcast audio/video files. The first audio/video file includes a first format requiring a first amount of storage space within a storage device of the audio/video recording device. The first format is associated with the audio/video presentation capabilities of a first audio/video presentation device and the first audio/video file is recorded. | 05-15-2014 |
20140165029 | REPLACING ANNOTATED PROGRAM CODE IN A NETWORKED COMPUTING ENVIRONMENT - An approach for replacing one program code library (or method(s) thereof) with another program code library (or method(s) thereof) during execution is provided. Specifically, an annotation (e.g., comprising a runtime optimization request and associated performance/measurement criteria) within a program code file will be detected, analyzed, and used to monitor/assess the performance of a running set of methods of the program code file or the like (e.g., a set of initial/original methods). As this is occurring, a set of substitute methods will be identified from a program code library (e.g., based on similarities to the original set of methods) and likewise monitored/assessed. Based on the monitored performance, one or more alternate method(s) may be substituted for the original method(s) in the program code file. Such a capability allows for methods to be evaluated during runtime, and for performance to be optimized by utilizing the highest performing methods. | 06-12-2014 |
20140165031 | PROGRAM CODE LIBRARY CONSOLIDATION IN AN INTEGRATED DEVELOPMENT ENVIRONMENT - An approach for integrated development environment (IDE)-based program code library consolidation in a networked computing environment (e.g., a cloud computing environment) is provided. Under this approach, it may be determined whether to consolidate a first set of program code libraries in an integrated development environment (IDE). The determination may be based on consolidation criteria applicable to the first set of program code libraries. Based on the determination, the first set of program code libraries may be consolidated based on a set of consolidation preferences and a set of consolidation rules to yield a second set of program code libraries. An ordered list identifying the second set of program code libraries may then be generated. | 06-12-2014 |
20140165032 | PROGRAM CODE LIBRARY SEARCHING AND SELECTION IN A NETWORKED COMPUTING ENVIRONMENT - An approach for integrated development environment (IDE)-based program code library searching and selection in multiple programming languages in a networked computing environment is provided. In a typical embodiment, a search request (e.g., to locate a desired program code library) will be received in an IDE and parsed. The search request generally includes a set of annotations corresponding to at least one of: a primary program code language of the program code library, an alternate program code language of the program code library, or a method pair associated with the program code library. A search of at least one program code library repository will then be conducted based on the set of annotations, and a set of matching results will be generated. The set of matching results may include one or more program code libraries, and may be provided to a device hosting the IDE. | 06-12-2014 |
20140165034 | PROGRAM CODE LIBRARY SELECTION IN AN INTEGRATED DEVELOPMENT ENVIRONMENT - An approach for integrated development environment (IDE)-based program code library selection in a networked computing environment (e.g., a cloud computing environment) is provided. Under this approach, a search results file is received in a library selection IDE from a library searching IDE. It may then be determined whether to perform a micro-benchmarking on the at least one method and the at least one class. Based on the determination, the micro-benchmarking may then be performed on the at least one method and the at least one class. A set of code style similarity scores may then be calculated that indicate a similarity between the at least one method and the at least one class with the methods and classes of a second program code file. An ordered list of the methods and classes of the second program code file may then be provided. | 06-12-2014 |
20140189668 | PROCESSING PROPOSED PROGRAM CODE LIBRARIES IN A NETWORKED COMPUTING ENVIRONMENT - An integrated development environment (IDE)-based approach for processing/analyzing proposed program code libraries as a replacement for existing program code libraries in a networked computing environment is provided. A set of annotations associated with a set of program code files and a proposed (e.g., new, modified, etc.) program code library are received in an integrated development environment (IDE). It may then be determined whether the proposed program code library is an excluded program code library based on the set of annotations. It may also be determined whether the proposed program code library meets one or more thresholds for replacing an existing program code library. If the proposed program code library is not excluded and meets the threshold(s), the proposed program code library may then be provided to a computer device hosting the IDE (e.g., for implementation). | 07-03-2014 |
20140288812 | VEHICLE FUEL EFFICIENCY OPTIMIZATION BASED ON VEHICLE USAGE PATTERNS - Approaches for indicating vehicle fuel efficiency for vehicle usage patterns are provided. Patterns of inefficient operation are detected and conveyed to a user to inform the user of the impact of his/her inefficient operation. In these embodiments, a fuel efficiency tool provides this capability. The fuel efficiency tool comprises: an analysis component configured to analyze usage patterns of a vehicle; a calculation component configured to calculate a vehicle fuel efficiency for each of the usage patterns; and a notification component configured to: provide a real-time notification to a user of the vehicle indicating each of the following via a feedback device within the vehicle: a numerical representation of the vehicle fuel efficiency calculated for each of the plurality of recurring driver habits; and a monetary value indicating an amount of money sacrificed by at least one vehicle usage pattern that is contributing to inefficient vehicle fuel consumption. | 09-25-2014 |
20140330909 | AUGMENTING A REAL-TIME COLLABORATION WITH RANKED ELECTRONIC BULLETIN BOARD POSTS - An approach for augmenting a current instant message (IM) session is presented. The subjects of the first and second posts of electronic bulletin boards are determined to be similar to the text dialog of the IM session. The first post is determined to be from a first user who previously collaborated with a participant of the text dialog. The second post is determined to be from a second user who has not collaborated with the participant. Based in part on the first post being from the first user who previously collaborated with the participant and the second post being from the second user who has not collaborated with the participant, a first hyperlink to the first post is displayed relative to a second hyperlink to the second post to indicate the first post is ranked higher in relevance to the current IM session than the second post. | 11-06-2014 |
20140372609 | DYNAMICALLY EXPANDING COMPUTING RESOURCES IN A NETWORKED COMPUTING ENVIRONMENT - Embodiments of the present invention provide an approach for dynamically expanding cloud capacity (e.g., computing resources), based on infrastructure needs. In a typical embodiment, an available capacity of a set (e.g., at least one) of computing resources in the networked computing environment will be determined. Then, a future capacity needed for processing a set of workloads in the networked computing environment will be forecasted. Such a forecast can be made based on multiple factors/approaches. For example, the forecast can be made based upon at least one of the following: an average consumption of the set of computing resources over a predetermined period of time, a periodic estimation of consumption of the set of computing resources, a scheduled consumption of the set of computing resources, and/or a potential capacity of the set of computing resources. In general, the scheduled consumption can be determined based on at least one resource consumption schedule stored in a computer data structure, while the potential capacity can be determined based upon a set of application events associated with the set of workloads. Regardless of the approach utilized, once the future capacity has been forecasted, it will be determined whether the future capacity exceeds the available capacity. If so, the available capacity of the set of computing resources will be expanded (e.g., hardware and/or software elements will be added to the networked computing infrastructure and/or made available) until the available capacity at least meets the future capacity. | 12-18-2014 |
20150039715 | PUBLISHER-ASSISTED, BROKER-BASED CACHING IN A PUBLISH-SUBSCRIPTION ENVIRONMENT - Embodiments of the present invention provide an approach for a publisher-assisted, broker-based cache that can be utilized to reduce a volume of data (e.g., network traffic) delivered between a publisher and broker in a publication/subscription (pub/sub) environment. Specifically, in a typical embodiment, when a message is being generated on a publisher system, the publisher system will determine if the message includes a set of data that has a potential to be repeated in subsequent messages. Once such a set of data has been identified, the set of data will be associated/marked/tagged (e.g., in the message) with a unique identifier/cache key corresponding thereto (i.e., to yield a modified message). The modified message will be sent to a broker system, which will detect/locate the unique identifier, cache the corresponding data, and send the message along to any applicable subscriber systems. When a subsequent message that is supposed to contain the cached set of data is generated, the publisher system will instead substitute the unique identifier for the set of data to yield an abbreviated message and send the abbreviated message to the broker system. Upon receipt, the broker system will detect/locate the unique identifier, retrieve the corresponding set of data from the cache, replace the unique identifier with the set of data to yield a completed message, and then send the completed message to the applicable subscriber systems. | 02-05-2015 |
20150074169 | TRANSFERRING SESSION DATA BETWEEN NETWORK APPLICATIONS - In a method for transferring session data from a first application accessible via at least one DNS name in a first DNS domain to a second application accessible via at least one DNS name in a second DNS domain, a computer receives via the first application a first HTTP request from an HTTP client, and in response, the computer establishes a first session with the HTTP client. The computer receives, from the HTTP client, a second HTTP request comprising an identifier of the second application, and in response, the computer stores in a memory a data structure identifiable by a data structure identifier and containing data pertaining to the first session. Responsive to storing the data structure, the computer transmits, to the HTTP client, an HTTP response comprising the data structure identifier, a redirection status code, and a URI comprising a DNS name in the second DNS domain. | 03-12-2015 |