Abstract:
A method comprising: defining a first rate in accordance with which actions in a virtual universe occur; modifying, for a first area of the virtual universe, a rate at which an action occurs to a second rate different from the first rate, wherein said modifying causes actions in the first area to occur in accordance with the second rate.
Abstract:
A firewall control method includes receiving a data request at a firewall where the data request is associated with a program and determining whether a remote system condition exists for the associated program, where the remote system condition includes a condition to be satisfied based on information received from a particular remote system. Embodiments may also include, in response to determining that a remote system condition exists, determining whether the remote system condition is satisfied based on information received from the particular remote system. Embodiments may also include, in response to determining whether the remote system condition is satisfied, performing one or more firewall actions.
Abstract:
A method comprising: defining a first rate in accordance with which actions in a virtual universe occur; modifying, for a first area of the virtual universe, a rate at which an action occurs to a second rate different from the first rate, wherein said modifying causes actions in the first area to occur in accordance with the second rate.
Abstract:
The present invention provides a system, method and computer program for implementing a firewall control system responsive to process interrogations are disclosed. Embodiments of a method may include receiving a data request at a firewall where the data request is associated with a program and determining whether a process rule exists for the associated program, where the process rule includes a condition to be satisfied for a process of the user computer system. Preferred embodiments may also include, in response to determining that a process rule does exist, determining a method for evaluating a status of the process and determining a current status of the process. Preferred embodiments may also include determining whether the process rule is satisfied based on the current status of the process and using the determined evaluation method. Preferred embodiments may also include, in response to determining whether the condition of the process rule is satisfied, performing one or more firewall actions.
Abstract:
PROBLEM TO BE SOLVED: To provide a method for processing a form on the basis of an image. SOLUTION: The form is captured as an image. A plurality of field identifiers and field values in the form in the image are detected. The field identifiers and field values concerned are stored in image metadata. In another embodiment, a request for accessing the form is detected, and it is determined whether the form corresponds to one stored image among a plurality of stored images. In a case that the form corresponds to one stored image, metadata relative to the stored image concerned are retrieved. The metadata includes a plurality of the field values corresponding to the form and related text data. The plurality of the field values and related text data concerned are populated from the metadata, which relate to the stored image, to the form. COPYRIGHT: (C)2011,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To utilize a time when a user is concentrating on a challenge/response type test.SOLUTION: Advertisements are introduced to a challenge/response type test so that a chance of improving a brand power can be presented to a user. When the user tries to perform an access to content, a CAPTCHA test is presented to the user. The CAPTCHA test includes advertisements (for example, a logo, label or the like) and relevant questions to be answered by the user. The advertisements are selected on the basis of information relevant to the user. When the user succeeds in responding to the questions and/or making a response within a fixed time, a reward can be determined. On the basis of a cumulative response to the CAPTCHA test, cumulative total points can be kept for the user. The difficulty of the CAPTCHA test to be presented to the user can be increased according to the reward.
Abstract:
A computer implemented method, system, and computer program product for managing client connections to a server among a plurality of clients. A messaging server detects, by a first server, an attribute of a client connection that exceeds a threshold, wherein the attribute is a select write operation. The messaging server selects a client that connects to a server, responsive to detecting the attribute of the client exceeding the threshold of select write calls. The messaging server selects a connect mechanism of a second server, responsive to selecting the client. The messaging server transmits a migrate message to the client, the migrate message comprising at least a uniform resource identifier (URI).
Abstract:
Ausführungsformen der vorliegenden Erfindung betreffen das Instanziieren eines Codier-Wettbewerbs, um Problemen in Programmmodulen eine Lösung zuzuführen. Bei einer typischen Ausführungsform wird eine erste Anmerkung in einer Programmcode-Datei erkannt, die eine Gruppe von Programmmodulen aufweist. Die erste Anmerkung gibt im Allgemeinen eine Notwendigkeit einer Funktionalität an, die wenigstens einem Programmmodul aus der Gruppe von Programmmodulen zugehörig ist. In Reaktion auf ein Fehlen einer vorhandenen Bibliothek, die die Lösung aufweist, wird eine Angabe zum Instanziieren eines Codier-Wettbewerbs zwischen einer Gruppe von Entwicklern zum Bereitstellen der Lösung empfangen. In Reaktion auf die Angabe wird eine zweite Anmerkung in die Programmcode-Datei eingefügt. Der Codier-Wettbewerb kann dann instanziiert werden, um eine Gruppe von Entwickler-Bibliotheken zu identifizieren, die eine Möglichkeit zum Bereitstellen der Lösung aufweisen. Anhand des Codier-Wettbewerbs kann die Lösung dann identifiziert und umgesetzt werden.
Abstract:
Generally speaking, systems, methods and media for authenticating a user to a server based on previous authentications to other serversare disclosed. Embodiments of amethod for authenticating a user to a servermay include rec eiving a request to authenticate the user to the server and determining whet her authenticating the user requires matching an authentication plan.If a pl an is required, the method may also include accessing a stored authenticatio n plan with authentication records each having expected information relating to user access to a different server. The method may also include receiving an indication of the user s current authentication plan from an authenticat ion store where the plan has authorization records each having current infor mation relating to user access. Embodiments ofthe method may also include co mparing the stored authentication plan with the received current authenticat ion plan to determine whether they match and, in response to a match, authen ticating the user.
Abstract:
Verfahren zum Einrichten einer Peer-to-Peer- (P2P) Kooperation von Herausgebern in einer Publikations-Abonnement- (Pub/Sub-) Nachrichtenübertragungsumgebung, wobei das Verfahren aufweist:Einrichten einer P2P-Datenübertragung zwischen einem Satz von Herausgebersystemen in der Pub/Sub-Nachrichtenübertragungsumgebung;Ermitteln eines Satzes von Daten, der dem Satz von Herausgebersystemen gemeinsam und potenziell zwischenspeicherbar ist;Erzeugen einer eindeutigen Kennung, die dem Satz von Daten auf mindestens einem aus dem Satz von Herausgebersystemen entspricht, wobei die eindeutige Kennung den Satz von Daten als zwischenspeicherbar kennzeichnet;gemeinsames Nutzen der eindeutigen Kennung innerhalb des Satzes von Herausgebersystemen;Zuordnen der eindeutigen Kennung zu dem Satz von Daten;Senden einer ersten Nachricht, die den Satz von Daten und die eindeutige Kennung aufweist, an ein Vermittlersystem in der Pub/Sub-Nachrichtenübertragungsumgebung;Empfangen der ersten Nachricht auf dem Vermittlersystem;Suchen nach der eindeutigen Kennung;Veranlassen, dass der Satz von Daten in einem Cachespeicher gespeichert wird;Senden der ersten Nachricht an einen Satz von Abonnentensystemen in der Pub/Sub-Nachrichtenübertragungsumgebung, Empfangen einer zweiten Nachricht auf dem Vermittlersystem von einem beliebigen aus dem Satz von Herausgebersystemen, wobei die zweite Nachricht eine abgekürzte Nachricht aufweist, die anstelle des Satzes von Daten die eindeutige Kennung aufweist;Suchen nach der eindeutigen Kennung in der abgekürzten Nachricht;Abrufen des Satzes von Daten von dem Cachespeicher;Ersetzen der eindeutigen Kennung in der zweiten Nachricht durch den Satz von Daten, um eine vollständige Nachricht zu erzeugen; undSenden der vollständigen Nachricht an den Satz von Abonnentensystemen.