会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 41. 发明授权
    • Dynamically acquiring computing resources in a networked computing environment
    • 在网络计算环境中动态获取计算资源
    • US09158590B2
    • 2015-10-13
    • US13204892
    • 2011-08-08
    • Gregory J. BossChristopher J. DawsonRick A. Hamilton, IIBrian M. O'Connell
    • Gregory J. BossChristopher J. DawsonRick A. Hamilton, IIBrian M. O'Connell
    • G06F15/173G06F9/50
    • G06F9/5061
    • The present invention provides an approach for dynamically acquiring computing resources in a networked computing environment (e.g., a cloud computing environment) based on infrastructure/computing resource needs. In a typical embodiment, a set of computing resources (needed to process a set of workloads) external to a first portion of a networked computing environment is identified. Once identified, electronic negotiations with at least one provider of the set of computing resources may be held for utilizing the provider's set of computing resources to process the set of workloads. In general, the negotiations are based on at least one resource registration (setting forth terms for utilizing the set of computing resources such as usage rates, usage limitations, etc.) associated with the at least one provider stored in at least one computer data structure. Responsive to successful completion of the negotiations, the set of computing resources will be associated with the first portion.
    • 本发明提供了一种基于基础设施/计算资源需求在网络计算环境(例如,云计算环境)中动态获取计算资源的方法。 在典型的实施例中,识别在网络化计算环境的第一部分外部的一组计算资源(处理一组工作负载所需的)。 一旦确定,可以保持与该组计算资源的至少一个提供者的电子谈判,以利用提供者的一组计算资源来处理该组工作负载。 通常,协商基于至少一个资源注册(提出利用与至少一个计算机数据结构中存储的至少一个提供者相关联的计算资源集合,例如使用率,使用限制等) 。 响应成功完成谈判,这套计算资源将与第一部分相关联。
    • 44. 发明申请
    • Security Enhancements for Immersive Environments
    • 沉浸式环境的安全性增强
    • US20130007636A1
    • 2013-01-03
    • US13172947
    • 2011-06-30
    • Gregory J. BossRick A. Hamilton, IINeil A. KatzBrian M. O'Connell
    • Gregory J. BossRick A. Hamilton, IINeil A. KatzBrian M. O'Connell
    • G06F3/048
    • G06F3/011
    • In some example embodiments, a method includes defining a tracking area for a first avatar in an online immersive environment, wherein the tracking area encompasses the first avatar and some defined area beyond the first avatar. The first avatar represents a first person who is a guardian of a second person in the real world and external to the online immersive environment. A second avatar represents the second person in the online immersive environment. The method includes tracking a path through the online immersive environment of the tracking area for the first avatar. The method includes marking a region in the online immersive environment as a safe zone for the second avatar, after the path of the tracking area for the first avatar has traversed the region. The method includes authorizing access to the region marked as the safe zone for the second avatar in the online immersive environment.
    • 在一些示例性实施例中,一种方法包括为在线沉浸式环境中的第一化身定义跟踪区域,其中所述跟踪区域包含所述第一头像和超出所述第一化身的某些限定区域。 第一个头像代表第一个人,他是现实世界中第二个人的守护者,在网络沉浸环境之外。 第二个头像代表在线沉浸式环境中的第二个人物。 该方法包括跟踪通过第一化身的跟踪区域的在线沉浸环境的路径。 该方法包括在第一化身的跟踪区域的路径经过该区域之后,将在线沉浸环境中的区域标记为第二化身的安全区域。 该方法包括授权访问被标记为在线沉浸式环境中的第二化身的安全区域的区域。