Patent classifications
H04L67/133
System, method, and computer program for providing similar product recommendations for non-merchant publishers based on publisher preferences
The present disclosure relates to a system, method, and computer program for automatically providing similar product recommendations for sold-out products promoted on non-merchant publisher sites, wherein the similar product recommendations are filtered for publisher preferences. A computer system with a product database provides a platform that enables non-merchant publishers to search products in the database, create call-to-actions on publisher sites for products in the database, and automatically receive similar product recommendations when end users of the publisher sites attempt to purchase promoted products that are now sold out. Once a publisher creates a call-to-action for a product that subsequently becomes sold out, similar product recommendations are provided without requiring any action on the publisher's part to change the publisher's site. Similar product recommendations are tailored to each publisher to account for publisher preferences. Publisher preferences may be learned by the system based on publisher behavior or inputted by each publisher.
System, method, and computer program for providing similar product recommendations for non-merchant publishers based on publisher preferences
The present disclosure relates to a system, method, and computer program for automatically providing similar product recommendations for sold-out products promoted on non-merchant publisher sites, wherein the similar product recommendations are filtered for publisher preferences. A computer system with a product database provides a platform that enables non-merchant publishers to search products in the database, create call-to-actions on publisher sites for products in the database, and automatically receive similar product recommendations when end users of the publisher sites attempt to purchase promoted products that are now sold out. Once a publisher creates a call-to-action for a product that subsequently becomes sold out, similar product recommendations are provided without requiring any action on the publisher's part to change the publisher's site. Similar product recommendations are tailored to each publisher to account for publisher preferences. Publisher preferences may be learned by the system based on publisher behavior or inputted by each publisher.
System and method for providing unique identifiers for use with enterprise application environments
In accordance with an embodiment, described herein is a system and method for providing unique identifiers for use with enterprise software application environments. A unique ID server (service) operates to provide calling applications with unique identifiers, for use by the applications in storing, accessing, or using data stored at a database or data warehouse. A database sequence provided by the database can be leveraged for issuing unique ID sequences for use by the applications. A calling application can reserve and/or request, via the unique ID service, sequences of unique IDs, ahead of time, either as a single sequence or bulk sequence. The unique ID can be subsequently used within the enterprise application environment for various purposes.
System and method for providing unique identifiers for use with enterprise application environments
In accordance with an embodiment, described herein is a system and method for providing unique identifiers for use with enterprise software application environments. A unique ID server (service) operates to provide calling applications with unique identifiers, for use by the applications in storing, accessing, or using data stored at a database or data warehouse. A database sequence provided by the database can be leveraged for issuing unique ID sequences for use by the applications. A calling application can reserve and/or request, via the unique ID service, sequences of unique IDs, ahead of time, either as a single sequence or bulk sequence. The unique ID can be subsequently used within the enterprise application environment for various purposes.
Communication protocol, and a method thereof for accelerating artificial intelligence processing tasks
A system and method for communicating artificial intelligence (AI) tasks between AI resources are provided. The method comprises establishing a connection between a first AI resource and a second AI resource; encapsulating a request to process an AI task in at least one request data frame compliant with a communication protocol, wherein the at least one request data frame is encapsulated at the first AI resource; and transporting the at least one request data frame over a network using a transport protocol to the second AI resource, wherein the transport protocol provisions the transport characteristics of the AI task, and wherein the transport protocol is different than the communication protocol.
Communication protocol, and a method thereof for accelerating artificial intelligence processing tasks
A system and method for communicating artificial intelligence (AI) tasks between AI resources are provided. The method comprises establishing a connection between a first AI resource and a second AI resource; encapsulating a request to process an AI task in at least one request data frame compliant with a communication protocol, wherein the at least one request data frame is encapsulated at the first AI resource; and transporting the at least one request data frame over a network using a transport protocol to the second AI resource, wherein the transport protocol provisions the transport characteristics of the AI task, and wherein the transport protocol is different than the communication protocol.
TREE-BASED LEARNING OF APPLICATION PROGRAMMING INTERFACE SPECIFICATION
A cybersecurity appliance monitoring application traffic to a web application programming interface (API) dynamically updates tree structures for the web API using the application traffic. An API tree generator generates batches of API trees from paths indicated in the application traffic. An API tree merger/pruner updates the generated batches of API trees with various merging, pruning, compacting, and malicious detection operations on the generated batches of API trees. The cybersecurity appliance implements the updated API trees with an API agent that filters the application traffic prior to processing by the web API.
System and method for improving content fetching by selecting tunnel devices
A method for fetching a content from a web server to a client device is disclosed, using tunnel devices serving as intermediate devices. The tunnel device is selected based on an attribute, such as IP Geolocation. A tunnel bank server stores a list of available tunnels that may be used, associated with values of various attribute types. The tunnel devices initiate communication with the tunnel bank server, and stays connected to it, for allowing a communication session initiated by the tunnel bank server. Upon receiving a request from a client to a content and for specific attribute types and values, a tunnel is selected by the tunnel bank server, and is used as a tunnel for retrieving the required content from the web server, using standard protocol such as SOCKS, WebSocket or HTTP Proxy. The client only communicates with a super proxy server that manages the content fetching scheme.
System and method for improving content fetching by selecting tunnel devices
A method for fetching a content from a web server to a client device is disclosed, using tunnel devices serving as intermediate devices. The tunnel device is selected based on an attribute, such as IP Geolocation. A tunnel bank server stores a list of available tunnels that may be used, associated with values of various attribute types. The tunnel devices initiate communication with the tunnel bank server, and stays connected to it, for allowing a communication session initiated by the tunnel bank server. Upon receiving a request from a client to a content and for specific attribute types and values, a tunnel is selected by the tunnel bank server, and is used as a tunnel for retrieving the required content from the web server, using standard protocol such as SOCKS, WebSocket or HTTP Proxy. The client only communicates with a super proxy server that manages the content fetching scheme.
Creating Product Orchestration Engines
A system can receive information about a first orchestration service that indicates a mapping from an application programming interface (API) to an executable script, and a dependency of the first orchestration service on a second orchestration service. The system can, in response to receiving the information, creating a base container image for the first orchestration service. The system can associate the API with executing the executable script on the base container image. The system can associate the dependency of the first orchestration service on the second orchestration service with the base container image. The system can, in response to receiving data indicative of a request to create an instance of the first orchestration service, creating an instance of the base container image.