Y10S707/99934

METHODS AND SYSTEMS FOR SELECTING AND PRESENTING CONTENT ON A FIRST SYSTEM BASED ON USER PREFERENCES LEARNED ON A SECOND SYSTEM

A method of selecting and presenting content on a first system based on user preferences learned on a second system is provided. The method includes receiving a user's input for identifying items of the second content system and, in response thereto, presenting a subset of items of the second content system and receiving the user's selection actions thereof. The method includes analyzing the selected items to learn the user's content preferences for the content of the second content system and determining a relationship between the content of the first and second content systems to determine preferences relevant to items of the first content system. The method includes, in response subsequent user input for items of the first content system, selecting and ordering a collection of items of the first content system based on the user's learned content preferences determined to be relevant to the items of the first content system.

REGISTRY DRIVEN INTEROPERABILITY AND EXCHANGE OF DOCUMENTS

The present invention relates to systems and methods for registry driven transformation of a document exchanged between businesses or applications. More particularly, it relates to systems and protocols for using one or more commonly accessible registries to transform electronic commerce documents among dissimilar interfaces, preferably XML documents. Particular aspects of the present invention are described in the claims, specification and drawings.

Secure system for allowing the execution of authorized computer program code

Systems and methods for selective authorization of code modules are provided. According to one embodiment, a kernel mode driver monitors events occurring within a file system or an operating system. Responsive to observation of a trigger event performed by or initiated by an active process, in which the active process corresponds to a first code module within the file system and the event relates to a second code module within the file system, performing or bypassing a real-time authentication process on the second code module with reference to a multi-level whitelist database architecture. The active process is allowed to load the second code module into memory when the real-time authentication process is bypassed or when it is performed and results in an affirmative determination.

APPARATUS AND METHOD FOR PROVIDING JOB SEARCHING SERVICES, RECRUITMENT SERVICES AND/OR RECRUITMENT-RELATED SERVICES
20170337519 · 2017-11-23 ·

An apparatus, including a memory device which stores work schedule information or scheduling information for an employer, hiring entity, individual, independent contractor, temporary worker, or freelancer; a receiver which receives a first request containing information regarding a request to obtain work schedule information or scheduling information for the employer, hiring entity, individual, independent contractor, temporary worker, or freelancer, and the first request is received from a first communication device; a processing device which is specially programmed for processing information contained in the first request and generates a first message containing the work schedule or scheduling information for the employer, hiring entity, individual, independent contractor, temporary worker, or freelancer; and a transmitter for transmitting the first message to the first communication device or to a second communication device.

Intelligent multimedia E-catalog
09754315 · 2017-09-05 · ·

An intelligent product catalog system provides for electronic creation, management and viewing of product information using a multimedia display system. A central database repository stores the product information and provides for an unlimited number of product attributes and dynamic reconfiguration of the product information. The central database repository comprises a meta data system, a scheme system and an object model system. A plurality of applications access the central database repository, the applications being automatically adaptive to the dynamic reconfiguration of the product information. A user interface provides display, sorting and filtering of the product information including the unlimited number of product attributes.

Method and system for managing database
09753977 · 2017-09-05 · ·

A database management method generates an execution plan with respect to a factorized character string generated by factoring an execution value list of a query and storing the factorized character string and an execution plan identifier associated with the factorized character string. The method includes receiving a factorized character string generated from a query; determining whether the factorized character string is stored in a memory; transmitting an execution plan identifier matching the factorized character string stored in the memory when the factorized character string is stored in the memory; generating and transmitting an execution plan identifier with respect to an execution plan of the factorized character string when the factorized character string is not stored in the memory; receiving a query request consisting of the execution plan identifier and an execution value list included in the query; and providing a query result obtained using the query request.

Estimating confidence for query revision models

An information retrieval system includes a query revision architecture that integrates multiple different query revisers, each implementing one or more query revision strategies. A revision server receives a user's query, and interfaces with the various query revisers, each of which generates one or more potential revised queries. The revision server evaluates the potential revised queries, and selects one or more of them to provide to the user. A session-based reviser suggests one or more revised queries, given a first query, by calculating an expected utility for the revised query. The expected utility is calculated as the product of a frequency of occurrence of the query pair and an increase in quality of the revised query over the first query.

In-context searching

A system limits search results based on context information. The system obtains the context information and a search query, and obtains a set of references to documents in response to the search query. The system then filters the set of references based on the context information and presents the filtered set of references to a user.

Secure system for allowing the execution of authorized computer program code

Systems and methods for selective authorization of code modules are provided. According to one embodiment, a kernel-level driver within a kernel of an operating system of a computer system intercepts activity in connection with a file system associated with the computer system or the operating system relating to a code module. A determination is made by the kernel-level driver regarding whether to allow the intercepted activity to proceed by performing a real-time authentication process of the code module with reference to a multi-level whitelist database architecture, including a local copy of a remote global whitelist database hosted by a trusted their-party service provider, a local whitelist database and a most recently used (MRU) cache. When the intercepted activity is allowed to proceed as a result of the determination, the code module is permitted by the kernel-level driver to be loaded and executed by the computer system.

METHODS AND SYSTEMS FOR SELECTING AND PRESENTING CONTENT BASED ON DYNAMICALLY IDENTIFYING MICROGENRES ASSOCIATED WITH THE CONTENT

A method of selecting and presenting content based on learned user preferences is provided. The method includes providing a content system including a set of content items organized by genre characterizing the content items, and wherein the set of content items contains microgenre metadata further characterizing the content items. The method also includes receiving search input from the user for identifying desired content items and, in response, presenting a subset of content items to the user. The method further includes receiving content item selection actions from the user and analyzing the microgenre metadata within the selected content items to learn the preferred microgenres of the user. The method includes, in response to receiving subsequent user search input, selecting and presenting content items in an order that portrays as relatively more relevant those content items containing microgenre metadata that more closely match the learned microgenre preferences of the user.