Patent classifications
G06F17/30
SYSTEMS AND METHODS FOR DYNAMIC VENDOR AND VENDOR OUTLET CLASSIFICATION
Certain embodiments of the present invention provide methods and systems for dynamic classification of electronic vendors. Certain embodiments provide a method for dynamic vendor classification. The method includes analyzing a vendor based on a comparison of vendor features; categorizing the vendor based on the analysis; and permitting access to the vendor according to the categorization of the vendor. The categorization may include trusted, not trusted, or unsure, for example. Analysis may include comparing a first outlet of the vendor with a second outlet of the vendor, for example. Analysis may include comparing an outlet of the vendor with an outlet of a second vendor, for example. A vendor may be defined as a particular outlet for a vendor and/or all outlets associated with a vendor (a vendor entity).
SYSTEM AND METHOD FOR LANGUAGE SENSITIVE CONTEXTUAL SEARCHING
A method, system and computer-readable media for searching a database and returning relevant results are disclosed. The method includes the steps of receiving a user query in one language, searching a database based on the user query to obtain one or more results, processing the results according to a local linguistic context association with the user query, and presenting to the user the results with an identifier for each result in which a local linguistic context around a location of the user query is in a second language.
PARALLELIZATION OF ELECTRONIC DISCOVERY DOCUMENT INDEXING
A system and method for parallelizing document indexing in a data processing system. The data processing system includes a primary processor for receiving a list of data having embedded data associated therewith, at least one secondary processor to process the data as provided by the primary processor, a data processor to determine a characteristic of the embedded data and process the embedded data based upon the characteristic, and a messaging module to exchange at least one status message between the primary processor and the at least one secondary processor.
METHOD AND SYSTEM OF USING A LOCAL HOSTED CACHE AND CRYPTOGRAPHIC HASH FUNCTIONS TO REDUCE NETWORK TRAFFIC
The described method and system enables a client at a branch office to retrieve data from a local hosted cache instead of an application server over a WAN to improve latency and reduce overall WAN traffic. A server at the data center may be adapted to provide either a list of hashes or the requested data based on whether a hosted cache system is enabled. A hosted cache at the client side may provide the data to the client based on the hashes. The hashes may be generated to provide a fingerprint of the data which may be used to index the data in an efficient manner.
Controlling Content Distribution
A computer-implemented method for controlling content distribution includes forwarding information associated with a user to a device operated by the user, the information being configured for use in selecting content from any of multiple content providers for a content distribution to the user. The method includes receiving, in response to the information, an edit of the information forwarded from the device. The edit identifies a first content provider and including a first modification of the content distribution regarding the first content provider. The method includes storing the edit in association with the information such that the first modification is taken into account in the content distribution. The method can be implemented using a computer program product tangibly embodied in a computer-readable storage medium.
IDENTIFYING CONTACTS
The present disclosure may include receiving a query from a computing device at a server having a database, the query identifying a desired attribute. The present disclosure may also include searching the database to identify contact information for at least one individual having the attribute corresponding to the query. The attribute may include at least one of skills, expertise, product, organization, geography and language The contact information may be transmitted to the computing device via an electronic message identifying the contact information.
METHOD FOR INPUTTING AND PROCESSING FEATURE WORD OF FILE CONTENT
A computer or computer retrieval system implemented method for inputting and processing file feature determination information by network terminal users. It includes providing terminal users with the items of the files according to query, determining the input feature word(s) according to the prescribed operation modes and the prescribed modes on the web page on which the item sequence(s) being located or a web page linked by that web page directly. Retrieval system can process the input information to create or improve a retrieval method or database used by users which can include different feature words or classification results, therefore the search efficiency would be greatly improved
Mechanism for Deprecating Object Oriented Data
Techniques are described to allow the deprecation of classes in an object-oriented data model, such as a CDM for a CMDB. When a class is deprecated and replaced by another existing or new class, data associated with instances of the deprecated class may be migrated to the replacement class. A mapping between the deprecated class and its replacement class may be provided to allow existing applications to continue to access data using the deprecated class without change until the deprecated class is finally deleted or the application is updated to use the replacement class. New applications written to use the object-oriented data model after the deprecation may use the replacement class to access data instances created using the original data model.
RULE-BASED SYSTEM AND METHOD TO ASSOCIATE ATTRIBUTES TO TEXT STRINGS
A method implemented in a data processing system includes receiving a plurality of text strings. A plurality of rules are applied to the text strings. If a condition specified in one of the rules exists in a given text string, one or more attributes are associated to that text string as metadata. One or more of the text strings are selected, using the metadata, as a potential title for the content. A final title is prepared based on the potential title, and the content is published online under the final title.
INTERNET-BASED PROXY SERVICE TO MODIFY INTERNET RESPONSES
A proxy server receives from a client device a request for a network resource that is hosted at an origin server for a domain. The request is received at the proxy server as a result of a DNS request for the domain resolving to the proxy server. The origin server is one of multiple origin servers that belong to different domains that resolve to the proxy server and are owned by different entities. The proxy server retrieves the requested network resource. The proxy server determines that the requested resource is an HTML page. The proxy server scans the HTML page to locate one or more modification tokens that each indicates content that is subject to being modified. For at least one of the located modification tokens, the proxy server automatically modifies at least a portion of the content of the HTML page that corresponds to that modification token. The proxy server then transmits the modified HTML page to the client device.