Patent classifications
H04L67/50
Longevity management of social network data
In an approach to longevity management of social network data, a computer detects a posting of a social artifact by a first user of a social network. A computer stores the social artifact with associated identification information. A computer stores activity associated with the social artifact by one or more other users. A computer detects a status change in an account associated with the first user, wherein the status change indicates the first user is not active in the social network. In response to detecting the status change, a computer determines a second user from the one or more other users to which to transfer the social artifact based on the social artifact, the associated identification information, and the activity associated with the social artifact by the one or more other users. A computer transfers the social artifact to an account associated with the second user on the social network.
Selective online content removal based on activity history
A computer that selectively removes online content associated with an individual is described. During operation, the computer may perform an enrollment process associated with the individual, where the enrollment process involves receiving credentials for one or more accounts associated with the individual. Then, based at least in part on the credentials, the computer may monitor a subsequent activity history associated with the individual, where the activity history includes online transactions associated with the individual, and where the online transactions are associated with multiple locations and the one or more accounts. When the computer receives information specifying an occurrence of an event (such as death or illness of the individual), the computer may, based at least in part on the monitored activity history, selectively remove the online content associated with the individual and at least some of the locations.
Method for sorting geographic location point, method for training sorting model and corresponding apparatuses
A method for sorting geographic location points, a method for training a sorting model and corresponding apparatuses are disclosed, which relates to the technical field of big data. A specific implementation solution is: receiving a query request for geographic location points of a vertical class from a user; inputting candidate geographic location point data of the vertical class into a preference model of the user, to obtain a preference score of the user for each candidate geographic location point; inputting the preference score of the user for each candidate geographic location point into a sorting model as one of sorting features of each candidate geographic location point, to obtain a sorting score of each candidate geographic location point; and determining, according to the sorting score of each candidate geographic location point, a query result returned to the user. The present disclosure can integrate preference factors of a user into sorting when the user queries geographic location points of a vertical class, so that query results can meet the user's personalized needs.
System for a product bundle and related methods
A system for a product bundle for purchase may include a user device associated with a given user, and a promotional server. The promotional server may obtain historical online browsing data associated with the given user, and obtain historical shopping data associated with the given user. The promotional server may also generate the product bundle based upon the historical shopping data and the historical online browsing data. The product bundle may include complementary products for purchase each having a purchase price associated therewith. The product bundle may have a bundle price that is less than a sum of purchase prices of each of the complementary products. The promotional server may communicate the product bundle and the bundle price to the user device for display thereon, generate a digital promotion redeemable toward the purchase of the product bundle, and communicate the digital promotion to the user device.
Correlation across non-logging components
Systems are provided for logging transactions in heterogeneous networks that include a combination of one or more instrumented components and one or more non-instrumented components. The instrumented components are configured to generate impersonated log records for the non-instrumented components involved in the transaction processing hand-offs with the instrumented components. The impersonated log records are persisted with other log records that are generated by the instrumented components in a transaction log that is maintained by a central logging system to reflect a complete flow of the transaction processing performed on the object, including the flow through the non-instrumented component(s).
SYSTEM AND METHOD FOR DETERMINING REAL-TIME RESOURCE CAPACITY BASED ON PERFORMING PREDICTIVE ANALYSIS
Embodiments of the present invention provide a system for determining real-time resource capacity of entity devices based on performing predictive analysis. In particular, the system may be configured to identify one or more users at a location of an entity device waiting to perform one or more interactions via the entity device, establish a communication link with the entity device, determine identity of the one or more users based on communicating with the entity device, calculate an estimated interaction amount associated with the one or more interactions of the one or more users, determine capacity of the entity device in real-time, identify that the capacity of the entity device does not meet the calculated estimated interaction amount, and transmit a notification to at least one user of the one or more users via the entity application present on a user device of the at least one user.
Spam detection
A method of determining that a client is likely engaged in the sending of spam emails via a network node. The method comprises, at the network node, defining a message size threshold and a message sending rate threshold, detecting the opening of Simple Mail Transfer Protocol, SMTP connections between a client device and an email server, identifying messages sent from the client over the SMTP connections which exceed said message size threshold and counting the identified messages to determine a client email message sending rate. The method further comprises making an assumption that the client is engaged in the sending of spam emails if the client message sending rate exceeds said message sending rate threshold.
Messaging and gaming applications rewards
Aspects of the present disclosure involve a system comprising a computer-readable storage medium storing at least one program and a method for providing a platform that facilitates communication between a messaging application and a web-based gaming application; receiving, via the platform, a request from the web-based gaming application to execute a reward activity; determining, by the messaging application, that the request satisfies a reward activity criterion; generating the reward activity on the messaging application in response to receiving the request; and communicating, via the platform, a status of the reward activity from the messaging application to the web-based gaming application.
Information processing apparatus and information processing method
Provided is an information processing apparatus and an information processing method that are capable of providing contents suitable for a user. The information processing apparatus includes an information generation section that refers to information related to an action history and an action schedule of a user acquired and a database of event content information regarding a plurality of events, and generates profile information of the user while tying together information of stay places in past and future of the user and information of artistes of the events, and an output section that sets a priority for each of the plurality of artistes on the basis of the generated profile information, and outputs a content corresponding to each of the artistes in accordance with the priority.
Systems and methods for securely using cloud services on on-premises data
The present disclosure relates to systems and methods for providing cloud-based services securely to on-premises networks or other infrastructure. More particularly, the present disclosure relates to systems and methods for enriching first-party data (e.g., data collected directly by an on-premises server) stored within on-premises networks by enabling the on-premises networks to retrieve and process third-party data stored on cloud-based networks. As a technical benefit, cloud-based services can be performed on the first-party data within the on-premises networks.