Abstract:
Disclosed are examples of systems, apparatus, methods, and computer program products for message delivery in a distributed server environment. In some implementations, a first dispatcher component can control an event stream. A first connection can be established between a first server and a client device. The first dispatcher component can identify a first event associated with the client device. A first message including an identifier can be generated. The first message can be provided to the client device. It can be determined that the first connection is unreliable. A second connection can be established with a second server responsive to receiving the identifier from the client device. A temporary second dispatcher component can be instantiated. The temporary second dispatcher component can identify a second event. A second message can be generated based on the second event. The second message can be provided to the client device.
Abstract:
Contact recommendations based on purchase history are described. A system creates a directed graph of nodes in which at least some of the nodes are connected by directed arcs, wherein a directed arc from a first node to a second node represents a conditional probability that previous users who purchased a first contact also purchased a second contact. The system identifies a set of contacts purchased by a current user. The system estimates a prospective purchase probability based on a historical probability that previous users purchased a specific contact and a related probability that previous users who purchased the specific contact also purchased a contact in the set of contacts, for each candidate contact. The system outputs a recommendation for the current user to purchase a recommended candidate contact based on a corresponding prospective purchase probability.
Abstract:
Methods and systems are provided for regulating access to a database by a server. One exemplary method involves the server receiving one or more requests for an activity with respect to the database and determining an attempted usage for the activity over a monitoring period by a source of the requests. When the attempted usage exceeds an allowed usage of the activity for the monitoring period, the server provides a human verification test to the source and thereafter initiates the activity with respect to the database in response to receiving a satisfactory human verification response to the human verification test from the source.
Abstract:
Methods and systems are provided for regulating access to a database by a server. One exemplary method involves the server receiving one or more requests for an activity with respect to the database and determining an attempted usage for the activity over a monitoring period by a source of the requests. When the attempted usage exceeds an allowed usage of the activity for the monitoring period, the server creates an entry in a cache that includes an identifier associated with the source of the one or more requests. Thereafter, the requested activity with respect to the database on behalf of the source may be prevented based on the entry in the cache.
Abstract:
A method and apparatus for multi-domain authentication is described. In one example, credentials are received for a user accessing a first domain. User access to the first domain and a second domain is confirmed. A token is created for access to the second domain and the is provided with access to the second domain.
Abstract:
Methods and systems are provided for regulating access to a database by a server. One exemplary method involves the server receiving one or more requests for an activity with respect to the database and determining an attempted usage for the activity over a monitoring period by a source of the requests. When the attempted usage exceeds an allowed usage of the activity for the monitoring period, the server provides a human verification test to the source and thereafter initiates the activity with respect to the database in response to receiving a satisfactory human verification response to the human verification test from the source.
Abstract:
Disclosed are examples of systems, apparatus, methods, and computer program products for message delivery in a distributed server environment. In some implementations, a first dispatcher component can control an event stream. A first connection can be established between a first server and a client device. The first dispatcher component can identify a first event associated with the client device. A first message including an identifier can be generated. The first message can be provided to the client device. It can be determined that the first connection is unreliable. A second connection can be established with a second server responsive to receiving the identifier from the client device. A temporary second dispatcher component can be instantiated. The temporary second dispatcher component can identify a second event. A second message can be generated based on the second event. The second message can be provided to the client device.
Abstract:
Systems and methods are provided for dynamic electronic message content. A first template is associated with a first electronic message service provider, and a second template is associated with a second electronic message service provider. The first template is incompatible with the second electronic message service provider and/or the second template is incompatible with the first electronic message service provider. Dynamic content for electronic messages is stored in a database accessible by the first electronic message service provider and the second electronic message service provider. The dynamic content includes electronic message addresses associated with intended recipients of the electronic messages. The first electronic message service provider is instructed to generate a set of electronic messages based on the dynamic content, wherein the first electronic message service provider uses the first template to generate the set of electronic messages.
Abstract:
A system and method for determining organizational hierarchy from contact data. A phrase having multiple terms representing a job title is received and converted to lower case, then concatenated with a symbol to separate the terms. The phrase is compared to a training set of predefined normalized phrases representing known job titles. If a match is found, a data record is created or updated with organizational hierarchy information associated with the matched phrase in the training set. If a match is not found, a term is removed from the phrase and the comparison repeated.
Abstract:
A system and method for determining organizational hierarchy from contact data. A phrase having multiple terms representing a job title is received and converted to lower case, then concatenated with a symbol to separate the terms. The phrase is compared to a training set of predefined normalized phrases representing known job titles. If a match is found, a data record is created or updated with organizational hierarchy information associated with the matched phrase in the training set. If a match is not found, a term is removed from the phrase and the comparison repeated.