Techniques are disclosed for handling database queries from multiple different application versions using a single database. A computer system executing a database management system (DBMS) may receive a database query from a particular version of an application having a plurality of versions. The database query may specify the particular version. The computer system may then identify catalog tables, where the catalog tables include version information columns storing version access information. The computer system may determine that version access information for the database query indicates that one or more database objects corresponding to the database query are accessible to the particular version of the application. Based on the determining, the computer system may access one or more database objects that are responsive to the database query and are accessible to the particular version of the application, which may advantageously reduce or avoid duplication of data stored in the database.
Disclosed herein are system, method, and computer-readable storage-medium embodiments for automatic discovery of translated text. An embodiment may include relating a user-interface (UI) output with a corresponding localization object in a code-base index and matching a first instance of a unique identifier with a second instance of the unique identifier. The first instance of the unique identifier may be located in a code base corresponding to the code-base index, and the second instance of the unique identifier may correspond to the UI output. The code base may be structured to comprise the unique identifier in a given context. Further operations may include retrieving a reference to the corresponding localization object of the UI output in response to a determination that the UI output is incorrect in the given context, and outputting the reference to the corresponding localization object. The reference may be copied into a ticket of a tracking system.
Techniques are disclosed relating to refining, based on user feedback, one or more machine learning engines for automatically generating component-based user interfaces. In various embodiments, a computer system stores template information that defines a plurality of component types and one or more display parameters identified for one or more user interfaces. The computer system may receive a request to generate a user interface, where the request specifies a data set to be displayed. Further, the computer system may automatically generate a user interface, where the generating is performed by one or more machine learning engines that use the template information and the data set as inputs. The computer system may then provide the user interface to one or more users, receive user feedback associated with the user interface, and train at least one of the one or more machine learning engines based on the user feedback.
Among other things, embodiments of the present disclosure may utilize identification information associated with a user from a variety of sources in order to authenticate the user for a particular platform. Other embodiments may be described and/or claimed.
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
A method of visual search of a data set includes receiving a request from a client digital data device comprising an image and utilizing a detection model to identify, in the image, apparent objects of interest, as well as bounding boxes within the image of those apparent objects. For each of one of more of the apparent objects of interest, the method extracts a sub-image defined by its respective bounding box. A feature retrieval model is used to identify features of apparent objects in each of those sub-images, and those features are applied (e.g., as text or otherwise) to a search engine to identify items in the digital data set. Results of the search can be presented on a digital data device of a requesting user.
Disclosed herein are system, method, and computer program product embodiments for unifying graphical user interface (GUI) displays across different device types. In an embodiment, a unification system may convert various GUI view appearing on, for example, a desktop device into a GUI view on a mobile device. Both devices may be accessing the same application and/or may use a cloud computing platform to access the application. The unification system may aid in reproducing GUI modifications performed on one user device onto other user devices. In this manner, the unification system may maintain a consistent look-and- feel for a user across different computing device type.
Disclosed herein are system, method, and computer program product embodiments for synchronizing an offline briefcase. An embodiment operates by defining an offline briefcase for a user group that is accessible offline at an application. The embodiment detects a change to a component of the offline briefcase. The embodiment sends a push notification to the application based on the detected change to the component. The embodiment receives a synchronization request from the application in response to the sent push notification. The embodiment then sends the changed component to the application based on the synchronization request.
Disclosed herein are method, system and device embodiments for setting up a graphical user interface (GUI) for a commerce architecture. An embodiment operates by providing a GUI that displays a first button for adding a first data source and a second button for adding a second data source, the second data source being related to the first data source, receiving a first response via the first button to add the first data source and a second response via the second button to add the second data source, providing a view of a first data schema and a second data schema, wherein the first data schema includes at least one object from the first or the second data source, and wherein the second data schema is a canonical data model, mapping the at least one object of the first data schema to at least one object of the second data schema, and providing a single entity view of the at least one object of the second data schema.
Embodiments of apparatus, systems, and methods are described for creating and configuring a custom mobile application (app), with communities, using a graphical user interface (GUI). The GUI enables selection of a pre-configured template for creating a custom mobile app for a user group of a customer relationship management system or of an existing community. The GUI enables entry of metadata comprising identification of a specific user community of the custom mobile app. The GUI enables selection of a distribution model for the custom mobile app for the specific user community, further allowing entry of additional metadata comprising distribution model parameters and packaging parameters of the app. The GUI enables packaging of the app using the packaging parameters and publishing of the app to an app store using the distribution model parameters. The app becomes accessible from the app store for installation on a mobile device according to the distribution model.
Methods, systems, and computer program products for a customer relationship management (CRM) system are provided herein. Embodiments presented herein provide for exchange of data between disparate, distributed systems; subscribe to and/or publish customer data change event; creation of master records for consumers using static and streaming sources; providing data provenance, auditing capabilities, and queries across multiple tenants and third party systems. Embodiments provide a single view of a customer in a distributed system environment.
Disclosed herein are system, method, and computer program product embodiments for managing communication between one or more consumers and one or more representatives of an entity. In an embodiment, a mobile device receives a communication from a consumer including first piece of data relating to the consumer, and then presents the first piece of data. The mobile device is thereafter able to receive input comprising a second piece of data relating to the consumer, and then send the second piece of data to a primary server managed by an entity.
Disclosed herein are system, method, and computer program product embodiments for unifying graphical user interface (GUI) displays across different device types. In an embodiment, a unification system may convert various GUI view appearing on, for example, a desktop device into a GUI view on a mobile device. Both devices may be accessing the same application and/or may use a cloud computing platform to access the application. The unification system may aid in reproducing GUI modifications performed on one user device onto other user devices. In this manner, the unification system may maintain a consistent look-and-feel for a user across different computing device type.
Disclosed herein are system, method, and computer program product embodiments for improving user experiences within a cloud collaboration platform that integrates communication tools with word processor functions to enhance workflows, save time, and promote teamwork in the development of slide presentations. To improve usability, a cloud collaboration platform may furnish a reader mode to streamline the presentation review process. The reader mode may allow viewers to review the presentation as the presentation will eventually be presented to an audience. The viewers may provide comments and feedback on the presentation without being inundated with comments and metadata added to an edit mode of the presentation by the original authors.
14.
IDENTIFICATION AND APPLICATION OF HYPERPARAMETERS FOR MACHINE LEARNING
Methods and systems are provided to determine suitable hyperparameters for a machine learning model and/or feature engineering process. A suitable machine learning model and associated hyperparameters are determined by analyzing a dataset. Suitable hyperparameter values for compatible machine learning models having one or more hyperparameters in common and a compatible dataset schema are identified. Hyperparameters may be ranked according to each of their respective influences on a model performance metrics, and hyperparameter values identified as having greater influence may be more aggressively searched.
G06F 16/90 - Information retrieval; Database structures therefor; File system structures therefor - Details of database functions independent of the retrieved data types
Methods, systems, and devices for data retention handling are described. In some data storage systems, data objects are stored in a non-relational database schema. The system may support configurable data retention policies for different tenants, users, or applications. For example, a data store may receive retention requests, where the retention requests may specify deletion or exportation actions to perform on records contained within data objects. The data store may determine retention rules based on these retention requests, and may periodically or aperiodically evaluate the rules to determine active actions to perform. To improve the efficiency of the system, the data store may aggregate the active actions (e.g., according to the dataset to perform the actions on), and may generate work items corresponding to the aggregate actions. A work processor may retrieve these work items and may efficiently perform the data retention actions on datasets stored in the data object store.
A method of filtering content from a data set includes accepting a search request directed to a data set associated with a site, the search request including a search term that is not among terms represented in a site-specific lookup table representing site-specific relatedness of terms in that data set, such related terms including any of synonyms, hypernyms and hyponyms; generating an approximating lookup table by applying a transformation function to a corpus lookup table, the corpus lookup table representing relatedness, in a general corpus, of terms in the data set; identifying terms represented in the approximating lookup table that are related terms of the search term; and filtering from the data set digital content that includes any of the search term and the terms identified from the approximating table as related terms of the search term.
Disclosed herein are system, method, and computer program product embodiments for performing external change detection without copying data from an external system. An embodiment operates by transmitting a registration request comprising data selection criteria to a data service at an external system. The external system generates a tracking token representing a transaction state of a data object satisfying the data selection criteria. The embodiment receives the tracking token. The embodiment detects a change to the data object in the external system using the tracking token. The embodiment receives the change to the data object from the external system based on the detecting. The embodiment then processes the change to the data object.
Methods, systems, and devices for user authentication are described. A user may attempt an authentication procedure when accessing an application or cloud platform. When the user requests access to the application or cloud platform, a server may determine one or more unique identifiers to display at a first application for the user, and the user may select one of the unique identifiers. The server may then display unique identifiers (e.g., in some cases, the same unique identifiers) at a second application associated with the user. The user may verify that the selected unique identifier is displayed on the second application, and may select the same unique identifier in the second application. Additionally, the user may input a user-specific identifier to confirm their identity. The server may authenticate the user's identity if the user selected matching unique identifiers, and if the user-specific identifier matches an expected identifier for the user.
Technologies for injecting dynamic content into microblogging posts are described, where dynamic content may be updated each time a post or feed is fetched or refreshed. A user of may add a placeholder for dynamic content when composing a post. The placeholder indicates a data provider and a data parameter. When the post is published, the data provider and data parameter are stored along with the other content of the post. When the post is requested, every placeholder in the post is parsed and content is obtained for every placeholder by passing the data parameter to the data provider. The placeholder is replaced with the data returned by the data provider and the post is provided to the requesting entity including the obtained data in place of the placeholder.
Techniques are disclosed relating to creating and managing an information flow within a multi-layer computer network. In various embodiments, a computer system in a first layer within a multi-layer computer network, maintains state information defining an information flow within the multi-layer computer network. In various embodiments, the computer system assigns a particular action (that is included in the information flow) to be performed at a second, different layer of the multi-layer computer network. In various embodiments, the computer system generates program instructions to perform the particular action. The program instructions may be generated using device information accessible to the computer system and indicative of characteristics of a computer system within the second layer. In various embodiments, the computer system in the first layer causes the program instructions to be sent to the computer system in the second layer to perform the particular action as part of the defined information flow.
H04L 67/02 - Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
H04L 67/10 - Protocols in which an application is distributed across nodes in the network
H04L 41/22 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
H04L 61/103 - Mapping addresses of different types across network layers, e.g. resolution of network layer into physical layer addresses or address resolution protocol [ARP]
Systems and methods are provided for migrating a tenant of a database system from a source database instance to a destination database instance. The systems and methods include quiescing the tenant data of the tenant to be migrated from the source database instance to the destination database instance so that no new data is written to the storage of the database system associated with the tenant identifier at the source database instance, transmitting metadata of the tenant to be migrated from the source database instance to the destination database instance, and modifying, at the destination database instance, the metadata of the tenant so that the destination database instance has information to point to groupings of data in the storage for the destination database to access the tenant data.
System and methods are provided for creating a tenant of a database system, the tenant to have tenant data stored in an immutable storage of the database system associated with a tenant identifier. A request may be received at the database system to create a new tenant. A template tenant metadata of a template tenant may be selected at the database system to create the new tenant based on the received request. A new tenant identifier may be created at the database system based on the selected template tenant metadata. The new tenant may be created by associating the new tenant identifier with a snapshot of at least a portion of the template tenant metadata at a point in time when the template tenant metadata is made accessible to the new tenant. Systems and methods are also provided for removing a tenant of a database system by removing references to a tenant identifier.
Systems and methods are provided for performing a point-in-time restore of data of a first tenant of a multitenanted database system. Metadata can be located to identify an archival version of first data of the first tenant stored in immutable storage of the database system. The archival version includes a most recently committed version of each datum prior to a first point in time. By using the metadata, a restore reference set is mapped into a target database instance of the database system. The mapping can be performed when all existing data for a tenant is to be the archival version, and where versions of data and records committed after the point in time are not available to the target database instance.
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
Disclosed herein are system, method, and computer program product embodiments providing color theme maintenance for presentations. An embodiment operates by receiving a border image, a background color rule, a text color rule, and compiling the rules into a theme for a presentation. The compiled theme is provided to an application configured to display the presentation including the compiled theme in accordance with the background color rule and the text color rule.
Disclosed herein are system, method, and computer program product embodiments for displaying a presentation across various electronic devices. An embodiment operates by receiving a presentation slide comprising a plurality of layout segments and an object. The embodiment determines a device characteristic for an electronic device. The embodiment determines the object in a layout segment of the plurality of layout segments. The embodiment determines a layout rule based on the determined device characteristic, the determined layout segment, and a property of the object. The embodiment modifies the object based on the determined layout rule. The embodiment then outputs a layout result based on the presentation slide and the modified object.
Disclosed herein are system, method, and computer program product embodiments for managing cloud-based document permissions. In an embodiment, a document generation system may generate and/or store a cloud-based document. The document generation system may also generate links to the cloud-based document. The generated links may be associated with different permissions. For example, a first link may allow a first client device accessing the first link to edit the document while a second link may allow a second client device accessing the second link to only view the document. Other permissions may also include generating distinct graphical user interfaces (GUIs) associated with different links. The GUIs may accept input messages and/or comments in a chat panel. The document generation system may facilitate the delivery of these input messages to other client device with document access.
Disclosed herein are system, method, and computer program product embodiments for performing automatic layout of an object in a presentation slide. An embodiment operates by implementing a graphical user interface defining a plurality of layout segments on a presentation slide. The embodiment receives an object from a user via an input gesture. The embodiment determines the object is in a layout segment of the plurality of layout segments. The embodiment determines a layout rule based on the determined layout segment and a property of the object. The embodiment then modifies the object based on the determined layout segment. The embodiment outputs a layout result based on the presentation slide and the modified object.
G06F 17/00 - Digital computing or data processing equipment or methods, specially adapted for specific functions
G06F 40/106 - Display of layout of documents; Previewing
G06F 3/04883 - Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures for inputting data by handwriting, e.g. gesture or text
The disclosed technology for accurate translation of elements in a web application includes systems and methods that provide a sanitization and exception- generation tool set configurable to present tags in a preliminary localization kit to a localization expert; and run a tag name convention enforcement tool against the preliminary localization kit, which parses extracted tags and locates key name strings and translatable text, then applies key naming rules that require presence of keywords from a list of valid keywords and that require key uniqueness. The tool set creates bug report stubs from a tag exception and accepts additional comments from the expert to include in a completed bug report, regarding the key name that triggered the exception; is configurable to generate sanitization correction files using the received key names and edited translatable text for processing by a developer; and includes a verification-in-context tool that supports debugging of a language pack.
Methods and systems are provided for assigning computational problems to be solved by compute nodes that have artificial intelligence problem-solving capability. A method includes receiving a computational problem to be solved. Node-related processing attributes of the compute nodes are used to determine which one or more of the compute nodes are capable of solving the computational problem. One or more of the compute nodes are selected to handle the computational problem based upon the determination.
An automated self-healing database system is provided that includes a primary database, an application server that writes data to the primary database and reads data from the primary database when it is available, a standby database that is a replica of the primary database, and a self-healing module (SHM). The SHM can automatically detect unavailability of the primary database, and if the standby database is available, the SHM can automatically enable the standby database as readable and writable, assign the standby database the role of primary database at the primary site to start replicating data to other standby databases, and use a pre-established connection between the application server and the standby database to allow the application server to read data from the standby database and to write data to the standby database resulting in the standby database assuming role of the primary database at the primary site.
G06F 11/16 - Error detection or correction of the data by redundancy in hardware
G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
31.
FORMATION AND MANIPULATION OF TEST DATA IN A DATABASE SYSTEM
Systems and methods are provided for creating a sandbox for an original tenant at a point in time, the original tenant having original tenant data stored in an immutable storage associated with an original tenant identifier, the original tenant data as of the sandbox creation point in time being a virtual snapshot of the original tenant data accessible by a sandbox tenant, where the sandbox tenant data can be changed without changing the original tenant data, and the original tenant data can be changed without changing the sandbox tenant data. A sandbox tenant is created by associating a sandbox tenant identifier with the virtual snapshot of the original tenant data and with sandbox tenant data created by the sandbox tenant subsequent to the sandbox creation point in time. Original tenant data is subsequently created and associated with the original tenant identifier, and is not accessible to the sandbox tenant.
G06F 11/36 - Preventing errors by testing or debugging of software
G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
G06F 16/21 - Design, administration or maintenance of databases
32.
MULTIVERSION CONCURRENCY CONTROL OF DATABASE RECORDS WITH UNCOMMITTED TRANSACTIONS
Systems and methods provide multi-version concurrency control of database records with uncommitted transactions. The system and methods may include receiving a query regarding a transaction counter number. When a transaction header identifying data is updated with the assigned transaction counter number, the updated transaction header may be used in identifying data as an instance of multiversion concurrency control information by the received query. A key lookup may be performed, and when the key lookup encounters an uncommitted row for a transaction number, a corresponding transaction header identifying data to identify a data array element to determine whether the transaction number is committed, and determining the transaction counter number when the transaction number is committed. The transaction counter number may be stamped on the row version record when it is determined that the row is committed.
Disclosed are examples of systems, apparatus, methods and computer program products for updating and managing multi-tenant non-relational database schemas. A database system maintains a multi-tenant non-relational database associated with multiple enterprises. A number of records are stored for each of the enterprises. The system also maintains a dynamic virtual table storing a number of records. A request is received from a user of the database system to define a data object within the database system. The request is processed, and an object script is generated based on the request, the object script defining one or more database columns in the database system that are associated with the data object. The dynamic virtual table is updated such that one or more virtual columns match the database column definitions in the object script. Existing columns of a shared table in the multi-tenant non-relational database are then updated to match the virtual columns in the dynamic virtual table.
G06F 16/21 - Design, administration or maintenance of databases
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
The technology disclosed relates to assigning field level security to fields extracted from primary sources on a batch basis and compiled into analytical, read-only databases, for ultra-fast, ad-hoc data exploration and faceted navigation on integrated, heterogeneous data sets. The method includes assigning field level security to the extracted fields by combining user selectable inheritance of field level security from source fields that yield the extracted fields, with pinning of inheritance of field level security for the extracted fields to reference fields in the database sources wherein the reference fields are distinct from the extracted fields. The disclosed method also includes receiving additional fields as unsecured data sets, and assigning field level security to the additional fields, received by combining user selectable explicit specification of field level security for the received fields with pinning of inheritance of field level security for the received fields to reference fields in the database sources.
Embodiments include an apparatus for securing customer data and include a processor, and one or more stored sequences of instructions which, when executed, cause the processor to store an encrypted first key fragment in a first storage area, store an encrypted second key fragment in a separate second storage area, wherein access to the first storage area and to the second storage area is mutually exclusive. The instructions further cause the processor to decrypt the encrypted first key fragment and the encrypted second key fragment using a key set and keys associated with a hardware security module based on receiving a request to derive a master key. The master key is derived using the decrypted first key fragment and the decrypted second key fragment and stored in an in-memory cache. The master key is used to encrypt or to decrypt encrypted customer data.
Disclosed herein are systems and methods for implementing data upload, processing, and predictive query API exposure including means for receiving a dataset in a tabular form, the dataset having a plurality of rows and a plurality of columns; processing the dataset to generate indices representing probabilistic relationships between the rows and the columns of the dataset; storing the indices in a database; exposing an Application Programming Interface (API) to query the indices in the database; receiving a request for a predictive query or a latent structure query against the indices in the database; querying the database for a prediction based on the request via the API; and returning the prediction responsive to the request. Other related embodiments are further disclosed.
In accordance with embodiments, there are provided mechanisms and methods for facilitating an auction-based fair allocation and usage of thread resources for user messages according to one embodiment in an on-demand services environment. In one embodiment and by way of example, a method includes receiving job requests and bids from a plurality of organizations over a network, where each job request and the corresponding bid is placed by a user associated with an organization having a resource currency value within a multi-tenant database system via a user interface at a computing device over the network, determining resource currency values associated with pending jobs relating to the plurality of organizations, wherein the resource currency values corresponds to resources dedicated to the pending jobs, and performing an auction of the received bids for resources that are not dedicated and remains available for purchase, where a bid includes a purchase request to purchase the available resources. The method may further include prioritizing the job requests based on the dedicated resources and the auction of the available resources, and processing the job requests based on the prioritized job requests.
Methods and systems for performing cross store joins in a multi-tenant store are described. In one embodiment, such a method includes retrieving data from a multi-tenant database system having a relational data store and a non-relational data store, receiving a request specifying data to be retrieved from the multi-tenant database system, retrieving, based on the request, one or more locations of the data to be retrieved, generating a database query based on the request, in which the database query specifies a plurality of data elements to be retrieved, the plurality of data elements including one or more data elements residing within the non-relational data store and one or more other data elements residing within the relational data store, and executing the database query against the multi-tenant database system to retrieve the data.
Methods and a system for exploiting the secondary traffic generated by social networking sites are disclosed. Traffic on a commercial website is constantly monitored by a web analytics tool, which collects traffic measurements of hits, button presses, enquiries, purchases etc, as well as the referrer URL of a site such as a social networking site through which the commercial website is accessed. The collected measurements are forwarded to a Referred Traffic Analysis System. Concurrently, the Referred Traffic Analysis System crawls the Internet and collects a large number of social networking sites, analyses their content by extracting insight terms and phrases from them. In a third step, the collected traffic measurements are correlated with the collected insights from the social networking sites, and the top insights that reoccur frequently enough to appear to be a driver for the measurements observed, are presented to the client. A corresponding system is also provided.
40.
SYSTEM AND METHOD FOR MANAGING A MESSAGING CAMPAIGN WITHIN AN ENTERPRISE
A method and system for managing a messaging campaign within an enterprise are disclosed. Such a method includes generating with a server a user interface, the interface being configured to allow a user to select a recipient list based upon one or more contextual attributes stored in a database, wherein the contextual attributes are based upon the interaction of one or more recipients with external systems. The method also includes selecting a recipient list using the user interface based upon a set of contextual attributes, generating electronic messages within a message campaign, and sending the electronic messages to recipients on the recipient list.
H04L 51/52 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
H04L 12/16 - Arrangements for providing special services to substations
A social messaging hub provides communication services for a data enabled device having Internet network access capabilities such as a portable media player, personal digital assistant, a Wi-Fi mobile platform, a tablet computer, portable e-Reader, a personal computer, a laptop and a netbook computer. The social messaging hub communicates with the data enabled device over the Internet or cellular data networks, and interfaces with a message infrastructure including mobile carriers, message aggregators, message exchanges and various specialized social messaging services, such as Microsoft Windows Live Messenger, AIM, Yahoo, GoogleTalk, Facebook and Twitter to enable bi-directional messaging communication. The user is given a registered phone number and unique IP addressable identification which serve as a source and destination identifier of the associated data enabled device. Messages may originate in or be delivered to other users' mobile telephones or in similarly equipped and provisioned IP data enabled devices.
H04L 51/52 - User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
H04W 4/14 - Short messaging services, e.g. short message service [SMS] or unstructured supplementary service data [USSD]
H04W 4/21 - Services signalling; Auxiliary data signalling, i.e. transmitting data via a non-traffic channel for social networking applications
H04L 51/58 - Message adaptation for wireless communication
H04L 12/16 - Arrangements for providing special services to substations
42.
SYSTEM, METHOD AND USER INTERFACE FOR GENERATING ELECTRONIC MAIL WITH EMBEDDED OPTIMIZED LIVE CONTENT
A system for introducing behaviorally tested live content (18) into an electronic mail message comprising at least one dynamic live content area (1006) sent through an e-mail service provider system (16) comprises memory and a click manager (28). The memory 5 includes behaviorally tested live content comprising image data. The click manager (28) receives an indication of the opening of the message by a recipient, whereupon the click manager (28) accesses the memory to retrieve behaviorally tested live content (18) and send the retrieved behaviorally tested live content (18) for rendering in the dynamic live content area (1006) of the electronic mail message opened by the one of the plurality of 0 recipients.
A method and system for determining on-line influence in social media is disclosed. A recursive site influence modeling module computes a site influence from aggregated viral properties of content hosted by the site and further integrates, in the formulation of the site influence model, the influence of commentors, commenting on the hosted content, and the influence of individuals cited in the content. The influence of the commentors and individuals is calculated by aggregating viral properties of related content and as well by taking into account the influence of outlets owned by the commentors and the individuals.
The invention teaches a method for creating and managing a website as an object oriented system, comprising: providing on a system server a plurality of hierarchical classes of objects, each of the classes representing one aspect of the storage, presentation and logic of a website; providing on a web server an interface operable to present representations of objects instantiating the plurality of hierarchical classes and receive commands meant to one of : instantiate a new object, destroy a presented object, and change a property of a presented object; and storing on a database server objects as a traversable tree in accordance with the plurality of hierarchical classes.
A targeted advertising system and method based on memes contained in content sources are disclosed. Content matching keywords-defining topics are identified from content sources and are further processed to extract the memes. Ad networks servicing the content are also identified and their reach for each meme determined. The system and method extract also viral dynamics of the content associated to a meme and use the aggregation of the viral dynamics as a measure of engagement level for the meme. The system and method allow a Marketer to select a meme based on the engagement level and to run an ad campaign against the meme. The advertisements are delivered through an Ad network and inserted at the meme page level when the content hosting the meme is accessed, the Ad network being selected based on its reach.
46.
METHOD AND SYSTEM FOR TARGETED ADVERTISING BASED ON TOPICAL MEMES
A targeted advertising system and method based on memes contained in content sources are disclosed. Content matching keywords-defining topics are identified from content sources and are further processed to extract the memes. Ad networks servicing the content are also identified and their reach for each meme determined. The system and method extract also viral dynamics of the content associated to a meme and use the aggregation of the viral dynamics as a measure of engagement level for the meme. The system and method allow a Marketer to select a meme based on the engagement level and to run an ad campaign against the meme. The advertisements are delivered through an Ad network and inserted at the meme page level when the content hosting the meme is accessed, the Ad network being selected based on its reach.