Abstract:
Embodiments of the present invention are directed to a method and system for developing an analytic process. The method includes displaying, within an electronic system, a plurality of components operable to be used for designing a data analysis process. A user makes a selection of a data access component from the plurality of components. The data access component is operable for configuring access to a data source. The method further includes the user making a selection of a data selection component from the plurality of components and a data display component. The data selection component is operable for selecting data accessed via the data access component. The data display component is operable for configuring display of data based on the data selection component. Configuration data corresponding to the data access component, the data selection component, and the data display component can then be stored.
Abstract:
The present invention concerns a data acquisition and transfer device comprising a sensor responsive to change of predetermined nature, and a transmitter for transmitting over the mobile phone network data concerning the occurrence of such a change to a receiver station. Such devices can be used in monitoring patients compliance when undergoing drug trials and can form part of a system which polls the device for changes and keeps a record of all transmissions.
Abstract:
Single sign-on authorization in a multi-modal messaging system (212) wherein an authorization server hosts a virtual customer database (244) and an authorizer application (242). The authorizer application (242) generates a data service list and on request for authorization from a participating company server (232) a request for authorization, sends it to the wireless terminal (214) and updates the user profile in the virtual customer database (244) based on the response received from the wireless terminal (214).
Abstract:
A mechanism for securely transmitting credentials to instantiated virtual machines is provided. A central server is used to turn on a virtual machine. When the virtual machine is turned on, the central server sends it a secret text string. The virtual machine requests the credentials from the central server by transmitting the secret string and its instance ID. The central server validates the secret string and source IP to determine whether they are authentic. Once verified, the central server transmits the credentials to the virtual machine in a secure channel and invalidates the secret string. The credentials can now be used to authenticate API calls.
Abstract:
Disclosed herein are converged marketing architectures that may be utilized by retailers.in conjunction with and/or independent of consumer loyalty programs in order to improve targeted marketing efforts. Such architectures enable participating retailers to constantly generate and compile consumer activity and preferences information from a plurality of in-store and out of store activities, including e-commerce web site activity, television viewing and recording activity, and retail location activity. In certain embodiments, retail location activity may be monitored by one or more of RFID tracking sub-systems, smart shopping cart sub-systems, and point-of-sale information sub-systems.
Abstract:
This application relates to a computer readable medium storing a client application in the form of computer executable instructions that, when executed, cause a mobile terminal (201) to perform a method for receiving information relating to a selected topic, comprising: (i) querying (405) a user of the mobile terminal to select one of a push or pull mode of operation; (ii) when the user selects the push mode of operation: a). displaying a plurality of menus (701-705) to allow the user to identify desired information regarding which the user would like to remain updated, to identify one or more criteria specifying how often the user would like to receive updates, and to identify a number of prepaid messages for which the user would like to be charged; b). generating a coded short text messaging system message (707) based on the user's selection of the push mode of operation, and further based on the user's selections regarding desired information, criteria, and number of prepaid messages; and c). outputting the short text messaging system message for sending to a content provider (227) associated with the client application via a wireless telecommunications network.
Abstract:
This document describes a computer-implemented method for facilitating a check-in finalization process for a travel passenger. The method includes receiving one or more check-in parameters related to a check-in procedure for a passenger checking in for a travel segment, and determining from the received check-in parameters a check-in workflow status corresponding to which of a plurality of steps of the check-in procedure have been completed. The method also includes identifying one or more finalization actions that are available for finalizing the check-in procedure based on the check-in workflow status. The method further includes determining a primary finalization action from the one or more finalization actions, the primary finalization action being the finalization action most likely to be taken to finalize the check-in procedure. The method also includes providing for display on a user interface the available finalization actions, where the primary finalization action is pre-selected on the user interface.
Abstract:
A marketing optimization system triggers offline marketing actions based on online behavior. The system stores trigger events including conditions for each trigger event. The system also stores captured online behavior. The system includes a cross-channel campaign engine configured to determine from the captured online behavior whether the conditions are satisfied for a stored trigger event. If the conditions are satisfied, the cross-channel campaign engine triggers an offline marketing action associated with the trigger event. The system also optimizes trigger events based on an analysis of the captured online behavior.
Abstract:
A system includes a multidimensional data processing system storing meta data identifying a plurality of variables, a plurality of dimensions for each variable describing attributes of the variable, and a plurality of levels in each dimension. The meta data also identifies a hierarchy of the dimensions and levels for each variable. The multidimensional data processing system is configured to use the meta data to perform multidimensional queries to retrieve data for one or more of the variables from data storage. The system also includes a variable determination module determining at least one variable of the plurality variables operable to be used to generate a model, and a model generator receiving the data from the multidimensional data processing system and generating a model using the data.
Abstract:
A system and method for analyzing a customer load and/or generation profile in order to disaggregate the customer load and/or generation profile is provided. The analysis of the customer load and/or customer generation profile may thereby determine the one or more devices that are operating and that contribute to the customer load and/or generation profile. In this way, the system and method may automatically analyze the customer load and/or generation profile in order to determine the one or more devices that contribute to the load and/or generation profile.