Abstract:
Input received into a first component of a user interface is mirrored in another component of the user interface. The first component of the user interface is monitored and changes to the first component are caused to occur in the second component. The first component may be configured to receive user input for an authentication claim.
Abstract:
Disclosed are various embodiments for active data, such as active decoy data. The active decoy data includes instructions that, when executed by a particular device, cause the particular computing device to determine whether the particular computing device is a target computing device. The particular computing device initiates a predefined action in response to determining that the particular computing device is not the target computing device. The approaches described herein may also be useful in wrapping and distributing digital content.
Abstract:
The techniques described herein provide software testing of a candidate version of software. In some examples, an interceptor intercepts at least one production request to a production version of the software and issues the production request to a shadow proxy service as a shadow request. The shadow proxy service causes the at least one shadow request to be processed by the candidate version of the software being validated and an authority version of the software being used to validate the candidate version. The shadow proxy service may then compare and/or analyze at least one candidate response to the shadow request from the candidate version and at least one authority response to the shadow request from the authority version. A dashboard service may provide at least some of the resulting information and issue a request the shadow proxy service to replay at least one of the shadow requests.
Abstract:
Techniques are described for dynamically enabling or disabling portions of an executing software module based on control data. During compilation of source code for a software module, switching instructions may be generated to enable the conditional bypassing of executable instructions for one or more functions described in the source code. In some cases, the switching instructions may be generated for the public functions of a software module. During execution of the software module, the switching instructions may trap a call to a function and dynamically determine whether to execute the function based on the value of control data corresponding to the function. A user interface may be presented to enable an operator to set the control data to enable or disable the execution of one or more functions.
Abstract:
Customers receive advertisements or “impressions” related to brick and mortar merchants while accessing online content. The merchants or other entities track which impressions correlate with customers coming to a physical store and conducting a transaction (e.g., making a purchase) by comparing transaction information with information about the customer that is provided by the source of online impressions. In one implementation, the merchant creates a hash from the customer's name and account number on a payment card. This hash is compared with a hash from the impression provider that is generated using the same technique. When a match is found, it is inferred that exposure to the online impression caused the customer to make a purchase at the physical store. Merchants may pay the impression providers an advertising or referral fee based on the matches.
Abstract:
Techniques are described for scheduling data access jobs based on a job dependency analysis. A requested primary data access job is analyzed to determine one or more preliminary data access jobs on which it depends, and an execution duration of each data access job is predicted based on historical data or other factors. A time-sensitive subset of the preliminary data access jobs is determined as the subset of those serially dependent preliminary data access jobs for which there is a minimum time difference between the total predicted execution duration and a requested target completion time. Data access jobs are scheduled with priority given to those preliminary data access jobs in the time-sensitive subset, to enable the primary data access jobs to be completed by the requested target completion times.
Abstract:
This disclosure is directed to, in part, providing information about a user to a requesting party where the information is provided by an identity provider that has a preexisting relationship with the user. The user may request the identity provider to provide the information to the relying party using an interactive voice response (IVR) system. After the relying party requests the user's account information, the user may be redirected, at least momentarily, to an IVR system provided by the identity provider. The IVR system may authenticate the user. Once authenticated, the identity provider may provide the user information to the relying party. By authenticating the user, the identity provider may provide the user information to the relying party without compromising user credentials or other private or sensitive information of the user.
Abstract:
Methods, systems, and computer-readable media for implementing automated services capacity modeling using call tracing are disclosed. A plurality of demand drivers are determined based on trace data for service interactions between services in a service-oriented system. The demand drivers are determined to drive a generation of service calls to a particular service. A total call volume is determined to the particular service based on the external demand drivers. An optimized quantity of computing resources to provide the particular service is determined based on the total call volume.
Abstract:
User input into a user interface is symbolically represented to increase security. User input received into a user interface and a mapping is applied to the user input. A result of the mapping is provided. The user interface may be updated to include the result of the mapping and/or may be provided to another device, such as over a short range communication channel. A person who views or otherwise has access to the user interface does not obtain the user input, but the result of the mapping indicates whether the user input was provided correctly.
Abstract:
Customers receive advertisements or “impressions” related to brick and mortar merchants while accessing online content. The merchants or other entities track which impressions correlate with customers coming to a physical store and conducting a transaction (e.g., making a purchase) by comparing transaction information with information about the customer that is provided by the source of online impressions. In one implementation, the merchant creates a hash from the customer's name and account number on a payment card. This hash is compared with a hash from the impression provider that is generated using the same technique. When a match is found, it is inferred that exposure to the online impression caused the customer to make a purchase at the physical store. Merchants may pay the impression providers an advertising or referral fee based on the matches.