Abstract:
Methods, systems, and products protect personally identifiable information. Many websites acquire the personally identifiable information without a user's knowledge or permission. Here, though, the user may control what personally identifiable information is shared with any website. For example, the personally identifiable information may be read from a header of a packet and compared to a requirement associated with a domain name.
Abstract:
Methods, systems, and products protect personally identifiable information. Many websites acquire the personally identifiable information without a user's knowledge or permission. Here, though, the user may control what personally identifiable information is shared with any website. For example, the personally identifiable information may be read from a header of a packet and compared to a requirement associated with a domain name.
Abstract:
According to an aspect of this invention, a method to detect phishing URLs involves: creating a whitelist of URLs using a first regular expression; creating a blacklist of URLs using a second regular expression; comparing a URL to the whitelist; and if the URL is not on the whitelist, comparing the URL to the blacklist. False negatives and positives may be avoided by classifying Internet domain names for the target organization as “legitimate”. This classification leaves a filtered set of URLs with unknown domain names which may be more closely examined to detect a potential phishing URL. Valid domain names may be classified without end-user participation.
Abstract:
Disclosed are method and apparatus for identifying members of a social network who have a high likelihood of providing a useful response to a query. A query engine examines the personal pages of a set of members and automatically gleans semantic information relevant to the query. From the automatically-gleaned semantic information, a score indicative of the likelihood that the member may provide a useful response is calculated.
Abstract:
A method performed by a processing system including at least one processor includes applying a contextual filter to mask a portion of at least one of: an input of a software application, an output of the software application, or an underlying dataset of the software application, where the contextual filter simulates a limitation of a user of the software application, executing the software application with the contextual filter applied to the at least one of: the input of the software application, the output of the software application, or the underlying dataset of the software application, collecting ambient data during the executing, and recommending, based on a result of the executing, a modification to the software application to improve at least one of: an accessibility of the software application or an inclusion of the software application.
Abstract:
A method performed by a processing system including at least one processor includes applying a contextual filter to mask a portion of at least one of: an input of a software application, an output of the software application, or an underlying dataset of the software application, where the contextual filter simulates a limitation of a user of the software application, executing the software application with the contextual filter applied to the at least one of: the input of the software application, the output of the software application, or the underlying dataset of the software application, collecting ambient data during the executing, and recommending, based on a result of the executing, a modification to the software application to improve at least one of: an accessibility of the software application or an inclusion of the software application.
Abstract:
Aspects of the subject disclosure may include, for example, system and apparatus that enable operations that may include receiving, by a processing system, project data defining a proposed machine learning(ML) project of an entity and storing the project data in a project database with other project data for other projects. The operations may further include extracting extracted features of the proposed project and, based on the extracted features, determining a clustering assignment for the proposed project. Determining the clustering assignment may comprise comparing information about the proposed project including the extracted features with information about the other projects and assigning the proposed project to a cluster including one or more projects having similar bias characteristics as the proposed project. The operations may further include determining a risk of potential bias for the proposed project and, based on the risk of bias, recommending a corrective action to reduce the risk of bias. Machine learning models may be used for project clustering and bias score determination and may be readily updated as new ML projects are evaluated. Other embodiments are disclosed.
Abstract:
Aspects of the subject disclosure may include, for example, system and apparatus that enable operations that may include receiving, by a processing system, project data defining a proposed machine learning (ML) project of an entity and storing the project data in a project database with other project data for other projects. The operations may further include extracting extracted features of the proposed project and, based on the extracted features, determining a clustering assignment for the proposed project. Determining the clustering assignment may comprise comparing information about the proposed project including the extracted features with information about the other projects and assigning the proposed project to a cluster including one or more projects having similar bias characteristics as the proposed project. The operations may further include determining a risk of potential bias for the proposed project and, based on the risk of bias, recommending a corrective action to reduce the risk of bias. Machine learning models may be used for project clustering and bias score determination and may be readily updated as new ML projects are evaluated. Other embodiments are disclosed.
Abstract:
Disclosed are method and apparatus for identifying members of a social network who have a high likelihood of providing a useful response to a query. A query engine examines the personal pages of a set of members and automatically gleans semantic information relevant to the query. From the automatically-gleaned semantic information, a score indicative of the likelihood that the member may provide a useful response is calculated.
Abstract:
A method, computer readable medium and apparatus for determining a value of a user of a social network are disclosed. For example, the method measures user influence information of the user on the social network. The method then calculates the value of the user based upon the user influence information.