摘要:
Detecting click fraud that includes a server that hosts a website that includes a web page containing an advertisement. The server provides an advertisement on a web page, provides pixel clusters on the web page with the advertisement, each pixel cluster having an associated mechanism for capturing whether a cursor on the web page has transited the associated pixel cluster, and collects information based on the capturing of each associated mechanism of information regarding the transit of the pixel cluster by a cursor. The collected information is useable in a determination of a confidence level pertinent to the determination of click fraud occurring on the advertisement on the web page. The server verifies the cursor on the web page has transited at least one pixel cluster on the web page prior to a controller of the cursor clicking the advertisement.
摘要:
A method for generating an assent indication in a document approval and review function can include loading a document for editing in a document editor and determining a set of authors for the document. The method also can include modifying a title of the document to include an identity of at least one of the authors in the set. Finally, the method can include changing a visual appearance in the title of an identity of the assenting author responsive to one of the authors in the set assenting to a publication of the document.
摘要:
Detecting click fraud that includes a processing device that receives data related to a cursor movement towards an advertisement displayed on a web page. The processing device analyzes the cursor movement data and determines a confidence level useable in the determination of click fraud, the confidence level responsive to the analysis of the cursor movement. The received data includes data that the cursor on the web page has transited at least one pixel cluster on the web page prior to a clicking the advertisement. In one embodiment, a click fraud is detected when the click occurred without the cursor crossing a pixel cluster, and no click fraud occurring when the click occurred after the cursor crossed a pixel cluster.
摘要:
Travel routes for a vehicle from a first location of the vehicle to a second location are generated. Different alternative travel routes are calculated from a first location to a second location selected by a user for a specific vehicle in a navigation system. For each of the different alternative travel routes, both estimated emissions of the specific vehicle and also estimated fuel consumption of the specific vehicle when following each of the different alternative travel routes are computed. Subsequently, each of the different alternative travel routes are presented to a user in the navigation system in connection with corresponding estimated emissions and fuel consumption for each of the different alternative travel routes.
摘要:
Embodiments of the present invention address deficiencies of the art in respect to telephonic phishing and provide a method, system and computer program product for preventing telephonic phishing. In an embodiment of the invention, a method for preventing telephonic phishing can be provided. The method can include receiving in a third-party validation service a request by an enterprise caller to establish a telephone call with a customer, validating the enterprise caller in the third-party validation service, and notifying the customer of whether or not the enterprise caller is legitimate or illegitimate.
摘要:
A rating is applied in connection with a sender of an electronic message and a use of an urgency indicator for the electronic message. A different electronic message is received from the sender, and an urgency indicator established for the different electronic message is modified responsive to the applied rating.
摘要:
A teleconference between at least two participants is evaluated by monitoring the teleconference and detecting a triggering event if more than one participant desires to speak at the same time. Upon detecting a triggering event, e.g., detecting an attempt of one or more participants to interrupt another participant, or detecting a request initiated by one or more participants to interrupt another participant, a dominant source is selected from among the ones of the participants attempting/requesting to speak based at least in part upon a determined hierarchal order of those participants attempting/requesting to speak. A participant is then selected from the participants to have the role of the dominant participant based upon the selected dominant source and only the speech of the dominant participant is conveyed to each participant through the teleconference system.
摘要:
Embodiments of the present invention address deficiencies of the art in respect to telephonic phishing and provide a method, system and computer program product for preventing telephonic phishing. In an embodiment of the invention, a method for preventing telephonic phishing can be provided. The method can include receiving in a third-party validation service a request by an enterprise caller to establish a telephone call with a customer, validating the enterprise caller in the third-party validation service, and notifying the customer of whether or not the enterprise caller is legitimate or illegitimate.
摘要:
Embodiments of the present invention address deficiencies of the art in respect to errata sheet management for published documents and provide a novel and non-obvious method, system and computer program product for errata sheet notification aggregation. In one embodiment of the invention, a method for errata sheet handling in an e-commerce system can be provided. The method can include registering a customer for errata sheet notification for a publication externally to a publisher of the publication and also externally to a publisher of errata sheets for the publication. The method further can include providing a notification to the customer of the publication of the errata sheet in response to determining the publication of an errata sheet for the publication by the publisher of errata sheets for the publication.
摘要:
Detecting click fraud that includes a client device capable of accessing a server hosting a web page containing an advertisement. The client device includes a network interface allowing access to the server and code on the client device. The code accesses and displays a web page containing an advertisement, provides mechanisms (e.g., an applet, an ActiveX control, a plugin, a JavaScript, a browser scripting language, browser extensions, or code native to the browser) associated with each pixel cluster where each mechanism captures information regarding the transit of the pixel cluster by a cursor on the web page, and collects information based on the capturing by each associated mechanism regarding the transit of the pixel cluster by a cursor on the web page.