Abstract:
Concepts and technologies are disclosed herein for obtaining ratings using a rating service. A server computer executing a rating service can detect arrival of a user device at a vendor location. The server computer also can detect an interaction with a product offered at the vendor location by the user device. The server computer can determine that a rating for the product is to be requested, and can request the rating from the user device.
Abstract:
Potential click fraud is determined. When a client device activates an Internet advertisement, the location of the client device is determined. Multiple activations of the same advertisement, by the client device, may indicate fraud.
Abstract:
Methods, systems, and computer-readable media provide for utilizing a repeating function to improve quality of service. According to embodiments, a method for utilizing a repeating function to improve quality of service is provided. According to the method a first mobile cellular device is selected. An instruction is transmitted to the first mobile cellular device instructing the first mobile cellular device. The instruction causes the first mobile cellular device to relay communications between the second mobile cellular device and the cellular service provider. The first mobile cellular device thereby provides the repeating function for the second mobile cellular device.
Abstract:
Provided are a wireless communication device and a communication device control method that include a set of templates corresponding to a plurality of potential environmental circumstances. The templates may be stored in a database in the computer readable memory of the communication device. At predetermined intervals, a suite of environmental sensors integral to the communication device may periodically sample the user's environment. The user's environmental circumstances may be derived or inferred by an analysis module based on the output of the suite of environmental sensors and then may be compared to the templates to determine a matching template. An action script is then executed based at least partially on the matching template which may include the contacting of a responding party.
Abstract:
A trust evaluation may be obtained for a network element in a communication network. Based on this trust evaluation, one or more services may be invoked to address the risk that a potentially untrustworthy network element poses in the communication network. Application programming interfaces (APIs) may automate the invocation of trust-controlled services. An API for a trust-controlled service may be used to directly perform a function on one or more resources in the communication network or may be used to set up an ongoing function on one or more resources in the communication network that may continue until the API is used to terminate the function.
Abstract:
A communication network is operated by determining whether a network element can be trusted and monitoring traffic associated with the network element based on whether the network element can be trusted. At least some of the monitored traffic may be selected for examination based on the degree of trust for the network element. At least some of the monitored and/or examined traffic is selected to be blocked based on the degree of trust for the network element.
Abstract:
Methods, systems, and products are disclosed for specifying a signature for an encrypted packet stream. One method receives the encrypted stream of packets, and encryption obscures the contents of a packet. A signature for insertion into the stream of packets is specified, and the signature identifies a type of data encrypted within the stream of packets. The signature identifies the contents of the packet despite the encryption obscuring the contents.
Abstract:
Concepts and technologies disclosed herein are directed to escalation of feedback instances. In one aspect disclosed herein, a feedback instance escalation resolver (“FIER”) system can receive a feedback instance escalation request from an original feedback instance. The feedback instance escalation request can identify a deficiency in the original feedback instance. The FIER system can examine the feedback instance escalation request and an objective of the original feedback instance to identify a new objective of an escalated feedback instance. The FIER system can create a definition for the escalated feedback instance to satisfy the objective and can map the definition for the escalated feedback instance to an existing feedback instance model. The FIER system can generate a feedback instance escalation realization request directed to a feedback instance orchestrator and controller (“FIOC”) system. The feedback instance escalation realization request can instruct the FIOC system to realize the escalated feedback instance.
Abstract:
Provided are exemplary embodiments including a method for creating and using a personal encounter history using a communication device. The method involves the communication device receiving the transmission of a pseudo identifier from a proximal communication device where the pseudo identifier is associated with the user of the proximal communication device. Once received, the method continues with the wireless communication device requesting and receiving the actual identification of the user of the proximal communication device that is correlated with the pseudo identifier. The communication device includes a transceiver capable of communicating wirelessly with a mobile telecommunications network, a memory device and a processor. To ensure privacy, the processor is capable of receiving a pseudo identifier from a proximate communication device and then requesting an actual identification correlated with the pseudo identifier of the proximate communication device.
Abstract:
Concepts and technologies disclosed herein are directed to the dynamic creation and management of ephemeral coordinated feedback instances. In accordance with one aspect disclosed herein, a system can receive a feedback instance creation request. The feedback instance creation request can be received from a policy engine in response to the policy engine attempting to satisfy a policy request. The system can examine the feedback instance creation request to determine an objective to be met by a new feedback instance model. The system can build a specification for the new feedback instance model. The specification can be built in accordance with a feedback instance building policy. The system can create the new feedback instance model in accordance with the specification. The system can store the new feedback instance model and a unique identifier associated with the new feedback instance model in a feedback instance model repository.