摘要:
Implementations generally relate to access and usage of privileged credentials. In some implementations, a method includes receiving, from a mobile device, an access request for privileged credentials. The method further includes accessing one or more predetermined conditional access policies. The method further includes receiving location data associated with the mobile device. The method further includes performing a plurality of location-aware verification checks based on the one or more predetermined conditional access policies and the location data. The method further includes determining whether to grant or to deny the access request based on results from the plurality of location-aware verification checks.
摘要:
Biometrics identification module and personal wearable electronics network based authentication and transaction processing are disclosed. According to one embodiment, a method for biometric authentication may include (1) a biometric identification device connecting to a plurality of sensing devices, each of the plurality of sensing devices receiving a user characteristic from a user; (2) the biometric identification device receiving the user characteristics from the sensing devices; (3) the biometric identification device communicating the received user characteristics to a server; (4) the biometric identification device receiving a biometric profile for the user; and (5) the biometric identification device storing the biometric profile.
摘要:
This invention relates to an expense reporting system for viewing and manipulating a user's financial transaction data and a method for associating financial transaction data with a user's project data. The system includes a user's financial transaction data hosted in a data storage unit, addressable on a network, and accessible by a remote user on a user interface unit having a user input means and a display; and an expense reporting module having a graphical user interface (GUI) that allows a user to define project category data and associate representations of the user's financial data with the user-defined project category data.
摘要:
In one example, a method for prediction future network anomaly events is disclosed. The method includes generating a machine learning model for a computer communication network. Generation of the machine learning model can be by applying a historical set of time series data metrics of the computer communication network to train the machine learning model. The method may determine a data metric threshold that indicates a limit for future data metrics associated with the computer communication network. The method may analyze current data metrics associated with the computer communication network, and predict a future time when the data metrics associated with the computer communication network will meet or exceed the data metric threshold value. The method may flag the prediction of the future time to avoid a network anomaly.
摘要:
Systems and methods for prioritizing electronic messages in an electronic message repository are disclosed. According to one embodiment, a method may include (1) at least one computer processor determining an amount of message review time for a user; (2) the at least one computer processor estimating a number of electronic messages that the user can review in the message review time; (3) the at least one computer processor determining a priority level for a plurality of electronic messages in the user's electronic message repository; (4) the at least one computer processor selecting electronic messages from the user's electronic message repository based on the estimated number of electronic messages that the user can review and the priority level for the electronic messages.
摘要:
Systems and methods for prioritizing electronic messages in an electronic message repository are disclosed. According to one embodiment, a method may include (1) at least one computer processor determining an amount of message review time for a user; (2) the at least one computer processor estimating a number of electronic messages that the user can review in the message review time; (3) the at least one computer processor determining a priority level for a plurality of electronic messages in the user's electronic message repository; (4) the at least one computer processor selecting electronic messages from the user's electronic message repository based on the estimated number of electronic messages that the user can review and the priority level for the electronic messages.
摘要:
Systems and methods for prioritizing electronic messages in an electronic message repository are disclosed. According to one embodiment, a method may include (1) at least one computer processor determining an amount of message review time for a user; (2) the at least one computer processor estimating a number of electronic messages that the user can review in the message review time; (3) the at least one computer processor determining a priority level for a plurality of electronic messages in the user's electronic message repository; (4) the at least one computer processor selecting electronic messages from the user's electronic message repository based on the estimated number of electronic messages that the user can review and the priority level for the electronic messages.
摘要:
A system and method for offer targeting is disclosed. According to one embodiment, a method for offer targeting may comprise: providing a plurality of offers and a plurality of groups, wherein each group comprises one or more accounts; maintaining an offer counter for each of the plurality of groups; and assigning the plurality of offers, in a predetermined order, to the plurality of groups by repeating the following steps: (1) assigning an offer to one or more groups, wherein the one or more groups are selected from groups that are pre-qualified for the offer based on a plurality of business rules, and the selection of the one or more groups is based at least in part on the offer counters of the one or more groups; (2) incrementing offer counters associated with the one or more groups; and (3) sorting the plurality of groups based on the incremented offer counters.
摘要:
A method for delivering notifications of software deprecations on an external unmanaged cloud environment is provided. The method may be implemented by at least one processor. The method may include gathering data from data sources hosted on an external unmanaged cloud environment but not serviced by the external unmanaged cloud environment; creating a data feed by aggregating the data gathered based on a predetermined criteria; streaming, via a network, the data feed to an internal managed cloud environment; storing the data feed in a data store on the internal managed cloud environment; joining the data feed with internal application data for at least one internal application on the internal managed cloud environment; and creating, based on the joined data, a backlog for delivering the notifications.
摘要:
Systems and methods for graphically representing a plurality of electronic messages in an electronic message repository are disclosed. According to one embodiment, a method may include, for each of a plurality of electronic messages in an electronic message repository: (1) at least one computer processor determining a category for the electronic message; (2) the at least one computer processor determining a topic for the electronic message; and (3) the at least one computer processor identifying at least one related electronic message that is related to the electronic message. The at least one computer processor may graphically represent each of the plurality of electronic messages in relation to at least one of the topic, the category, and the related electronic message.