摘要:
The filtering of activities generated by nodes of a network while interacting with a device may be performed by evaluating the desirability of the activities (e.g., a spam or not-spam determination of email messages sent by the node) and assigning a trust rating to the node. However, nodes are often identified by network address, and an operator of a node sending undesirable activities may reassign the network address of the node in order to avoid heavy filtering. Instead, nodes may be identified as being controlled by a network entity (e.g., an autonomous system identified in a border gateway protocol routing table.) The network entity is assigned a network entity trust rating based on the trust ratings of the nodes controlled thereby, and an appropriate level of activity filtering based on the network entity trust rating may be selected for subsequent activities received from all nodes controlled by the network entity.
摘要:
Message management and classification techniques are described. In one or more implementations, a message received from a sender for delivery via a user account is examined to extract one or more features of the message. A determination is then made as to whether the message corresponds to one or more categories based on the extracted features, the categories usable to enable features to be applied to the message in a user interface.
摘要:
A supplemental downforce system is shown for a ground working implement having a frame and a plurality of ground engaging row units movably mounted to the frame for up and down movement relative to the frame. The downforce system includes at least one actuator between the frame and each row unit to apply an up or down force to each row unit. The actuators are assigned to one group of at least two groups of actuators. A control system controls the down force applied by each group of actuators separately so that each group of actuators is given the amount of supplemental down force that group of row units needs. In a closed loop feedback system, at least one row unit in each group of row units is equipped with a load sensor so that feed back of the soil reaction force on the row unit is supplied to the control system.
摘要:
Techniques for account compromise detection are described. In one or more implementations, a usage pattern is established for a user account of a service provider, where the service provider is configured to provide a plurality of web services for access via a network and the usage pattern describes interaction with one or more of the plurality of web services. A deviation is detected in subsequent activity associated with the user account from the usage pattern and a determination is made as to whether compromise the user account is likely based at least in part on the detection.
摘要:
Geo-data spam filters are described. In one or more implementations, origin data and language data of a message are evaluated to establish a score for the message indicating a likelihood that the message is spam. The evaluation includes comparing the origin data and the language data to ranked lists indicating message origins and languages with which a respective message recipient interacts positively and ranked lists indicating message origins and languages with which the respective recipient interacts negatively. Interactions of the respective recipient with previously sent messages may be tracked to form these lists. Based on the score established by evaluating the origin data and the language data of the message, the message is filtered for delivery.
摘要:
Methods for assisting email users manage email messages received in an email account. An event is triggered by an action performed by an email user with respect to an email message in an email account. The event identifies an entity associated with the email message (e.g., sender address, domain, keyword, etc.). A determination is made whether to assist the user manage their email based on a heuristic. The heuristic assigns weights based on prior events associated with the same entity to determine whether the user is interested in receiving emails from the sender. Based on the heuristics, the method may add the sender to the user's block-list or unsubscribe the user from a mailing list.
摘要:
A seeding apparatus and a method is disclosed in which a seed spacing variability value is determined and displayed to the operator during a planting operation. Any method of determining variability among a set of data can be used to determine the seed spacing variability value. Three examples are shown: standard deviation; coefficient of variation; and coefficient of uniformity. Data can be stored for later comparison with harvest yield data to determine the effects of seed spacing on yield.
摘要:
Network entities controlling a set of nodes may vary by trustworthiness, such as tolerance for nodes that send spam, distribute malware, or perform denial-of-service attacks. A device receiving such activities may identify a trust rating of the network entity and apply appropriately stringent filtering (such as spam evaluation) to activities received from nodes controlled by the network entity. However, a poor trust rating of a network entity may subject a legitimate node controlled by the network entity to inefficiently or unfairly stringent activity filtering. Instead, the device may evaluate the activities of a particular node, assign a trust rating to the node, and if the trust rating of the node is higher than the trust rating of the network entity, apply less stringent activity filtering to the activities of the node, thereby “rescuing” the node from the more stringent activity filtering applied to the other nodes of the network entity.
摘要:
Publicly accessible linking information is to establish a trusted relationship between reciprocally linked entities controlling web resources, such as websites or web logs. A method of establishing a trust relationship between two entities identifying a user-installed link to a second web resource in a first web resource. Next, the method determines when a reciprocal link is made in the second web resource directed to the first web resource and creates a trust relationship between the entities based on the reciprocal link.
摘要:
A method of displaying email messages to a user is provided. Spam classification information and meta data is associated with email messages received for a user. Email message summary information is displayed in a user interface based on whether the meta data associated with the message meets or exceeds a threshold display level for the summary information. The user provides input via the user interface which is an indication to change the threshold display level and the change is dynamically displayed.