摘要:
A method and apparatus are provided for capturing and managing user-specific data, where the user-specific data contains information on the user's interaction with the Net. The method generally involves using a proxy to capture or cause to capture the user-specific data and then storing the user-specific data. The user-specific data may be used to customize the contents of electronic information delivered to the particular user.
摘要:
A method and apparatus are provided for indexing electronic documents that include one or more visible text portions and one or more non-visible text portions. The method includes the step of identifying an electronic document. Once the electronic document is identified, a set of words is selected from a particular tag type that is associated with one or more non-visible text portions of the electronic document. Each word in the selected set of words is compared with words in the one or more visible text portions of the electronic document. An index word set is then determined for the electronic document based on matches between words in the selected set of words and words in the one or more visible text portions of the electronic document.
摘要:
An Internet Protocol driver executed by a network interface card, or a network address translation module, includes a mechanism that enables a server to bypass packets associated with certain destinations, sources, or a combination of the two based upon their IP address. When a packet arrives at the network interface card, the driver extracts a source IP address and a destination IP address from the packet. The driver searches a table to locate a rule matching one of the addresses. If a match is found, the packet is bypassed. If no match is found, the packet is sent on to an indexing and caching server for further processing. The bypass rules may be adaptively and dynamically generated when a message causes a remote server to respond with an error code. The dynamically generated bypass rules prevent the first server from sending subsequent requests to the remote server, thereby insulating the indexing and caching server from unnecessary network traffic.