摘要:
Protecting privacy in groups e-mails messages. A method includes the step of receiving an e-mail message having one or more intended recipients. The method also includes the step of comparing content of the e-mail message against content of previous e-mail messages. Further, the method includes the step of flagging the e-mail message. In another embodiment, a computer program product stored on a non-transitory computer-readable medium when executed by a processor, performs the method for verifying intended recipients of an e-mail message with anomalous content. In yet another embodiment, a system to verify intended recipients of an e-mail message with anomalous content includes an e-mail interface and a content analyzer.
摘要:
A system is described for providing scalable in-memory caching for a distributed database. The system may include a cache, an interface, a non-volatile memory and a processor. The cache may store a cached copy of data items stored in the non-volatile memory. The interface may communicate with devices and a replication server. The non-volatile memory may store the data items. The processor may receive an update to a data item from a device to be applied to the non-volatile memory. The processor may apply the update to the cache. The processor may generate an acknowledgement indicating that the update was applied to the non-volatile memory and may communicate the acknowledgment to the device. The processor may then communicate the update to a replication server. The processor may apply the update to the non-volatile memory upon receiving an indication that the update was stored by the replication server.
摘要:
Currency and consistency requirements are specified as part of a query against a database that may contain replicated data that is updated asynchronously and therefore may not be completely up to date. The database system constructs query execution plans that include an input selection operator that verifies the currency of a replica and selects a subplan using the replica for execution only when the replica meets the query's currency constraints. It checks possible query execution plans at construction time against the query's consistency constraints and any plans that may produce a result not meeting the consistency constraints are rejected. In this way, the query result is guaranteed to satisfy the query's currency and consistency requirements.
摘要:
An improved system and method for asynchronous update of indexes in a distributed database is provided. A database server may receive the request to update the data and may update the data in a primary data table of the distributed database. An asynchronous index update of the indexes may be initiated at the time a record is updated in a data table and then control may be returned to a client to perform another data update. An activity cache may be provided for caching the records updated by a client so that when the client requests a subsequent read, the updated records may be available in the activity cache to support the various guarantees for reading the data. Advantageously, the asynchronous index update scheme may provide increased performance and more scalability while efficiently maintaining indexes over database tables in a large scale, replicated, distributed database.
摘要:
The subject matter disclosed herein relates to a process for receiving, evaluating and selecting of content modules such as content summary boxes and landing pages for display on network-accessible search engine results page. In one particular example, potential content providers may be provided with incentives and guidelines for the preparation of content summary boxes and landing pages over an electronic communications network, and the resulting submissions can be ranked and published in conjunction with the display of a search engine results page over the network.
摘要:
Methods and apparatuses are provided for dynamically reorganizing the data within a replicated database system. One method, for example, includes performing a split operation across a plurality of replicated databases with regard to an existing partition therein, wherein the existing partition comprises a plurality of data records and the two new partitions each include at least a portion of the plurality of data records, and allowing at least one type of access to the plurality of data records during the split operation.
摘要:
Methods and systems for generating overlay data to supplement search results obtained as a result of an internet search for a query provided by a user. The method includes accessing a universal resource locator (URL) database having URLs that are processed. The URL database has information regarding the number of times a URL in the URL database has been bookmarked and any descriptive tags assigned to specific URLs in the URL database. Then, receiving the query provided by the user that generates search results, where each search result is associated with a URL. The method further includes, before displaying the search results, analyzing each URL of a plurality of the search results to identify if the URL is present in the accessed URL database, and applying overlay data to particular ones of the search results. The overlay data includes information regarding the number of times the URL has been bookmarked and includes particular descriptive tags from the URL database. In one embodiment, a detailed sub-query is associated with each overlay descriptive tag that includes the original query and the overlay descriptive tag.
摘要:
Content display policies are evaluated using two kinds of methods. In the first kind of method, using information, collected in a “controlled” manner about user characteristics and content characteristics, truth models are generated. A simulator replays users' visits to the portal web page and simulates their interactions with content items on the page based on the truth models. Various metrics are used to compare different content item-selecting algorithms. In the second kind of method, no explicit truth models are built. Events from the controlled serving scheme are replayed in part or whole; content item-selection algorithms learn using the observed user activities. Metrics that measure the overall predictive error are used to compare different content-item selection algorithms. The data collected in a controlled fashion plays a key role in both the methods.
摘要:
Methods and systems for presenting content such as articles based on utility are provided. In one embodiment, a plurality of articles are determined, each article in the plurality of articles including article content and a corresponding preview icon, the preview icon defining a link to the corresponding article content when presented. For each article in the plurality of articles, a user experience utility value is determined. And for each article in the plurality of articles, an economic utility value is also determined. A ranked order of the articles is determined based upon each article's user experience utility value and economic utility value. And a portion of the preview icons of the articles are presented on a graphical display page in a priority orientation based on the ranked order of the articles.
摘要:
Embodiments are directed towards employing a playful incentive to encourage users to provide feedback that is useable to train a classifier. The classifier being associated with any of a variety of different settings, including but not limited to classifying: messages as ham/spam, images, advertising, bookmarking, music, videos, photographs, shopping, or the like. An animated image, such as a pet, provides an interface to the classifier that encourages and responds to user feedback. Users may share their classifiers or aspects thereof with other users to enable a community of knowledge to be applied to a classification task, while preserving privacy of the user feedback. One form of sharing may be within the context of a competitive game. Various evaluations may be performed on a classifier to indicate user feedback consistency, or quality. Classifiers may also be used to provide users with advertisements, products, or services based on the user's feedback.