摘要:
Topical affinity badges in information retrieval is described, for example, where graphical elements are presented together with ranked search results from a search engine, to indicate a degree of association between an author of a document and a topic. In various embodiments, a measure of an author's affinity to a topic is predicted using a machine learning system that takes as input author features derived from documents of the author. In various examples topical affinity scores or labels are used to generate badges and/or to index documents at an index of a search engine. For example, badges may be presented with ranked search results, in pop up displays or in other ways. In examples author features relating to any of recency, frequency and presentation of an author's documents are generated, where presentation features may relate to biographical information such as experience, qualifications, and previous documents.
摘要:
Social influencers may be identified for specific usage contexts and for influencer type. Influencers may be categorized by mavens, connectors, salesmen, or other categories. Within each usage context, a unified data model may be used to collect data from multiple sources, including multiple social networks, as well as to collect data from different levels of influencers in each usage context. The relevance of various communication media as well as the frequency and quality of use of the media may be factors used to determine a person's effectiveness as a specific type of influencer within a usage context.
摘要:
A social marketing system may reward and incentivize participants, and may also have a fraud detection system. The manager may create social marketing campaigns that may be simulated to determine an expected set of activities, which may be compared to an actual set of activities. A fraud detection system may detect abnormal activity and may bring the activity to a manager's attention and may also punish the participants by withholding rewards, lowering the participant's reputation, or some other punishment mechanism.
摘要:
A honeypot in a computer network is configured for use with a wide variety of computing resources that are defined by a network administrator or user which may include desktop and network resources such as address book contacts, instant messaging contacts, active directory user accounts, IP addresses, and files that contain particular content or that are stored in particular locations. The resources may be real for which protection against leakage is desired, or fake to operate as bait to lure and detect malicious attacks. The honeypot is implemented in an extensible manner so that virtually any resource may be honeypotted to apply honeypot benefits to resources beyond static IP addresses in order to improve both the breadth of information leakage prevention and the detection of malicious attacks.
摘要:
Information is automatically located which is relevant to source content that a user is viewing on a user interface without requiring the user to perform an additional search or navigate links of the source content. The source content can be, e.g., a web page or a document from a word processing or email application. The relevant information can include images, videos, web pages, maps or other location-based information, people-based information and special services which aggregate different types of information. Related content is located by analyzing textual content, user behavior and connectivity relative to the source. The related content is scored for similarity to the source. Content which is sufficiently similar but not too similar is selected. Similar related content is grouped to select representative results. The selected content is filtering in multiple stages based on attribute priorities to avoid unnecessary processing of content which is filtered out an early stage.
摘要:
A system and method for follow up management comprising determining if a user has an unexpired repository record, extracting information from the repository record associated with the user; and acting on instructions stored in the repository record. The method is practiced on a system for managing online interaction comprising a business rules engine a follow up repository, and a follow up engine.
摘要:
A ranked set of users may be calculated from an expertise categorization for each user and a person's trust in the users for specific categories. The ranked set of users may be used for presenting search results, recommendations, social marketing, or other uses. A person's expertise may be determined through various online activities. A person's trust in another person may be related to their proximity and activity in one or more social networks.
摘要:
Systems, methods, and computer storage media having computer-executable instructions embodied thereon that provide contextual indicators associated with a user session are described. Content items within a document associated with a user session are selected. Upon receiving an indication that the user desires to perform a context-aware search, the document associated with the user session is analyzed for contextual information related to the content items selected by the user. Various “contextual indicators” associated with the user session are derived. The contextual indicators are provided for output in association with the user session. The contextual indicators may be fed to a search engine and used to identify search results that the user has an increased likelihood (relative to the current context surrounding the user) of desiring to access.
摘要:
A method and a system for enabling website navigation, the method comprising: providing web-page tags with capabilities for rendering specific content for each visitor to a web page/site based on the past and current behavior of the visitor; providing configurable content templates and editable content embedded in the webpage/site; and providing a real-time delivery means and a configuration means for the real-time delivery of the specific content to a webpage/site and for configuring the specific content of the webpage/site, respectively. A marketer is enabled to configure the specific content via the system using the web-page tags and is also given the ability to embed automatically generated content which reflects the entire web-branch of pages that are accessible from the specific link. The system further enables zooming between one or more websites, or groups of web pages to access the embedded content.
摘要:
A recommendation system may use a network of relationships between many different entities to find search results and establish a relevance value for the search results. The relevance value may be calculated by analyzing trust and similarity components of each relationship between the search user and the entity providing the search results. The entities may be, for example, persons associated within express or implied social networks, or corporations or other organizations with a historical or other reputation. The relationships may be created through many different contact mechanisms and may be unidirectional, asymmetric bidirectional, or symmetric bidirectional relationships. The relationships may be different based on topic or other factors.