Abstract:
A method and system are provided for generating a comprehension indicator that indicates how well an individual understood the subject matter covered by a test. In one implementation, a question-level comprehension indicator is generated for each of the questions on the test. The question-level comprehension indicators may be generated based upon one or more question-level factors, which may include behavioral aspects of the individual while taking the test. After the question-level comprehension indicators are generated, they may be used to generate a first test-level comprehension indicator. A second test-level comprehension indicator may also be generated. Unlike the first test-level comprehension indicator, the second test-level comprehension indicator is generated based upon test level rather than question level factors. After the first and second test-level comprehension indicators are generated, they may be used to derive an overall comprehension indicator for the individual for that test. The overall comprehension indicator may then be used in addition to or in lieu of a test score to determine how well the individual understood the subject matter covered by the test, as well as other purposes.
Abstract:
Techniques are described for controlling access to an online service by a one or more authentication mechanisms based on device, browser, or location, or a combination of the three. A method comprises receiving a request to access a service, receiving, in association with the request, a first access mechanism, receiving a first and second level of authentication associated with the user requesting the service, updating authenticated-mechanism data to indicate that the first access mechanism is an authenticated access mechanism for the particular user, receiving a second request to access the service, in response to receiving a second request, determining whether the second access mechanism is an authenticated access mechanism for the particular user, upon determining that the second access mechanism is not an authenticated mechanism, requesting a second level of authentication for the particular user, otherwise granting access.
Abstract:
Techniques are described for controlling access to an online service by a one or more authentication mechanisms based on device, browser, or location, or a combination of the three. A method comprises receiving a request to access a service, receiving, in association with the request, a first access mechanism, receiving a first and second level of authentication associated with the user requesting the service, updating authenticated-mechanism data to indicate that the first access mechanism is an authenticated access mechanism for the particular user, receiving a second request to access the service, in response to receiving a second request, determining whether the second access mechanism is an authenticated access mechanism for the particular user, upon determining that the second access mechanism is not an authenticated mechanism, requesting a second level of authentication for the particular user, otherwise granting access.
Abstract:
Techniques are described for controlling access to an online service by a one or more authentication mechanisms based on device, browser, or location, or a combination of the three. A method comprises receiving a request to access a service, receiving, in association with the request, a first access mechanism, receiving a first and second level of authentication associated with the user requesting the service, updating authenticated-mechanism data to indicate that the first access mechanism is an authenticated access mechanism for the particular user, receiving a second request to access the service, in response to receiving a second request, determining whether the second access mechanism is an authenticated access mechanism for the particular user, upon determining that the second access mechanism is not an authenticated mechanism, requesting a second level of authentication for the particular user, otherwise granting access.
Abstract:
Resources available to a service node in a system are dynamically modified. The modification is based on current performance levels of other service nodes, application level transactions, resource utilization patterns, and/or in response to detecting a pre-failure conditions.