摘要:
Systems and methods are described for managing requests for computing capacity from a provider of computing resources. The computing resources may include program execution capabilities, data storage or management capabilities, network bandwidth, etc. In some implementations, user requests are probabilistically denied or granted while some computing resources are still available. By denying some requests or granting only some, the rate of computing resource usage can be reduced, thus preserving some capacity for a longer period of time. In one embodiment, the capacity can be provided to clients based on client priority, provided to clients with reserved resources, provided to clients probabilistically, sold on a spot market, or allocated in some other fashion.
摘要:
Systems and methods are described for managing requests for computing capacity from a provider of computing resources. The computing resources may include program execution capabilities, data storage or management capabilities, network bandwidth, etc. In some implementations, a user can request that computer resources be reserved for guaranteed availability by the user (or others authorized by the user) during a future usage time period. For example, the user can request a desired amount of program execution capacity. The usage period can be flexibly chosen to meet the user's needs. The request can specify, for example, that a particular program be executed during the usage period, that only certain users be authorized to have access to the guaranteed availability computer resources, and so forth. The provider may charge a fee for the request and/or fees for access or use of the guaranteed availability computer resources during the usage period.
摘要:
Technologies are described herein for providing notifications of computing resource availability for on-demand allocation. A resource request is received from a requesting application indicating the type, size, number, and other parameters of the computing resources desired. Upon determining that the requested computing resources are not immediately available, suitable alternative resources are determined based on the parameters of the requested resources. The availability of computing resources at the service provider is monitored, and when the requested resources or suitable alternatives become available, the requesting application is sent one or more resource availability notifications describing the available resources. The requesting application may then allocate the available resources from the service provider on-demand.
摘要:
Various embodiments of a system and method for message-based purchasing are described. The system and method for message-based purchasing may include a message-based purchase service configured to determine that a selection has been performed through a network-based interface. Such selection may be indicative of one or more items offered for sale via the network-based interface. The message-based purchase service may be configured to, in response to the selection of one or more items, send to a communication device, a message indicating a code corresponding to the selection. The message-based purchase service may receive from the communication device through a communication channel that does not include the network-based interface, a message including the code. The message-based purchase service may be configured to, in response to determining that the message received from the communication device includes the code, generate a purchase request for the one or more previously selected items.
摘要:
Item scarcity resulting from a high demand of the item is addressed by providing users a high demand sale process. In some aspects, users may opt-in to purchase the item in a sale by transmitting a mobile message to a host over a mobile device network prior to a sale of the item. If the user is eligible, the host then attempts to purchase the item on behalf of the user once the sale begins.
摘要:
A method, system, and computer-readable medium for assisting in automatically identifying and handling erroneous orders is described. In some situations, an automatic identification is made of received orders from users that are duplicates of one or more other orders recently placed by those users. When orders are identified as being potentially erroneous, fulfillment of those orders may be delayed while automatically querying the users to obtain manual confirmation to continue with the order fulfillment. In other situations, other types of orders are analyzed, orders are identified as being potentially erroneous in other ways, and such orders are handled in ways other than based on querying for a manual confirmation or rejection response. This abstract is provided to comply with rules requiring an abstract, and it is submitted with the intention that it will not be used to interpret or limit the scope or meaning of the claims.
摘要:
Media enhanced mobile payments enable a user to make payments and payment requests that include additional media. The user may transmit a text-based message that may be used to update an account associated with a recipient. Additional media, such as a personalized voice recording, may be acquired by a host from the user, and may be associated with the text-based message. The additional media may be transmitted to the recipient identified in the text-based message. In some aspects, the text-based message may be a short messaging service (SMS) text message. Further aspects may include the host connecting to the user via a telephone call to record the personalized voice recording.
摘要:
Techniques, including systems and methods, for organizing access to computing resources include dynamically mapping identifiers of data zones to data zones. A request for initiation of one or more computing resources is received. The request specifies an identifier of a data zone. Responsive to the request, the specified identifier is mapped to a data zone. The requested computing resources are initiated in the data zone to which the identifier was mapped.
摘要:
A mobile payment network receives location information from mobile devices used to conduct transactions between two account holders, and qualifies any requested transactions based on the physical proximity of the two devices relative to each other.
摘要:
Various embodiments of a system and method for preventing large-scale account lockout are described. The system and method for preventing large-scale account lockout may include an account access control component configured to prevent fraudulent individuals from locking access to user accounts. The account access control component may lock access to an account after a lockout threshold is tripped. To prevent an account from being locked by fraudulent individuals, the account access control component may utilize a warning threshold. When the account access control component detects a number of incorrect authorization attempts equal to the warning threshold, the control component may perform various actions to prevent a fraudulent individual from locking an account holder's account, including, but not limited to, contacting the account holder through a registered communication channel to inform the user that the warning threshold has been reached or placing the account holder's account in a particular hold state.