摘要:
A method and system for quickly and reliably processing a high volume of messages. In one embodiment, text messages are submitted by mobile phone subscribers to cast votes. The votes are recorded and replies are returned in near real time by updating a state in active memory for each subscriber that submits a message. To provide scaling and reliability, a message summary is also used to distribute the processing over a number of master-slave pairs that are each defined to access certain messages based on one or more message characteristics, such as an area code of the submitting subscriber. Campaign processing rules are applied to the summary to produce a subscriber state change, which indicates a corresponding reply to be returned. Billing and other administrative operations are done on a post processing basis so as not to slow the vote processing.
摘要:
Identifying a reply message using a relatively limited number of message source identifiers divided among multiple enterprises. In an exemplary embodiment, a message is sent with a source device to one or more target mobile devices on one or more wireless carriers. Each target mobile device can be associated with multiple enterprises. A gateway assigns one of a limited number of long codes to the message for each wireless carrier. The long code is selected from a sub-block of long codes that are associated with one of the multiple enterprises. Each long code identifies the gateway as a return address for the message. Upon receiving a second message, addressed to the long code, the gateway examines an associated target mobile device inbox for a message assigned the same long code. If a matching message exists, the gateway interprets the second message is a reply to the first message.
摘要:
A method and system for identifying a reply message using a relatively limited number of message source identifiers. In an exemplary embodiment, a message is sent with a source device to one or more target mobile devices on one or more wireless carriers. A gateway assigns one of a limited number of long codes to the message for each wireless carrier. Each long code identifies the gateway as a return address for the message. The gateway also stores the message in a virtual inbox for each target mobile device. When a target mobile device sends a second message to the long code, the gateway examines the associated inbox for a message assigned the same long code. If the gateway finds a matching message, the gateway interprets the second message received from the target mobile device as a reply to the first message.
摘要:
An appearance manager for editing and previewing a portion of a Web page, such as a header and/or a footer. A browser-based appearance manager user interface enables a user to edit, validate, and store source markup code of the portion of the Web page without affecting a corresponding deployed Web page. The appearance manager can render the portion of the Web page separate from the remainder of the corresponding deployed Web page or together with the remainder of the corresponding deployed Web page. In either case, the rendering is done separate from the corresponding deployed Web page, so as not to affect the deployed Web page, which is accessible to client browsers. When rendering together, the appearance manager accesses and applies the same stylesheet that is applied to the corresponding deployed Web page. Thus, the user can preview revised portions of the Web page as they will appear when deployed.
摘要:
Detecting unsolicited messages (spam) by aggregating information across multiple recipients and/or across the same or differing messaging protocols. Multiple messages are analyzed to detect a call to action pattern that specifies a target communication address with which the recipients are requested to communicate, such as an email address, an Internet address, a telephone number, and the like. Once a frequency threshold of messages containing the call to action pattern is reached, subsequent messages are temporarily quarantined for evaluation by a human operator. If the human determines that the messages are not spam, the human can release the quarantined messages, and indicate that future messages with the call to action pattern are not to be delayed. Conversely, if the human determines that the messages are spam, the human can delete the messages in quarantine, and indicate that all future messages with that call to action pattern are to be deleted automatically.