Abstract:
Information, called context information, relating to a current state of a user may be aggregated. In one implementation, the context information may include information that is automatically generated by communication devices of the user and information, submitted by the user, that relates to the user's state. The context information may be used to provide personalized advertisements for the user.
Abstract:
An approach for providing hierarchical pattern recognition of communication network data is described. A network security brain platform may process communication network data associated with one or more levels of communication network hierarchies. The network security brain platform may further determine a network information pattern of the communication network data based on one or more network information pattern models. The network security brain platform may also identify a network service issue based on the determined network information pattern. The network information pattern may include a network security pattern.
Abstract:
A method, performed by a computer device, may include receiving an indication of a distributed denial of service event at a front end system associated with a customer; generating one or more virtual front end systems for the customer, in response to receiving the indication of the distributed denial of service event; and redirecting traffic intended for the customer's front end system to the generated one or more virtual front end systems. The method may further include determining whether resource capacity of the generated one or more virtual front end systems has been reached; and generating an additional one or more virtual front end systems for the customer, in response to determining that the resource capacity of the generated one or more virtual front end systems has been reached.
Abstract:
An exemplary method includes a virtual interface adjustment system detecting, based on user input data associated with user input received by way of a virtual interface of a user device, an erroneous input pattern that includes at least one unintentional input, determining, based on the erroneous input pattern, an adjustment procedure configured to adjust the virtual interface to avert future unintentional inputs that correspond to the at least one unintentional input of the erroneous input pattern, determining an adjustment procedure trigger for the adjustment procedure, activating the adjustment procedure trigger, detecting, after the activating, an occurrence of the adjustment procedure trigger, and executing, in response to the detecting of the occurrence of the adjustment procedure trigger, the adjustment procedure to avert the future unintentional inputs that correspond to the at least one unintentional input of the erroneous input pattern. Corresponding methods and systems are also described.
Abstract:
Information, called context information, relating to a current state of a user may be aggregated. In one implementation, the context information may include information that is automatically generated by communication devices of the user and information, submitted by the user, that relates to the user's state. The context information may be used to provide personalized advertisements for the user.
Abstract:
A method, performed by a computer device, may include receiving a Short Message Service (SMS) message. The method may further include analyzing one or more sender parameters associated with the received SMS message to validate the one or more sender parameters; determining whether the one or more sender parameters have been validated based on the analysis; rejecting the SMS message in response to determining that the one or more sender parameters have not been validated; analyzing message content included in the SMS message to validate the message content; determining whether the message content has been validated based on the analysis; rejecting the SMS message in response to determining that the message content has not been validated; and forwarding the SMS message to a recipient, in response to validating the one or more sender parameters and in response to validating the message content.
Abstract:
An exemplary method includes a virtual interface adjustment system detecting, based on user input data associated with user input received by way of a virtual interface of a user device, an erroneous input pattern that includes at least one unintentional input, determining, based on the erroneous input pattern, an adjustment procedure configured to adjust the virtual interface to avert future unintentional inputs that correspond to the at least one unintentional input of the erroneous input pattern, determining an adjustment procedure trigger for the adjustment procedure, activating the adjustment procedure trigger, detecting, after the activating, an occurrence of the adjustment procedure trigger, and executing, in response to the detecting of the occurrence of the adjustment procedure trigger, the adjustment procedure to avert the future unintentional inputs that correspond to the at least one unintentional input of the erroneous input pattern. Corresponding methods and systems are also described.
Abstract:
A method includes sending, by a user device, a request for video content based on a selected video content chapter of the video content. The method also includes receiving video content information that includes a list of video content chapters of the video content. The method includes determining, for each listed video content chapter, whether the video content chapter has been previously stored on the user device. The method further includes downloading particular chapters of the video content in a priority order based on the selected chapter in response to a determination that the particular chapters have not been previously stored on the user device, and playing the video content based on the selected chapter.
Abstract:
A method, performed by a computer device, may include receiving an indication of a distributed denial of service event at a front end system associated with a customer; generating one or more virtual front end systems for the customer, in response to receiving the indication of the distributed denial of service event; and redirecting traffic intended for the customer's front end system to the generated one or more virtual front end systems. The method may further include determining whether resource capacity of the generated one or more virtual front end systems has been reached; and generating an additional one or more virtual front end systems for the customer, in response to determining that the resource capacity of the generated one or more virtual front end systems has been reached.
Abstract:
A method, performed by a computer device, may include receiving a Short Message Service (SMS) message. The method may further include analyzing one or more sender parameters associated with the received SMS message to validate the one or more sender parameters; determining whether the one or more sender parameters have been validated based on the analysis; rejecting the SMS message in response to determining that the one or more sender parameters have not been validated; analyzing message content included in the SMS message to validate the message content; determining whether the message content has been validated based on the analysis; rejecting the SMS message in response to determining that the message content has not been validated; and forwarding the SMS message to a recipient, in response to validating the one or more sender parameters and in response to validating the message content.