Abstract:
Methods and devices for verifying whether to send a message may include delaying, at an operating system executing on the computer device, sending of a message to at least one recipient based at least upon an associated delay period for the message. The methods and devices may include verifying a completion of the delay period and determining whether at least one override condition exists. The methods and devices may include altering a sending of the message when the at least one override condition occurred.
Abstract:
Information of an electronic message to be delivered to an intended recipient is received. For an original resource identifier included in the electronic message, a corresponding alternative resource identifier that can be at least in part used to obtain the original resource identifier and obtain context information associated with the electronic message is determined. The original resource identifier included in the electronic message is replaced with the alternative resource identifier to generate a modified electronic message. The modified electronic message with the alternative resource identifier is allowed to be delivered to the intended recipient instead of the electronic message with the original resource identifier. A request made using the alternative resource identifier in the modified message triggers a security action based at least in part on the context information associated with the electronic message.
Abstract:
Methods, apparatus, systems and articles of manufacture are disclosed to facilitate information exchange using publish-subscribe with blockchain. An example apparatus includes a broker including a processor and a distributed ledger module. The example distributed ledger module stores a message to be relayed by the broker from a publisher to a subscriber. The example processor is to at least compute, triggered by receipt of the message by the broker, a proof-of-work (PoW) function. The example processor is to at least verify the computation of the PoW function. The example processor is to at least transmit, upon verifying the computation of the PoW function, the message to the subscriber. The example processor is to at least process feedback received by the broker to update the PoW function.
Abstract:
Implementations of the present application relate to caller preview data and call messages based on caller preview data. In some implementations, a method includes sending, by a caller device, a call request to one or more callee devices, and establishing a connection to at least one callee device prior to receipt of an acceptance of the call request by the callee device. At least a portion of caller preview data is transmitted to the callee device over the connection prior to the receipt of the call acceptance. In response to determining that the at least a portion of the caller preview data has been transmitted for a particular time period without receipt of the acceptance of the call request, information is transmitted to instruct a call message to be stored on the callee device, where the call message includes at least a part of the caller preview data.
Abstract:
Electronic messages are automatically debugged. An electronic message sent by a sender to one or more recipients is received and analyzed to identify any issues in the message. Whenever one or more issues are identified in the message, a reply message may be sent to the sender that describes each of the identified issues and includes a proposed fix for each of the identified issues. Each of the issues identified in the message may also be fixed resulting in a fixed version of the message, and the fixed version of the message may be sent to the sender for their approval. The fixed version of the message may also be sent to each of the recipients. Whenever no issues are identified in the message, a reply message may be sent to the sender informing them that no issues were found.
Abstract:
A method for managing outbound communications for a contact center includes: detecting, by a processor associated with the contact center, a trigger for transmitting outbound messages to a customer of the contact center, determining, by the processor, a notification strategy for the customer in response to the detected trigger, identifying, by the processor, a contact group designated for the customer, initiating, by the processor, first and second conversations with respectively first and second contacts in the contact group for transmitting first and second outbound communications according to the notification strategy, monitoring, by the processor, progress of the first and second conversations, and modifying, by the processor, a state of the second conversation with the second contact based on the progress of the first conversation with the first contact.
Abstract:
Technologies are described herein for altering message properties within a message to indicate acknowledgement. In particular, types of acknowledgment may include delivery receipts, read receipts and non-read receipts. According to one aspect presented herein, a method is provided for acknowledging a message. The method includes receiving a message from a client and attempting to send the message to a recipient mailbox. Additionally, the method alters properties of the message in response to attempting to send the message.
Abstract:
The present invention provides an interface for controlling the transfer of electronic transaction messages between a first financial institution and a plurality of switches distributed amongst a plurality of switch sites, wherein the first financial institution and the plurality of switches are connected via a data communications network, the interface comprising communication circuitry, processing circuitry and memory storing the operational status of each switch site, wherein the communication circuitry is operable to transmit a test message to one of the switch sites over the data network if no transaction message has been received from that switch site for a predetermined time, and in response to the test message, the communication circuitry is operable to receive an echo of the test message from the switch site; wherein the processing circuitry is operable such that if the echo is received within a defined time then the operational status of the switch site is set as operational and if the echo is not received within the defined time then the operational status of the switch site is set as not operational; whereby in the event that the operational status of the switch site is set to not operational, the processing circuitry is operable such that no electronic messages are transferred to the switch site.
Abstract:
The present invention relates to a way to provide computing and communication infrastructure to support full duplex quality of service for urgent and actionable structured communications securely transacted over a many-to-many managed network of intermittent ad hoc nodes. The invention overcomes technical challenges associated with high-volume, short-latency, semi-custom mobile order fulfillment by ensuring communications between customer and merchant are structured, robust, reliable and delivered via a duplex link. The described embodiments are advantageous in that they provide a bidirectional channel to facilitate discussion, confirmation and post-order communication. Moreover, the present invention is scalable to a many-to-many node ad-hoc network.
Abstract:
A method of verifying the validity of an email address includes establishing a communication session with a client device; receiving an email address from the client device during the communication session; and while the communication session with the client device remains active, performing an email verification procedure that includes (a) causing a first communication to be sent to the email address; (b) evaluating a second communication received in reply to the first communication; and (c) in response to receiving a second communication indicating that the email address is invalid, sending a request to the client device for a corrected email address. The method may include requesting further information from the client device after receiving the email address, and, while requesting further information from the client device, performing the email verification procedure. Steps (a) to (c) may be repeated using the corrected email address until a valid email address is received.