A method of routing communications according to a loyalty program can include receiving guest information upon checking-in at a location associated with a loyalty program indicating an identifier for communications to a guest while checked-in via the location and associating the identifier for communications to the guest with a guest profile upon receiving the guest information upon checking-in.
- Atlanta GA, US Dylan Chamberlain Reid - Atlanta GA, US
International Classification:
H04L 29/06 G06N 20/00
Abstract:
Network security is applied to identify malicious activity occurring on a network or at network nodes from a coordinated attack. For instance, a device, comprising a memory and a processor, can generate a first flag signal representative of a first flag applicable to first data and a second flag signal representative of a second flag applicable to second data in response to the first and second data being determined to be related and directed to a common destination node using identifiers associated with network equipment.
Augmented reality security is enabled, e.g., to prevent transmission of maliciously manipulated augmented reality data. For instance, a device can comprise a processor, and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising: based on a defined tampering criterion, determining whether a virtual frame, of a group of virtual frames received via a communication link established between the device and augmented reality equipment, has been modified without authorization, and in response to the virtual frame being determined to have been modified, causing the augmented reality equipment to stop displaying the group of virtual frames.
Intelligent Orchestration To Combat Denial Of Service Attacks
A method, system, computer readable storage medium, or apparatus provides for monitoring network traffic and creating virtual machines to inspect or block traffic when unusual network traffic is observed.
The concepts and technologies disclosed herein are directed to virtual machine (“VM”) orchestration spoofing attack mitigation. According to one aspect disclosed herein, an anti-spoofing controller (“ASC”) can determine a target memory location in which to instantiate a new VM. The ASC can determine a challenge for a physically unclonable function (“PUF”) associated with the target memory location. The ASC can provide the challenge to the PUF, and in response, can receive and store an output value from the PUF. The ASC can instruct an orchestrator to instantiate the new VM in the target memory location. The ASC can provide the challenge to the new VM, which can forward the challenge to the orchestrator. The ASC can receive, from the orchestrator, a response to the challenge, and can determine whether the response passes the challenge. If the response does not pass the challenge, the ASC can decommission the orchestrator.
Concepts and technologies disclosed herein are directed to image classification attack mitigation. According to one aspect of the concepts and technologies disclosed herein, a system can obtain an original image and reduce a resolution of the original image to create a reduced resolution image. The system can classify the reduced resolution image and output a first classification. The system also can classify the original image via deep learning image classification and output a second classification. The system can compare the first classification and the second classification. In response to determining that the first classification and the second classification match, the system can output the second classification of the original image. In response to determining that the first classification and the second classification do not match, the system can output the first classification of the original image.
Intelligent Continuous Authentication For Digital Rights Management
The concepts and technologies disclosed herein are directed to intelligent continuous authentication (“ICA”) for digital rights management (“DRM”). A user device can receive a notification that a media content playback device has requested playback of a media file that is protected by an ICA engine (“ICAE”) instance. The user device can request a unique code from the media content playback device. The user device can provide the unique code to an ICAE central management system associated with a media content provider that provides media content encompassed in the media file. The user device can determine, based upon a result provided by the ICAE central management system, whether the unique code is valid or invalid. The user device can instruct the ICAE instance to enable or disable the media file based upon whether the unique code is valid or invalid.
Security mechanisms for content delivery networks (“CDNs”) are disclosed herein. One security mechanism can be used to mitigate or prevent dynamic content attacks. A system can execute a CDN manager to perform operations. In particular, the CDN manager can receive a plurality of hypertext transfer protocol (“HTTP”) requests, and parse a plurality of headers from the plurality of HTTP requests to determine a plurality uniform resource locators (“URLs”). The CDN manager can generate a plurality of web page images associated with the plurality of URLs. The CDN manager can execute a machine learning algorithm, such as a convolution neural network, to perform an analysis of the plurality of web page images. Based upon the analysis of the plurality of web page images, the CDN manager can determine whether the plurality of HTTP requests are for the same web page, which can be indicative of a dynamic content attack.
Reinhardt Elementary School Rockwall TX 1993-2000, Cain Middle School Rockwall TX 2000-2001, Williams Middle School Rockwall TX 2001-2002, Utley Freshman Center Rockwall TX 2002-2003
According to Dylan Reid, the co-founder of Walk Toronto, a 20-per-cent decrease in pedestrian deaths from 2015 would leave the number at 31, which is still higher than the 18 pedestrian deaths in 2011.
Date: Oct 21, 2016
Source: Google
Toronto can ban texting while walking, province says
But Toronto pedestrian advocate Dylan Reid said the move targets the wrong problem. Rather, council should look to improve safety through better infrastructure and by persuading drivers to follow the rules.
Date: Jul 15, 2016
Source: Google
Chromebooks outsell Macs, get big boost with app store
"The same apps that run on phones and tablets can now run on Chromebooks," writes Dylan Reid and Elijah Taylor, Chrome OS Software Engineers in a blog post announcing the update,"without compromising their speed, simplicity or security."