Patent application number | Description | Published |
20110092191 | ENABLING A USER TO PURCHASE A RING BACK TONE - The instant application describes a method for enabling a user of a mobile device to purchase a Ring Back Tone (“RBT”). The method includes steps of receiving an identifier associated with the mobile device that has received the RBT as a result of a call to another device and a mapping identification code associated with a RBT content identification code; generating a long code for the mapping identification code; and generating a message with the long code as a reply-to-number. The method also includes steps of sending the message to the mobile device, the message offering the user of the mobile device an option to purchase the RBT; receiving a response from the mobile device, reflecting the mobile device's user desire to either purchase the RBT or not to purchase the RBT; and identifying the mapping identification code from the reply-to-number in the response. Upon determining that the user desires to purchase the RBT from the response, allowing the purchase of the RBT by determining the RBT content identification code based on the mapping identification code. | 04-21-2011 |
20120222048 | CENTRALIZED AUDIT AND ERROR HANDLING - Audit objects generated by applications executing on one or more computers are received in a central queue. Each audit object is generated responsive to a transaction occurrence in the execution of an application. Each audit object includes detailed information about the transaction occurrence, including information identifying the application and the transaction that occurred. Each audit object in the central queue is transformed from a format used by the application into a common format for audit processing with respect to all of the applications. At least some of the formats used by the applications are different. Each transformed audit object is placed into a record in a central database for the respective application by populating the detailed information about the transaction occurrence from each transformed audit object into fields of the record in the database for the respective application. | 08-30-2012 |
20120238239 | ACCOUNT HOLDER NOTIFICATION FOR AN INFRACTING MOBILE STATION OR MOBILE DIRECTORY NUMBER (MDN) - A mobile communication network offers notification to an account holder upon occurrence of an infraction of a subscriber selected restriction by operation of one of the mobile stations under the subscriber's account. In the examples, the subscriber can select a directory number/station under the account, a desired one of a number of available restriction options and one or more parameters of the selected restriction. When the mobile communication network detects an infraction, caused by operation of the mobile station through the network, a system or processor obtains a destination address designated for an account holder, for the subscriber's account, such as the directory number for one of the subscriber's stations selected as that of the account holder. The system sends a notification of the infraction intended for the account holder, using the destination address, for example, as a text message sent through the network to the account holder's mobile station. | 09-20-2012 |
20120309369 | ENABLING A USER TO PURCHASE A RING BACK TONE - Methods and systems are provided for enabling users of mobile devices to purchase Ring Back Tones (“RBTs”). The system enables an offer message, offering for purchase an RBT and including a reply-to telephone number, to be generated and sent to a mobile device. In response to the offer message, a reply message sent from the mobile device to the reply-to telephone number of the offer message is received. A code is extracted from the reply-to telephone number to which the received reply message was sent. A particular RBT associated with the code extracted from the telephone number is identified in a table storing a plurality of codes each associated with a corresponding RBT. A user of the mobile device is determined to desire to purchase the particular RBT associated with the code in the table. | 12-06-2012 |
Patent application number | Description | Published |
20100169488 | SYSTEM AND METHOD OF CONSOLIDATED CENTRAL USER ADMINISTRATIVE PROVISIONING - In one embodiment the present invention includes a computer-implemented method of reducing a quantity of business application programming interface (BAPI) calls in a hardware client-server environment. The method includes configuring a centralized provisioning system on a hardware server with access definitions for systems. The method further includes receiving, by the centralized provisioning system, a provisioning request for a user of a client to access the systems. The method further includes determining a collected BAPI call according to the access definitions. The method further includes providing access to the user according to the collected BAPI call. | 07-01-2010 |
20120216243 | ACTIVE POLICY ENFORCEMENT - A method and apparatus is provided that includes techniques for providing complete solutions for role-based, rules-driven active policy enforcement. An embodiment addresses blended risk assessment and security across logical systems, IT applications, databases, physical systems, and operational systems in the context of threat and fraud detection, risk analysis and remediation, compliance checks and continuous monitoring. Further, an embodiment provides ability to embed and enforce active policy enforcement in particular processes. | 08-23-2012 |
20140297873 | System and Method of Consolidated Central User Administrative Provisioning - In one embodiment the present invention includes a computer-implemented method of reducing a quantity of business application programming interface (BAPI) calls in a hardware client-server environment. The method includes configuring a centralized provisioning system on a hardware server with access definitions for systems. The method further includes receiving, by the centralized provisioning system, a provisioning request for a user of a client to access the systems. The method further includes determining a collected BAPI call according to the access definitions. The method further includes providing access to the user according to the collected BAPI call. | 10-02-2014 |
Patent application number | Description | Published |
20130275452 | DISTRIBUTING AND PROCESSING STREAMS OVER ONE OR MORE NETWORKS - In an embodiment, a method for distributing and processing streams over wide area networks comprises receiving, at a unified data processing node, a continuous query; determining a parallel portion of the continuous query; sending the parallel portion to a plurality of distributed data processing nodes located in a plurality of data centers; at each distributed node in the plurality of distributed nodes, locally executing the parallel portion against independent data partitions, producing a partial summary data, sending the partial summary data to the unified node; continuously receiving, at the unified node, in real-time, the partial summary data. | 10-17-2013 |
20160026530 | Speculative Data Processing of Streaming Data - In an embodiment, a method comprises receiving a plurality of source data records from one or more source computers, wherein one or more first source data records are associated with a first source transaction and one or more second source data records are associated with a second source transaction; generating a first derived transaction comprising one or more first derived records based on the plurality of source data records; generating a first transaction mapping between the first derived transaction and the first source transaction; generating a second transaction mapping between the first derived transaction and the second source transaction; determining that the first derived transaction has ended, and in response, committing first derived transaction including the one or more first derived records to a persistent storage; receiving a first ending punctuation associated with the first source transaction, and in response, committing the first source transaction including the one or more first source data records associated with the first source transaction to the persistent storage; after committing the first derived transaction, determining that the second source transaction failed, and in response: determining that the first derived transaction should be regenerated based on the second transaction mapping, and in response, regenerating the first derived transaction. | 01-28-2016 |
Patent application number | Description | Published |
20110107089 | METHODS AND SYSTEMS FOR IMPLEMENTING POLICY BASED TRUST MANAGEMENT - This disclosure describes, generally, methods and systems for implementing policy based trust management. The method includes receiving, at an host server, a trust request from a partner, and identifying, at the host server via a trust policy enforcer, parameters and attributes associated with the partner. The method further includes identifying, at the host server via the trust policy enforcer, parameters and attributes associated with the requested resource, and accessing, by the trust policy enforcer, a policy database. Furthermore, the method includes retrieving, by the trust policy enforcer, one or more trust policies associated with the requested resource, and based on the attributes and parameters of the partner, applying, by the trust policy enforcer, the one or more associated trust policies to the request. Further, the method includes based on conformity with the one or more trust policies, providing the partner with access to the requested resource. | 05-05-2011 |
20140149741 | ACCESS MANAGEMENT SYSTEM USING TRUSTED PARTNER TOKENS - A method of using an access manager server to establish a communication session between a resource and a user device may include receiving a request from the user device to access the resource, determining that the client system is registered as a trusted partner, sending the client system a first encrypted token that includes a resource identifier where the client system has access to a first cryptographic key that decrypts the first encrypted token. The method may also include receiving a second encrypted token that signifies that access to the resource has been granted by the client system where the second token comprises a user identifier and the access manager server has access to a second cryptographic key that decrypts the second token. The method may additionally include decrypting the second token and establishing the communication session between the user device and the resource using the user identifier. | 05-29-2014 |
20140149978 | DYNAMIC COMMUNICATION BETWEEN SCRIPT AND EXECUTION LAYERS - A method of dynamically communicating a parameter during runtime may include providing a script to a command-line scripting module that uses the parameter, where the parameter is to be provided during runtime by a user and the script is configured to generate an exception including an identifier associated with the parameter. The method may also include generating byte code based on the script, executing the byte code on a virtual machine until the exception is generated, passing the exception to the command-line scripting module, causing, by the command-line scripting module, receiving a parameter value from the user through an input device, passing the parameter value to the virtual machine, and continuing execution of the byte code on the virtual machine. | 05-29-2014 |
20140208304 | METHODS AND SYSTEMS FOR DYNAMIC UPGRADE OF AN ACCESS MANAGER - Methods and systems are described for upgrading an access manager framework. In response to an upgrade request from a client, current and new versions of the access manager framework are identified. Upon successful identification of the current version, one or more supported upgrade paths are determined for the upgrade process. An appropriate upgrade path from the current version to the new version is determined upon successful identification of the current and/or new version of the access manager framework. In response to determination of the appropriate upgrade path, a version specific program upgrade component and a version specific upgrade program are associated with the determined upgrade path. In addition, a set of information may be extracted from the access manager framework, transformed, and imported to the upgraded access manager framework based at least in part upon the determined version specific upgrade program and the version specific program upgrade component. | 07-24-2014 |
20150089614 | SINGLE SIGN-ON BETWEEN MULTIPLE DATA CENTERS - Systems and methods are disclosed for a single sign-on (SSO) enterprise system with multiple data centers that use a lightweight cookie on a user's client device. The lightweight cookie includes a reference to a data center in which the user is already authenticated, and a new data center contacts the old data center for creating a session for the user on the new data center. If the old data center is unavailable, then the new data center may fall back to accessing a local security store, a backup of keys, security tokens, and/or other security data, in order to create a local session for the user on the new data center. | 03-26-2015 |
Patent application number | Description | Published |
20090132280 | System and Method for a Worklist Search and Creation Tool in a Healthcare Environment - Certain embodiments of the present invention provide a system and method for a worklist search and creation tool in a healthcare environment. In an embodiment, the worklist search and creation system includes a worklist user interface, which includes an input search field adapted to receive inputted search data. The system also includes one or more databases for storing information that is associated with a data entry, which includes multiple fields of identification data. In addition, the system includes a search engine for searching the multiple fields of the data entry associated with the information stored in the one or more databases for identifying data that at least partially matches the inputted search data of the worklist user interface and displays any of the at least partially matching data entry in the worklist user interface. | 05-21-2009 |
20090132963 | METHOD AND APPARATUS FOR PACS SOFTWARE TOOL CUSTOMIZATION AND INTERACTION - Certain embodiments of the present invention provide methods and systems for circular tool menu configuration and use with a clinical application. Certain embodiments provide a user interface providing software tools and customization for a picture archiving and communication system. The user interface includes a pie-shaped menu including a plurality of tool segments arranged as pieces of the pie-shaped menu. The user interface also includes a pointer movable by a user to select one of the plurality of tool segments in the pie-shaped menu. The user interface further includes an image review area displayed underneath the pie-shaped menu. In certain embodiments, the user interface further includes a tool bar including one or more tools and functions associated with a tool segment in the pie-shaped menu, for example. | 05-21-2009 |
20120143817 | SOCIAL FILES - Disclosed are systems, apparatus, methods, and computer readable media for creating and sharing social files in an on-demand database service environment. In one embodiment, a first document file is received at a computing device configured to provide on-demand computing services via a network. The first document file may be capable of being displayed on a display device. The first document file may be stored on a storage medium accessible via the network. The first document file may be designated as being associated with a social file. A reference to the social file may be stored as a first one of a plurality of feed items in a feed table in a database. The feed items may be capable of being published in an information feed displayed on a display device. | 06-07-2012 |
20120143917 | SOCIAL FILES - Disclosed are systems, apparatus, methods, and computer readable media for creating and sharing social files in a feed system. In one embodiment, a request is received to perform an action related to a social file. The social file may provide access to a first document file within a social networking system. The first document file may be capable of being displayed on a display device. A determination may be made as to whether the requested action complies with a permission configuration record associated with the social file. The permission configuration record may identify one or more user accounts permitted to access the social file. | 06-07-2012 |
20140244689 | SOCIAL FILES - Disclosed are systems, apparatus, methods, and computer readable media for creating and sharing social files in a feed system. In one embodiment, a request is received to perform an action related to a social file. The social file may provide access to a first document file within a social networking system. The first document file may be capable of being displayed on a display device. A determination may be made as to whether the requested action complies with a permission configuration record associated with the social file. The permission configuration record may identify one or more user accounts permitted to access the social file. | 08-28-2014 |
Patent application number | Description | Published |
20150149192 | SYSTEMS AND METHODS TO OPTIMIZE RADIOLOGY EXAM DISTRIBUTION - Example methods, systems, and computer readable media are disclosed to allocate a medical exam. An example method includes identifying an exam characteristic associated with the medical exam. The example method includes determining a plurality of allocation scores for a plurality of radiologists by comparing the exam characteristic to a radiologist characteristic for each of the plurality of radiologists. The example method includes determining one of the plurality of allocation scores with a highest value. The example method includes allocating the medical exam to one of the plurality of radiologists associated with the one of the plurality of allocation scores with the highest value. The example method includes marking the medical exam as allocated to the one of the plurality of radiologists associated with the one of the plurality of allocation scores with the highest value. The example method includes providing an indication that the medical exam is allocated via a graphical user interface. | 05-28-2015 |
20150149193 | SYSTEMS AND METHODS FOR WORKFLOW MODIFICATION THROUGH METRIC ANALYSIS - An example system to manage a radiologist workflow includes a first interface to monitor a distribution status of at least one medical exam. The medical exam is to be at least one of automatically allocated or assigned to an examiner work queue based on one or more rules. The example system includes a second interface to view at least one metric associated with distribution of the at least one medical exam and an assignment tool to be displayed via the first interface. The assignment tool is to facilitate assignment of the medical exam to an examiner work queue. The example system includes a rules viewer to be displayed via a third interface. The rules viewer is to facilitate configuration of the one or more rules based on the distribution status, the at least one metric, or the assignment. The rules viewer is to automatically update the one or more rules. | 05-28-2015 |
20150149206 | SYSTEMS AND METHODS FOR INTELLIGENT RADIOLOGY WORK ALLOCATION - An example system to distribute a medical exam to an examiner includes a first interface to display a medical exam identifier associated with a medical exam stored in a patient record database and an examiner availability indicator to be displayed via the first interface. The examiner availability indicator is to be updated via a second interface. The example system includes an exam allocator to automatically allocate the medical exam to the examiner and an assignment tool to be displayed to a user via the first interface and to facilitate assignment of the allocated exam to the examiner. At least one of the exam allocator or the assignment tool is to be communicatively associated with the examiner availability indicator. Upon assignment of the medical exam to the examiner, the medical exam identifier is displayed in an examiner work queue via the first interface, the second interface, and a third interface. | 05-28-2015 |
Patent application number | Description | Published |
20080298277 | NEIGHBOR DISCOVERY PROXY WITH DISTRIBUTED PACKET INSPECTION SCHEME - A network device is to receive traffic including neighbor discovery messages from requesting customer devices, and can detect the neighbor discovery messages within the traffic according to a distributed inspection scheme that includes the network device and a remote component. The network device is to then examine the neighbor discovery messages to determine if the neighbor discovery message should be forwarded to other of the customer devices, and respond to the requesting customer devices. | 12-04-2008 |
20090125957 | STATEFUL DHCPv6 RELAY AGENT IN A CABLE MODEM TERMINATION SYSTEM - A CMTS or other data aggregation component having a DHCPv6 relay agent extracts a Media Access Control (MAC) address of an end device from a data packet received from an end device. A DHCPv6 data frame is created for transmission to a DHCPv6 server. The MAC address may be inserted into a specific option of the DHCPv6 data frame, where data in the option may not be processed by the server and are echoed back to the aggregation component or CMTS. The DHCPv6 data frame is transmitted to the DHCPv6 server. The component receives a response message from the server that may contain the MAC address or similar client hardware address as it was sent to the server by the network component. The network component may determine an outgoing port interface from which the response message should be sent, utilizing the MAC address and an interface bundling table. In this manner, interface bundling may be enabled. | 05-14-2009 |
20100020821 | NEIGHBOR DISCOVERY IN CABLE NETWORKS - A network device has a communications link to allow the device to communicate with customer devices and a processor. The processor is to receive neighbor discovery messages from requesting customer devices, examine the neighbor discovery messages to determine if the neighbor discovery message should be forwarded to other of the customer devices, and respond to the requesting customer devices. | 01-28-2010 |
20100309813 | DETECTION AND SUPPORT OF A DUAL-STACK CAPABLE HOST - A network processing device is configured to receive a configuration message from a host device and forward the configuration message to a server. The configuration message can be configured to request the server assign an Internet Protocol (IP) address to the host device. The network processing device can be configured to send at least one probe message to the host device responsive to receiving the configuration message. The network processing device can be configured to determine whether the host device intends to continue utilizing a previously assigned IP address in addition to the IP address requested by the configuration message based, at least in part, on any responses to the at least one probe message received from the host device. | 12-09-2010 |
20110208845 | USE OF IPv6 IN ACCESS NETWORKS - An apparatus may include a port to receive a ranging request from a cable modem and a processor in communication with the port. The processor may assign a service identifier to the cable modem, match the service identifier with a link layer address of the cable modem, receive a router advertisement and comparing the source link layer address from the router advertisement to the link layer address of the cable modem, and determine if the link layer address of the cable modem is the same as the source link layer address. | 08-25-2011 |
20120151085 | Hot Standby Neighbor Discovery Protocol for Internet Protocol Version 6 - Techniques are provided herein for receiving synchronization messages at a second network device that is in a hot standby configuration from a first network device that is maintaining Internet Protocol version 6 (IPv6) state machines for one or more neighbor devices. The synchronization messages are configured to indicate an IPv6 state for each state machine maintained in the first network device. An IPv6 state for corresponding state machines is updated in the second network device based on the synchronization messages such that the IPv6 states in the second network device allows the second network device to actively process IPv6 traffic for the one or more neighbor devices upon traffic switchover from the first network device to the second network device without restarting the corresponding IPv6 state machine associated with each of the one or more neighbor devices in the second network device. The roles of the first and second device with respect to active and standby state are reversed after a switchover. | 06-14-2012 |
20140215091 | RECOVERING LOST DEVICE INFORMATION IN CABLE NETWORKS - In one embodiment, methods are described for recovering lost customer premises equipment (CPE) information on a cable modem termination system (CMTS) in the presence of only Dynamic Host Control Protocol Version 6 (DHCPv6) CONFIRM. A CMTS purges routing information for an Internet Protocol Version 6 (IPv6) node, such as a CPE router, in response to detecting an interface reset for the IPv6 node. IPv6 addresses and prefixes information for the IPv6 node is gleaned from a DHCPv6 CONFIRM message received from the IPv6 node. By sending portions of the IPv6 addresses and prefixes information within a DHCPv6 LEASEQUERY message, a DHCPv6 CONFIRM message with an embedded DHCPv6 LEASEQUERY message, or a DHCPv6 CONFIRM message with an Interface-ID option, a reply message can be received that contains the purged routing information for the IPv6 node. | 07-31-2014 |
Patent application number | Description | Published |
20130311752 | INSTRUCTION-OPTIMIZING PROCESSOR WITH BRANCH-COUNT TABLE IN HARDWARE - A processing system comprising a microprocessor core and a translator. Within the microprocessor core is arranged a hardware decoder configured to selectively decode instructions for execution in the microprocessor core, and, a logic structure configured to track usage of the hardware decoder. The translator is operatively coupled to the logic structure and configured to selectively translate the instructions for execution in the microprocessor core, based on the usage of the hardware decoder as determined by the logic structure. | 11-21-2013 |
20140189310 | FAULT DETECTION IN INSTRUCTION TRANSLATIONS - In one embodiment, a method for identifying and replacing code translations that generate spurious fault events includes detecting, while executing a first native translation of target instruction set architecture (ISA) instructions, occurrence of a fault event, executing the target ISA instructions or a functionally equivalent version thereof, determining whether occurrence of the fault event is replicated while executing the target ISA instructions or the functionally equivalent version thereof, and in response to determining that the fault event is not replicated, determining whether to allow future execution of the first native translation or to prevent such future execution in favor of forming and executing one or more alternate native translations. | 07-03-2014 |
20140189386 | SUPPLY-VOLTAGE CONTROL FOR DEVICE POWER MANAGEMENT - One embodiment provides a method for reducing leakage current in device logic having an operational supply-voltage threshold, a nonzero data-retention supply-voltage threshold, and two or more on-die transistor switches to switchably connect a voltage source to the device logic. After the logic enters an idle period, one or more of the switches are opened to lower a supply voltage of the logic below the operational supply-voltage threshold but above the data-retention supply-voltage threshold. When the logic exits the idle period, one or more of the switches are closed to raise the supply voltage of the logic above the operational supply-voltage threshold. | 07-03-2014 |
20140281392 | PROFILING CODE PORTIONS TO GENERATE TRANSLATIONS - The disclosure provides a micro-processing system operable in a hardware decoder mode and in a translation mode. In the hardware decoder mode, the hardware decoder receives and decodes non-native ISA instructions into native instructions for execution in a processing pipeline. In the translation mode, native translations of non-native ISA instructions are executed in the processing pipeline without using the hardware decoder. The system includes a code portion profile stored in hardware that changes dynamically in response to use of the hardware decoder to execute portions of non-native ISA code. The code portion profile is then used to dynamically form new native translations executable in the translation mode. | 09-18-2014 |
20140372796 | CHECKPOINTING A COMPUTER HARDWARE ARCHITECTURE STATE USING A STACK OR QUEUE - Various embodiments relating to saving and recovering a hardware architecture state are provided. In one embodiment, during a first mode of operation, entries in a first portion of a random-access memory (RAM) are manipulated. A current version of less than all of the entries of the first portion is saved to a checkpointed version in response to a checkpoint event that triggers operation in a second mode of operation. During the second mode of operation, entries in a second portion of the RAM are manipulated. The checkpointed version of less than all of the entries of the first portion is recovered as the current version in response to a restore event that triggers resumption of operation in the first mode. | 12-18-2014 |
Patent application number | Description | Published |
20090070177 | System and Method for Optimally Allocating Overlapping Inventory - The present invention introduces methods for allocating: overlapping inventory. In the system of the present invention overlapping inventory problems are reformulated as a network transport problem. Specifically, different inventory types are represented as inventory network nodes. Similarly, corresponding inventory requests are also represented as request network nodes. The different inventory network nodes corresponding to inventory that can satisfy inventory requests are coupled to the request network nodes associated with those inventory requests. A source node is then coupled to the inventory network nodes and a destination node is coupled to the request network nodes. A flow limit of the available inventory is assigned to the connections between the source node and the inventory network nodes. Finally, inventory requests that must be satisfied are represented as flow minimums between the request network nodes and the destination network node. The transport network problem is then solved to solve the corresponding overlapping inventory allocation problem. | 03-12-2009 |
20090222316 | METHOD TO TAG ADVERTISER CAMPAIGNS TO ENABLE SEGMENTATION OF UNDERLYING INVENTORY - A method and system for enabling segmentation of advertising inventory for an advertisement campaign includes capturing a plurality of requirements for an advertisement campaign. The campaign requirements include a descriptive tag that uniquely identifies the advertisement campaign. The requirements include a plurality of campaign attributes that define the requirements of the advertisement campaign including target audience and advertisement campaign objective. A tag inventory, with a plurality of descriptive tags and a plurality of advertisement bookings associated with one or more of the descriptive tags, is analyzed based on the captured advertisement campaign requirements. A recommended suggestion of bookings based on the analysis is presented. The recommended suggestion of bookings matches at least a portion of the campaign attributes. A media plan is finalized for the advertisement campaign based on a response received for the recommended suggestion of bookings, the response defines the relevancy of the recommended suggestion of bookings. | 09-03-2009 |
20100293046 | SYSTEM AND METHOD FOR OPTIMIZING DELIVERY OF INVENTORY FOR ONLINE DISPLAY ADVERTISING - An ad network system for optimizing the delivery of online display advertisement inventory is disclosed. The ad network system includes an advertiser management system to manage and acquire data for a set of advertising campaigns for a set of advertisers and a publisher management system to manage and acquire data for inventory at publishers' sites and applications. A delivery management system manages representations of the set of advertising campaigns in a third-party, external ad server in order to meet a set of guarantees for the set of advertising campaigns. | 11-18-2010 |
20100293047 | SYSTEM AND METHOD FOR OPTIMIZING PURCHASE OF INVENTORY FOR ONLINE DISPLAY ADVERTISING - An ad network system for optimizing the purchase of online display advertisement inventory is disclosed. The ad network system includes an advertiser management system to manage and acquire data for a set of advertising campaigns for a set of advertisers and a publisher management system to manage and acquire data for inventory at publishers' sites and applications. A media buying system runs a two-part optimization to determine an allocation of available inventory and an inventory purchase plan based on the data acquired by the advertiser management system and the publisher management system. | 11-18-2010 |
20100293063 | SYSTEM AND METHOD FOR APPLYING CONTENT QUALITY CONTROLS TO ONLINE DISPLAY ADVERTISING - An ad network system for providing content quality controls to advertisers when placing display advertisements online at publishers' sites and applications is disclosed. The ad network system includes a proposal tool for creating proposals for advertising campaigns, the proposals specifying content quality controls for the campaign. An advertiser management system manages the advertising campaigns for the advertisers, and a content categorization module analyzes content at the publishers' sites and applications. The display advertisements are served to the publishers' sites and applications with a two-stage ad server system according to the content quality controls for the advertising campaigns. | 11-18-2010 |