FAQ & Information

Technology, Security and Artificial Intelligence

The content of our customers is the value we have to preserve, so we designed THRON with great attention to issues related to the protection of corporate know-how and performance.
 
Starting from the choice of programming languages, to arrive at the basic technological infrastructure, each platform component is developed starting from the principles of security, scalability and technological reliability.
 
Thanks to the use of Machine Learning algorithms, it has been possible to develop an innovative Software as a Service suitable for the needs of any business, reducing the complexity of marketing in content management.
 

Software as a Service

THRON has been designed using the latest technologies to be precisely a Software as a Service cloud native. In this way, it guarantees each user availability, performance and accessibility worldwide, both in terms of content and functionality. The platform has been built to be easily connected with on-premise workflows, such as content authoring suites and mobile applications.
Of course. THRON has been designed on cloud infrastructures to avoid service interruptions for each and every system component. Should the service be unavailable due to a technical problem, it will automatically be restored, as stated in the “Terms and Conditions” document. In line with the transparency that we want to offer all our customers, THRON provides an online dashboard, certified by third parties, containing the status of all services. It also provides a monthly SLA and Incident Report areaobtained from the platform.
TTHRON Marketplace contains applications designed by THRON as well as others designed by partners. Each supplier is responsible for guaranteeing the SLA and security relating to its own applications. Make sure that you always check the supplier and the terms and conditions stipulated for each application.

Technology

THRON is natively designed to automatically manage unexpected peak loads. It has been natively designed on elastic cloud architectures. This means that the platform automatically manages to increase and reduce resources based on the load request. Imagine that news is spreading locally and that, therefore, a large number of users will begin to arrive at your site in search of a specific video or gallery. Or imagine an advertising campaign that unexpectedly goes viral. Thanks to THRON, you can forget about scalability problems and focus exclusively on the success of the campaign.
THRON has all the state-of-the-art features to allow your content to reach users in the best possible way. Integrated content distribution networks, adaptive bitrate streaming, ability to alter images in real time, lazy loading of assets and other optimizations will always guarantee optimal performance with the minimum impact possible on customers’ devices (we know how important it is to preserve your smartphone’s battery!). The “China Delivery” additional module ensures optimal performance within Chinese territory. Technical Documentation »
THRON’s platform is equipped with public APIs that are recorded and can be consulted directly from the Help portal. They are able to facilitateintegration with third-party systems both for digital assets (CMS and applications) and for Content Intelligence data integration (with CRM, PIM, DMP).
Developers Portal »
No. For large organizations with different locations and multiple users who need to access the Intelligent DAM’s content, THRON allows internet bandwidth to be saved using Multimedia Proxy. This additional module ensures that intranet users are able to benefit from all THRON services without blocking the network itself. Furthermore, you can optimize intranet bandwidth consumption during the use of live and on-demand multimedia content on your company’s network.
No. THRON uses the best global Content Delivery Networks and manages them automatically, China included. You therefore do not have to worry about managing CDN configurations, clearing the cache, etc.: THRON does all that.
Technical Documentation »
THRON has been designed for cloud architecture. It uses self-provisioning components that are able to dynamically adapt and scale in order to combat certain service interruptions and unexpected loads. Each infrastructure component is in excess or makes up part of a cluster with automatic "master promotion". This means that service continuity is always followed automatically. THRON’s Terms and Conditions define the SLA that we guarantee to our customers, proof of our commitment to operational continuity.
Technical Documentation ».

Data security & privacy - Documentatiom

THRON manages two different kinds of data subjects: contacts (who access content) and platform users (who access the THRON control panel). The term “personally identifiable information” (PII) generally refers to the identifiability of information relating to a user, such as name, address, phone number and email address. THRON does not collect contacts’ PII unless users intentionally choose to divulge such information, providing it through customer interfaces or applications, for example, filling in forms or text boxes. Being Data controller, THRON’s customers must inform users and manage consent to collect PII to comply with General Data Protection Regulation.
THRON collects information which is not personally identifiable (“Non-PII”), to identify computers with which it has already had prior interaction. For example, by using Non-PII, THRON can identify a computer that has previously viewed content. Through the collection and use of Non-PII, we offer a range of services that allow our customers to show their users the most useful and relevant content on their websites, and to avoid showing the same content on too many occasions to the same people.
THRON collects user’s first names, surnames and email addresses used in the console in order to execute the THRON service delivery.
We may disclose a user’s Non-PII to a third party where we are legally obliged to do so and in order to investigate, prevent or take action against suspicious or prohibited activities (including, for illustrative purposes but not limited to, fraud and situations involving potential threats to any individual’s physical safety). Furthermore, if permitted by applicable law, we may also divulge and provide access to a user’s PII and Non-PII to our service providers and partners who work with us. However, such providers and partners are not authorized to use the information for purposes beyond the provision of services to THRON.
  • THRON’s customers: THRON’s customers (who are the “owners of the data”) have access to data relating to contacts for the purposes indicated in the Privacy Policy. The “parties responsible for their processing” are authorized to access such data in order to carry out their duties.
  • THRON authorized staff: THRON’s technical and qualified staff have access to Content Intelligence data, but only for software and platform maintenance.
  • Public authorities: all data may be handed over to public authorities should it be required by law.
  • Circulation: users’ personal information is not circulated. However, some details such as nicknames and/or profile images, and any other information published by users on their profiles, or through other service communication channels, will be accessible to other users. This occurs as soon as the user concerned decides to take part in the blog or access the community. Some personal information provided by the user may also be circulated during certain events, for example, online competitions or promotions.
THRON’s terms and conditions state (paragraph no. 20) that THRON is Data processor appointed by the Data Controller (THRON’s Customer). This means that data intellectual property and ownership is THRON Customer’s but data is being stored in THRON to allow data processing. You can check the extended privacy policy and opt-out from device tracking at: https://[yourdomain]-cdn.thron.com/shared/assets/privacy/extendedprivacy.html
Data are stored in Ireland, Europe.
As far as development standards are concerned, we follow the most up-to-date best practices to protect consumer data.
Some key aspects:
  • Data in transit: the transmission of data is encrypted (HTTPS protocol).
  • Archived data: archives and databases use encrypted archiving thanks to the Key Management System.
  • THRON is a multi-tenant system, which means that all customer information is logically divided within the same physical infrastructure.
  • Access to data is protected by “access control” and features full inspection capabilities.
  • Our processes and technologies comply with Italian regulations regarding privacy and security.
THRON complies with European General Data Protection Regulation (GDPR). You can explore details about which data is collected, processing purposes, where data is stored and how data is protected from unauthorized access and loss in the extended privacy policy available on each THRON instance.
Extended privacy policy is available on url like: https://[yourdomain]-cdn.thron.com/shared/assets/privacy/extendedprivacy.html , such as: https://contarini5-cdn.thron.com/shared/assets/privacy/extendedprivacy.html
In order to ensure maximum levels of security and data integrity, as well as allowing the customer to retrieve any lost data, THRON is equipped with the following features:
  • Encryption of information: sent files and related automatically performed processing are stored with Advanced Encryption Standard (AES) 256, with a 256-bit symmetric key.
  • Encryption of transmission (active by default): each customer is able to activate transmission channel encryption using the HTTPS protocol and restrict the distribution of information through this encryption protocol.
  • Data redundancy: the data is stored and copied to multiple data centers that are physically distinct and configured in high availability.
THRON never stores its customer’s password (indeed, you will never be able to retrieve your password, but can only replace it). The password database contains one-way dashes, so that THRON can be aware of whether or not you have performed a correct authentication. However, a potential hacker would never be able to retrieve your password, should data be stolen from our database. We would like to remind you that databases are based on an encrypted archive. All authentication requests use only HTTPS protocol.
In accordance with the law, THRON must report any attack or threat detected to the local authorities. For this reason, it is mandatory to request authorization before performing any kind of test (vulnerability scanning or attempts to exploit the system) in order to differentiate tests from genuine attacks. The results of the assessments must be shared with THRON. We do not allow vulnerability assessments or penetration tests to be performed in our production environment so as to protect our customers. However, you can contact infosec@thron.com to arrange for a penetration test in a dedicated environment that is identical to the official one. The dedicated environment has the same architecture, the same software versions and the same configuration as that of the product, and will be created specifically to carry out the assessment. THRON is a SaaS cloud native. Therefore, all environments are managed through automation, and can be dynamically supplied and removed.
THRON has been developed on the basis of OWASP best practices.
Yes. THRON has full industrial and intellectual property rights over the entire platform. Where services are performed by third parties / technological partners, THRON has acquired the relevant rights for commercial use.
you will to erase or download your data we suggest you to direct your request to the Data Controller, so that you can have a complete scope of the data. You can exercise your rights regarding THRON data removal or collection by writing an email to support@thron.com, please note that to performing any action regarding your data we will require proof of your identity. You can also stop monitoring of your information at any moment. Please read the privacy statement and, subsequently, the extended policy, inserting the data requested in this example link: https://[yourdomain]-cdn.thron.com/shared/assets/privacy/extendedprivacy.html

Intelligenza Artificiale e Machine Learning - Documentation

The analysis of texts becomes ever more fine-tuned thanks to the constant evolution of computational linguistics.
Documents and texts go through a preliminary phase of stemming and tokenization, which is available in 11 languages.
The sections of the text that are relevant to the overall meaning of a specific document are set apart from those that are not.
The relevant textual elements are then ingested by various classifiers. At this point, the system also extracts those notions that cannot be derived directly from the words used to express them (resolving ambiguities in this way too), and that are not related to a specific language (indeed, the same concepts will be extracted from a document translated into different languages).
THRON, therefore
  • recognizes the context and the concept expressed in a text
  • solves disambiguation
  • aggregates concepts expressed in different languages with the same notions
  • learns and assimilates new concepts that, from now on, it will be able to recognize.
Using this information, the semantic engine consolidates different notions that are related to the same conceptual sphere, identifying a topic. Subsequently, it automatically assigns relevant tags to each document, while taking into account your company’s dictionary tags.
The convolutional neural network lies at the base of THRON’s AI engines’ visual recognition technology.
Visual elements and patterns are extracted from images and are subsequently applied to models that identify objects and characteristics. These are the concepts that, when combined together, produce the tags that represent the image’s content.
With this same methodology, THRON recognizes and analyzes video content too.
THRON’s users can define their own taxonomy in the Tag Center. Official taxonomy may be established by your own sales and marketing departments. This way, THRON will also tag in compliance with the company’s strategy.
If a relationship is set between tags, this will also be automatically transferred to the corresponding concepts.
The tags that make up the taxonomy can be structured:
  • into heritage relationships, or rather, where some characteristics, such as personalized metadata, are transferred from parent tags to the related children;
  • into combined relationships, or rather, where a tag is inserted into another, taking with it all the content that it is associated with.
Of course. This too is one of the advantages offered by THRON’s AI engines: the ability to search content by subject matter. For example, you may carry out a generic search for “wedding images”, or documents that have “microeconomics” as their topic. An autocompletion mechanism in the concept dictionary allows users to easily tap into all THRON’s knowledge.
THRON recognizes the interests of each individual, analyzing the subject matters relating to the content that the company publishes online, and that is then viewed by each and every user.

This can be achieved because THRON applies the relevant tags to each digital asset. In this way, it is possible to discover what the user who has consulted specific content is interested in.

Thanks to its behavioral engine, THRON produces a synthetic and exhaustive representation of all the interests demonstrated by a particular contact. The tags are linked to those users who have consulted content with the same tags, and the frequency of interaction between the two is then measured.

Clearly, some concepts may be overrepresented, for example “car” if we are in a car company. To solve this problem, THRON’s algorithm also takes into account the tags’ rarity index.

Another aspect to bear in mind is that the importance of a specific subject matter may change for an individual over time. For this reason, the algorithm for behavioral analysis grants less weight to past events compared with recent ones.
User behavior is dynamic by nature: it changes according to trends, habits, and due to external influences. THRON takes into account such dynamism in its creation of contact profiles or when it proposes content to them.

Taxonomies are also dynamic. THRON allows you to update your taxonomies at any moment. When a change is made to the taxonomy, THRON propagates it back through the entire history of each user, consequently updating profiles and adjusting suggestions.

In this way, the taxonomy approach is incremental. It builds itself up step by step, understanding as it works over time which data is most relevant for the company.
THRON’s content recommendation engine adopts a highly evolved Machine Learning approach. It does not make suggestions that are based simply on similar tags, but combines the interests of the user, content topics and the interactions that users have with content and channels in real time.

This approach is considered “hybrid” because it combines content-based techniques and collaborative techniques. In this way, it reduces the problem that arises when there is only a small amount of data available on which to base recommendations.

In the content-based approach, content and contacts are represented by a series of characteristics (subject matters and interests) from which an indication of similarity is derived. In this instance, the recommendation is based on the idea that the user will like content that has characteristics corresponding with their interests.

In the collaborative approach, all actions performed by the user with regard to specific content are interpreted in the form of a “history”. Tracking of these past actions may then be analyzed to predict what the user might like, based on what others liked before them.

 

Want to know more about
security and performance?
Contact our specialist!