ANSWERED
ANSWERED
ANSWERED

what does "unscored users" means?

what does "unscored users" means?

Any Audit Informations exists for a profile in Lytics

The profile information's in our Lytics account are created through Lytics API and frequently the profile details are getting updated within via Lytics API calls from our internal systems. So is there any way to know when a profile is updated in Lytics and what all values are modified and does lytics keep track of audits against a profile
ANSWERED
ANSWERED

Where can we get the definition for the following fields? How are these fields derived? (e.g. _num_events)

In a user audience, there are some fields that is not related to any data stream (these were not custom defined fields as the "stream" value is blank). This include. \_cust_sz \_internal_sz \_num_aliases \_num_conflicts \_num_days \_num_events \_num_streams \_total_sz I can't find in the document what each of these fields mean or how are they derived. Can anyone shed some clarity for each of the said fields? The field names seems to infer important values but unless there is a relevant reference, the use seems to be speculative at best.
ANSWERED

How and where are my authoriztion credentials stored?

Lytics takes great care to securely store any tokens or authorization credentials necessary to maintain connection to up or downstream channel tools. Upon submitting any type of auth credentials, such as oAuth or key/secret, an "authorization" record is created in our account database. This contains the contextual information such as author, description, etc, as well as an encrypted copy of your credentials. When it comes to the encryption we adhere to the Advanced Encryption Standard (AES) to ensure credentials are never surfaced in a consumable way outside of our backend system processing. Any API calls will result in returning either no credentials or an encrypted version of the credentials. ### What is AES? AES, or Advanced Encryption Standard, is a block cipher that was selected by the U.S. National Institute of Standards and Technology (NIST) as the standard for the encryption of electronic data. AES is a symmetric cipher, which means that the same key is used for both encryption and decryption. AES is a block cipher, which means that it operates on data in blocks of 128 bits. AES has three key sizes: 128 bits, 192 bits, and 256 bits. The 128-bit key size is the most common, but the 192-bit and 256-bit key sizes are also secure. AES is a secure algorithm because it has a large key space and a complex structure. The key space is the number of possible keys that can be used to encrypt data. The larger the key space, the more difficult it is to break the encryption. AES has a key space of 2128, which is an extremely large number. The complex structure of AES makes it difficult to find weaknesses in the algorithm. AES has been extensively tested and has not been broken to date. It is widely used by governments, businesses, and individuals to protect sensitive data.