1. Field of the Invention
The present invention relates to contacts networking and incentive systems, and more particularly to automated candidate and prospect referral systems.
2. Description of Related Art
Very often the needs of an organization outstrip their abilities to find suitable candidates. This is true for employers trying to find qualified workers, for charitable organizations to find donors, for creditors to find debt-collection agents to get debtors to pay their bills, for researchers to find suitable clinical trial candidates, for law enforcement to find tipsters willing to respond to rewards, etc. So organizations have resorted in the past to the use of incentives and incentive programs that are not automated, difficult to administer, and limited in the populations they reach.
Many campaigns to find the needed resources are infrequent or rare events that do not justify a full-time, in-house staff. But at the same time, these campaigns demand high quality candidates that do not respond to traditional forms of marketing and advertising.
Briefly, a referral and recruitment system embodiment of the present invention is hosted on a webserver and provides for recruitment, fundraising, or advocacy campaigns. Users on the Internet with browsers log-on as clients to post and refer charitable donations or job opportunities, for example. At the heart of the server is an incentive engine that tracks job openings or other offerings by their ID, incentive type, and the value of the incentive. Incentives can be structured as cash bonuses, days off, contest points, etc. Combinations of incentives can be tailored to suit particular persons or groups. Users can post new jobs, make direct referrals to collect the entire hiring incentive, or pass along the information to their private contacts to share later in the incentives. The communication between these people is based on email and their respective email contact lists. The system tracks who-knows-who, and who-referred-who to who. The hierarchy of relationships can then be used to dictate how the incentive bonuses and payments are distributed amongst the successful referring parties. Employment opportunities can be broadcast to recruiting organizations. Each time an employee, friend, recruit or associate sets up a message campaign, or responds to a message, they do so from their own personalized account using their email address for user identification.
An advantage of the present invention is a contact network is provided where each recipient who forwards, commits or responds in any way, sets up their own personalized account. Such allows sponsors to easily collect and track new email addresses and campaign data, thus creating a valuable re-contact and tracking tool.
Another advantage of the present invention is that a contact network is provided that automates and leverages Candidate Referral Programs. Messages are personal, dynamic, actionable, and customizable rich-text HTML emails which can include graphics, animation files, colors, and unique incentive management capabilities.
A still further advantage of the present invention is that a contacts networking technology is provided with individual account access for each participant, automated incentive creation and management, embedded email address manager, viral forwarding functionality, ability to automatically refer a candidate, resume storage and handling, directory service to locate current email addresses, real time referral tracking for all responses, multi-level organization admin features, auto non-duplicate email detection and handling, etc.
Another advantage of the present invention is that a contact network is provided that allows an employer, recruiter or sponsor to set up their own campaigns, e.g., naming the campaign, its duration, the position description or marketing message, etc. An administrator decides the starting and any ending dates of the campaign. If the employer wishes to include a bonus to encourage membership recruitment, they can select a rule from standard challenge rules provided, and then separately define the rule parameters.
A further advantage of the present invention is that a contact network is provided with incentive methods that include a direct bonus, where a one-time bonus is awarded to the person directly responsible for fulfilling the campaign goal, or allowing the referral agents to share the bonus, where users may elect to share all or part of the provided bonus with their contacts as incentive for campaign participation. Incentives can be structured in any units as defined by the employer within the application, e.g., dollars, time off, points, coupons, volunteer hours, etc.
The above and still further objects, features, and advantages of the present invention will become apparent upon consideration of the following detailed description of specific embodiments thereof, especially when taken in conjunction with the accompanying drawings.
The Business Layer does not own exclusive rights to the data access layer. The presentation layer may also access the database, e.g., when some data needs to be retrieved for display.
The Business Layer includes entities known as Packages. A Package is a Class that encapsulates a collection of related data and operations that may be performed on that data. For example, there is a Package Class that represents a user in the system. This class contains data regarding the user (name, address, job title, etc.) as well as operations that may be performed on this data, e.g., updating the name, updating the address, committing the changes to the database, etc.
Packages exist for every major type of entity in the system, e.g., users, organizations, campaigns, messages. They are simply in-memory representations of information from the database that may be manipulated by the contacts networking application and then committed to the database for permanent storage. Packages may be created from existing data. For example, when editing a user profile. Or they may be created anew, e.g., when creating a new user profile.
Packages serve as vessels that may be transmitted between various parts of the contacts networking application. Consider the following example: suppose we're dealing with the creation of a user account. The User Creation Workflow Engine (UCWE) creates a new UserPackage. As the UCWE progresses from step to step, it populates the UserPackage with information that is gathered at each step, possibly passing the UserPackage (or parts of it) to various Utility or Logic Engines for processing. Once the UCWE has reached the end of its operation, it then commits the UserPackage to the database for permanent storage. The UCWE and the UserPackage are then disbanded and the user is sent back to the login page so that they may sign on with their new account.
All business rules are processed by objects within the business layer 204. All interfacing with the user is done by components within the presentation layer 202. There is no direct communication between the presentation and data access layers. All communication must pass through the business layer 204. The presentation logic includes the user interface for displaying data to the user, and accepting input from the user. The business logic implements business rules, e.g., data validation and task-specific behavior. The data access logic controls database communication, e.g., constructing SQL queries and executing them with an API.
The presentation layer 202 includes component scripts 212, dialog type scripts 214, screen structures 216, extensible markup language (XML) files 218, extensible style sheet language transformation (XSLT) process 220, extensible style sheet language (XSL) files 222, cascading style sheets (CSS) 224, and hypertext markup language (HTML) document output 226.
Instead of XML/XSL/XSLT being involved in the styling of the contacts networking application at the presentation layer, the styling is stored in mostly static template pages with dynamic components. For example, loops, conditional statements, etc. These template pages are fed into a templating engine that processes the dynamic components and then outputs an HTML document that is then sent to the client. A Templating Engine that works here is SMARTY, an open-source PHP software package designed to help developers separate application logic and content from presentation (see http://smarty.php.net).
The general flow from HTTP request (208) to HTTP response (210) is as follows:
(1) An HTTP request sent to the appropriate Workflow Engine;
(2) The workflow engine processes the information from the HTTP request, possibly funneling it through some number of utility and/or logic engines;
(3) Control passes back to the workflow engine which determines the next page to display based on feedback from the business layer engine;
(4) Workflow engine passes values to the templating engine;
(5) Templating Engine merges those values into a pre-defined template (HTML/CSS/JavaScript) which is sent as the HTTP response; and
(6) HTTP response is displayed on the client's browser.
The business layer 204 includes database table classes 228, abstract table classes 230, a validation class 232, and a collection of workflow, utility, and logic engines 234.
Three different types of engines are included with a contacts networking application. Workflow engines are used to manage a process, e.g., creating user accounts, campaigns, etc. Utility engines operate on data, e.g., validation, transformation for normalization, etc. Logic engines are used for complex operations or operations on large amounts of data. For example, an incentive engine is used to calculate incentives based on campaign activity. A tracking engine is used to deliver tracking statistics based on campaign activity.
Utility and logic Engines are best disposed within the business layer 204. Workflow engine act as intermediaries between the presentation and the business layers 202 and 204. The presentation layer is a good place to put them, however the exact placement is not important.
The data access layer 206 comprises a data manipulation language (DML) class 236, a database 238, and an audit class 240. In an embodiment that was prototyped, there was no audit class 240 included in the contacts networking application because PostgreSQL can automatically log all activity to the database. An audit log keeps track of the changes made to the database and by whom. Database table classes are included in the data access layer 206. Such call the Database Access Objects (DAO).
There is generally one DAO class per table, though there are exceptions. For example, when a database action spans multiple tables. The UsersDAO, for example, handle all interactions with the users table in the database, e.g., when retrieving information about an existing user or adding a new user to the table. Each DAO provides functions that may be called to perform operations on the tables that that DAO is responsible for. Since the actual SQL statements are hidden within the DAO functions, the client of the DAO is not required to deal with the specifics of the database driving the contacts networking application. The client simply needs to know what the function calls are named.
The presentation layer 202 includes a separate component script for each transaction or task to identify the models, views and controller components to use. A screen structure script identifies which XSL stylesheet to use for the HTML output, and lists field names with their associated labels. A dialog type script controller component manages the input request and generates the output response. It communicates with table objects in the business layer 204. Data from these objects is written out to an XML file 218 then converted into HTML output 226 by an XSL transformation process 220. The XML file is generated automatically by the dialog type script. It has the data obtained by the table classes and other data required by that component. The XSL stylesheet includes the commands which will transform the XML input into HTML output during the XSL transformation process. It is possible to create custom stylesheets. The XSL transformation process uses the XML input to transform it into HTML output using the rules defined within the XSL stylesheet. The HTML output text file is sent to the client's web browser. It is rendered into a viewable page with the assistance of CSS files 224. The CSS files are a way of specifying a standard style in a group of HTML documents.
The business layer 204 includes a separate table class for each database table or business entity. Each table class is a subclass of a generic table class so that it can inherit as much generic code as possible. All communication with the physical database 238 is handled by the generic table class through a separate DML class. Primary data validation is handled by the generic table class through a validation class. Secondary data validation is performed by customized functions within each table class. The business layer 204 communicates with Engines 234 to determine if a new workflow case needs to be created, and to progress each case through its various stages.
The data access layer 206 comprises DML objects 236 to communicate with the databases 238. A separate DML class is used for each database engine, e.g., MySQL, PostgreSQL, etc. Such are sometimes referred to as a Data Access Object (DAO). The same transactions can access tables in different databases, and tables through different database engines. The data Access layer 206 communicates with AUDIT class 240 to record changes made to an application database. A separate audit database can be reviewed later using online query screens.
Each component script 212 specifies the Model and View before handing control over to a particular controller. Dialog Type (controller) scripts 214 are Transaction Controllers or Page controllers. Each script is based on a particular combination of structure and behavior. The actual content is identified by the Screen Structure script 216 set in the calling Component script 212. Controller scripts may be called by many different component scripts 212. Each database table 238 (or business entity) is represented by its own class which extends the generic table class. Each table subclass will inherit all the generic code from the superclass. It includes information specific to the database table to which it relates. Generic (abstract) table class 230 is an abstract class because it does not include implementation details and cannot be instantiated into an object. Implementation details for each physical database table are supplied in separate subclasses, only these subclasses are instantiated into objects. Because this class/object exists in the Data Access layer 206 it may be referred to as a Data Access Object (DAO). This abstract database class contains generic methods and properties which can be used by any database table in the system. These methods and properties are automatically inherited by every subclass. Code specific to any particular table is built into in the subclass for that particular table. A generic validation class 232 handles primary validation of all user input, e.g., declarative checking. It compares the contents of the input array with the contents of the a $fieldspec array to verify that the input data for each field conforms to that field's specifications. It puts any error messages in a current object's $errors array. The DML class 236 is the only object in the system that communicates with the database 238. It receives requests from a Generic Table class. It generates an appropriate DML or SQL command. It then executes these commands by calling a relevant API for the database in question. Screen Structure (View) scripts 216 are scripts which identify the view or content for the output screen. Each one identifies the name of an XSL stylesheet and a list of table names, field names and field labels that will be used during the XSL transformation process to produce the HTML output. XML files 218 are flexible text formats based on an open standard maintained by the World Wide Web Consortium. They send the XSL transformation process all the data it needs to produce HTML output. XSL Stylesheets 222 help transform data in the XML file 218 into HTML output 226. XSL Transformation process 220 uses the contents of an XML document to transform it to another document, e.g., an HTML document. It uses rules included within an XSL stylesheet.
It is possible to send both the XML and XSL files to the client and have the transformation done within the client's browser. But this may be unreliable due to the different levels (sometimes nonexistent) of XML/XSL support in different browsers. It is much safer to perform the transformation in a single place (the web server) where the software is under the control of the web developer. This is known as a server-side transformation.
The http response 210 is the document sent back to the client's browser in response to an http request 208. Its content conforms to the (X)HTML specification supervised by the World Wide Web Consortium. CSS files 224 Cascading Style Sheets which convey all the styling information, e.g., fonts, colors, sizes, positioning, etc. Tags within each HTML document refer to a style by a class name, and the specifications for each of these classes are communicated within a CSS file. It is possible to change the style specifications for any tag in all documents simply by changing the specifications within a single CSS file. AUDIT class 240 detects all database changes and records them in a separate ‘audit’ database. These can be reviewed later using online query screens.
The engines 234 is actually a collection of engines that are tailored specifically for the business application. In one instance, it includes employer hiring incentives and email contact-tracking. Such allows different workflow processes to be defined. A triggering task and the sequence of subsequent tasks can be defined. A mechanism is included to automatically create a new workflow case when a triggering task is processed, then process that case through its various stages. For example, outstanding tasks in workflow cases which require human intervention will appear in a list to prompt the user to intervene. A task can be activated by clicking on its entry in such list.
Specifically, the email contact-tracking engine includes an embedded email address book manager. A “viral” forwarding functionality permits real time referral tracking for all responses, and two-way online communication with the campaign administrator or referral agent. A directory service is included to locate current email addresses of associates. The database can be used for resume storage and handling. In some embodiments of the present invention, it may be necessary to limit email messages to intra-company email, or open it up to non-employee recipients. Auto non-duplicate email detection and handling would also be advantageous.
The contacts networking technology system 100 facilitates and maximizes employee and member referral and recruitment programs, e.g., incentive automation. Users can create their own personal email message or incentive challenge campaigns with just a few “clicks” at their browser. For example, an employer could incentivize their employees to search their current social and business network base by offering a direct $1000 cash bonus or charitable contribution for any employee who finds a new hire for the company through their contacts list.
Contract recruiters can broadcast employment opportunities that they are unable to fill, and agree to offer an incentive or finder's payment with the recipients. Sales managers can expand in-house CRM contacts' databases for key target accounts.
The combinations of incentive units (dollars, days off, points, etc.) can be defined by the employer. Such ability allows each participant to personalize the incentive, and this can spur healthy competition.
Email messages sent by users are personal, dynamic, actionable and customizable rich-text HTML emails. These can include graphics, animation files, colors, and incentive matching capabilities. Users can create personalized announcements or incentives for recruitment, fundraising or advocacy campaigns.
In some embodiments of the present invention, the email addresses of former co-workers or other business contacts can be looked up in a sort of directory assistance from a database containing millions names.
For the incentive engine, the incentives should be configurable in dollars, points or any other “units”. An employer can award a one-time direct bonus, e.g., to the referral agent who was directly responsible for referring the new hire. Some embodiments of the present invention can assist reporting income with IRS form 1099. Merchant accounts tracking and record-keeping administration can be included for donations made to a 501(c)3 not-for-profit organization.
Personal profiles include career and social/business networks. Each time an employee, friend, recruit or associate sets up a message campaign or responds to a message, they do so from their own personalized account using their personal email address as their user identification. Users track their personal campaign progress via their personal account. Users may also indicate their vocational fields of interest, e.g., to help customize the types of staffing positions they would like to be presented with during recruitment campaigns.
Users may upload and store resumes in their own personal account. When they apply for any job position, their resume and a corresponding employer job ID number and job title will automatically be attached. Users may store multiple resumes and select the desired resume to attach when responding to a particular job opening.
User identification and email addresses should never be sold, traded, or otherwise disclosed to a third party, other than to the entity receiving the donation or commitment unless the user has requested anonymity.
An embedded address book allows users to easily build, manage, and import existing contact lists from most standard email programs. This also guarantees delivery through most “spam” filters.
Anyone initiating a campaign message can view a visual referral contacts network (VRCN) map of their current referral network. Such VRCN map is a graphical display of the relationship structure between the current responders to each campaign. Administrators can view the responder relationship structure for the entire campaign. Champions have viewing access to only those respondents within their personal network circle.
Employer administrators can track the progress of all campaigns that they initiated as well as any branching campaigns sent by recipients, and track email addresses of respondents. Administrators can track the number of participants interacting, including the number of forwarded, branching and bounced emails.
In another embodiment, the networking technology system 100 platform accelerates the recruitment of clinical trial patents or sites and candidates, and strengthens sponsors' physician, patient and advocate relationships.
Setting up a campaign is quick and simple. A user first creates a campaign. All messages are issued by providing a campaign name and a brief profile of the trials protocol, and it indicates the primary purpose of the campaign. Such user establishes the start and end dates of the campaign. All campaigns must have a start date, however campaigns can be open-ended with no ending date. Sponsors assign administrative access to patient or support group staff to administer fundraising or volunteer/advocacy campaigns independent of any site or patient recruitment messaging.
If the sponsor wishes to include a bonus to encourage membership or volunteer recruitment, they may want to have access to the system's incentive functionality. They select a rule from standard challenge rules provided, and then define its parameters on a separate screen. Incentive methods include a direct bonus, where a one-time bonus is awarded for fulfilling the campaign goal. The referral agents can also share the bonus. Users may elect to share all or part of the provided bonus with their contacts as an incentive for participating in the campaign. For example, a company can decide to challenge and incentivize their recipients by agreeing to donate $5000 to charity if at least 100 qualified candidates sign up and participate in the trial campaign. If the sponsor wants to motivate potential site coordinators to sign up or to forward the recruitment message on to their professional contacts, they would use the same process.
Recipients have the opportunity to sign up, personalize and forward the message to their own list, or ask a question to the campaign administrator regarding any questions they may have before committing. Users can track all responses from within their personal accounts.
An alternative viewing method can be provided at the top of each message, e.g., for those recipients who are unable to read HTML emails. A hot link to a sponsor's homepage can also be included in the email.
When a recipient first responds in any way, they must set up a personalized account using their own email address as identification. That way a tracking engine can follow their contact referrals and build corresponding contact hierarchies.
Pre-approved personal accounts can be created if the organization passes the appropriate user information to the contacts networking application. The system actively tracks who has responded to which champion, and relaying that information to the administrator or sponsor for campaign reconciliation. Sponsors can capture valuable patient profiles for further contacts.
After recipients register for their own account, they are able to participate in campaigns by creating their own new challenge or invitation, make commitments, donations, appointments, or fulfill the champion's request.
Tracking can be done at multiple levels. One for each individual user, and another in aggregate for the campaign sponsor or administrator. Organization or sponsor administrators can track the progress of all loyalty campaigns initiated, as well as any branching campaigns sent by recipients, and track email addresses of respondents. All administrative control/access is controlled by the sponsor. The administrator can terminate any current campaign so that no other enrollments will be accepted if a goal or deadline has been met.
Each time an employee, friend, recruit or associate sets up a message campaign, or responds to a message, they do so from their own account using their email address as user identification. Users can track their personal campaign progress at any time via their personal account. Users may also indicate their vocational fields of interest to help customize the types of staffing positions they would like to be presented with during recruitment campaigns.
Users may upload and store their resumes in their own personal account. When they apply for any job position within the contacts networking application, their resume along with the corresponding employer job ID number and job title, will automatically be attached for them. An embedded address book technology allows users to build, manage, and import existing contact lists from most standard email programs. This also guarantees delivery through most “spam” filters.
Anyone initiating a campaign message can view a visual contacts network map of their current referral network. This visual referral contacts network (VRCN) map is a graphical display of the relationship structure between the current responders to each campaign. Administrators can view the responder relationship structure for the entire campaign, whereas champions will have viewing access to only those respondents within their personal network circle.
Employer administrators can track the progress of all campaigns that they initiated as well as any branching campaigns sent by recipients, and track email addresses of respondents. Administrators can track the number of participants interacting, including the number of forwarded, branching and bounced emails.
An employer, recruiter, or sponsor sets up their campaign including campaign name, duration, position description or marketing message, and any optional incentive specifications. The administrator also establishes the start and end dates of the campaign. All campaigns must have a start date, however specifying a corresponding end date is optional (campaigns can be open-ended).
If the employer wishes to include an bonus to encourage membership recruitment, they may want to have access to the incentive functionality. A rule is selected from standard challenge rules provided, and then they define its parameters. Incentive methods include direct, shareable, matching, group, and early completion bonuses. In a direct bonus, a one-time payment is awarded to the person directly responsible for fulfilling the campaign goal. Referral agents can be designated to share the bonus, users may elect to share all or part of the provided bonus with their contacts as incentive for their campaign participation.
Incentives can be structured by the sponsor/administrator in various units and amounts, e.g., numbers of dollars, hours of time off, points, coupons, volunteer hours, etc.
Users can become referral agents with just a few clicks. Contacts networking technology system 100 includes individual account access, embedded address book, and real-time tracking of messages. Each time an employee, friend, peer, or associate responds in any way, they are required to setup an account using their personal email address as their user identification.
Users may also indicate their vocational fields of interest to help customize the types of staffing positions they would like to be presented with during recruitment campaigns.
Contacts networking technology system 100 also allows users to search for email addresses of former co-workers or other business contacts, e.g., from a database containing over twenty million names.
Tracking engine 312 generates a report 314 for the incentive engine documenting the second level contacts referred by the first level contacts. Here, for example, contact-A has referred a contact-D (AD) 316, and a contact-E (AE) 318. Contact-B has only referred one other, a contact-F (BF) 320. Contact-C 310 has not yet made any referrals, but could at a later date. The hierarchies are built-in to the message chains, AD, AE, and BF. Hierarchy daughters D and E have parent A. Hierarchy daughter F has only B as a parent.
These second level contacts can, in turn, make campaign referrals to a third level of contacts. The details of the campaign and its incentives are included in the email or in a webpage that can be accessed. The tracking engine needs to keep track of all referrals so the incentives can be distributed properly. If any of them want to participate by referring others, each clicks on their embedded http hyperlinks included in the emails they received from tracking engine 312. These clicks too will issue http requests, but this time to a tracking engine 322. Such is the same tracking engine as tracking engine 312, but it has a different element number in
Tracking engine 322 reports the third level contacts in a report 324. Here, A referred D and E. Contact-D, in turn, referred G and H. Contact-E, in turn, referred J, K, and L. Contact-F, so far, has not referred anybody. These are represented in
In the example illustrated by
Specifically in one embodiment, the incentive engine 400 comprises a step 402 that creates individual incentives that are associated with a job ID. Various parameters are received from the employer, e.g., in http requests from an employer's browser or emails. A step 404 adds this incentive to a sub-table of incentives. Such is then made available to campaigns, as in
Embodiments of the present invention strictly enforce the privacy rights of their users. Tracking engines 312 and 322 are in a strategic location in the system 100 that allows for such privacy controls. User identification and email addresses must never be unintentionally or in an unauthorized way made visible, sold, traded, or otherwise disclosed to a third party.
Individual account controls allow for multi-level administration. The sponsors can allow users along a chain to elect to share their bonuses. The number of layers in a chain allowed to share can be fixed. The sponsors can configure their incentives in any amounts and in any kind of units. Bonuses can be customized to particular individuals or groups. Bonus types selectable by the sponsors include direct-fixed, shareable, matched by third parties, outstanding contribution received, outstanding group participation, early completion, etc. Each incentive can be constructed as a combination of any or all of these.
Employees, or others who the recruiting organization wants to have access to openings, can receive a message from the recruiter, or a current user, or access openings powered by browsing public or the recruiter's private label job boards.
Recipients of referral messages can respond in at least three ways. They have the option to attach their resume and apply for the job themselves, they can personalize and forward the message to other qualified or interested candidates from their contacts list, or can automatically refer a candidate of their choice to the campaign administrator.
Users may also upload and store their resumes in their own personal account. When they apply for any job position within the contacts networking technology system 100 application, their resume along with the corresponding employer job ID number and job title, will automatically be attached for them. Users may store multiple resumes and then select the desired resume to send when responding to a job opening.
The PHP implementation described above can, instead, be implemented as an active server page (ASP). ASP's are a traditional specification for a dynamically created Web page with a .ASP extension that uses ActiveX scripting, e.g., usually VB Script or Jscript code. When a browser requests an ASP, the Web server generates a page with HTML code and sends it back to the browser. ASP's are similar to CGI scripts, but they enable Visual Basic programmers to work with familiar tools.
Contacts networking application embodiments of the present invention support at least two types of privacy. These can be implemented as engines 234 (
Contacts networking application embodiments of the present invention may further include an intelligent incentive engine for recognizing when an incentive can no longer be applied to a campaign. It then intervenes in the messaging process to make users aware such incentive has been dissolved. A dynamic incentive engine can provide for modifications of the incentives within a campaign, such that administrators may increase, reduce, or completely remove incentives from even an active campaign.
An external interface so external applications can exchange data with the contacts network is very useful. For example, if an employer designates certain companies that they wish to receive referrals from, the contacts networking application can view those criteria and return referral agents who work for the designated companies and have opted-in to receive job solicitations. Another interface should provide for the direct posting of existing jobs to the contacts network application through a standardized XML format, e.g., HR-XML. It would also be desirable to include an HTML-based framework that allows administrators to customize the look-and-feel of their campaign messages.
In a very different embodiment, a commercial business like Safeway Groceries owns the contacts networking system. It also owns and maintains a list of shoppers' emails and other data. When various jobbers, distributors, and suppliers wish to run specialized promotional campaigns targeting particular shopper demographics, the commercial business sends out incentives like coupons and offers of special discounts. E.g., for purchases of certain products, in certain quantities, in certain time frames, or in certain combinations. A business like Safeway has loyalty programs that can be tied in to make these offers, either electronically or as hardcopy printed at the checkstands.
Although particular embodiments of the present invention have been described and illustrated, such is not intended to limit the invention. For example, the embodiments illustrated here have shown a job recruitment incentive contacts network. Modifications and changes will no doubt become apparent to those skilled in the art, and it is intended that the invention only be limited by the scope of the appended claims.