摘要:
Various embodiments protect against undesirable activities, in at least some embodiments, by combining the protection of a data or message filter with the user's own knowledge and judgment. In at least some embodiments, data or a message that is suspected of being associated with an undesirable activity is identified and indicia is provided to a user that the message is suspect. The data or message is presented to the user in a protected environment that allows the user to access the data or message in full fidelity, but prevents them from interacting with the data or message in a manner which would expose them to the undesirable activity. After reviewing the data or message in the protected environment, the user can decide how the message should thereafter be treated.
摘要:
The present invention extends to methods, systems, computer program products, and data structures for presenting message attachments independent of electronic messages at a user-interface. A message application submits a query for message related data that satisfies query criteria. A database application receives the query and identifies a message attachment that satisfies the query criteria. The database application returns a message attachment link to the message attachment in response to the query. The message attachment link provides access to the message attachment independent of an electronic message that included the message attachment. The message application receives the message attachment link. The message application presents the message attachment link at a user-interface independent of the electronic message such that the message attachment can be accessed without first accessing the electronic message.
摘要:
The present invention extends to methods, systems, computer program products, and data structures for maintaining multiple versions of electronic bodies in a common database. A computer system maintains an association between an electronic message and a plurality of versions of a corresponding message body in a database that is accessible to a plurality of messaging applications. Versions of the corresponding message body can be stored in different formats that vary in fidelity. A messaging application submits a request to access an electronic message. An operating system receives the request and identifies data formats supported by the messaging application. The operating system provides the messaging application with an appropriate version of the message body from the database based on the supported data formats. The messaging application receives the version of the message body and utilizes the version of the message body to perform a message related operation.
摘要:
A mechanism for placing a telephone call while at the same time communicating context (e.g., subject, importance and/or nature) of the telephone call. The caller uses a mechanism on a user interface to instruct a caller computing system to place a telephone call to a callee computing system. Using the same user interface, the caller also identifies some contextual information for the telephone call such as, for example, the subject, importance and/or nature of the telephone call. The caller computing system then constructs a call invitation data structure that includes both an invitation to the callee to engage in a telephone conversation and the user-entered identification of the context of the telephone call. Upon receiving the call invitation data structure, the callee computing system reads the identification of the context of the telephone call, and then takes appropriate action based on the context for the telephone call.
摘要:
Generally, the present invention provides for a distributed computing system that is capable of associating time-date information with a property value in the database. The distributed computing system has a device that stores properties in a database without corresponding time-date fields, and thus is considered a low fidelity or legacy device. Example embodiments provide that time-date information corresponding to remote property values can be identified and formatted in a standard format parsable by one or more devices in the distributed computing system. The formatted time-date information is sent to the remote database for storage in a field associated with the remote property values. The formatted time-date information can then subsequently be used in resolving conflicts between property values.
摘要:
The present invention provides for a distributed computing system that is capable of determining when data needs to be synced between two computer devices because data has changed on at least a remote device. More particularly, the present invention provides for a sync adapter that uses sync data to detect that a property on a device is new and needs to synchronize with corresponding data on another machine. The sync data is specific to the two devices in that the sync data mirrors data that was last synchronized between these two computing devices. Other example embodiments use the sync data to detect and mark data as low fidelity data for identifying any date and time information associated with the low fidelity data as potentially unreliable.
摘要:
Various embodiments protect against undesirable activities, in at least some embodiments, by combining the protection of a data or message filter with the user's own knowledge and judgment. In at least some embodiments, data or a message that is suspected of being associated with an undesirable activity is identified and indicia is provided to a user that the message is suspect. The data or message is presented to the user in a protected environment that allows the user to access the data or message in full fidelity, but prevents them from interacting with the data or message in a manner which would expose them to the undesirable activity. After reviewing the data or message in the protected environment, the user can decide how the message should thereafter be treated.
摘要:
The present invention involves a system and method that facilitate extracting data from messages for spam filtering. The extracted data can be in the form of features, which can be employed in connection with machine learning systems to build improved filters. Data associated with origination information as well as other information embedded in the body of the message that allows a recipient of the message to contact and/or respond to the sender of the message can be extracted as features. The features, or a subset thereof, can be normalized and/or deobfuscated prior to being employed as features of the machine learning systems. The (deobfuscated) features can be employed to populate a plurality of feature lists that facilitate spam detection and prevention. Exemplary features include an email address, an IP address, a URL, an embedded image pointing to a URL, and/or portions thereof.
摘要:
Various embodiments can utilize information that is displayed for a user to automatically generate a list of keywords and use that list as a means to display supplemental information that is relevant to the keywords. In at least some embodiments, the displayed information is analyzed using an extraction algorithm to identify words or, more generally, character strings of interest. If these words or character strings of interest are determined to constitute relevant search terms or “keywords”, then a special user interface portion can be used to display this supplemental information along with the information that is already displayed for the user. This supplemental information can include the search terms themselves, ads that pertain to the search terms, and/or search results that have been ascertained from a web search engine.
摘要:
Generally, the present invention provides for a distributed computing system that is capable of associating time-date information with a property value in the database. The distributed computing system has a device that stores properties in a database without corresponding time-date fields, and thus is considered a low fidelity or legacy device. Example embodiments provide that time-date information corresponding to remote property values can be identified and formatted in a standard format parsable by one or more devices in the distributed computing system. The formatted time-date information is sent to the remote database for storage in a field associated with the remote property values. The formatted time-date information can then subsequently be used in resolving conflicts between property values.