摘要:
Systems and techniques are described to display usage data that is collected regarding the employee's use of corporate computing resources and obtain the employee's permission to collect the usage data. A data schema associated with the usage data may be determined. Data elements included in the usage data may be determined based at least in part on the data schema. A permission model associated with the usage data may be determined. Based at least in part on the permission model, one or more additional employees that have access to the usage data may be determined. The employee may use a user interface to display the type of usage data that is being collected and the one or more additional employees that have access to the usage data. The employee may use the user interface to provide permission to collect the type of usage data.
摘要:
In one embodiment, a method includes collecting communications from a plurality of sources. The method further includes selecting a set of topics and a set of users. In addition, the method includes, for each user, identifying, from the collected communications, conversations in which the user has participated. Moreover, the method includes, for each topic, for each user: measuring a proportion of the identified conversations that contain content suggestive of the topic; analyzing timing of the identified conversations; and examining relationships among data attributes of the identified conversations. Further, the method includes generating multidimensional expertise data. The multidimensional expertise data is representative of the user's expertise on the topic. The multidimensional expertise data includes a topical dimension, an expertise-scope dimension, and a timeline dimension. The method also includes, for each topic, ranking the set of users by expertise index. Also, the method includes providing a searchable interface.
摘要:
In one embodiment, a method includes activating a cross-platform DLP policy for enforcement against a plurality of users on each of a plurality of heterogeneous communications platforms. The method further includes monitoring communications of the plurality of users on each of the plurality of communications platforms for violations of the cross-platform DLP policy. The method also includes, responsive to a detected violation of the cross-platform DLP policy by at least one user on at least one communications platform, dynamically acquiring context information for the detected violation using information associated with the detected violation. In addition, the method includes publishing violation information to one or more designated users. The violation information includes at least a portion of the information associated with the detected violation and at least a portion of the context information.
摘要:
Systems and techniques are described to display usage data that is collected regarding the employee's use of corporate computing resources and obtain the employee's permission to collect the usage data. A data schema associated with the usage data may be determined. Data elements included in the usage data may be determined based at least in part on the data schema. A permission model associated with the usage data may be determined. Based at least in part on the permission model, one or more additional employees that have access to the usage data may be determined. The employee may use a user interface to display the type of usage data that is being collected and the one or more additional employees that have access to the usage data. The employee may use the user interface to provide permission to collect the type of usage data.
摘要:
Techniques and systems for prioritizing messages are described. The messages may be associated with multiple message accounts of an individual and the message accounts may be administered by different message account providers. The messages may be prioritized according to priority scores determined based on priority rules. The priority rules may include components that correspond to attributes of the messages. The priority rules may also include weights for each of the respective components of the priority rules. The prioritized messages may be viewed in a user interface. In some cases, a user may modify an order of the messages in the user interface and the system may utilize the feedback from the user to change a priority rule.
摘要:
Systems and techniques are described to display usage data that is collected regarding the employee's use of corporate computing resources and obtain the employee's permission to collect the usage data. The usage data that is collected may be determined. A user interface may display a plurality of categories associated with the usage data, including system usage data, activity data, identity data, content data, raw data that includes personally identifiable data, aggregated data that does not include personally identifiable data, anonymized data that does not include personally identifiable data, a combination of anonymized and aggregated data used to determine personally identifiable data, user access information, and third party application access. For each category of the plurality of categories, the user interface may display one or more additional employees that have access to the usage data. The user interface may receive a user selection to collect one of the plurality of categories of usage data.