Abstract:
A system and method are disclosed for tracking documents in a computing environment, including documents stored locally on computing devices. A monitoring module stored on a computing device may determine that a user is trying to open a document stored locally on the computing device and communicate a signature associated with the document to a document tracking system. A document tracking system may compare the signature with a set of stored signatures to see if the document corresponds to a document already being tracked. If the document is not being tracked already, the document tracking system may upload the document into the system, send a link to a newer version or determine one or more actions to be performed on the document based on the signature.
Abstract:
Responsive to a request from a user device, a content server may perform an electronic discovery function. The request may include information on a quantity of data objects desired from a collection of data objects stored in a repository. Objects stored in the repository may be managed by the content server. The content server may determine a number of batches and process the collection of data objects into batches, each having a batch size. An efficient selection process may be determined and utilized in selecting data objects from each of the batches such that a total number of data objects selected from the collection is not less than the quantity of data objects desired. The content server may make a disk image of the selected data objects and communicate same to the user device over a network.
Abstract:
In some embodiments, a parent object may share its assets with its descendent(s) in a hierarchical asset sharing model. The hierarchical asset sharing model may specify a plurality of asset sharing modes. In a first mode, an asset of the parent is imposed on a child. The child is able to utilize the asset, but unable to modify or delete the asset. In a second mode, the child is able to utilize the asset and a copy of the asset is generated when the child attempts to modify the asset. The child can modify the copy of the asset, which is stored as an asset only of the child. The original asset is no longer shared becomes an asset only of the parent. In a third mode, both the parent and the child can utilize and modify the asset.
Abstract:
Embodiments disclosed herein provide a high performance content delivery system in which versions of content are cached for servicing web site requests containing the same uniform resource locator (URL). When a page is cached, certain metadata is also stored along with the page. That metadata includes a description of what extra attributes, if any, must be consulted to determine what version of content to serve in response to a request. When a request is fielded, a cache reader consults this metadata at a primary cache address, then extracts the values of attributes, if any are specified, and uses them in conjunction with the URL to search for an appropriate response at a secondary cache address. These attributes may include HTTP request headers, cookies, query string, and session variables. If no entry exists at the secondary address, the request is forwarded to a page generator at the back-end.
Abstract:
An automated rule-based system for facilitating delivery of a fax document from a source to a destination over a network where an initial delivery attempt has been unsuccessful. Rules may be stored in a database. The database may include rules based on past delivery information or new delivery instructions. When an input condition is determined, the database may be traversed to determine an action based on the set of rules. The actions may include one or more of resubmitting the fax document to the network for a next delivery attempt, cancelling the document, and identifying the destination as a technical problem. The input conditions may include an identification of non-business days and non-business hours.
Abstract:
Systems and methods for controlling access to multiple applications on a computing device are provided. One embodiment of a system includes an access device configured to: receive a request to access a first application and a device identifier; authenticate the user using a user credential associated with the user and store the device identifier in association with a login identifier in response to authentication of the user. The access device can be further configured to receive a request to access a second application and the device identifier. The access device can allow access to the second application based on the previous authentication of the user.
Abstract:
A system for managing message volume and timing, which permits first and second messages to be spaced apart over time, with the pacing controlled in part by a characteristic of the second message. The system sends the first message to an intended recipient. The system determines a separation based on a pacing algorithm and sends the second message to the recipient according to the separation.
Abstract:
Embodiments of systems and methods for data transfer are presented herein. Specifically, embodiments of such a data transfer methodology may utilize one or more transmission channels for the transmission of the data to be transferred. In addition, a control channel in a different protocol than the transmission channels may be utilized to transmit control information between the sender and recipient. The rate at which data is sent on the transmission channels may be adjusted or the transmission of data on the transmission channel prioritized.
Abstract:
Techniques are described for providing users of client devices with coordinated access to Information and/or functionality of multiple types, such as by using multiple types of connections to multiple information services of distinct types that exchange context information related to activities of the users and/or clients. The client devices can be, for example, wireless devices with multiple distinct modes (e.g., voice and data modes) for different types of connections with different types of servers (e.g., voice servers and data servers). In some situations, coordination between different servers allows multiple distinct interaction sessions of different types with different servers to remain synchronized or otherwise coordinated over time as the user performs interactions via the different sessions. This abstract is provided to comply with rules requiring an abstract, and is not intended to be used to interpret or limit the scope or meaning of the claims.
Abstract:
Embodiments as disclosed herein may provide systems and methods for component integration and security presented herein. In particular, in one embodiment, a native component that presents a network based interface may be on a device, where that native component may expose a network based interface for access by other components. This native component can then be accessed through the network based interface. To address security concerns and other issues, the native component may be configured to determine if a received request is associated with the same user space and only respond to requests originating from the same user space.