SYSTEMS AND METHODS FOR INTELLIGENT APPLICATION INSTANTIATION

    公开(公告)号:US20210103447A1

    公开(公告)日:2021-04-08

    申请号:US16590752

    申请日:2019-10-02

    Abstract: The systems and methods discussed herein provide for intelligent identification of applications or tasks to be utilized or performed by a user based on a variety of variables that provide relevant context. In some implementations, applications may be pre-launched or instantiated prior to a user requesting to execute the application, reducing user experience latency and avoiding incorrect application launch. User behavior patterns, location, time of day, user events, etc. may be utilized to identify and recommend or pre-launch relevant applications that should or can be used at any given instance. In some implementations, deep linking may be used to pre-launch or suggest specific tasks to be performed within an application.

    Auto termination of applications based on application and user activity

    公开(公告)号:US11550645B2

    公开(公告)日:2023-01-10

    申请号:US17460565

    申请日:2021-08-30

    Abstract: A system and method that automatically terminates an application. A method includes monitoring activity data points for an application launched by a client device within a workspace environment. The activity data points may include user interactions with a physical interface component. State data for each file associated with the application is monitored and, if a determination is made that the application is inactive based on the activity data points, the method determines if a file associated with the application includes unsaved content based on state data. If it is determined that no files for the application include unsaved content, the method forecasts whether the application will be inactive for a future period based on the activity data. The application is terminated if it is determined that no files for the application include unsaved content and the application is forecast to be inactive.

    DATA TRANSFER ACROSS STORAGE TIERS
    14.
    发明申请

    公开(公告)号:US20220382477A1

    公开(公告)日:2022-12-01

    申请号:US17330774

    申请日:2021-05-26

    Abstract: A computing device, a method, and a computer readable medium for transferring data objects predictively to reduce consumption of resources. In some embodiments, a computing device includes: a memory; and a processor coupled to the memory. The processor is configured to store data objects in a storage system. The storage system is a multi-tier storage system. Storage of the data objects includes: determining a future demand status for at least one data object stored in the storage system based on a set of access activity rules; and moving the at least one data object between tiers of the storage system in response to the determined future demand status being different from a current demand status of the at least one data object to reduce consumption of resources in which to store that data object.

    Systems and methods for expedited access to applications

    公开(公告)号:US11455227B2

    公开(公告)日:2022-09-27

    申请号:US16822900

    申请日:2020-03-18

    Abstract: Methods and systems for determining information of applications are described herein. A computing device may receive, from one or more client devices, data indicating application usage events. The computing device may determine, based on the data, popular applications that a target user regularly uses. The computing device may determine, based on the data, recommended applications that users similar to the target user regularly use. The computing device may determine, based on the popular applications and/or the recommended applications, a collection of applications for the target user. The collection of applications may be displayed on a user interface of a client device associated with the target user for expedited access of interested applications.

    CONTEXT-BASED NOTIFICATION PROCESSING SYSTEM

    公开(公告)号:US20220261300A1

    公开(公告)日:2022-08-18

    申请号:US17736230

    申请日:2022-05-04

    Abstract: In some implementations, a method may involve determining first feature vectors for a plurality of data items accessed by a user of one or more client devices, the first feature vectors representing first contextual data about the one or more client devices at times that respective data items of the plurality of data items were accessed, the plurality of data items including a first data item. A predictive model, configured to classify input feature vectors into context types, may be used to determine that the first feature vector for the first data item is classified as a first context type. A second feature vector representing second contextual data about a first client device operated by the user may be determined and the predictive model may be used to determined that the second feature vector is classified as the first context type. Based at least in part on the first and second feature vectors being classified as the first context type and the first and second data items being of a first data item type, the first client device may be caused to present the second data item.

    Data file replication of edge servers

    公开(公告)号:US11316919B1

    公开(公告)日:2022-04-26

    申请号:US17072189

    申请日:2020-10-16

    Abstract: A system and method of providing early replication of files to edge devices during a file share operation. A system is provided that is configured to receive a file on behalf of a network of devices, the network of devices including the computing device and is configured to store the file. The device is further configured to identify an edge device based on previous file downloads for a given pair of users, the edge device configured to enable download of a copy of the file to an endpoint device; and provide the copy of the file to the edge device before receipt of a request by the edge device from the endpoint device to download the copy of the file.

    IDENTITY LEAK PREVENTION
    18.
    发明申请

    公开(公告)号:US20220070123A1

    公开(公告)日:2022-03-03

    申请号:US17336751

    申请日:2021-06-02

    Abstract: Techniques are disclosed for providing messaging participant identity leak prevention. An example methodology implementing the techniques includes, receiving, by a computing device, a message from a sender to a recipient via a software application running on the computing device, the software application having a non-confidential messaging view and a confidential messaging view. The method also includes determining a message type of the message, the message type is one of a non-confidential message or a confidential message, and displaying the message in the confidential messaging view of the software application in response to a determination that the message type indicates a confidential message, the confidential messaging view being distinct from the non-confidential messaging view, wherein messaging participant identity information is obfuscated in the display of the message in the confidential messaging view.

    Synchronization of data between local and remote computing environment buffers

    公开(公告)号:US11057464B1

    公开(公告)日:2021-07-06

    申请号:US16906160

    申请日:2020-06-19

    Abstract: A computing system may determine that first data was copied from a first application to a buffer of a first computing environment, and that the first data was received by a second application in a second computing environment. The computing system may identify second data copied from the first application to the buffer and, in response to the second data being copied from the first application to the buffer and based at least in part on the second application having received the first data, may cause the second data to be transferred from the buffer to the second computing environment. The computing system may further evaluate the second data to determine whether it includes potentially private information, and may cause the second data to be transferred to the second computing environment based at least in part on the second data being free of potentially private information.

Patent Agency Ranking