摘要:
In one embodiment, a method includes receiving a future virtual-meeting time interval and a set of virtual-meeting attributes in relation to a future virtual meeting. The method also includes correlating the future virtual-meeting time interval to at least one recurring time interval of a time map. In addition, the method includes retrieving a time-based performance pattern. The method further includes determining, from the time-based performance pattern, a stream quality for the virtual-meeting attributes at the at least one recurring time interval. In addition, the method includes publishing information related to the determined stream quality to a requestor.
摘要:
In one embodiment, a method includes retrieving a time-based performance pattern of virtual meetings previously mediated by a communications platform executing in a computing environment, wherein the computing environment comprises a plurality of resources. The method further includes determining, from the time-based performance pattern, at least one virtual-meeting attribute associated with relatively poor virtual-meeting performance. Also, the method includes determining a performance relationship between the at least one virtual-meeting attribute and a particular resource of the computing environment. In addition, the method includes generalizing the performance relationship to overall, non-meeting-specific performance of the particular resource.
摘要:
In one embodiment, a method is performed by a computer system. The method includes receiving a request from a user to access particular content. The method further includes determining a trust measure of the user, wherein the trust measure is based, at least in part, on an analysis of logged user-initiated communication events of the user on a plurality of communications platforms. In addition, the method includes accessing a self-service access policy applicable to the particular content. Further, the method includes ascertaining, from the self-service access policy, a trust threshold applicable to the particular content. Moreover, the method includes, responsive to a determination that the trust measure fails to satisfy the trust threshold, automatically denying access by the user to the particular content.
摘要:
In one embodiment, a method is performed by a computer system. The method includes discovering content in a user environment. The method further includes generating one or more content fingerprints on a per-content basis. The method also includes providing information sufficient to identify the one or more content fingerprints to a central computer system. Further, the method includes receiving a user selection of particular content stored in the user environment. In addition, the method includes requesting, from the central computer system, information related to a level of exposure of the particular content across a plurality of platforms and a plurality of users. Moreover, the method includes receiving exposure information for the particular content in response to the request. Additionally, the method includes publishing the exposure information to a user associated with the user environment.
摘要:
A system, method, and computer-readable medium for dynamically partitioning a directory list to limit recipients to an appropriate context. More specifically, in certain embodiments the dynamic partitioning includes a first component which describes a priori categories. In certain embodiments, the a priori categories could include “inner circle” or “trusted advisors” categories. Other categories could include “friends of the DL” who only want occasional but relevant messages. In certain embodiments, these categories are created by a DL owner. However, in certain embodiments, members (e.g., recipients) could also change their own category. For example, a DL could have categories: All, Required participants, FYI participants, Managers.
摘要:
In one embodiment, a method includes determining a user context of at least one user device currently accessing an enterprise communication platform. The method further includes selecting a dynamic data loss prevention (DLP) policy applicable to the at least one user device based, at least in part, on the user context. The dynamic DLP policy specifies one or more communication events of interest. In addition, the method includes monitoring communication events initiated by the at least one user device for the one or more communication events of interest. Moreover, the method includes, responsive to each communication event of interest: assessing the communication event of interest based, at least in part, on a content-based classification of a communication associated with the communication event of interest; and responsive to a risk assessment meeting certain criteria, taking at least one action specified by the dynamic DLP policy.