摘要:
A method for improving information exchange in a social network environment. Actions (e.g., copying) being performed on an electronic object (e.g., e-mail) are detected. Furthermore, the entry of the electronic object in a social networking website is detected thereby identifying an association between this electronic object and this social networking website. Rule patterns are identified based on these detected actions and these associations. Indications of these associations are stored in terms of concept nodes in a hierarchical tree using the identified rule patterns. Social networking feeds of interest are then searched using the hierarchical tree as well as a current electronic object of a user (e.g., status message on a social networking feed, e-mail). The user would then be provided an opportunity to repost an information nugget from the current electronic object in one or more of these social networking feeds of interest.
摘要:
A system and computer program product for improving information exchange in a social network environment. Actions (e.g., copying) being performed on an electronic object (e.g., e-mail) are detected. Furthermore, the entry of the electronic object in a social networking website is detected thereby identifying an association between this electronic object and this social networking website. Rule patterns are identified based on these detected actions and these associations. Indications of these associations are stored in terms of concept nodes in a hierarchical tree using the identified rule patterns. Social networking feeds of interest are then searched using the hierarchical tree as well as a current electronic object of a user (e.g., status message on a social networking feed, e-mail). The user would then be provided an opportunity to repost an information nugget from the current electronic object in one or more of these social networking feeds of interest.
摘要:
A server system runs a bot service that registers an FAQ (frequently asked questions) for a document having an embedded object. The FAQ includes one or more question-and-answer (Q&A) pairs. The bot service receives, from each electronics device that renders a copy of the document, a request from the embedded object for the FAQ registered for the document, and transmits the FAQ to each electronic device from which a request is received. Each electronics device displays the FAQ, including the one or more Q&A pairs, within its rendered copy of the document. Any viewer of a copy of the document with the embedded object can submit a question to the bot service through the embedded object. The bot service uses a messaging service to obtain an answer to the question from an author. The FAQs displayed at the electronics devices are updated to include the new Q&A pair.
摘要:
A computer implemented user interface allows composition of an electronic mail message. A user selects at least one pre-existing email from an email inbox. An envelope is then created by parsing each of the selected pre-existing emails. The pre-existing email is displayed as a tree structure comprising an envelope with at least a label sub-node in a new email view. A new email is composed by selecting parts from the tree structure. The sub-nodes may further comprise a content sub-node. The content sub-node further comprises multi-media parts, and the new email body is composed by selecting parts from the content sub-node.
摘要:
Obscuring information in messages to be exchanged over a communications network. In one aspect, the information comprises path name information and parameters for use in a Uniform Resource Locator (“URL”). In another aspect, the information comprises links and parameters used in forms, where hidden parameters are removed from a form and used as URL parameters. A compression dictionary is used to create a compressed form of the information. An identifier of the dictionary and an error detection code (such as a checksum) computed over the compressed information are concatenated with the compressed information, and this is encoded for sending on an outbound message. The original information is then recovered from an inbound message which contains the obscured information by reversing the processing used for the obscuring.
摘要:
An edge-deployed database proxy. A database access system which has been configured with the database proxy can include a universal database connectivity driver having a first exposed interface through which access to a database server can be provided; a database proxy driver registered with the universal database connectivity driver; and, a database driven application programmatically linked to the database proxy driver. Significantly, the database proxy driver can have a second exposed interface which conforms with the first exposed interface of the universal database connectivity driver. The database proxy driver further can have a configuration for invoking at least one auxiliary task in addition to providing access to the database server through the first exposed interface of the universal database connectivity driver.
摘要:
A computer implemented method correlates a digital resource with an electronic message. A processor detects a focus on a targeted item that identifies a digital resource. The targeted item is in a user history that presents a history of a user's access to multiple digital resources. The processor then auto-populates a draft of an electronic message with the targeted item that was focused in the user history.
摘要:
Obscuring form data to be passed in forms that are sent in messages over a communications network. The form data to be obscured is removed from a form and inserted as a portion of a Uniform Resource Location (“URL”) string. The obscured form data may comprise hidden fields and/or links. An obfuscation is then applied to the portion of the URL string, thereby obscuring the information for sending on an outbound message. The original information is recovered from an inbound message which contains the obscured information by reversing the processing used for the obscuring. In one aspect, the obfuscation comprises encryption. In another aspect, the obfuscation comprises creating a tiny URL that replaces the portion of the URL string.
摘要:
Obscuring information in messages to be exchanged over a communications network. In one aspect, the information comprises path name information and parameters for use in a Uniform Resource Locator (“URL”). In another aspect, the information comprises links and parameters used in forms, where hidden parameters are removed from a form and used as URL parameters. A compression dictionary is used to create a compressed form of the information. An identifier of the dictionary and an error detection code (such as a checksum) computed over the compressed information are concatenated with the compressed information, and this is encoded for sending on an outbound message. The original information is then recovered from an inbound message which contains the obscured information by reversing the processing used for the obscuring.
摘要:
Some embodiments of the inventive subject matter are directed to selecting an area of a first window, which contains first content, in response to user input, generating a second window that contains second content that is substantially similar to a portion of the first content contained within the area of the first window, and superimposing the second window over a target window. The target window can be the first window or a third window. Some embodiments are further directed to affixing the second window to remain stationary and above the target window when the target window is active or in focus. Some embodiments are further directed to modifying target content in the target window in response to the activation of the second content (e.g., sorting target content based on activation of a sorting control within the second window, modifying number values in the target window based on number values of the second content, etc.).