Abstract:
A computing device for providing an intelligent invitation system for network-based conversation applications is provided. The computing device includes a computer readable medium and at least one processor operably coupled to the computer readable medium. The at least one processor can be configured to receive conversation information related to a conversation between two or more conversation participants. The processor can analyze the conversation information to identify one or more additional users to invite to the conversation by, for example, performing a speech to text conversion of the conversation information and processing the text for one or more specific keywords that can be used to identify the one or more additional users. The processor can then generate and transmit a notification to at least one of the conversation participants, the notification including information related to the one or more additional users to invite to the conversation.
Abstract:
Described embodiments provide systems and methods for providing data loss prevention via an embedded browser. An interprocess communication (IPC) manager may interface with an embedded browser to control the transfer of data from a first application to a second application in accordance with a policy. The IPC manager may detect a command to store data accessed on the first application via the embedded browser and store the data onto a secure container. The secure container may be dedicated to the embedded browser. The IPC manager may subsequently detect a command to retrieve data from the secure container and to replicate the data onto the second application. The IPC manager may determine a policy to apply to the data. The policy may specify whether the data from the first application is permitted to be replicated onto the second application. The IPC manager may subsequently replicate the data on the second application.
Abstract:
Embodiments described include systems and methods for managing downloads from an embedded browser. The client application can control the locations to which downloads are directed. A system administrator can configure a policy to restrict downloads to approved locations. The client application can prevent a user from navigating to and downloading a file to a location that has not been approved according to the policy.
Abstract:
Embodiments described include systems and methods for managing sessions to one or more network applications accessed via a client application including an embedded browser. The client application establishes sessions to one or more network applications. The client application identifies a session timeout policy for managing the sessions of the client application. The session timeout policy specifies a time period for which a session is determined to be inactive. The client application monitors activity in the embedded browser for each of the sessions. The client application detects that inactivity of a first session of the sessions has reached the time period of the session timeout policy. The client application detects the inactivity responsive to the monitoring. The client application terminates each of the sessions via the embedded browser responsive to the detection.
Abstract:
Described embodiments provide systems and methods for providing data loss prevention via an embedded browser. An interprocess communication (IPC) manager may interface with an embedded browser to control the transfer of data from a first application to a second application in accordance with a policy. The IPC manager may detect a command to store data accessed on the first application via the embedded browser and store the data onto a secure container. The secure container may be dedicated to the embedded browser. The IPC manager may subsequently detect a command to retrieve data from the secure container and to replicate the data onto the second application. The IPC manager may determine a policy to apply to the data. The policy may specify whether the data from the first application is permitted to be replicated onto the second application. The IPC manager may subsequently replicate the data on the second application.
Abstract:
In general overview, the present disclosure is directed to a system and method for selectively displaying a frame of an application user interface on a mobile computing device. A user interface analyzer on a mobile computing device analyzes a user interface for an application executing on a remote server. The user interface analyzer identifies frames in the user interface, the positions of the frames, relationships between frames, and horizontal and vertical panning offsets to move between adjacent frames. The mobile computing device receives a user input requesting the display of an adjacent frame. Based on the information the user interface analyzer obtained, the mobile computing device displays an adjacent frame of the user interface.
Abstract:
A system for accessing, by a resource, a setting in a virtualized user profile includes an isolation environment, a resource, and a filter driver. The resource executes outside an isolation environment on a local machine and requests access to a setting in a user profile. The filter driver intercepts the request for access and identifies one of the isolation environment and a remote machine, responsive to an application of a rule to the request. The filter driver redirects the request to the one of the isolation environment and the remote machine. A method includes intercepting an instruction from a resource to modify a setting on a local machine, the resource provided by a local machine and executing outside of an isolation environment. The method includes identifying the isolation environment, responsive to an application of a rule to the instruction. The method includes redirecting the instruction to the isolation environment.