摘要:
In one embodiment, a method includes identifying a user-initiated precursor of an anticipated exposure event. The method also includes, in response to the identifying, automatically determining particular content that would be exposed if the exposure event were to occur. In addition, the method includes automatically determining one or more users to which the particular content would be exposed if the exposure event were to occur. Further, the method includes, before the exposure event occurs, publishing a result of the automatically determining to a user associated with the user-initiated precursor. Also, the method includes, in response to a detected occurrence of the exposure event, monitoring a plurality of communications platforms for follow-on exposure events in relation to the particular content which chain from the exposure event.
摘要:
A network-based solution that provides enhanced management of migration and archiving operations may involve, as embodied in various systems, methods, and non-transitory computer-readable storage media, performing a pre-transfer assessment on each of a plurality of accessed mailboxes designated for migration or archiving. Performing the pre-transfer assessment may include designating one or more emails for exclusion from the migration or archiving operation after applying transferability rules and exception rules to each email message contained in the assessed mailbox. The solution may involve notifying the user about the email messages designated for exclusion and performing one or more user selected actions on the email message or related attachment files.
摘要:
In one embodiment, a method includes identifying virtual meetings previously mediated by one or more communications platforms. The method further includes determining attributes of the virtual meetings. In addition, the method includes collecting time-indexed performance data of individual media streams of the virtual meetings. The method also includes individually correlating the time-indexed performance data to at least a portion of the attributes of the virtual meetings on a per virtual-meeting basis. Further, the method includes selecting one or more virtual-meeting attributes. Also, the method includes extracting multi-stream performance data of those of the individual media streams that have the one or more virtual-meeting attributes. Additionally, the method includes correlating the multi-stream performance data to a time map. The method further includes determining aggregate multi-stream performance. Moreover, the method includes generating a time-based performance pattern.
摘要:
A method for determining predictive response time for electronic mail across enterprise communication systems is described. In particular, the method includes collecting and subsequently analyzing communications of a particular recipient in order to determine a probability of a sender receiving a response from the recipient. In the event a response is probable, the method also determines a time frame when a response may be sent. In situations where the recipient is non-responsive, the method also provides a list of alternate recipients that the sender can communicate with, whereby the alternate recipients are more responsive than the original recipient.
摘要:
In one embodiment, a method includes receiving a request from a user to access particular content. The method also includes determining at least one topic of the particular content. In addition, the method includes determining one or more need-to-access values for the user in relation to the particular content, wherein the one or more need-to-access values are based, at least on in part, on a comparison of the least one topic to one or more topics associated with logged user-initiated communication events of the user. Further, the method includes accessing a self-service access policy applicable to the particular content. Also, the method includes ascertaining, from the self-service access policy, need-to-access criteria applicable to the particular content. Additionally, the method includes, responsive to a determination that the one or more need-to-access values fail to satisfy the need-to-know criteria, denying access by the user to the particular content.
摘要:
In one embodiment, a method is performed by a computer system. The method includes receiving a request to authenticate a user of an enterprise computing system. The method further includes, responsive to the request, selecting a set of previous user-initiated events of the user on the enterprise computing platform. Further, the method includes accessing user-specific event information related to the selected set of previous user-initiated events. In addition, the method includes generating, from at least a portion of the user-specific event information, a user-specific authentication sequence comprising a plurality of event-information requests. Additionally, the method includes administering the user-specific authentication sequence to the user, the administering comprising requiring the user to provide a valid response to each of the event-information requests as a precondition to successful authentication.
摘要:
In one embodiment, a method is performed by a computer system. The method includes accessing information related to enterprise usage of a plurality of network-accessible peripheral devices and identifying, from the information, discrete content-imaging events that occurred on the plurality of network-accessible peripheral devices. In addition, the method includes determining particular users associated with the discrete content-imaging events on a per-event basis and determining particular content to which the discrete content-imaging events relate on a per-event basis. Further, the method includes abstracting correlated data related to the discrete content-imaging events into a standardized format, the correlated data comprising data related to the particular users and the particular content, the standardized format enabling expression of the discrete content-imaging events by user and by type of content-imaging activity.
摘要:
In an embodiment, a method includes receiving a request from a controlling user to publish particular content. The method also includes determining at least one topic of the particular content. The method further includes allowing the controlling user to select need-to-know criteria, the need-to-know criteria comprising one or more thresholds relating to a prevalence of the at least one topic in logged conversations of a requesting user. In addition, the method includes allowing a controlling user to select a trust threshold, wherein the trust threshold relates, at least in part, to a quantitative analysis of logged behavior of a requesting user on the communications platform. Further, the method includes generating based, at least in part, on the need-to-know criteria and the trust threshold, a self-service access policy for the particular content. Also, the method includes activating the self-service access policy as to the particular content.
摘要:
In one embodiment, a method includes extracting a cross-platform data-collection schema based, at least in part, on information available via heterogeneous interfaces of a plurality of source platforms. The cross-platform data-collection schema identifies a plurality of collectable data points in relation to particular source platforms. The method further includes configuring a cross-platform data-collection schedule for the plurality of source platforms. The cross-platform data-collection schedule indicates a collected subset of the plurality of collectable data points in relation to collection frequencies. The method also includes causing data values for the collected subset to be collected on an ongoing basis as dictated by the cross-platform data-collection schedule. Furthermore, the method includes processing a proposed change to at least one of the collected subset and the collection frequencies. In addition, the method includes modifying the cross-platform data-collection schedule to reflect the proposed change.
摘要:
In one embodiment, a method includes selecting a set of logged user-initiated events of a user. The method further includes determining timing information, device-identification information, and user-location information for the set of logged user-initiated events. In addition, the method includes correlating the set of logged user-initiated events to recurring time intervals of a time map. Also, the method includes determining an overall density, a location-specific density, and a device-specific density of the set of logged user-initiated events for at least some recurring time intervals of the time map. Furthermore, the method includes generating a time-based activity pattern of the user, the time-based activity pattern comprising, for the at least some recurring time intervals of the time map, information related to the overall density, the location-specific density, and the device-specific density. In addition, the method includes publishing the time-based activity pattern to a scheduling interface.