摘要:
Stacks that associate different electronic content are created using tags that are associated with electronic content. Stacks may be personal, organizational and/or shared. A tag may be associated with different types of electronic content (e.g. documents, people, contacts, meetings, emails, . . . ) that may be stored in different locations. The tag acts as an identifier that travels with the content as the electronic content is used. Content may be automatically/manually tagged. As the tagged content is used, the different applications that interact with the content (e.g. a messaging application, a content application) can use the tag to perform different actions. Changes to content with a tag may be aggregated such that users looking at the “consolidated” view can see all changes made to content or activity related to that content.
摘要:
Messaging content that is associated with a user is selected for sharing and transferring with one or more other recipients. A user may select all/portion of the messaging content to transfer. For example, a user may select a single folder from their mailbox, their entire mailbox, one or more conversation threads, one or more subjects, and the like. The selection may be made manually/automatically. For example, a user may use a graphical user interface to select messaging content to share and/or messaging content may be automatically selected based on a rule and/or some other condition. After selection, the selected messaging content is transferred to the other recipient(s) with which the user has selected for sharing/transferring. The recipient(s) of the selected messaging content may accept/decline the transfer of messaging content. Upon accepting the invitation, the messaging content is transferred and stored in the recipient's mailbox.
摘要:
A stealth mode may be used to interact with electronic messages. A user may enter the stealth mode to interact with electronic messages without making state changes to the messages. While operating in stealth mode, operations (e.g. implicit operations such as reading a message) do not change the state of the electronic messages. Upon exiting the stealth mode, the state of the electronic messages is the same as before entering the stealth mode. According to an embodiment, explicit operations performed during stealth mode (e.g. marking a message as “read”, deleting/forwarding/replying a message, . . . ) may change the state of the message relating to the action.
摘要:
Deleted property information relating to deleting an item, such as an electronic message, is used for restoring the deleted item. The deleted property information is stored in response to deleting the item. The stored deleted property information identifies a location of where the item was deleted from and may include other information. The location information may be a specific location such as a folder (e.g. inbox, sent, folder 1, . . . ), a calendar, a network location, and the like. In response to a request to restore a deleted item, the deleted property information is used to restore the deleted item to the location where the item was when deleted. A graphical user interface may be used to assist a user in restoring deleted items. The user interface may display a user friendly name (e.g. “Inbox”, “Folder 1”, . . . ) of where the deleted item(s) will be/have been restored.
摘要:
Deleted property information relating to deleting an item, such as an electronic message, is used for restoring the deleted item. The deleted property information is stored in response to deleting the item. The stored deleted property information identifies a location of where the item was deleted from and may include other information. The location information may be a specific location such as a folder (e.g. inbox, sent, folder 1, . . . ), a calendar, a network location, and the like. In response to a request to restore a deleted item, the deleted property information is used to restore the deleted item to the location where the item was when deleted. A graphical user interface may be used to assist a user in restoring deleted items. The user interface may display a user friendly name (e.g. “Inbox”, “Folder 1”, . . . ) of where the deleted item(s) will be/have been restored.
摘要:
Deleted property information relating to deleting an item, such as an electronic message, is stored for later use. The stored deleted property information may relate to one or more different properties that are associated with the deletion of the item, such as: a time when the item was deleted, a device from which item was deleted, a device on which the item was stored when deleted, a location of a user where the item was deleted, an application associated with the item, and the like. The deleted property information may be used to perform various operations. For example, deleted items may be sorted using the deleted item property information (e.g. time of deletion, device, location, application), rules may be created to use the deleted property information, deleted items may be restored based on the deleted property information, and the like.
摘要:
Deleted property information relating to deleting an item, such as an electronic message, is stored for later use. The stored deleted property information may relate to one or more different properties that are associated with the deletion of the item, such as: a time when the item was deleted, a device from which item was deleted, a device on which the item was stored when deleted, a location of a user where the item was deleted, an application associated with the item, and the like. The deleted property information may be used to perform various operations. For example, deleted items may be sorted using the deleted item property information (e.g. time of deletion, device, location, application), rules may be created to use the deleted property information, deleted items may be restored based on the deleted property information, and the like.