摘要:
A resource reference is detected in a base resource, such as a web page or an email message. The resource reference refers to a target resource, such as another webpage or another email message. An appropriate activity-based resource type for the resource reference is then identified. The resource reference is then linked to an activity-based resource such that when the base resource is displayed and a user interacts with the resource reference, the activity-based resource is displayed to the user. The activity-based resource comprises a calculated field that has a value that indicates how one or more users have interacted with one or more resources. The value of the calculated field is calculated using activity data indicating how users interacted with the resources. The activity data is generated without receiving input of the activity data from the users.
摘要:
A resource reference is detected in a base resource, such as a web page or an email message. The resource reference refers to a target resource, such as another webpage or another email message. An appropriate activity-based resource type for the resource reference is then identified. The resource reference is then linked to an activity-based resource such that when the base resource is displayed and a user interacts with the resource reference, the activity-based resource is displayed to the user. The activity-based resource comprises a calculated field that has a value that indicates how one or more users have interacted with one or more resources. The value of the calculated field is calculated using activity data indicating how users interacted with the resources. The activity data is generated without receiving input of the activity data from the users.
摘要:
A computing system generates resource data that represents a resource. The content of the resource data is dependent on a ranking of resources in a set of resources. The ranking of the resources in the set of resources is dependent on interactions between users in a set of users and the resources in the set of resources. The ranking of the resources in the set of resources also is dependent on a degree to which each user in the set of users is related to a user.
摘要:
Systems, methods and computer program products for facilitating the collection of data within a computer network (especially an intranet) while complying with applicable privacy laws and regulations, as well as individual organizations' rules addressing intranet users' privacy are disclosed. Such systems, methods and computer program products allow for the collecting of activity information related to computer-based activities performed by users while logged into an organization's intranet. Such activity includes navigating to URLs, opening and editing documents, writing, opening and reading email and instant messages, and the like. The collecting, consolidating, storing and exposing of such activity information—while ensuring privacy requirements—serves as a basis for high-value services (e.g., augmenting documents with extra information, improving search results, automatic news feeds, social networking announcements, etc.) to be offered and provisioned to such users.
摘要:
Systems, methods and computer program products are disclosed for facilitating the collection of activity data, organizational hierarchy data and distribution list data within a private computer network (especially an intranet) while complying with applicable privacy laws and regulations, as well as individual organizations' business rules addressing intranet users' privacy to display a social graph of organization members related to a requesting organization member. Such systems, methods and computer program products allow for the collecting of such data passively without a need for active participation from the requester. A computer-implemented process for displaying a social graph further comprises calculating sub-scores for each of activity data, organizational data and distribution list data and calculating a total score for each related organization member and displaying the social graph comprising those organization members whose score exceeds a predetermined value as related to the requester.
摘要:
Systems, methods and computer program products are disclosed for facilitating the collection of activity data, organizational hierarchy data and distribution list data within a private computer network (especially an intranet) while complying with applicable privacy laws and regulations, as well as individual organizations' business rules addressing intranet users' privacy to display a social graph of organization members related to a requesting organization member. Such systems, methods and computer program products allow for the collecting of such data passively without a need for active participation from the requester. A computer-implemented process for displaying a social graph further comprises calculating sub-scores for each of activity data, organizational data and distribution list data and calculating a total score for each related organization member and displaying the social graph comprising those organization members whose score exceeds a predetermined value as related to the requester.
摘要:
Systems, methods and computer program products for facilitating the collection of data within a computer network (especially an intranet) while complying with applicable privacy laws and regulations, as well as individual organizations' rules addressing intranet users' privacy are disclosed. Such systems, methods and computer program products allow for the collecting of activity information related to computer-based activities performed by users while logged into an organization's intranet. Such activity includes navigating to URLs, opening and editing documents, writing, opening and reading email and instant messages, and the like. The collecting, consolidating, storing and exposing of such activity information—while ensuring privacy requirements—serves as a basis for high-value services (e.g., augmenting documents with extra information, improving search results, automatic news feeds, social networking announcements, etc.) to be offered and provisioned to such users.
摘要:
An optimized caching mechanism for byte range requests from a web service is provided. When a large file that is not already in cache or being transferred is requested, a background thread may be created to transfer the file and a shared data structure created to track portions of the file that are transferred. For each subsequent request for portions of the same file, the data may be sent back in chunks and the request to read each chunk from the file blocked until that chunk is filled by the background thread. Thus, the locally stored and partially filled file is shared among multiple requestors.
摘要:
Methods and systems provide for application of style properties/settings to one or more web page items, components, links, or other web page content. Use of an edit menu allows for the application of a selected style setting on a per-item basis or on an all-item basis and allows for the provision of a preview of the application of a selected style setting to a selected web page item. Through the use of a web page editing user interface, style settings may be applied to web page items through drag and drop operations and through application via conventional style setting application methods such as highlighting a selected web page item, followed by selection of a desired style setting.
摘要:
Architecture for enabling a user to automatically recover documents and other information associated with work contexts and recover documents and other information artifacts associated with a specific project. The architecture enables monitoring and recording of activity information related to user interactions with information artifacts pertaining to a particular work context. The user can select a document having a portion of work content (e.g., a term or other type of reference item in a document) related to the work context. A lexical analysis is performed on the activity information and the reference item to identify lexical similarities. A list of candidate items (e.g., related documents) is inferred from the information artifacts based on the lexical similarities. The candidate items related to the work context are presented to the user, who can select specific items to reestablish the work context.