摘要:
Messages are managed for cost. A processing device includes receiving a message designating a recipient and determining a cost associated with the message.
摘要:
A differential message security policy includes receiving information regarding activities of a user, determining a security risk for the user based on the activities of the user, and setting a security policy for the user based on the security risk. The security policy of the user may be modified based on a change in the security risk of the user or the security risk of the user exceeding a predetermined level. The security risk may be determined based on an aggregated scoring system that uses security variables related to the activities of the user.
摘要:
A method is disclosed to provide delayed responses to messages. The method includes receiving in a computer, an email message containing a control character, from a network. The control character specifying a reply prohibiting period during which a reply to the email message over the network will be prohibited. The method then includes receiving in the computer, a user request at a requesting instant to reply to the email message. The method then includes determining whether the requesting instant occurs during the reply prohibiting period specified by the control character. The method then includes prohibiting a reply to the email message over the network if the requesting instant occurs during the reply prohibiting period. And finally, the method then includes allowing a reply to the email message over the network if the requesting instant does not occur during the reply prohibiting period.
摘要:
A differential message security policy includes receiving information regarding activities of a user, determining a security risk for the user based on the activities of the user, and setting a security policy for the user based on the security risk. The security policy of the user may be modified based on a change in the security risk of the user or the security risk of the user exceeding a predetermined level. The security risk may be determined based on an aggregated scoring system that uses security variables related to the activities of the user.
摘要:
Point-in-time actions are leveraged between computers that receive the same asynchronous electronic message. A point-in-time action is performed at a first receiving computer in response to receipt of an asynchronous electronic message. The point-in-time action results in an action alert, which is transmitted to a second receiving computer that also received the asynchronous electronic message.
摘要:
Chat sessions are managed between at least one sending computer and a receiving computer. A first chat session is initiated by a receiving computer in response to a first request from a first sending computer. A second chat session is initiated by the receiving computer in response to a second request from a second sending computer. The first and second chat sessions are prioritized in accordance with priority parameters to identify a higher priority chat session and a lower priority chat session. The lower priority chat session is restricted until the higher priority chat session is downgraded to a priority level that is below the lower priority chat session.
摘要:
A method and computer program product for context-informed summarization is described. A method may comprise determining, via a computing device, a context of a communication. The method may further comprise determining, via the computing device, a summarization attribute for the communication based upon, at least in part, the context of the communication. The method may also comprise creating a summary of the communication based upon, at least in part, the summarization attribute.
摘要:
A method and computer program product for propagating instant message status change is described. A method may comprise receiving, via at least one of a client electronic device and a server computer, an instant message request associated with an instant message request target. The method may further comprise determining, via at least one of the client electronic device and the server computer, an instant message status based upon, at least in part, the instant message request and the instant message request target. The method may also comprise in response to the determination, providing, via at least one of the client electronic device and the server computer, an indication of the instant message status.
摘要:
Collisions are detected between multiple instant messages that are sent to a given user at the same time. In response to detecting a collision, the sending users are put into a real-time, on-line negotiation that enables the sending users to determine among themselves whose instant message will be delivered next to the receiving user. This allows the sending users to make a determination of which message is most important based on their relative needs at the time. A collaborative communication session, such as a group chat, is initiated for the negotiating sending users so that they can exchange information regarding the purposes of their messages. Based on the results of this on-line negotiation between message senders, a limited number (e.g. one) of the colliding messages are next delivered to the receiving user.
摘要:
Collisions are detected between multiple instant messages that are sent to a given user at the same time. In response to detecting a collision, the sending users are put into a real-time, on-line negotiation that enables the sending users to determine among themselves whose instant message will be delivered next to the receiving user. This allows the sending users to make a determination of which message is most important based on their relative needs at the time. A collaborative communication session, such as a group chat, is initiated for the negotiating sending users so that they can exchange information regarding the purposes of their messages. Based on the results of this on-line negotiation between message senders, a limited number (e.g. one) of the colliding messages are next delivered to the receiving user.