Patent application number | Description | Published |
20100250321 | QUORUM MANAGEMENT OF APPOINTMENT SCHEDULING - A method, apparatus, system, and computer program product for managing scheduling of appointments with respect to a quorum requirement. The solution includes scheduling an appointment with each of a plurality of invitees, receiving one or more appointment management requests associated with the appointment from the invitees, the one or more appointment management requests including a change in the appointment, determining that a subset of the appointment management requests constitute a common request, determining that invitees that sent the common request satisfy the quorum constraint for the appointment, and implementing the common request in response to invitees that sent the common request satisfying the quorum constraint. The common request may include an acceptance, a cancellation notice, a cancellation request, and a re-scheduling request. | 09-30-2010 |
20100332602 | CONTROLLING LOCATION AND TIME PREFERENCES FOR MESSAGES - A system and method for controlling preferences for messages that includes receiving a message from a sender to a recipient, determining if the message will be received by the recipient based on message policies for the recipient, and notifying the sender that the message will not be received by the recipient and when it will be received responsive to the determination that the message will not be received by the recipient. | 12-30-2010 |
20110004503 | SYSTEM AND METHOD FOR MANAGING CALENDAR EVENTS WHILE PREPARING FOR TIME OUT-OF-OFFICE - In a calendar messaging method and system, a calendar application executing on a computer receives a command to activate an out-of-office status, and receives one or more selected calendar events. The method and system further include automatically updating the calendar events, wherein the updating includes at least one of canceling the calendar events, and removing the user as an invitee of the calendar events. An out-of-office message is then automatically sent to at least one recipient indicating a type of update made to one or more of the calendar events. | 01-06-2011 |
20110061089 | DIFFERENTIAL SECURITY POLICIES IN EMAIL SYSTEMS - A differential message security policy includes receiving information regarding activities of a user, determining a security risk for the user based on the activities of the user, and setting a security policy for the user based on the security risk. The security policy of the user may be modified based on a change in the security risk of the user or the security risk of the user exceeding a predetermined level. The security risk may be determined based on an aggregated scoring system that uses security variables related to the activities of the user. | 03-10-2011 |
20110078248 | IMPOSED POLICIES FOR HANDLING INSTANT MESSAGES - Chat sessions are managed between at least one sending computer and a receiving computer. A first chat session is initiated by a receiving computer in response to a first request from a first sending computer. A second chat session is initiated by the receiving computer in response to a second request from a second sending computer. The first and second chat sessions are prioritized in accordance with priority parameters to identify a higher priority chat session and a lower priority chat session. The lower priority chat session is restricted until the higher priority chat session is downgraded to a priority level that is below the lower priority chat session. | 03-31-2011 |
20110087740 | LEVERAGING POINT-IN-TIME KNOWLEDGE TO RESPOND TO E-MAIL - Point-in-time actions are leveraged between computers that receive the same asynchronous electronic message. A point-in-time action is performed at a first receiving computer in response to receipt of an asynchronous electronic message. The point-in-time action results in an action alert, which is transmitted to a second receiving computer that also received the asynchronous electronic message. | 04-14-2011 |
20110087741 | COST MANAGEMENT FOR MESSAGES - Messages are managed for cost. A processing device includes receiving a message designating a recipient and determining a cost associated with the message. | 04-14-2011 |
20110087745 | GROUP VOTING ACCESS CONTROL FOR MULTI-PARTY FORUMS - Group access control for a multi-party forum that includes receiving by a server a request from a party to access a multi-party forum, forwarding by the server the request to an approval group comprising at least two people, and approving or a denying the request by the server based on receiving votes from at least two persons of the approval group. | 04-14-2011 |
20110093596 | ALLOCATION OF CENTRAL APPLICATION RESOURCES BASED ON SOCIAL AGREEMENTS - Described is a method for allocating a central application resource. Upon a determination that a user has depleted an allocation of the resource, a request for an additional allocation of the resource is generated. The user is a member of a group of users that is a subset of all users of the central application resource. After determining that the request is valid according to a policy defining rules for allocation relevant to the user, the additional allocation is provided to the user. An allocation of the resource is reduced for one or more other users in the group so that a total allocation of the resource for the group remains unchanged. | 04-21-2011 |
20110161434 | SITUATION BASED PRESENCE NOTIFICATION LEVERAGING - Presence messages are managed for one or more members of a pre-defined group of e-mail users. An unavailability time period, during which a pre-defined group of e-mail users will be unavailable in the future, is established. A notice, which notifies the pre-defined group of e-mail users that an unavailability control instruction will be sent in the future to participating members of the group of e-mail users, is transmitted to the group of e-mail users. An acceptance signal, identifying the participating members, is received, indicating which members of the group of e-mail users agree to permit the unavailability control instruction to be received and implemented on their participating computers in the future. The unavailability control instruction is then transmitted to the participating computers at an initiation of the unavailability time period, in order to auto-generate an appropriate presence message for the participating members. | 06-30-2011 |
20110314098 | RELATIONSHIP MANAGEMENT IN A SOCIAL NETWORK SERVICE - Managing relationships in a social network service implemented by at least one processor includes: establishing with the at least one processor a quantified interaction goal for at least a first party and a second party corresponding to a period of time; determining with the at least one processor, prior to an expiration of the period of time, that a current quantified accumulated interaction between the first party and the second party is inconsistent with the quantified interaction goal; and automatically performing a remedial action with the at least one processor to facilitate adjusting the quantified accumulated interaction between the first party and the second party to a level consistent with the quantified interaction goal. | 12-22-2011 |
20110320545 | CONTROLLING EMAIL PROPAGATION WITHIN A SOCIAL NETWORK UTILIZING PROXIMITY RESTRICTIONS - A message header of an email message can be identified. The message header can comprise of an exemption field which specifies one or more email addresses that is prohibited from receiving the email message. The sending email address can be associated with a sender node and the one or more email addresses is associated with a prohibited node. The sender node and the prohibited node can be arbitrarily linked within a network that is a social structure comprising of one or more individuals and organizations which can be connected by one or more specific type of interdependency. The network can be modeled as a graph which can be a mathematical structure modeling pairwise relations between nodes and edges. The email message can be conveyed to multiple email addresses except the one or more email address associated with the exemption field. | 12-29-2011 |
20120005277 | PROPAGATING INSTANT MESSAGE STATUS CHANGE - A method and computer program product for propagating instant message status change is described. A method may comprise receiving, via at least one of a client electronic device and a server computer, an instant message request associated with an instant message request target. The method may further comprise determining, via at least one of the client electronic device and the server computer, an instant message status based upon, at least in part, the instant message request and the instant message request target. The method may also comprise in response to the determination, providing, via at least one of the client electronic device and the server computer, an indication of the instant message status. | 01-05-2012 |
20120005279 | SIDEBAND CONTROL OF E-MAIL MESSAGE DECRYPTION - Embodiments of the present invention provide a method, system and computer program product for sideband control of a secured e-mail message. In an embodiment of the invention, a method for sideband control of a secured e-mail message is provided. The method includes receiving a secured form of a message from a sender in an e-mail client executing in memory by at least one processor of a computer. The method also includes rendering the secured form of the message comprehensible only subsequent to the establishment of a sideband channel of communication with the sender. | 01-05-2012 |
20120005728 | MANAGING MEETING INVITATIONS TO SUB-INVITEES - A computer implemented method manages meeting invitations to sub-invitees. A meeting coordinating computer detects a meeting invitation being sent from a meeting moderator's computer to a primary invitee's computer. The meeting coordinating computer intercepts a response from the primary invitee's computer. This response contains a request for a sub-invitee to accompany the primary invitee to the meeting. If the sub-invitee is initially authorized by the meeting coordinating computer to attend the meeting, then a request is transmitted to the meeting moderator's computer for additional authorization to invite the sub-invitee to the meeting. | 01-05-2012 |
20120079034 | Secure electronic message conveyance - A method of secure electronic message conveyance. The method can include, via a processor, receiving a request to forward an electronic message originally received by a first user to at least a second user. The method also can include, based on content contained in the electronic message, selecting from a plurality of approval entities at least one approval entity that is to determine whether the electronic message is approved to be forwarded to the at least a second user, and receiving from the selected approval entity an indication that indicates whether the electronic message is approved to be forwarded to the second user. The method further can include, responsive to the selected approval entity approving the forwarding of the electronic message to the second user, automatically forwarding the electronic message to the second user. | 03-29-2012 |
20120110395 | MESSAGE COMPOSITION MANAGEMENT FOR FATIGUED COMPOSERS - Embodiments of the present invention provide a method, system and computer program product for message composition management for fatigued composers of electronic messages. In an embodiment of the invention, a method for message composition management for fatigued composers of electronic messages includes detecting a request by a message composer to transmit a message to a designated recipient in a messaging client executing in memory of a computer. The method also includes computing a fatigue quotient for the message composer. Finally the method includes diverting the message to a drafts folder instead of transmitting the message if the fatigue quotient exceeds a threshold value. | 05-03-2012 |
20120117159 | COMPUTER METHOD AND SYSTEM FOR ATTACHMENT REDUCTION - Computer method, apparatus and system reduces size of attachments for an electronic communication. The method/system automatically selects a part (portion) of a working document to serve as the electronic communication attachment or upload. A monitoring unit monitors sender-user activity with respect to the working document and logs indications of the portions of the working document that are read by the user. During email composition, an attachment engine automatically selects the logged and indicated document portions to serve as an attachment reduced in size. During other electronic communication composition, such as to a blog, wiki or computer network forum, the attachment engine automatically selects the logged and indicated document portions to serve as the upload reduced in size. | 05-10-2012 |
20120117633 | Enhanced Security For Pervasive Devices Using A Weighting System - An approach is provided where one or more biometric inputs are received at a biometric receiver accessible by a mobile pervasive computing device. The biometric inputs are from a current user of the mobile pervasive computing device. One or more sets of expected biometric data are retrieved with the sets of expected biometric data corresponding to one or more authorized users of the mobile pervasive computing device. The received biometric inputs are compared with the retrieved sets of expected biometric data. Themobile pervasive computing device is secured using one or more security actions if the comparison reveals a mismatch between the biometric inputs and the retrieved sets of expected biometric data. | 05-10-2012 |
20120136939 | CONTEXT-INFORMED SUMMARIZATION - A method and computer program product for context-informed summarization is described. A method may comprise determining, via a computing device, a context of a communication. The method may further comprise determining, via the computing device, a summarization attribute for the communication based upon, at least in part, the context of the communication. The method may also comprise creating a summary of the communication based upon, at least in part, the summarization attribute. | 05-31-2012 |
20120159315 | ASSISTING USERS TO GENERATE DESIRED MEME IN DOCUMENT - A method, system and computer program product for assisting users to generate the desired meme in a document. A document is scanned to identify parts of speech, numerical text or numbers and images (collectively the “terms”) that provide positive/negative memes. A score for each of these terms is assigned. A score may then be assigned to each designated primary object (e.g., individual, company) discussed in the document using the scores assigned to the identified terms. Options may then be provided to modify the document to provide the type of meme (e.g., positive or negative meme) desired by the author to be associated with the particular designated primary object. Upon receiving a selection of one or more of these options, the document is modified accordingly to generate the desired meme in the document. | 06-21-2012 |
20120159400 | SYSTEM FOR LEARNED MOUSE MOVEMENT AFFINITIES - A system for learned mouse affinities, including: a context listener to determine a context in which a user is operating, wherein the context listener also listens for an occurrence of a trigger event within the context; a mouse listener to recognize a mouse action by the user; and a mapping stored on a memory device, wherein the mapping includes mouse actions mapped to context actions, wherein the context actions correspond to the trigger event, wherein the context action is implemented in response to the mouse action according to the profile and after the occurrence of the trigger event. | 06-21-2012 |
20120233563 | Acclimatizing a User to a Scheduling Pattern Change - Acclimatizing a user to a scheduling pattern change includes: in a calendar system implemented by at least one processor, determining an anticipated scheduling pattern change for the user; establishing with the calendar system an acclimatization period to transition the user to the scheduling pattern change; receiving in the calendar system a request to schedule an event for the user at a time within the acclimatization period; and prompting the user to reschedule the event to a time outside of the acclimatization period with the calendar system. | 09-13-2012 |
20120254634 | PREDICTING BATTERY POWER USAGE - A method for predicting battery power usage includes, collecting information relating to battery power consumption due to tasks performed by the physical computing system powered by a battery, and notifying a user in response to a determination that tasks associated with an upcoming event stored in a calendar application of the physical computing system are projected to exhaust the battery. A computing system includes a processor, a memory communicatively coupled to the processor, and a battery to power the computing system. The processor is configured to collect information relating to battery power consumption due to tasks performed by the computing system, and notify a user in response to a determination that tasks associated with an upcoming event stored in a calendar application of the computing system are projected to exhaust the battery. | 10-04-2012 |
20120327456 | WORKGROUP MANAGEMENT OF CATEGORIZED PRINT JOBS - Embodiments of the present invention provide a method, system and computer program product for managing categorized workgroup print jobs. In an embodiment of the invention, a method for workgroup management of categorized print jobs includes receiving from an end user a print job designated for printing in a workgroup printer and determining from the print job whether the print job is should or should not be printed based on its categorization. It additionally can be determined whether or not printing the print job on behalf of the end user encroaches within a threshold value of a remaining allocation of printing resources established for the end user. Finally, in response to determining both that the print job is within a specific category and also that the printing of the print job on behalf of the end user encroaches within the threshold value of the remaining allocation of printing resources established for the end user, further processing of the print job can be restricted. | 12-27-2012 |
20130007140 | SELECTIVE DELIVERY OF CONTENT VIA ELECTRONIC MAIL - A method that includes identifying a first electronic mail (email) addressed to at least two groups of recipients, the first email comprising content. The method further can include communicating the first email comprising the content to a first group of recipients. The method also can include generating a second email different than the first email and not comprising the content, the second email comprising information that indicates a contact that the second group of recipients are to contact regarding subject matter associated with the first email, and communicating the second email to a second group of recipients. | 01-03-2013 |
20130007154 | SELECTIVE DELIVERY OF CONTENT VIA ELECTRONIC MAIL - A method that includes identifying a first electronic mail (email) addressed to at least two groups of recipients, the first email comprising content. The method further can include communicating the first email comprising the content to a first group of recipients. The method also can include generating a second email different than the first email and not comprising the content, the second email comprising information that indicates a contact that the second group of recipients are to contact regarding subject matter associated with the first email, and communicating the second email to a second group of recipients. | 01-03-2013 |
20130007481 | Software-centric power management - A trigger can relate to power usage of a computing device that a computer program to be run or running on the computing device causes. Detection of the trigger causes performance of a power-saving action. The power-saving action relates to the computer program to reduce the power usage of the computing device. The power-saving action is a strictly software-oriented action. An amount of power of the computing device used in detecting the trigger and performing the power-saving action is less than a reduction of the power usage of the computing device that results from performing the power-saving action, resulting in a net power usage reduction. | 01-03-2013 |
20130007487 | Software-centric power management - A trigger can relate to power usage of a computing device that a computer program to be run or running on the computing device causes. Detection of the trigger causes performance of a power-saving action. The power-saving action relates to the computer program to reduce the power usage of the computing device. The power-saving action is a strictly software-oriented action. An amount of power of the computing device used in detecting the trigger and performing the power-saving action is less than a reduction of the power usage of the computing device that results from performing the power-saving action, resulting in a net power usage reduction. | 01-03-2013 |
20130091224 | Managing Meetings Relative to Messages - Methods and systems of managing meetings may involve intercepting an outgoing message from a sender to a recipient, and conducting an analysis of the outgoing message with respect to a calendar associated with the sender. In addition, delivery of the message may be suspended if the analysis indicates that the sender and the recipient have a scheduled meeting. In one example, the outgoing message includes at least one of an email message, a chat message and a text message. | 04-11-2013 |
20130097248 | COMMUNICATIONS SECURITY BY ENFORCING OFFLINE CONSUMPTION AND AUTO-TERMINATION OF ELECTRONIC MESSAGES - A restrictive presentation system can receive an electronic message configured for offline consumption expressed as user-specified delivery conditions. The electronic message can be securely conveyed to a computing device in an online state using a communications network. A client application of the restrictive presentation system can be installed upon the computing device and can receive the electronic message. The client application can detect a change of the computing device from the online state to the offline state. In response to user-acceptance, the electronic message can be presented upon the computing device while in the offline state. Upon user-termination of the presentation, the electronic message can be automatically deleted from a storage location of the computing device. When the computing device returns to the online state, the client application can notify the restrictive presentation system of the offline consumption. | 04-18-2013 |
20130325951 | INTELLIGENT PRESENTATION OF MULTIPLE PROXIMATE AUDIBLE ALERTS - A computing device can receive an incoming message. The incoming message can be one directed to a set of different client machines at approximately the same time. The computing device can perform a mitigation action that alters a presentation characteristic of the audible alert for the incoming message. The mitigation action ensures that the computing device and at least a subset of the other client devices within a predefined audio range of the computing device do not audibly present alerts for the incoming message in an unsynchronized manner. | 12-05-2013 |
20140020055 | NETWORK SELECTION TOOL FOR INFORMATION HANDLING SYSTEM - A user information handling system (IHS) link analysis tool intercepts requests to navigate to a webpage, such as a link. The user IHS link analysis tool transmits the link to a security IHS link analysis tool. The user IHS link analysis tool receives a network selection message from the security IHS indicating which network the user IHS should utilize based upon the content of the link. | 01-16-2014 |
20140020057 | NETWORK SELECTION TOOL FOR INFORMATION HANDLING SYSTEM - A user information handling system (IHS) link analysis tool intercepts requests to navigate to a webpage, such as a link. The user IHS link analysis tool transmits the link to a security IHS link analysis tool. The user IHS link analysis tool receives a network selection message from the security IHS indicating which network the user IHS should utilize based upon the content of the link. | 01-16-2014 |
20140020106 | LINK ANALYSIS TOOL FOR SECURITY INFORMATION HANDLING SYSTEM - A security information handling system (IHS) receives a request to navigate to a webpage, such as a link, from a user IHS. A security IHS link analysis tool analyzes the link and determines if the link contains sensitive content. The security IHS link analysis tool transmits a network selection message to the user IHS indicating which network the user IHS should utilize based upon the content of the link. | 01-16-2014 |
20140020110 | LINK ANALYSIS TOOL FOR SECURITY INFORMATION HANDLING SYSTEM - A security information handling system (IHS) receives a request to navigate to a webpage, such as a link, from a user IHS. A security IHS link analysis tool analyzes the link and determines if the link contains sensitive content. The security IHS link analysis tool transmits a network selection message to the user IHS indicating which network the user IHS should utilize based upon the content of the link. | 01-16-2014 |
20140052434 | TRANSLATION OF TEXT INTO MULTIPLE LANGUAGES - Methods and systems for translating a text into multiple languages performed by at least one software component executed by at least one processor, comprise: maintaining a translation repository having a plurality of entries associating different types of content with user-specified languages; monitoring the text received by a program to identify one or more types of content and a source language of the text; retrieving the user-specified languages from the translation repository associated with the identified types of content; and for each of the identified types of content, translating the content thereof from the source language to the corresponding user-specified language when the source language is different from the corresponding user-specified language. | 02-20-2014 |
20140101258 | HANDLING OF WEBSITE MESSAGES - Mechanisms for handling website messages (e.g., website certificate warnings and/or errors), while combating website users ignoring such messages (sometimes referred to as “click-through syndrome”) are provided. Such mechanisms may comprise providing an interface for handling website messages (e.g., website certificate warnings and/or errors) based on a dynamic policy. In one example, such a dynamic policy may comprise: identifying a first trusted user; monitoring website access by the first trusted user; presenting the first trusted user with a first website message based upon a first access by the first trusted user to a first website; capturing a first response by the first trusted user to the first website message; and utilizing the first response of the first trusted user as a model for subsequent access to the first website. | 04-10-2014 |
20140114956 | INCORPORATING RELATED SEARCHES BY OTHER USERS IN A SOCIAL NETWORK IN A SEARCH REQUEST - Provided are a computer program product, system, and method for incorporating related searches by other users in a social network in a search request. A search request is received including keywords from a searching user including a keyword to search. A determination is made of at least one other user in a trust relationship with the searching user. A determination is made of related searches submitted by the determined at least one other user having related keywords related to the keywords included in the received search request. Information is returned to the searching user on the related keywords in the related searches in response to determining that the determined at least one other submitted related searches. | 04-24-2014 |
20140237598 | Reducing the Spread of Viruses and Errors in Social Networks and Affinity Groups - An approach is provided to reduce the spread of malware within a group of users. In the approach, a malware program (e.g., virus, Trojan, worm, etc.) is detected at a system that is utilized by one of the users that is a member of a peer affinity group. Event data pertaining to the detected malware program is gathered at the user's system. A notification is provided to the other users included in the peer affinity group. The notification identifies the detected malware program and the event data that was gathered at the user's system. | 08-21-2014 |
20140258213 | AUTONOMIC COLLABORATIVE WORKSPACE CREATION - Systems and methods provide for autonomic collaborative workspace creation. Patterns of artifact usage for a plurality of workspaces over a plurality of collaborative interactions may be determined. Some of the multitude of collaborative interactions may be between a subset of the plurality of workspaces. A workspace may be initialized with artifacts for a scheduled collaboration based on the patterns of artifact usage. | 09-11-2014 |
20140258884 | AUTONOMIC COLLABORATIVE WORKSPACE CREATION - Systems and methods provide for autonomic collaborative workspace creation. Patterns of artifact usage for a plurality of workspaces over a plurality of collaborative interactions may be determined. Some of the multitude of collaborative interactions may be between a subset of the plurality of workspaces. A workspace may be initialized with artifacts for a scheduled collaboration based on the patterns of artifact usage. | 09-11-2014 |
20140280006 | MANAGING TEXT IN DOCUMENTS BASED ON A LOG OF RESEARCH CORRESPONDING TO THE TEXT - A method and apparatus for managing text is disclosed. A data processing system identifies a log of research and text in a document that matches the log of research. The data processing system determines whether a mismatch exists between a search result for the text in the document and the log of research. Responsive to determining the mismatch exists between the search result for the text and the log of research, the data processing system then modifies the text in the document based on the log of research. | 09-18-2014 |
20140280117 | Prioritizing Items Based on User Activity - Prioritizing items based on user activity includes determining a user interest based on a current user activity and prioritizing items in a list presented in a display based on the user interest. | 09-18-2014 |
20140280123 | Prioritizing Items Based on User Activity - Prioritizing items based on user activity includes determining a user interest based on a current user activity and prioritizing items in a list presented in a display based on the user interest. | 09-18-2014 |
20140288988 | Acclimatizing a User to a Scheduling Pattern Change - A method of acclimatizing a user to a scheduling pattern change includes, in a calendar system implemented by at least one processor, determining an anticipated scheduling pattern change from a current scheduling pattern to a new scheduling pattern for the user; and establishing with the calendar system an acclimatization period to transition the user to the scheduling pattern change. | 09-25-2014 |
20140321720 | MANAGING SOCIAL NETWORK DISTANCE IN SOCIAL NETWORKS USING PHOTOGRAPHS - There are provided a method, a system and a computer program product for using a digital image in a social network. The system receives the digital image. The system runs an image processing technique on the digital image. The system determines, based on the run image processing technique, a social distance between the users in the digital image. | 10-30-2014 |
20140351024 | EXTRAPOLATING USER ACTIONS - There are provided a system, a method and a computer program product for extrapolating a next action for a user. The system enables the user to select or specify one or more role models. The system monitors data associated with the one or more role models. The system monitors data associated with the user. The system compares the data associated with the one or more role models with the data associated with the user. The system identifies, based on the comparison one or more discrepancies between the data associated with the one or more role models and the data associated with the user. The system suggests, based on the data associated with the one or more role models and based on the identified one or more discrepancies, one or more actions to the user. | 11-27-2014 |
20140351025 | EXTRAPOLATING USER ACTIONS - There are provided a system, a method and a computer program product for extrapolating a next action for a user. The system enables the user to select or specify one or more role models. The system monitors data associated with the one or more role models. The system monitors data associated with the user. The system compares the data associated with the one or more role models with the data associated with the user. The system identifies, based on the comparison one or more discrepancies between the data associated with the one or more role models and the data associated with the user. The system suggests, based on the data associated with the one or more role models and based on the identified one or more discrepancies, one or more actions to the user. | 11-27-2014 |
20150026267 | TARGETED MESSAGE RESPONSE - A tool for targeting a message response. The tool monitors reactions of a user to message subject lines, message content, and social networks. The tool analyzes user interest data and calculates a user interest rating per keyword. Rated keywords are stored in association with the user. When a user drafts a message addressed to a recipient, the tool compares rated keywords within the recipient's log with the subject line and message content. The tool suggests an alternative subject line likely to elicit a faster and more detailed response from the recipient. | 01-22-2015 |
20150046527 | MANAGING A COLLABORATIVE SPACE - Managing a collaborative space includes providing a collaborative space in which a number of users collaborate from respective client devices, monitoring content of the collaborative space to determine a context of collaboration in the collaborative space, and changing an operation of at least one functionality of the collaborative space based on the determined context of collaboration in the collaborative space. | 02-12-2015 |
20150046529 | MANAGING A COLLABORATIVE SPACE - Managing a collaborative space includes providing a collaborative space in which a number of users collaborate from respective client devices, monitoring content of the collaborative space to determine a context of collaboration in the collaborative space, and changing an operation of at least one functionality of the collaborative space based on the determined context of collaboration in the collaborative space. | 02-12-2015 |
20150051933 | ASYNCHRONOUS FEED OF TAGGED CONTENT BASED ON TIME CRITERIA - In one example, an asynchronous feed of tagged content based on time criteria includes tagging content into content segments and tagging the content with a duration. The method also includes scheduling consumption of the content segments using a schedule at least one user and providing the content segments through an asynchronous feed. Additionally, a computing device for an asynchronous feed of tagged content based on time criteria is provided. | 02-19-2015 |
20150051934 | ASYNCHRONOUS FEED OF TAGGED CONTENT BASED ON TIME CRITERIA - In one example, an asynchronous feed of tagged content based on time criteria includes tagging content into content segments and tagging the content with a duration. The method also includes scheduling consumption of the content segments using a schedule at least one user and providing the content segments through an asynchronous feed. Additionally, a computing device for an asynchronous feed of tagged content based on time criteria is provided. | 02-19-2015 |
20150058236 | MANAGING AN INITIAL POST ON A WEBSITE - Managing an initial post on a website includes identifying an initial post on website where the initial post is for an event, identifying a related post that describes the event after the event occurs, and updating the initial post to include content of the related post. | 02-26-2015 |
20150058750 | MANAGING AN INITIAL POST ON A WEBSITE - Managing an initial post on a website includes identifying an initial post on website where the initial post is for an event, identifying a related post that describes the event after the event occurs, and updating the initial post to include content of the related post. | 02-26-2015 |