Patent application number | Description | Published |
20110162059 | APPARATUS AND METHOD FOR SECURE REMOTE PROCESSING - A method and apparatus for providing on-demand services to an organization. The services are provided by a hosting center. The apparatus comprises an on-premises connectivity agent at the organization, which receives requests or commands from computing platforms within the organization and concentrates all communication to and from the hosting center. The on-premises connectivity agent embeds or otherwise introduces organization metadata to the messages. The apparatus further comprises a hosted connectivity agent associated with the hosting center. The apparatus may further comprise a central connectivity component for routing communication between the on-premises connectivity agent and the hosted connectivity agent, in accordance with the metadata. Communication between the on-premises connectivity agent and the central connectivity component flows through a secure channel and comprises only communications related to the organization. Communication between the central connectivity component and the hosted connectivity agent may comprise communications related multiple organizations. Such communications may be multiplexed. | 06-30-2011 |
20110162074 | APPARATUS AND METHOD FOR REMOTE PROCESSING WHILE SECURING CLASSIFIED DATA - A method and apparatus for providing an on-demand service to an organization by a hosting center, without having classified data leave the organization network, comprising: receiving a message sent from a first computing platform of the organization to an on-premise connectivity agent, the message comprising classified data; generating a code in accordance with the classified data, by a credential hiding component associated with the on-premise connectivity agent; sending the code to the hosting center; receiving a second message from the hosting center, the second message comprising the code; retrieving the classified data using the code by a credential retrieval component associated with the on-premise connectivity agent; and sending a third message to a second computing platform, the third message comprising the classified data. | 06-30-2011 |
20130311877 | Automatic Retrieval of Themes and Other Digital Assets from an Organizational Website - The present disclosure involves systems, software, and computer implemented methods for determining one or more themes for a portal site. One example process includes operations for identifying a reference to an organizational site that is to be used as a thematic basis for a new portal site. The reference is used to identify a representation of the organizational site. The representation is analyzed based on an analysis rule set. At least one potential theme associated with the organizational site is determined, based on the analysis, and the at least one potential theme is presented to a user. | 11-21-2013 |
20140040177 | RUNTIME ADAPTATION IN DYNAMIC WORKSPACES - The disclosure generally describes computer-implemented methods, software, and systems for search-, context-, and rule-based creation and runtime adaptation in dynamic workspaces. One computer-implemented method includes receiving an access request for an enterprise workspace from a requestor, determining properties of the requestor, determining at least one rule associated with the requestor, determining a context of the determined requestor, generating, by operation of at least one computer, the requested enterprise workspace, and modifying the generated enterprise workspace by executing the determined at least one rule for the determined context. | 02-06-2014 |
20140123020 | MULTIPLE USER INTERFACE PLATFORM SUPPORT FOR PORTAL APPLICATIONS - The disclosure generally describes methods, media, and systems for providing multiple user interface platform technology support for portal applications. One computer-implemented method includes receiving, using a user-interface (UI) framework of a computing system including one or more computers, a request for incremental data from a specified application of at least one application, wherein, prior to receipt of the request, UI platform code formatted according to a particular UI platform technology type was transmitted to a requestor of the request, parsing the request to determine at least the specified application, determining whether the specified application includes a UI platform handler, determining a responsive UI platform technology type, and determining whether to switch the particular UI platform technology type to the responsive UI platform technology type. | 05-01-2014 |
20140222914 | SYNCHRONIZING USER RELATIONSHIP ACROSS COMPUTER SYSTEMS IMPLEMENTING WORKSPACES - Computer-implemented methods, computer software, and computer systems for synchronizing user relationship across computer systems implementing workspaces. A computer system that provides features accessible by users by executing a workspace is accessed. Features provided to the users by remaining computer systems depends on the relationships between the users. A triggering event that represents a change to the computer workspace—for example, addition or removal or a user in the workspace, addition or removal of content in the workspace—is detected. Features provided to a first user by the remaining computer systems is affected by the change. Changes in relationships between the first user and the remaining users responsive to the change are determined, and provided to one or more of the remaining computer systems as respective messages that include the changes in the relationships. | 08-07-2014 |
20140282024 | PROVIDING MULTIPLE ROLES IN COMPUTER-IMPLEMENTED WORKSPACES - Providing multiple roles in computer-implemented workspaces. When a first computer workspace in which a user has been assigned a first role and a second role is accessed, a first subset of content defined by the first role and a second subset of content defined by the second role can be made accessible to the user. Input to switch access from the first computer workspace to a second computer workspace that is different from the first computer workspace and in which the user is assigned only the second role can be received. In response, only the second subset of content can be provided to the user and access to the first subset of content can be prohibited. | 09-18-2014 |
20150088897 | AUTOMATIC REMOVAL OF INAPPROPRIATE CONTENT - The disclosure generally describes computer-implemented methods, software, and systems for automatically removing inappropriate content. One example method includes: identifying a report of inappropriate content received from a user, the report identifying a content item the user has identified as inappropriate and an identification of the user, determining whether to automatically remove the content item based at least in part on the identity of the user, and removing the content item upon determining that the content should be removed. In some instances, the user is associated with a report weight. The report weight can be based, at least in part, on a business role of the user. Determining whether to automatically remove the content item may include determining that the user or a business role of the user is associated with an automatic removal rule, and removing the content item upon determining that the report is associated the user. | 03-26-2015 |