Patent classifications
H04L51/00
Intelligent scrolling in shared folder back integrated workspaces
Disclosed are systems, methods, and non-transitory computer-readable storage media for shared folder backed integrated workspaces. In some implementations, a content management system can provide a graphical user interface (GUI) that integrates communications and content management into a single user interface. The user interface can include mechanisms that allow a user to provide input to generate a new workspace. The user interface can provide a mechanism to allow a user to view conversations related to the workspace and/or content items associated with the workspace. The user interface can present representations of content items associated with the workspace and allow the user to provide input to generate, view, edit, and share content items associated with the workspace.
Mobile chat application integration with promotional systems
Techniques for programmatically interfacing with mobile chat sessions are discussed herein. Some embodiments may include one or more servers configured to: access the mobile chat session hosted by the mobile chat server; receive input chat data from the mobile chat server; determine promotions scores of candidate promotions based at least in part on the input chat data; and provide the output chat data to the mobile chat server including an electronic marketing communication of one or more promotions selected based on the promotion scores. The one or more servers may be further configured to programmatically interact with chat accounts within the mobile chat session, such as to request additional search terms for improved promotion relevance targeting, among other things.
Feedback-type SNS user information communicativity scoring server
A scoring server makes it possible for a provider of advertising or other content to arbitrarily search for an influencer who is suited to a promotion and to easily control target numbers or target conditions, and is capable of making effects and results from distribution of the promotion feedback into impact and information communicativity and improving precision. This server is connected by a network to a subscriber terminal, an SNS server, and a content provision terminal. Said server: communicates with the SNS server and creates a score of a subscriber's information communicativity; provides content to the subscriber terminal which has been provided from the content provision terminal; and re-creates the score using an action history with respect to the SNS server in relation to the content of the subscriber terminal, and the response to the actions, as feedback elements.
Generating a stitched data stream
Systems and methods provide for a server computer to receive a plurality of messages from a plurality of user computing devices, each message of the plurality of messages comprising a data stream, determine a subset of messages of the plurality of messages associated with a similar geolocation and time period, determine a set of messages of the subset of messages based on a match score for each pair of messages, and stitch together the set of messages to generate a stitched data stream from the data streams for each message of the set of messages based on a time period for each message, wherein the stitched data stream comprises messages with data streams that overlap in time periods such that there may be more than one data stream for a given time period.
Enforcing messaging policies using tags
A messaging system receives a message sent by an enterprise to an individual user. The message has an associated message tag describing the content of the message. The messaging system applies a filtering policy to the message. The filtering policy selectively blocks messages sent by enterprises to users. The filtering policy allows the message having the associated tag to pass through the filter even though the message might otherwise violate the filtering policy. The messaging system samples a subset of tagged messages from enterprises and analyzes the messages for compliance with a tagging policy. The messaging system may also train one or more tag models to recognize the correct tags for the messages.
Detection of spoofed internally-addressed email using trusted third party's SPF records
A method, system and computer-usable medium for performing a spoofed email detection operation, comprising: maintaining a list of allowed third party domains that are authorized to send an internally-addressed email, the list of allowed third party domains comprising a plurality of domains; receiving an email from a third party sender, the email comprising an email envelope, the email envelope storing a domain of a third party sender address of the third party sender; comparing the domain of the third party sender address stored in the email envelope with the list of allowed third party domains; identifying the domain of the third party sender address stored in the email envelope as an allowed domain when the domain of the third party sender address matches a third party domain stored within the list of allowed third party domains.
Messaging system with dynamic content delivery
A message handling system comprising connection handler circuitry, message parser circuitry, message modification circuitry, message processing circuitry, and content caching circuitry, wherein the message parser circuitry is operable to extract header(s) and/or content of a received message. The message modification circuitry is operable to generate a modified message by inserting, into the message, an HTML tag comprising a first unique uniform resource locator (URL). The connection handler circuitry is operable to send the modified message to a device that handles messages for the recipient. The message processing circuitry is operable to analyze the one or more headers and/or content. The message processing circuitry is operable to determine which image of a plurality of images to serve in response to a request containing the first unique URL, wherein the determination is based on the analysis of the one or more headers and/or content. The content caching circuitry is operable to serve the determined image.
ICN packet forwarding method
A ICN packet forwarding method, including: step 1) maintaining, by a network forwarding device, a network entity ID association state table, which is used for recording a state of the binding relationship between a network entity ID and a network address to which the network entity is associatively bound; after a network address binding relationship of the network entity changes due to location movement thereof, adding or updating, by the network forwarding device, a record of the network entity in the network entity ID association state table according to notification information of the network entity; and step 2) upon receipt of an ICN packet, by the network forwarding device, determining whether the ICN packet needs to be processed, according to information of the current network entity ID association state table; if yes, forwarding after processing the ICN packet; otherwise, directly forwarding the packet.
System and method for multivariate testing of messages to subgroup in a one-to-many messaging platform
A system and method for multivariate testing of messages to a subgroup in a one-to-many messaging platform. A client text message is generated for transmission to a number of users via one or more messaging services. A subset of users is defined according to one or more attributes of the text message or the users, and the client text message is transmitted only to users in the subgroup. The transmission is analyzed for performance metrics, such as actions or reactions by users in the subgroup, and based on the performance metrics, the message is optimized for transmission to the larger group of users. Optimization happens rapidly.
Experience for sharing computer resources and modifying access control rules using mentions
Various methods and systems for sharing computer resources and modifying access control rules for computer resources are described. An access control gesture may be defined using a command indicator comprising one or more identifying characters, symbols, or glyphs. For example, an access control gesture may be defined using an @-sign in combination with a modifier that indicates a particular security command to execute and/or a corresponding permission to add/modify/revoke. For example, an input string comprising a plus sign in combination with an @-sign (e.g., “+@”) may indicate a command to add a mentioned user to an access control list. An input string comprising a minus sign, hyphen, or dash in combination with an @-sign (e.g., “−@”) may indicate a command to remove a mentioned user from an access control list. As such, access control gestures can provide a simple and intuitive mechanism to grant temporary access to a designated resource.