Patent classifications
H04L41/026
Interactive Production Alerts Dashboard
Methods, computer systems, and computer storage media are provided that provide an interactive web-based alerts system. The system provides a combination of features including a mail application and a dashboard for reporting. Initially, automated emails sent from a plurality of sources are received and stored in a database. The automated emails are classified based on criteria including source, subject line, acknowledgement, and/or status. Using these classifications, various reports can be generated to provide insight into the alert quality and quantity. A dashboard interface displays the classified alerts and enables various interactions with the classified plurality of alerts. Based on the interactions, the dashboard interface is automatically updated, in real-time. In some embodiments, the interactions comprise causing an incident to be created for the alert, causing a category of the alert to be updated, or causing a shift report to be generated.
NOTIFICATION SERVICE IMPLEMENTATION
In some examples, notification service implementation may include detecting, with respect to a notification service of a plurality of notification services, based on an analysis of signals received at an activity event hub, at least one incident associated with activities of an entity. Based on an analysis of the incident, a determination may be made as to whether the incident is actionable, and information related to the incident may be requested from a data endpoint. Based on the received information, a notification object may be generated to notify the entity of the incident. Further information related to the incident may be stored with respect to the notification service by utilizing a database that is commonly used by the plurality of notification services. A stateless restart associated with the notification service may be performed in an event of a failure of the notification service based on the stored further information.
Network management device and method for discovering and managing network connected databases
Systems, software, and methods for managing traditional (i.e., TCP/IP-based), non-traditional, and traditional-non-traditional hybrid networks of connected electronic devices are described. In one example, network management policy and network management applications are downloaded automatically upon detection and identification of a new device, application or service on a network. In another example, information related to at least one aspect of the network is obtained by a network management device through connection to a non-TCP/IP network, or by way of a gateway device or application, at least one applicable management policy is identified, and the identified policy is used to manage at least one aspect of the network's operation. In another example, devices, applications or services presenting various behaviors under various scenarios are evaluated and placed under management.
Method, system, and non-transitory computer-readable record medium for providing multiple group calls in one chatroom
Disclosed is a method, system, and non-transitory computer-readable record medium for providing a plurality of group calls in a single chatroom. A group call providing method including receiving, by the at least one processor, information about a plurality of group call channels generated in response to a first request from at least one member included in a chatroom, from a server, providing, by the at least one processor, a group call channel list about the plurality of group call channels through the chatroom based on the information about the plurality of group call channels, and starting, by the at least one processor, a group call through a specific group call channel, from among the plurality of group call channels, in response to receiving a second request for joining the specific group call channel through the group call channel list may be provided.
Method, system, and non-transitory computer-readable record medium for providing multiple group calls in one chatroom
Disclosed is a method, system, and non-transitory computer-readable record medium for providing a plurality of group calls in a single chatroom. A group call providing method including receiving, by the at least one processor, information about a plurality of group call channels generated in response to a first request from at least one member included in a chatroom, from a server, providing, by the at least one processor, a group call channel list about the plurality of group call channels through the chatroom based on the information about the plurality of group call channels, and starting, by the at least one processor, a group call through a specific group call channel, from among the plurality of group call channels, in response to receiving a second request for joining the specific group call channel through the group call channel list may be provided.
Method, system, and non-transitory computer-readable record medium for generating chatroom according to condition
Disclosed is a method, system, and non-transitory computer-readable record medium for creating a chatroom according to a condition. The chatroom creation method may include providing an instant messaging service; registering a chatroom creation condition related to a specific account of the instant messaging service; retrieving at least one account of accounts of the instant messaging service that meets the chatroom creation condition; and automatically creating a chatroom of the specific account joined by the retrieved accounts.
Method, system, and non-transitory computer-readable record medium for generating chatroom according to condition
Disclosed is a method, system, and non-transitory computer-readable record medium for creating a chatroom according to a condition. The chatroom creation method may include providing an instant messaging service; registering a chatroom creation condition related to a specific account of the instant messaging service; retrieving at least one account of accounts of the instant messaging service that meets the chatroom creation condition; and automatically creating a chatroom of the specific account joined by the retrieved accounts.
Experience for sharing computer resources and modifying access control rules using mentions
Various methods and systems for sharing computer resources and modifying access control rules for computer resources are described. An access control gesture may be defined using a command indicator comprising one or more identifying characters, symbols, or glyphs. For example, an access control gesture may be defined using an @-sign in combination with a modifier that indicates a particular security command to execute and/or a corresponding permission to add/modify/revoke. For example, an input string comprising a plus sign in combination with an @-sign (e.g., “+@”) may indicate a command to add a mentioned user to an access control list. An input string comprising a minus sign, hyphen, or dash in combination with an @-sign (e.g., “−@”) may indicate a command to remove a mentioned user from an access control list. As such, access control gestures can provide a simple and intuitive mechanism to grant temporary access to a designated resource.
Experience for sharing computer resources and modifying access control rules using mentions
Various methods and systems for sharing computer resources and modifying access control rules for computer resources are described. An access control gesture may be defined using a command indicator comprising one or more identifying characters, symbols, or glyphs. For example, an access control gesture may be defined using an @-sign in combination with a modifier that indicates a particular security command to execute and/or a corresponding permission to add/modify/revoke. For example, an input string comprising a plus sign in combination with an @-sign (e.g., “+@”) may indicate a command to add a mentioned user to an access control list. An input string comprising a minus sign, hyphen, or dash in combination with an @-sign (e.g., “−@”) may indicate a command to remove a mentioned user from an access control list. As such, access control gestures can provide a simple and intuitive mechanism to grant temporary access to a designated resource.
Methods for enforcing compliance policies and devices thereof
A method, non-transitory computer readable medium, and mobile application manager computing device that determines a priority level for a mobile device requiring a compliance check based on characteristic data associated with, or an identified user of, the mobile device. An entry comprising identifying data for the mobile device is inserted into a processing queue associated with the priority level. A determination is made when each of the processing queues associated with a higher priority level than the one priority level is empty. The entry is retrieved from the processing queue, the compliance check is performed on the mobile device, and a status of the mobile device is marked as out-of-compliance or in-compliance based on a result of the compliance check, when the determining indicates each of the processing queues associated with a higher one of the priority levels than the one priority level determined for the mobile device is empty.