Patent application number | Description | Published |
20120173621 | MANAGING DELIVERY OF ELECTRONIC MEETING CONTENT - A first portion of electronic meeting content is transmitted to a first client computing device. The first portion of the electronic meeting content configured to provide a first content resolution that is less than a full content resolution. A second portion of the electronic meeting content is transmitted to the first client computing device. The second portion of the electronic meeting content configured to provide a second content resolution that is greater than the first content resolution. The second portion of the electronic meeting content combined with the first portion of the electronic meeting content provides progressive refinement of electronic meeting content transmitted to the first client computing device. | 07-05-2012 |
20120246237 | MANAGING DELIVERY OF ELECTRONIC MEETING CONTENT - A first portion of electronic meeting content is transmitted to a first client computing device. The first portion of the electronic meeting content configured to provide a first content resolution that is less than a full content resolution. A second portion of the electronic meeting content is transmitted to the first client computing device. The second portion of the electronic meeting content configured to provide a second content resolution that is greater than the first content resolution. The second portion of the electronic meeting content combined with the first portion of the electronic meeting content provides progressive refinement of electronic meeting content transmitted to the first client computing device. | 09-27-2012 |
20130007123 | REDACTING CONTENT IN ONLINE MEETINGS - A method, computer program product, and system for redacting content in online meetings is described. A method may comprise receiving, via one or more computing devices, a selected portion of content to redact in a first online meeting. The method may further comprise determining, via the one or more computing devices, if a participant of the first online meeting is in an un-trusted location. The method may additionally comprise, in response to determining that the participant of the first online meeting is in the un-trusted location, redacting, via the one or more computing devices, the selected portion of content from content available to the participant in the first online meeting. | 01-03-2013 |
20130085953 | Assessing Social Risk Due To Exposure From Linked Contacts - An approach is provided in which a risk assessment is performed that accesses the risk to a user of an information handling system due to the user's link to a social network contact. Risky action values is received with the values corresponding to the social network contact. A risk level is calculated with the risk level corresponding to one or more of the risky action values. A preventative security action is then performed based on the calculated risk level. In another embodiment, an approach is provided in which the potential risks posed by a user are transmitted to the user's social network contacts. In this approach, potentially risky actions that are performed by the user are detected. Risky action values are identified that correspond to the detected potentially risky actions. The risky action values are then transmitted to the user's social network contacts over a computer network. | 04-04-2013 |
20130086254 | Receiving Security Risk Feedback From Linked Contacts Due to a User's System Actions and Behaviors - An approach is provided in receiving risk feedback from a social network. Feedback transmissions are received by a user's system with each of the feedback transmissions being received over a computer network from a social network contact. The received feedback transmissions are analyzed and, based on the analysis, a risky action that was performed by the user is identified. The user performs a risk avoidance measure to counteract the identified risky action. In one embodiment, the risk avoidance measure is reported back to the user's contacts. | 04-04-2013 |
20130179970 | Receiving Security Risk Feedback From Linked Contacts Due to a User's System Actions and Behaviors - An approach is provided in receiving risk feedback from a social network. Feedback transmissions are received by a user's system with each of the feedback transmissions being received over a computer network from a social network contact. The received feedback transmissions are analyzed and, based on the analysis, a risky action that was performed by the user is identified. The user performs a risk avoidance measure to counteract the identified risky action. In one embodiment, the risk avoidance measure is reported back to the user's contacts. | 07-11-2013 |
20130179977 | Assessing Social Risk Due To Exposure From Linked Contacts - An approach is provided in which a risk assessment is performed that accesses the risk to a user of an information handling system due to the user's link to a social network contact. Risky action values is received with the values corresponding to the social network contact. A risk level is calculated with the risk level corresponding to one or more of the risky action values. A preventative security action is then performed based on the calculated risk level. In another embodiment, an approach is provided in which the potential risks posed by a user are transmitted to the user's social network contacts. In this approach, potentially risky actions that are performed by the user are detected. Risky action values are identified that correspond to the detected potentially risky actions. The risky action values are then transmitted to the user's social network contacts over a computer network. | 07-11-2013 |
20140115332 | SECURE SHARING AND COLLABORATIVE EDITING OF DOCUMENTS IN CLOUD BASED APPLICATIONS - Collaboratively editing a document in a system of sharee clients includes creating a document change, generating a document token for encrypting the document change, encrypting the document change with the document token, making the encrypted document change available to the other sharee clients, and generating a plurality of copies of the sharee document token. Each sharee document token is encrypted with a respective sharee's public key. Each encrypted sharee document token is distributed to respective sharee clients. Each sharee client is configured to: decrypt a sharee document token using a respective private key, decrypt the encrypted document change using the share document token, and consolidate the document change into a document. | 04-24-2014 |