Patent application number | Description | Published |
20080294728 | Service Discovery for Electronic Messaging Clients - An autodiscovery service for clients in an electronic messaging system is disclosed. Client devices in the system request messaging system configuration settings from an autodiscover server. Clients may derive the address of the autodiscover server from user input, such as an email address, or the address may be obtained by other means. The autodiscover server responds to the request with settings for that client. The settings requested may include addresses of electronic mail servers and other servers that provide client services. The autodiscover server may determine the settings for the client based on various criteria, including client location and user mailbox location. Third party servers may participate in the autodiscovery service, and addresses of third party servers may be included in the settings provided to the client devices. | 11-27-2008 |
20090177704 | RETENTION POLICY TAGS FOR DATA ITEM EXPIRATION - Architecture for retention policy tagging of data items such as messages for expiring data items without data reorganization. Retention policy tags can be applied to items, conversations, folders, and/or distribution lists, for example. Retention policy tags provide a way to manage (e.g., expire) data items such as email, for example, and reduce the corporate burden for compliance in documents of all types. Tags can be applied to data items individually and in-place, and do not impose changes to the natural workflow of the user. The use of expiry policy tags provides a solution by removing the pain point around physically moving messages to an unfamiliar folder hierarchy. | 07-09-2009 |
20090319456 | MACHINE-BASED LEARNING FOR AUTOMATICALLY CATEGORIZING DATA ON PER-USER BASIS - Architecture that employs machine-based learning to automatically categorize data on a per-user basis. Auto-tagging reduces the burden on infoworkers by creating a machine learning model to learn from user tagging behavior or preferences. Once this information is obtained, a trained model for this specific user is used to assign tags to incoming data, such as emails. The architecture finds particular applicability to compliance and message retention policies that otherwise would mandate extra work for the infoworker. The architecture learns the tagging behavior of a user and uses this learned behavior to automatically tag data based on the user's prior tagging habits. A regression algorithm is employed to process the training data according to an n-dimensional framework for prediction and application of the tag(s) to the incoming messages. | 12-24-2009 |
20100145932 | Automatic Discovery of Alternate Mailboxes - As described herein, a client system is automatically configured to access message objects in a plurality of mailboxes stored at a server system. The client system sends an autodiscover request to the server system. In response, the server system sends to the client system an autodiscover response that contains an autodiscover response document that comprises a primary mailbox element and at least one alternate mailbox element. The client system uses a first set of mailbox identification data specified by the primary mailbox element to access message objects in a primary mailbox stored at the server system and uses sets of mailbox identification data specified by the alternate mailbox elements to access message objects in alternate mailboxes stored at the server system. Email messages are one example type of message objects. The alternate mailbox may be an archive mailbox used to store message objects for occasional reference. | 06-10-2010 |
20100306147 | Boosting to Determine Indicative Features from a Training Set - Determining indicative features may be provided. First, a first set of features may be determined using a document frequency process. Then a second set of features may be determined using a boosting process. Using the boosting process may comprise using an approximation for a one-dimensional optimization. The approximation may include an upper bound. Next, the first set of features and the second set of features may be combined into a combined set of features. The combined set of features may comprise a union of the first set of features and the second set of features. At least one document may then be classified based on the combined set of features. | 12-02-2010 |
20120198019 | WEB SERVICE SUPPORT FOR BULK ITEM EXPORT/IMPORT - A method for migrating, archiving, or backing-up data between a first device and a second device hosting a communication application in a networked computing environment. The method includes retrieving mailbox data from the second device, the mailbox data includes messaging data and configuration data of the communication application associated with the mailbox data. The method also includes mapping the mailbox data from a first data format to a second data format, and transferring the mapped mailbox data to the first device as a first file. | 08-02-2012 |
20130191465 | FACILITATING MESSAGE SERVICES USING MULTI-ROLE SYSTEMS - Systems, methods, and software are provided for facilitating a message service. A multi-role system is identified based on where an active message database associated with a user identity resides. Service communications generated by a messaging client associated with the user identity are directed from an entry system to the multi-role system for handling in the multi-role system by a messaging server and a content server to provide the message service. | 07-25-2013 |
20150046550 | METHODS, SYSTEMS, AND COMPUTER-READABLE MEDIUMS FOR CONFIGURING ELECTRONIC MESSAGING APPLICATIONS - Methods, systems, and computer-readable mediums configure electronic messaging applications to communicate with a server storing messages to and/or from an electronic messaging account of a user. A method involves receiving an electronic message address and a password of the user as inputs, deriving server connection settings based on the electronic message address, and applying the server connection settings to the electronic messaging account. Another method involves receiving an electronic message address of the user and discovering the server connection settings for the electronic messaging account on a server having a designated protocol name as a server prefix name to assist in locating the server and having the server connection settings. The method also involves retrieving the server connection settings from a file provided by the server in response to locating the server having the designated name and applying the server connection settings to the electronic messaging account. | 02-12-2015 |
Patent application number | Description | Published |
20100094809 | TECHNIQUES TO MANAGE RETENTION POLICY TAGS - Techniques to manage retention policy tags are described. A system may comprise a tagging component operative to tag a message with an expiration tag to form an expiration tagged message, the expiration tag having expiration information used to expire the expiration tagged message in accordance with a retention policy. The system may further comprise a presentation component communicatively coupled to the tagging component, the presentation component operative to present a view of the expiration tagged message with an expiration field having the expiration information for the expiration tagged message. Other embodiments are described and claimed. | 04-15-2010 |
20100161737 | TECHNIQUES TO MANAGE ELECTRONIC MAIL PERSONAL ARCHIVES - Techniques to manage email personal archives are described. A computer-implemented system may comprise a primary mailbox component, associated with a user, and operative to receive and send email. The computer-implemented system may further comprise an alternate mailbox component separate from the primary mailbox component and associated with the user and the primary mailbox, operative to store email. The computer-implemented system may also include a mail client operative on a client computer to access and display contents of the primary and alternate mailboxes substantially simultaneously. Other embodiments are described and claimed. | 06-24-2010 |
20130191509 | TECHNIQUES TO PROVIDE PROXIES FOR WEB SERVICES - Techniques to provide proxies for web services are described. A technique may include providing proxies for web services that translate one format to a format native used, or understood, by the web service without having to rewrite existing APIs. In one embodiment, for example, an apparatus may comprise a processing unit and a network interface coupled to the processing unit. The apparatus may further include a web service executing web service requests on the processing unit using a native format. The apparatus may further include a proxy to receive a web service request in a first format via the network interface and to translate the web service request from the first format to the native format. Other embodiments are described and claimed. | 07-25-2013 |
20140095641 | TECHNIQUES TO MANAGE RETENTION POLICY TAGS - Techniques to manage retention policy tags are described. A system may comprise a tagging component operative to tag a message with an expiration tag to form an expiration tagged message, the expiration tag having expiration information used to expire the expiration tagged message in accordance with a retention policy. The system may further comprise a presentation component communicatively coupled to the tagging component, the presentation component operative to present a view of the expiration tagged message with an expiration field having the expiration information for the expiration tagged message. Other embodiments are described and claimed. | 04-03-2014 |
Patent application number | Description | Published |
20130212683 | Systems and Methods for Managing Data Incidents - Systems and methods for managing a data incident are provided herein. Exemplary methods may include receiving data breach data that comprises information corresponding to the data breach, automatically generating a risk assessment from a comparison of data breach data to privacy rules, the privacy rules comprising at least one federal rule and at least one state rule, each of the rules defining requirements associated with data breach notification laws, and providing the risk assessment to a display device that selectively couples with the risk assessment server. | 08-15-2013 |
20130212692 | Systems and Methods for Managing Data Incidents - Systems and methods for managing a data incident are provided herein. Exemplary methods may include receiving data breach data that comprises information corresponding to the data breach, automatically generating a risk assessment from a comparison of data breach data to privacy rules, the privacy rules comprising at least one federal rule and at least one state rule, each of the rules defining requirements associated with data breach notification laws, and providing the risk assessment to a display device that selectively couples with the risk assessment server. | 08-15-2013 |
20140304822 | Systems and Methods for Managing Data Incidents - Systems and methods for managing a data incident are provided herein. Exemplary methods may include receiving data breach data that comprises information corresponding to the data breach, automatically generating a risk assessment from a comparison of data breach data to privacy rules, the privacy rules comprising at least one federal rule and at least one state rule, each of the rules defining requirements associated with data breach notification laws, and providing the risk assessment to a display device that selectively couples with the risk assessment server. | 10-09-2014 |