Methods, systems, and computer program products for electronic signature systems. Multiple components are operatively interconnected to carry out operations for securing e-signatures applied to content objects. A data processing system that interacts with user devices over a network that carries e-signature events raised by the user devices is configured to implement a content management system (CMS) that maintains a single CMS e-signature object within an object storage repository. The single CMS e-signature object is representative of multiple different versions or renditions of CMS objects. Upon an e-sign event, the data processing system modifies the single CMS e-signature object. Human cognition is aided by presentation of two different and independently operable graphical user interface (GUI) renderings, wherein a first rendering presents the single CMS e-signature object and wherein a second rendering displays at least some of the multiple different versions or renditions or properties that constituent the single CMS e-signature object.
Methods, systems, and computer program products for gathering electronic signatures to be applied to collaboration system content objects (e.g., contracts, letters, insurance claims, riders, etc.). A collaboration system monitors changes made to the collaboration system content objects during electronic signature processing. A module of the content management system is configured to associate one or more instances of e-signing metadata to one or more of the stored content objects of the content management system. The e-signing metadata indicates whether or not a particular portion of the one or more of the stored content objects has been e-signed by a designated e-signatory. A collaborator who is not one of the designated e-signatories makes a change to one or more of the stored content objects (e.g., contracts, letters, insurance claims, riders, etc.). The change is remediated on-the-fly and the e-signing process continues without having to restart the e-signing process from the beginning.
G06Q 10/101 - Collaborative creation, e.g. joint development of products or services
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
3.
METHODS AND SYSTEMS FOR MAKING FILE REQUESTS IN A COLLABORATION ENVIRONMENT
Embodiments of the disclosure provide systems and methods for obtaining content for a workspace of a collaboration environment. According to one embodiment, requesting and obtaining one or more content items for a workspace of a collaboration environment can comprise generating a content request identifying the one or more content items and metadata for the one or more content items requested from a submitter. The content request can be provided to a computing device associated with the submitter. A determination can be made as to whether the content item can be submitted anonymously. In response to determining the content items may be submitted anonymously, the content items and the metadata can be obtained while maintaining the anonymity of the submitter.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable computer software for document management; Downloadable file sharing software; Downloadable mobile applications for accessing, controlling access to, uploading, downloading, creating, viewing, editing, printing, storing, managing, exchanging, publishing, distributing, transferring, securing, and sharing digital media, information, data, documents, files, text, multimedia, graphics, images, photographs, videos, digital audio, music, and electronic messages; natural language processing, generation, understanding and analysis using artificial intelligence (AI); Downloadable computer software using artificial intelligence (AI) for natural language processing, generation, understanding and analysis; data processing, generation, understanding and analysis; processing, analyzing, organizing, and managing files and documents and defining, generating, extracting, editing, and displaying metadata; processing, analyzing, and managing multimedia, video, audio, and images; data security; Downloadable computer software for the collection, editing, organizing, modifying, book marking, transmission, storage, and sharing of data and information; Downloadable software for cloud storage of data; cloud content management; accessing, controlling access to, uploading, downloading, creating, viewing, editing, printing, storing, managing, exchanging, publishing, distributing, transferring, securing, and sharing digital media, information, data, documents, files, text, multimedia, graphics, images, photographs, videos, digital audio, music, and electronic messages; Downloadable computer programs for downloading, uploading, sharing, editing, and saving electronic documents hosted on a cloud storage platform; Downloadable chatbot software using artificial intelligence (AI) for natural language processing, generation, understanding and analysis Providing temporary use of online non-downloadable file sharing software; Electronic data storage; Electronic storage of digital images; Electronic storage of files and documents; Electronic storage of digital audio files; Electronic storage of digital video files; Cloud storage services for electronic data; Cloud storage services for electronic files; Hosting of digital content on the Internet; Computer services, namely, cloud hosting provider services; File sharing services, namely, providing a website featuring technology enabling users to upload and download electronic files; Providing a secure electronic online system featuring technology which allows electronic storage of files, documents, and digital media; Computer services, namely, providing application servers, web servers, file servers, co-location servers, load balancing servers, redundancy servers, media servers and database servers to others; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Platform as a service (PAAS) featuring computer software platforms for managing retention, preservation, classification, access control, security policy control, compliance management, deletion, and disposition of electronic files and documents; cloud content management; the collection, editing, organizing, modifying, book marking, transmission, storage, and sharing of data and information; Software as a service (SAAS) services featuring software using artificial intelligence (AI) for data processing, generation, understanding and analysis; Providing on-line non-downloadable software for cloud storage of data; file sharing; document management; collaborating on shared documents; Providing temporary use of on-line non-downloadable cloud computing software for use in electronic storage of data; Artificial intelligence as a service (AIAAS) services featuring software using artificial intelligence (AI) for processing, analyzing, organizing, and managing files and documents and defining, generating, extracting, editing, and displaying metadata; Providing on-line non-downloadable software using artificial intelligence (AI) for natural language and data processing, generation, understanding and analysis; processing, analyzing, and managing multimedia, video, audio, and images; natural language processing, generation, understanding and analysis; workflow management and facilitating business processes; data security; Software as a service (SAAS) services featuring software for accessing, controlling access to, uploading, downloading, creating, viewing, editing, printing, storing, managing, exchanging, publishing, distributing, transferring, securing, and sharing digital media, information, data, documents, files, text, multimedia, graphics, images, photographs, videos, digital audio, music, and electronic messages; Electronic storage of files, documents, and digital media; Providing a website for the electronic storage of files, documents, text, digital images, digital audio files, and digital video files; Providing a web site featuring technology that enables users to create, bookmark, annotate, and publicly share data
42 - Scientific, technological and industrial services, research and design
Goods & Services
Providing online non-downloadable workflow management software; Providing temporary use of online non-downloadable file sharing software; Electronic data storage; Electronic storage of digital images; Electronic storage of files and documents; Electronic storage of digital audio files; Electronic storage of digital video files; Providing a secure electronic online system featuring technology which allows electronic storage of files, documents, and digital media; Cloud storage services for electronic data; Cloud storage services for electronic files; Hosting of digital content on the Internet; Computer services, namely, cloud hosting provider services; File sharing services, namely, providing a website featuring technology enabling users to upload and download electronic files; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, providing application servers, web servers, file servers, co-location servers, load balancing servers, redundancy servers, media servers and database servers to others; Platform as a service (PAAS) featuring computer software platforms for no-code development of computer software applications; no-code development of webpages and web applications; managing retention, preservation, classification, access control, security policy control, compliance management, deletion, and disposition of electronic files and documents; cloud content management; the collection, editing, organizing, modifying, book marking, transmission, storage, and sharing of data and information; Providing temporary use of on-line non-downloadable software for cloud storage of data; file sharing; document management; collaborating on shared documents; processing and analyzing files and documents and defining, generating, extracting, editing, and displaying metadata; Providing temporary use of on-line non-downloadable cloud computing software for use in electronic storage of data; Providing on-line non-downloadable software using artificial intelligence (AI) for natural language and data processing, generation, understanding and analysis; Software as a service (SAAS) services featuring software for automating document management and filing; designing, creating, customizing, editing, maintaining, and viewing data dashboards; designing, creating, customizing, editing, maintaining, and viewing digital dashboards featuring information and metadata extracted and generated from documents, files, text, spreadsheets, multimedia, graphics, images, videos, digital audio, music, and electronic messages; developing customized web pages and other data feed formats featuring user-defined information; accessing, controlling access to, uploading, downloading, creating, viewing, editing, printing, storing, managing, exchanging, publishing, distributing, transfering, securing, and sharing digital media, information, data, documents, files, text, multimedia, graphics, images, photographs, videos, digital audio, music, and electronic messages; Artificial intelligence as a service (AIAAS) services featuring software using artificial intelligence (AI) for processing and analyzing files and documents and defining, generating, extracting, editing, and displaying metadata; Electronic storage of files, documents, and digital media; Providing a website for the electronic storage of files, documents, text, digital images, digital audio files, and digital video files; Providing a web site featuring technology that enables users to create, bookmark, annotate, and publicly share data
6.
GENERATING A LARGE LANGUAGE MODEL PROMPT BASED ON COLLABORATION ACTIVITIES OF A USER
Methods, systems, and computer program products for managing interactions between a content management system (CMS) and a large language model (LLM) system. The semantics of user questions can be considered before prompting an LLM, or alternatively, before querying datasets that are local to the CMS. Given a user question to be answered, the embedding of the user question can be matched against preconfigured sample question embeddings to determine a best match. A prompt corresponding to the determined best match is then configured based on identification of the class or classes that correspond to the matched question. Prompts for provision to LLMs can be synthesized based on a particular user's identity and/or based on the particular user's historical collaboration activities over objects of the CMS. The LLM can be hosted by a third-party provider. Alternatively all or portions of a large language model system can be hosted within the CMS.
A method for processing content management system workflows. Systems and subsystems are established for configuring a content management system to implement workflow processes wherein the content management system (CMS) exposes instances of stored content objects to a plurality of user devices through an electronic interface. Further systems and subsystem are established for identifying metadata maintained by the CMS for the stored content objects, and for identifying a generative AI entity (GAIE) to interact with the CMS. On an ongoing basis, the foregoing systems and subsystems carry out steps for (1) forming a GAIE prompt, wherein the GAIE prompt comprises at least a portion of the metadata identified from the CMS for the stored content objects, (2) receiving a response from the GAIE, wherein the response corresponds to the GAIE prompt; and (3) using, by the CMS, the response from the GAIE to implement processing of a content management system workflow.
Methods, systems, and computer program products for managing interactions between a content management system (CMS) and a large language model (LLM) system. The semantics of user questions can be considered before prompting an LLM, or alternatively, before querying datasets that are local to the CMS. Given a user question to be answered, the embedding of the user question can be matched against preconfigured sample question embeddings to determine a best match. A prompt corresponding to the determined best match is then configured based on identification of the class or classes that correspond to the matched question. Prompts for provision to LLMs can be synthesized based on a particular user's identity and/or based on the particular user's historical collaboration activities over objects of the CMS. The LLM can be hosted by a third-party provider. Alternatively all or portions of a large language model system can be hosted within the CMS.
Methods, systems, and computer program products for managing interactions between a content management system (CMS) and a large language model (LLM) system. The semantics of user questions can be considered before prompting an LLM, or alternatively, before querying datasets that are local to the CMS. Given a user question to be answered, the embedding of the user question can be matched against preconfigured sample question embeddings to determine a best match. A prompt corresponding to the determined best match is then configured based on identification of the class or classes that correspond to the matched question. Prompts for provision to LLMs can be synthesized based on a particular user's identity and/or based on the particular user's historical collaboration activities over objects of the CMS. The LLM can be hosted by a third-party provider. Alternatively all or portions of a large language model system can be hosted within the CMS.
Methods, systems, and computer program products for managing interactions between a content management system (CMS) and a large language model (LLM) system. The semantics of user questions can be considered before prompting an LLM, or alternatively, before querying datasets that are local to the CMS. Given a user question to be answered, the embedding of the user question can be matched against preconfigured sample question embeddings to determine a best match. A prompt corresponding to the determined best match is then configured based on identification of the class or classes that correspond to the matched question. Prompts for provision to LLMs can be synthesized based on a particular user's identity and/or based on the particular user's historical collaboration activities over objects of the CMS. The LLM can be hosted by a third-party provider. Alternatively all or portions of a large language model system can be hosted within the CMS.
Systems and methods of real time notification of activities that occur in a web-based collaboration environment are disclosed. In one aspect, embodiments of the present disclosure include a method, which may be implemented on a system, for selecting a recipient of a notification an activity according to criteria determined based on a workspace in which the activity was performed in the online collaboration platform and/or sending the notification of the activity to the recipient such that the recipient is notified in real time or near real time to when the activity occurred.
Content object operations over content objects of a content management system are prioritized to be performed immediately, or at a later time. The immediate scheduling of an operation is determined by policies, rules, and/or predictive model outcomes. The determination for later time scheduling is based on analysis of a history of events on content objects. If the content object operation is deemed to be at least potentially delayable to a later time, then a scheduling model is consulted to determine an urgency of performing the content object operation on the content object. The urgency value resulting from consulting the scheduling model is combined with then-current resource availability to determine a timeframe for performance of the content object operation on the content object relative to other entries in a continuously updated list of to-be-performed operations. The performance of the content object operation on the content object is initiated in due course.
Methods, systems and computer program products for managing workflows between multiple third-party systems. A content management system stores a workflow that operates over content objects by invoking third-party applications. The content management system invokes these third-party applications, and these applications make modifications to the progression of the workflows as the third-party applications carry-out their specific portions of the workflow. Upon receipt of a workflow variable value from a first third-party application, the content management system determines the semantics of the workflow variable value and caries out a next portion of the workflow. The content management system then invokes a further next portion of the workflow to be carried out by a second third-party application. Upon receipt of a workflow variable value from the second third-party application, the content management system determines the semantics of the workflow variable value to then carry out yet a further portion of the workflow.
Disclosed is an improved systems, methods, and computer program products that performs user behavior analysis to identify malicious behavior in a computing system. The approach may be implemented by generating feature vectors for two time periods, performing scoring, and then performing anomaly detection.
H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Methods, systems and computer program products for recommendation systems. Embodiments commence by gathering a set of pathnames that refer to content objects of a collaboration system. A tokenizer converts at least some of the pathnames into vectors. The vectors comprise hierarchical path components such as folder names or file names, which vectors are labeled with an indication as to whether or not the folder or file referred to in a particular vector had been clicked on by one or more users. Some portion of the labeled vectors are used to train a predictive model. Collaboration recommendations may be generated that pertain to security-related recommendations.
Methods, systems, and computer program products for automated document generation within a collaboration system. Multiple components are operatively interconnected to carry out automated document generation operations. Collaboration activity limitations are enforced over newly-generated documents. The document generation process produces newly-generated documents and other outputs that are stored in the collaboration system. Operational elements of the collaboration system are able to access the generated document and other document generation system outputs to perform content analysis. Based at least in part on results of the content analysis, characteristics of the generated document and characteristics of the corresponding document system I/O, the collaboration system assigns and/or modifies access parameters of the newly-generated document and its metadata. The access parameters control ongoing enforcement of document handling policies. The document generation process gathers information from third-party systems to produce situation- or application-specific generated documents.
G06F 16/908 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
H04L 65/1093 - In-session procedures by adding participantsIn-session procedures by removing participants
17.
THIRD PARTY RESOLUTION OF TEMPLATE PARAMETERS DURING AUTOMATED DOCUMENT GENERATION PROCESSING
Methods, systems, and computer program products for automated document generation within a collaboration system. Multiple components are operatively interconnected to carry out automated document generation operations. Collaboration activity limitations are enforced over newly-generated documents. The document generation process produces newly-generated documents and other outputs that are stored in the collaboration system. Operational elements of the collaboration system are able to access the generated document and other document generation system outputs to perform content analysis. Based at least in part on results of the content analysis, characteristics of the generated document and characteristics of the corresponding document system I/O, the collaboration system assigns and/or modifies access parameters of the newly-generated document and its metadata. The access parameters control ongoing enforcement of document handling policies. The document generation process gathers information from third-party systems to produce situation- or application-specific generated documents.
Methods, systems, and computer program products for detection of personally identifiable information (PII). A first detector and a second detector are configured to interoperate. The first detector is different from the second detector and the second detector incurs a greater computational cost than the first detector when processing identical content. Content is presented to the first detector so as to implement a first type of PII detection that is based at least in part on regular expression analysis using regular expressions. The content is presented to the second detector. The second detector performs PII detection based on content analysis that is different from the first detector's regular expression analysis. The second detector causes generation of new regular expressions based on the content analysis and the first detector is updated with such new regular expressions. Performance of the first detector is continually improved as new regular expressions are generated.
Systems and methods for folder synchronization and offline synchronization via a mobile platform in a web-based collaboration environment are disclosed. One embodiment includes synchronizing user selected folders and/or sub-folders via the mobile platform, using portable devices including smart phones and tablets using any mobile operating system to allow offline access. Child or sub-folders of the selected folders and/or sub-folders are automatically detected and synchronized for offline access. Any change or new content detected on the client side or on the server side is also synchronized such that the selected folders and/or sub-folders on the client and server sides are up to date.
G06F 16/00 - Information retrievalDatabase structures thereforFile system structures therefor
G06F 16/176 - Support for shared access to filesFile sharing support
G06F 16/178 - Techniques for file synchronisation in file systems
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
Disclosed is an improved systems, methods, and computer program products that use a cluster-based probability model to perform anomaly detection, where the clusters are based upon entities and interactions that exist in content management platforms.
According to one embodiment, a method for performing domain-wide authentication and authorization in a cloud-based environment can comprise receiving, from a third-party service of the cloud-based environment, a request to perform authentication and authorization of a user of the third-party service for accessing a cloud-based storage system of the cloud-based environment. A mapping of the user of the third-party service to a user account of the cloud-based storage system can be generated and one or more tokens for the user of the third-party service can in turn be generated based on the mapping of the user of the third-party service to the user account of the cloud-based storage system. The one or more tokens can provide access to services of the cloud-based storage system. The one or more tokens can be provided to the third-party service.
Methods, systems, and computer program products for content management systems. Multiple components are operatively interconnected to carry out operations for content management systems. Content objects of a content management system (CMS) are managed from original creation through to final disposition (e.g., deletion). The CMS communicates with a security threat management facility (STMF). In operation, the STMF establishes a first set of security parameters corresponding to information derived from packet inspection, whereas the CMS establishes a second set of security parameters corresponding to information derived at least in part by analysis of user activities or contents of the content object. A security perimeter is formed by combining the first set of security parameters and a second set of security parameters. Risks or vulnerabilities corresponding to the content object are minimized by choosing the lower of any two compared parameters to define a lower risk perimeter for the content object.
Methods, systems, and computer program products for content management systems. Multiple components are operatively interconnected to carry out operations for content management systems. A security threat management facility (STMF) is identified. The STMF contains a database of threat assessment values in addition to further information pertaining to one or more users. Concurrent with operation of the STMF, a content management system (CMS) tracks user-initiated content object interaction events. Based on analysis of the tracked user-initiated content object interaction events, a further threat assessment value is generated by the CMS. Such a further threat assessment is determined based on one or more user-to-user relationships or one or more user-to-file relationships as determined at the content management system. An augmented threat assessment is formed using both the threat assessment values of the STMF with the further threat assessment value from the CMS. The augmented threat assessment is then provided to the STMF.
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
A recommendation system integrated with a content management system (CMS). The CMS stores instances of shared content objects and coordinates user interactions by and between a plurality of CMS users. Shared content objects are divided into a plurality of portions, after which any user interactions over the various portions of the content object are observed and analyzed. User interest inferences are drawn from analysis of the observed user interactions taken user over respective particular portions of the content object. Based on the inferred user interests, fine-grained recommendations are formed and propagated. Some fine-grained recommendations refer to further content objects (e.g., content objects of different types). Some fine-grained recommendations are propagated to other CMS users (e.g., to a plurality of CMS users that are related in some way). The fine-grained recommendations refer to one or more specific portions of a content object as well as to the content object itself.
H04N 21/25 - Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication or learning user preferences for recommending movies
H04N 21/258 - Client or end-user data management, e.g. managing client capabilities, user preferences or demographics or processing of multiple end-users preferences to derive collaborative data
25.
WEB MEETING INTEGRATIONS WITH CONTENT MANAGEMENT SYSTEMS
Methods, systems, and computer program products. A virtual canvas is presented in an active area of an online meeting facility that renders participant-specific online virtual canvas interactions raised by a respective plurality of users' devices. Users can see and hear each other's interactions during an virtual canvas session. Annotations include drawings, content object edits, voice annotations, etc. that correspond to a displayed portion of a content object of a content management system (CMS). Based on the interactions and/or inferences made based on those interactions, the virtual canvas system generates commands to be executed by the content management system. Characteristics of interactions between users can be enriched by drawing information from the content management system and using such information in combination with the interactions themselves. The CMS can recommend teams, and action items, and the CMS can provide hints to participants, so as to facilitate more effective engagement between the participants.
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
G06F 40/169 - Annotation, e.g. comment data or footnotes
26.
CONTENT MANAGEMENT SYSTEM INTEGRATIONS WITH WEB MEETINGS
Methods, systems, and computer program products. A virtual canvas is presented in an active area of an online meeting facility that renders participant-specific online virtual canvas interactions raised by a respective plurality of users' devices. Users can see and hear each other's interactions during an virtual canvas session. Annotations include drawings, content object edits, voice annotations, etc. that correspond to a displayed portion of a content object of a content management system (CMS). Based on the interactions and/or inferences made based on those interactions, the virtual canvas system generates commands to be executed by the content management system. Characteristics of interactions between users can be enriched by drawing information from the content management system and using such information in combination with the interactions themselves. The CMS can recommend teams, and action items, and the CMS can provide hints to participants, so as to facilitate more effective engagement between the participants.
Scalable architectures, systems, and services are provided herein for generating jobs by applying user-specified rules to events in an action log framework (ALF) stream is disclosed. More specifically, collaboration environments can include features or mechanisms that allow end-users or collaborators to perform a variety of actions such as, for example, file uploads and previews, or collaboration operations such as, for example, task assignment and comments. These actions can be captured or logged by an action log framework and, as described herein, automatically translated into one or more jobs by applying customizable user-specified rules.
Methods, systems and computer program products for content management systems. The techniques of the methods, systems and/or computer program products automatically determine activity-based content object access permissions and/or make a recommendation of activity-based content object access permissions. A machine learning model is formed from observations of user interactions over a plurality of content objects. The model is continually updated based on ongoing observation and analysis of user interaction events. When a collaborative relationship is formed between an invitor and one or more invitees, the activity-based permissions model is accessed to determine a set of access permissions to assign to the collaborative relationship. A single collaborative relationship may cover many collaboration objects. In some cases, a set of access permissions are automatically assigned to the collaborative relationship. In other cases, a set of access permissions is presented to the invitor as a recommendation. A user can accept or reject any recommendation.
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
G06F 16/11 - File system administration, e.g. details of archiving or snapshots
G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine
G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
Methods, systems and computer program products for content management systems. In a computing environment having multiple interconnected computer systems, one or more network communication links between a first computer system that hosts a first application and a second computer system that hosts one or more second applications are established. The first computer system hosts a plurality of shared content objects that can be operated over by any second applications that are interfaced with the first application. Particular interaction events over a shared content object take place at the second applications and/or at the interfaces between the first and second applications. Such particular interaction events are recorded as they occur, after which, based on event attributes associated with the particular interaction events, at least one workflow of the first application is selected. The selected workflow of the first application is executed to perform operations over the shared content object.
Embodiments of the disclosure provide systems and methods for identifying collaborators on migrated content and determining which, if any, of those collaborators should be allowed access to the content on the target system of that migration. According to one embodiment, a method for migrating content and a plurality of collaborators on the content from a source system to a target system can comprise initiating, by a migration control system, migration of the content from the source system to the target system and analyzing, by the migration control system, while the migration is being conducted, the content being migrated from the source system to the target system. One or more policies can be applied to the content and the plurality of collaborators on the content being migrated from the source system to the target system by the migration control system while the migration is being conducted.
Embodiments of the disclosure provide systems and methods for reducing the capacity used to provide High Availability (HA) and Disaster Recovery (DR) in a distributed computing environment. According to one embodiment, dynamic recovery of a cloud-based resource can comprise setting a current latency value to an initial latency value and handling received requests with the current latency value. Current resource utilization can be detected while requests are being processed and a determination can be made as to whether the detected current resource utilization exceeds a predetermined threshold amount of resource utilization. In response to determining the detected current resource utilization does not exceed the threshold, the current latency amount can be maintained at the initial latency value. In response to determining the detected current resource utilization exceeds the threshold, the current latency value can be adjusted and injected into handling of received client requests.
Systems and methods for forming collaboration recommendations. Techniques for forming event-based recommendations use time-decayed event values. A shared content management system supports a plurality of users that generate events by interacting with content objects of the shared content management system. Events over the content objects are captured as event objects. Method steps are invoked upon receiving event objects that describes user-to-object interaction events that arise from interactions by users over content objects. Different types of interactions carry different importance values. The importance values can be applied as weights when scoring user-to-object interaction activities. The importance can decay over time. As time progresses and as the importance of older interactions decay, score components of a user-to-object interaction can be updated based at least in part on a time decay function. The system emits collaboration recommendations based on the decayed user-to-user collaboration scores.
A server in a cloud-based environment interfaces with storage devices that store shared content accessible by two or more users. Individual items within the shared content are associated with respective object metadata that is also stored in the cloud-based environment. Download requests initiate downloads of instances of a virtual file system module to two or more user devices associated with two or more users. The downloaded virtual file system modules capture local metadata that pertains to local object operations directed by the users over the shared content. Changed object metadata attributes are delivered to the server and to other user devices that are accessing the shared content. Peer-to-peer connections can be established between the two or more user devices. Object can be divided into smaller portions such that processing the individual smaller portions of a larger object reduces the likelihood of a conflict between user operations over the shared content.
H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
G06F 12/0891 - Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches using clearing, invalidating or resetting means
G06F 12/122 - Replacement control using replacement algorithms of the least frequently used [LFU] type, e.g. with individual count value
H04L 67/06 - Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
H04N 19/40 - Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using video transcoding, i.e. partial or full decoding of a coded input stream followed by re-encoding of the decoded output stream
Methods, systems and computer program products for shared content management systems that provide performance analytics pertaining to a project. Embodiments include establishing one or more network communication links between a content management system that manages a plurality of shared content objects and a plurality of applications that cause modifications to the shared content objects in accordance with workflows of the project. Iteraction events that correspond to modifications over the shared content objects are recorded such that interaction events associated with the plurality of applications are selected based at least in part on attributes associated with the interaction events. Relationships between the recorded interaction events such as time durations between certain of the interaction events are calculated. Project performance measurements are generated based on the calculations and/or based on other relationships between the interaction events. The calculations may span across many different applications and/or many different departments and/or many different enterprises.
G06Q 10/0637 - Strategic management or analysis, e.g. setting a goal or target of an organisationPlanning actions based on goalsAnalysis or evaluation of effectiveness of goals
G06Q 10/0639 - Performance analysis of employeesPerformance analysis of enterprise or organisation operations
G06Q 30/0201 - Market modellingMarket analysisCollecting market data
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable computer software for document management;
downloadable file sharing software; downloadable software
for enabling users to access, upload, download, create,
view, edit, print, store, exchange, publish, distribute,
transfer, secure, share, transmit, control access to and
manage digital media and information, data, documents,
files, text, graphics, images, photographs, and electronic
messages and to manage, organize, distill, query, interpret,
and create workflow with such content collaboratively online
and offline leveraging ai technology; downloadable software
for creating, generating, editing, querying, interpreting,
distilling, summarizing, and managing content leveraging ai
technology, and for providing chatbot software for
simulating conversations; recorded software for creating,
generating, editing, querying, interpreting, distilling,
summarizing, and managing content leveraging ai technology,
and for providing chatbot software for simulating
conversations; recorded software for enabling users to
access, upload, download, create, view, edit, print, store,
exchange, publish, distribute, transfer, secure, share,
transmit, control access to and manage digital media and
information, data, documents, files, text, graphics, images,
photographs, and electronic messages and to manage,
organize, distill, query, interpret, and create workflow
with such content collaboratively online and offline
leveraging ai technology. Providing temporary use of online non-downloadable software
enabling users to upload and download electronic files via a
website; providing on-line non-downloadable software for
creating, generating, editing, querying, interpreting,
distilling, summarizing, and managing content leveraging ai
technology, and for providing chatbot software for
simulating conversations; providing on-line non-downloadable
software for enabling users to access, upload, download,
create, view, edit, print, store, exchange, publish,
distribute, transfer, secure, share, transmit, control
access to and manage digital media and information, data,
documents, files, text, graphics, images, photographs, and
electronic messages and to manage, organize, distill, query,
interpret, and create workflow with such content
collaboratively online and offline leveraging ai technology;
providing temporary use of online non-downloadable file
sharing software; software as a service (saas) services
featuring software for creating, generating, editing,
querying, interpreting, distilling, summarizing, and
managing content leveraging ai technology, and for providing
chatbot software for simulating conversations; software as a
service (saas) services featuring software for enabling
users to access, upload, download, create, view, edit,
print, store, exchange, publish, distribute, transfer,
secure, share, transmit, control access to and manage
digital media and information, data, documents, files, text,
graphics, images, photographs, and electronic messages and
to manage, organize, distill, query, interpret, and create
workflow with such content collaboratively online and
offline leveraging ai technology.
Methods, systems, and computer program products for content management systems. Multiple components are operatively interconnected to carry out operations for establishing a user device trust level. A content management system facilitates interactions between a plurality of user devices and a plurality of shared content objects. The plurality of user devices are network connected to the content management system. One of the user devices issues a request to access a particular one of the content objects. Responsive to the request, a two-step device check is performed before granting access to the particular one of the content objects. A first step of the two-step device check process is based on environmental information, and a second step of the two-step device check process is based at least in part on analysis of the content of the particular one of the content objects. The actual bits of the content object itself are inspected.
Systems, methods and computer program products for high-performance, low latency start-up of large shared media files. A method for low latency startup with low defect playback commences upon identifying a first media file having a first format to be converted to a second media file having a second format. A scheduler divides the first media file into multiple partitions separated by partition boundaries. The method continues by converting the partitions into respective converted partitions that comport with the second format. Determinations as to the position of the partition boundaries is made based on measurable conditions present at a particular moment in time. Different formats receive different treatment based on the combination of characteristics of the first format, characteristics of the second format, as well as on characteristics of measurable conditions present at the moment in time just before conversion of a segment.
H04N 19/40 - Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using video transcoding, i.e. partial or full decoding of a coded input stream followed by re-encoding of the decoded output stream
G06F 12/0891 - Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches using clearing, invalidating or resetting means
G06F 12/1081 - Address translation for peripheral access to main memory, e.g. direct memory access [DMA]
G06F 12/122 - Replacement control using replacement algorithms of the least frequently used [LFU] type, e.g. with individual count value
G06F 16/11 - File system administration, e.g. details of archiving or snapshots
G06F 16/17 - Details of further file system functions
G06F 16/172 - Caching, prefetching or hoarding of files
G06F 16/174 - Redundancy elimination performed by the file system
G06F 16/176 - Support for shared access to filesFile sharing support
H04L 67/00 - Network arrangements or protocols for supporting network services or applications
H04L 67/06 - Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Management of web conference assets in a content management system. At the conclusion of a web conferencing session, an event is raised at the content management system. Various web conference assets (e.g., recordings) and web conference parameters are analyzed in conjunction with content management system metadata. Based on the analysis, one or more actions to perform on the web conference assets are determined. The content management system metadata may include user profile information of at least one web conference participant. Rules and/or a classification model that considers then-current conditions at the content management system are used singly, or in combination, to determine action characteristics and/or labels such as a retention period or security classifications to apply to the web conference assets. The web conference assets are stored in a hierarchical directory at the content management system. The hierarchy of the directory is derived from aspects of the web conferencing facility.
Handling user-demanded privacy controls over data of an electronic document collaboration system. A storage facility is configured to store content objects and associated metadata that pertains to the content objects. A user raises a privacy action request that comprises a demand to change how certain content objects that contain personally identifiable information (PII) of the user are handled. A plurality of content objects are classified using a PII classifier that is trained using synthetically-generated training set entries where, rather than reading actual contents from electronic documents of the collaboration system to generate training set entries, instead, the training set entries are generated using words that are randomly selected from a repository of natural language words. When PII corresponding to the user who raised the privacy action request is discovered in content objects, then the content management system modifies those content objects and/or its metadata in accordance with the demand.
Techniques for monitoring local and/or remote file systems by a synchronization component (e.g., client/server) of a cloud-based platform are disclosed. In some embodiments, a method of building synchronization events by a synchronization component (e.g., a synchronization server/client) includes obtaining a set of items that have been changed and their new states and retrieving last known states of the set of items that are stored in a reference snapshot inside a filesystem scanner. The method further includes generating differences between the new states and the last known states of the set of items as item changes and utilizing information provided by the item changes to translate the item changes into synchronization events for execution on the opposing file system. A method of handling failed synchronization events by a synchronization component of the cloud-based platform by collapsing a subsequent event with the failed synchronization event is also disclosed.
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
(1) Downloadable computer software for document management; downloadable file sharing software; downloadable software for enabling users to access, upload, download, create, view, edit, print, store, exchange, publish, distribute, transfer, secure, share, transmit, control access to and manage digital media and information, data, documents, files, text, graphics, images, photographs, and electronic messages and to manage, organize, distill, query, interpret, and create workflow with such content collaboratively online and offline leveraging ai technology; downloadable software for creating, generating, editing, querying, interpreting, distilling, summarizing, and managing content leveraging ai technology, and for providing chatbot software for simulating conversations; recorded software for creating, generating, editing, querying, interpreting, distilling, summarizing, and managing content leveraging ai technology, and for providing chatbot software for simulating conversations; recorded software for enabling users to access, upload, download, create, view, edit, print, store, exchange, publish, distribute, transfer, secure, share, transmit, control access to and manage digital media and information, data, documents, files, text, graphics, images, photographs, and electronic messages and to manage, organize, distill, query, interpret, and create workflow with such content collaboratively online and offline leveraging ai technology. (1) Providing temporary use of online non-downloadable software enabling users to upload and download electronic files via a website; providing on-line non-downloadable software for creating, generating, editing, querying, interpreting, distilling, summarizing, and managing content leveraging ai technology, and for providing chatbot software for simulating conversations; providing on-line non-downloadable software for enabling users to access, upload, download, create, view, edit, print, store, exchange, publish, distribute, transfer, secure, share, transmit, control access to and manage digital media and information, data, documents, files, text, graphics, images, photographs, and electronic messages and to manage, organize, distill, query, interpret, and create workflow with such content collaboratively online and offline leveraging ai technology; providing temporary use of online non-downloadable file sharing software; software as a service (saas) services featuring software for creating, generating, editing, querying, interpreting, distilling, summarizing, and managing content leveraging ai technology, and for providing chatbot software for simulating conversations; software as a service (saas) services featuring software for enabling users to access, upload, download, create, view, edit, print, store, exchange, publish, distribute, transfer, secure, share, transmit, control access to and manage digital media and information, data, documents, files, text, graphics, images, photographs, and electronic messages and to manage, organize, distill, query, interpret, and create workflow with such content collaboratively online and offline leveraging ai technology.
42.
Synchroniznig files having filenames with illegal characters
Embodiments are directed to synchronizing files between client devices utilizing different file systems with different filename restrictions. Generally speaking, a server of a cloud-based storage environment can, upon generation of a file or receiving a file from a first client device, detect any “illegal” characters therein, i.e., characters that are predefined by a file system of a second client device of the environment as being impermissible for use in a filename, and substitute a replacement character for those illegal characters. This replacement character can comprise a character that is permissible by the file system of both the first and second client devices, thereby allowing synchronization and access. Additionally, the server(s) can identify the original filename from the first client device and substitute the replacement characters back to the original filename when the file is being accessed by or synchronized with the first client device.
Disclosed is an approach for performing auto-classification of documents. A machine learning framework is provided to analyze the document, where labels associated with certain documents can be propagated to other documents.
G06F 16/383 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
Methods, systems, and computer program products for a content management system. Embodiments operate within or in conjunction with such a content management system. The content management system stores content objects for access by various collaborators, including extra-system collaborators. A user of the content management system configures extra-enterprise shared link URLs that permit the extra-system collaborators to access shared content objects over an Internet connection. A shared link event graph data structure is formed based on access requests over the extra-enterprise shared link URLs. An interactive user interface module is generated by processing a shared link report query over the shared link event graph data structure to select a subject set of the extra-enterprise shared link URLs, and to generate a data set of the interactive user interface module based at least in part on results from the query. A user interacts with the interactive user interface module to generate insights.
According to one embodiment, distributing data across a plurality of storage shards can comprise generating a file key for each file of a plurality of files stored in a plurality of physical shards, each physical shard maintained by a node of a plurality of nodes in one or more clusters. The file key can comprise a hash of an enterprise identifier for an entity to which the creator of the file is a member, a hash of a folder identifier for a location in which the file is stored, and a hash of a file identifier uniquely identifying the file. The generated file keys can be sorted into an ordered list and the ordered list can be logically partitioning into a plurality of logical shards. Each logical shard of the plurality of logical shards can then be mapped to one of the plurality of physical shards.
09 - Scientific and electric apparatus and instruments
Goods & Services
Downloadable computer software for document management; Downloadable file sharing software; Downloadable software for enabling users to access, upload, download, create, view, edit, print, store, exchange, publish, distribute, transfer, secure, share, transmit, control access to and manage digital media and information, data, documents, files, text, graphics, images, photographs, and electronic messages and to manage, organize, distill, query, interpret, and create workflow with such content collaboratively online and offline leveraging AI technology; Downloadable software for creating, generating, editing, querying, interpreting, distilling, summarizing, and managing content leveraging AI technology, and for providing chatbot software for simulating conversations; Recorded software for creating, generating, editing, querying, interpreting, distilling, summarizing, and managing content leveraging AI technology, and for providing chatbot software for simulating conversations; Recorded software for enabling users to access, upload, download, create, view, edit, print, store, exchange, publish, distribute, transfer, secure, share, transmit, control access to and manage digital media and information, data, documents, files, text, graphics, images, photographs, and electronic messages and to manage, organize, distill, query, interpret, and create workflow with such content collaboratively online and offline leveraging AI technology
42 - Scientific, technological and industrial services, research and design
Goods & Services
File sharing services, namely, providing a website featuring technology enabling users to upload and download electronic files; Providing on-line non-downloadable software for creating, generating, editing, querying, interpreting, distilling, summarizing, and managing content leveraging AI technology, and for providing chatbot software for simulating conversations; Providing on-line non-downloadable software for enabling users to access, upload, download, create, view, edit, print, store, exchange, publish, distribute, transfer, secure, share, transmit, control access to and manage digital media and information, data, documents, files, text, graphics, images, photographs, and electronic messages and to manage, organize, distill, query, interpret, and create workflow with such content collaboratively online and offline leveraging AI technology; Providing temporary use of online non-downloadable file sharing software; Software as a service (SAAS) services featuring software for creating, generating, editing, querying, interpreting, distilling, summarizing, and managing content leveraging AI technology, and for providing chatbot software for simulating conversations; Software as a service (SAAS) services featuring software for enabling users to access, upload, download, create, view, edit, print, store, exchange, publish, distribute, transfer, secure, share, transmit, control access to and manage digital media and information, data, documents, files, text, graphics, images, photographs, and electronic messages and to manage, organize, distill, query, interpret, and create workflow with such content collaboratively online and offline leveraging AI technology
48.
User device processing of information from a network-accessible collaboration system
Executable code comprising a local file system is stored at a collaboration system server for downloading. The remote collaboration system responds to a message from a user device to download the local file system. The local file system to be downloaded is configured to operate on the user device so as to issue requests from the user device to perform an initial access to server-side collaboration data. The collaboration system responds to such requests by predicting interests of the user, which predictions are used to retrieve additional server-side collaboration data. The additional server-side collaboration data is sent to the user device and stored on the user device in an area for locally-stored collaboration system information. The user provides search terms for searching the locally-stored collaboration system information, and results are displayed on the user device. The results are displayed without the need to perform additional communications with remote collaboration system.
H04L 65/401 - Support for services or applications wherein the services involve a main real-time session and one or more additional parallel real-time or time sensitive sessions, e.g. white board sharing or spawning of a subconference
G06F 16/14 - Details of searching files based on file metadata
G06F 16/16 - File or folder operations, e.g. details of user interfaces specifically adapted to file systems
G06F 16/9535 - Search customisation based on user profiles and personalisation
H04L 67/06 - Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
49.
Real-time modification of application programming interface behavior
Methods, systems, and computer program products for application-specific, real-time modification of application programming interface behavior. Meaning is derived from analysis of human-readable intelligence found in a collaboration object of a content management system. The meaning is used to inform the behavior of an application programming interface that is exposed to applications that interface with the content management system. The content management system invokes a range of analysis modules that examine the human-intelligible contents of a requested collaboration object to determine meaning from the human-intelligible contents. Content-derived tags are emitted based on the analysis. When the application invokes an entry point of the API, a set of content-derived tags are associated with the application, and the occurrence and/or values of the content-derived tags are then used in rules. The results of evaluation of the rules determine how the API will respond to the application.
Embodiments are directed to association of storage objects in a multi-tenant, cloud-based storage environment. More specifically, a first object can be made available in the file system of the environment and can be accessed, for example, by its file or object name. At some point thereafter, an auxiliary object can be provided that is related to the first object. For example, this auxiliary object can comprise metadata or other content associated with or related to the first object. According to one embodiment, this auxiliary object can be assigned an identifier that not only uniquely identifies the auxiliary object but also identifies, within the identifier itself, the relationship to the first object. This relational naming can be used to track the relationship between objects, e.g., to update the auxiliary object based on changes to the first object, but without a separate mapping of the objects.
Methods, systems, and computer program products. A virtual canvas is presented in an active area of an online meeting facility that renders participant-specific online virtual canvas interactions raised by a respective plurality of users' devices. Users can see and hear each other's interactions during an virtual canvas session. Annotations include drawings, content object edits, voice annotations, etc. that correspond to a displayed portion of a content object of a content management system (CMS). Based on the interactions and/or inferences made based on those interactions, the virtual canvas system generates commands to be executed by the content management system. Characteristics of interactions between users can be enriched by drawing information from the content management system and using such information in combination with the interactions themselves. The CMS can recommend teams, and action items, and the CMS can provide hints to participants, so as to facilitate more effective engagement between the participants.
Methods, systems, and computer program products for gathering electronic signatures to be applied to collaboration system content objects (e.g., contracts, letters, insurance claims, riders, etc.). A collaboration system monitors changes made to the collaboration system content objects during electronic signature processing. A module of the content management system is configured to associate one or more instances of e-signing metadata to one or more of the stored content objects of the content management system. The e-signing metadata indicates whether or not a particular portion of the one or more of the stored content objects has been e-signed by a designated e-signatory. A collaborator who is not one of the designated e-signatories makes a change to one or more of the stored content objects (e.g., contracts, letters, insurance claims, riders, etc.). The change is remediated on-the-fly and the e-signing process continues without having to restart the e-signing process from the beginning.
G06Q 10/101 - Collaborative creation, e.g. joint development of products or services
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
Methods, systems and computer program products for shared content management systems. In a content management system that supports multiple applications that operate on shared documents, multiple modules are operatively interconnected to make and present activity-based application recommendations. Techniques for making activity-based application recommendations include recording a series of interaction events from multiple users, which events correspond to a series of interactions performed by a plurality of applications over a shared content object. Constituent interaction events from the series of interactions are analyzed to determine a set of recommended applications. The set of recommended applications is presented to a user in a dynamically-populated user interface.
H04L 65/401 - Support for services or applications wherein the services involve a main real-time session and one or more additional parallel real-time or time sensitive sessions, e.g. white board sharing or spawning of a subconference
H04L 65/403 - Arrangements for multi-party communication, e.g. for conferences
Systems for centralized processing of regulatory control events. A method embodiment applies regulatory compliance rules against regulatory control events that occur at a plurality of heterogeneous remote cloud-based systems. A centralized cloud-based platform manages the compliance of the plurality of heterogeneous remote cloud-based systems by applying a set of data compliance rules pertaining to regulatory controls. The regulatory controls pertain to data access events and data manipulation events that occur on the plurality of computing systems. The centralized cloud-based platform receives control event messages, the control event messages being raised any one or more of the heterogeneous remote cloud-based systems. Rules are processed against the received control event messages to determine a set of compliance actions. Compliance action occurrences are logged in a log facility such that at any moment in time, an audit can be run over the logged events so as to verify and report compliance or non-compliance.
Systems and methods for folder synchronization and offline synchronization via a mobile platform in a web-based collaboration environment are disclosed. One embodiment includes synchronizing user selected folders and/or sub-folders via the mobile platform, using portable devices including smart phones and tablets using any mobile operating system to allow offline access. Child or sub-folders of the selected folders and/or sub-folders are automatically detected and synchronized for offline access. Any change or new content detected on the client side or on the server side is also synchronized such that the selected folders and/or sub-folders on the client and server sides are up to date.
G06F 16/00 - Information retrievalDatabase structures thereforFile system structures therefor
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
G06F 16/176 - Support for shared access to filesFile sharing support
G06F 16/178 - Techniques for file synchronisation in file systems
56.
Configurable metadata-based automation and content classification architecture for cloud-based collaboration platforms
Scalable architectures, systems, and services are provided herein for generating jobs by applying user-specified metadata rules to metadata events. More specifically, the scalable architecture described herein uses metadata to drive automations and/or polices in a cloud-based environment. In one embodiment, the architecture integrates a metadata service with an event-based automation engine to automatically trigger polices and/or automations based on metadata and/or changes in metadata changes. The metadata service can include customizable and/or pre-build metadata templates which can be used to automatically apply a metadata framework (e.g., particular fields) to files based on, for example, the upload or placement of a particular file in a particular folder. The architecture also provides for advanced metadata searching and data classification.
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
H04L 65/403 - Arrangements for multi-party communication, e.g. for conferences
H04L 67/10 - Protocols in which an application is distributed across nodes in the network
H04W 4/60 - Subscription-based services using application servers or record carriers, e.g. SIM application toolkits
G06F 16/11 - File system administration, e.g. details of archiving or snapshots
G06F 16/14 - Details of searching files based on file metadata
09 - Scientific and electric apparatus and instruments
41 - Education, entertainment, sporting and cultural services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable software development kits (SDK). Education services, namely providing a website featuring
on-line non-downloadable educational material in the fields
of the internet, technology, cloud computing, online
collaboration, file sharing and software development (terms
considered too vague by the International Bureau - Rule 13
(2) (b) of the Regulations); educational services, namely,
conducting classes, workshops, conferences, courses, and
seminars in the field of the internet, technology, cloud
computing, online collaboration, file sharing and software
development. Providing information in the fields of the internet,
technology, cloud computing, online collaboration, file
sharing and software development.
Methods, systems, and computer program products for detection of personally identifiable information (PII). A first detector and a second detector are configured to interoperate. The first detector is different from the second detector and the second detector incurs a greater computational cost than the first detector when processing identical content. Content is presented to the first detector so as to implement a first type of PII detection that is based at least in part on regular expression analysis using regular expressions. The content is presented to the second detector. The second detector performs PII detection based on content analysis that is different from the first detector's regular expression analysis. The second detector causes generation of new regular expressions based on the content analysis and the first detector is updated with such new regular expressions. Performance of the first detector is continually improved as new regular expressions are generated.
A user interface is configured to present a stream of activities that arise from operation of two or more heterogeneous applications that access shared content objects of a content management system. A first application of a first type among the heterogeneous applications interoperates with a second application of a second type. Application activity records that correspond to interactions by the second application over the shared content objects are stored. Additional interactions that are raised by the first application and that pertain to a common content object are also stored. When a user requests access to a content object of the content management system, recent application activity records are selected. Some of the selected activity records are filtered out based on permissions attributes corresponding to the content object and/or based on permissions attributes corresponding to the requesting user. An application activity stream is generated based on the selected application activity records.
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
G06F 9/451 - Execution arrangements for user interfaces
H04L 65/403 - Arrangements for multi-party communication, e.g. for conferences
G06F 16/955 - Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
G06F 16/9535 - Search customisation based on user profiles and personalisation
G06F 16/9536 - Search customisation based on social or collaborative filtering
H04L 65/401 - Support for services or applications wherein the services involve a main real-time session and one or more additional parallel real-time or time sensitive sessions, e.g. white board sharing or spawning of a subconference
Embodiments provide for identifying and resolving conflicts in access permissions migrated data by receiving a set of mappings including path mappings of a hierarchy of data objects on the source system to locations on the target system for migrated data objects. Based on the received set of mappings, permissions controlling access to data objects of the hierarchy of data objects on the source system can be translated to permissions controlling access to the migrated data objects on the target system for one or more user accounts on the target system. One or more conflicts can be detected between permissions on the source system and permissions on the target system. A conflict resolution strategy can be selected from a plurality of conflict resolution strategies and the selected conflict resolution strategy can be applied to the permissions controlling access to the migrated data objects on the target system.
Policy-informed e-signature processing. An electronic signature system (ESS) is interfaced to a content management system (CMS) that stores instances of shared files and coordinates policy-informed interactions with the shared files. Upon detection of an occurrence of an e-signature request event, electronic signature processing is carried out in a manner that observes one or more governance policies that control handling of shared files. When responding to an e-signature request event, the CMS observes the governance policies by issuing an electronic query to a database of parameters, wherein the parameters define metes and bounds of the governance policies. Upon determination that at least some of the governance policies at least potentially apply to the e-signature processing, the ESS and/or the CMS modifies metadata pertaining to one or more workflow objects that are associated with a computer-implemented workflow. The workflow may terminate or be terminated based upon the one or more governance policies.
Securely acquiring and managing electronic-based signatures by a content management system. A content management system exposes content objects to a plurality of collaborators. Executable modules of the content management system implement an Internet-based interface that is configured to acquire electronic-based signatures from a user device. A particular user device is configured to access particular content objects over the Internet-based interface and to acquire an electronic-based signature corresponding to one or more of the particular content objects. When one or more conditions are detected that would at least potentially influence how the acquisition of the electronic-based signature is carried out, then one or more remediation actions are invoked. Various security-specific remediation actions address corresponding security vulnerabilities. Various document-specific remediation actions are determined based on the document conditions that had been detected. In some cases, a plurality of remediation actions are carried out to securely acquire electronic-based signatures from a user device.
H04L 29/06 - Communication control; Communication processing characterised by a protocol
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
Scalable architectures, systems, and services are provided herein for generating jobs by applying user-specified rules to events in an action log framework (ALF) stream is disclosed. More specifically, collaboration environments can include features or mechanisms that allow end-users or collaborators to perform a variety of actions such as, for example, file uploads and previews, or collaboration operations such as, for example, task assignment and comments. These actions can be captured or logged by an action log framework and, as described herein, automatically translated into one or more jobs by applying customizable user-specified rules.
G06F 9/451 - Execution arrangements for user interfaces
H04L 65/401 - Support for services or applications wherein the services involve a main real-time session and one or more additional parallel real-time or time sensitive sessions, e.g. white board sharing or spawning of a subconference
Embodiments of the disclosure provide systems and methods for providing random access to segmented and encrypted or compressed data stored in a repository. Retrieving at least a portion of a file stored in a repository can comprise storing a plurality of files in the repository. A request to retrieve at least a portion of one of the plurality of files can be received and object metadata for the requested one of the plurality of files can be obtained. A determination can be made based on the obtained metadata as to whether the requested one of the plurality of files is a multipart file. In response to determining the requested one of the plurality of files is not a multipart file, a single file retrieval process performing and in response to determining the requested one or the plurality of files is a multipart file, a multipart retrieval process can be performed.
G06F 21/78 - Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
H04L 67/06 - Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
A cloud-based content object management system responds to download requests from user devices to provide access to synchronization code. Using the synchronization code, a user device requests, receives, and stores a user-device-local copy of a subject content object. The cloud-based content object management system determines that at least one security-related parameter pertaining to the subject content object has undergone a change and reaches a determination that the user-device-local copy of the subject content object is to be either deleted or quarantined. Upon such determination, the cloud-based content object management system forms eviction instructions and sends them to the user device, which in turn causes deletion or quarantining of the remote content object copy at the user device, while still retaining directory structure metadata that refers to the now evicted subject content object. The subject content object stored at the cloud-based content object management system is synchronized with other user devices.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
(1) Downloadable computer software enabling users to create, edit, download, upload, and share collaborative workspaces and virtual whiteboards; downloadable software enabling users to view, discuss, modify, comment on, embed, and update documents, text, images, voice and video in real time or asynchronously from remote locations featuring collaborative virtual whiteboards and workspaces; downloadable computer software used to create, edit and collaborate on content, documents, text, images, diagrams, information and materials for use in group communication and automated integrations with external service providers featuring collaborative virtual whiteboards and workspace. (1) Providing temporary use of online non-downloadable software enabling users to create, edit, download, upload, and share collaborative workspaces and virtual whiteboards; providing temporary use of online non-downloadable software enabling users to view, discuss, modify, comment on, embed, and update documents, text, images, voice and video in real time or asynchronously from remote locations featuring collaborative virtual whiteboards and workspaces; providing temporary use of online non-downloadable software used to create, edit and collaborate on content, documents, text, images, diagrams, information and materials for use in group communication and automated integrations with external service providers featuring collaborative virtual whiteboards and workspace.
09 - Scientific and electric apparatus and instruments
41 - Education, entertainment, sporting and cultural services
42 - Scientific, technological and industrial services, research and design
Goods & Services
(1) Downloadable software development kits (SDK), namely downloadable computer software development programs for assisting developers in creating and developing computer programs and computer software applications for others. (1) Education services, namely, providing on-line non-downloadable educational digital publications and videos in the fields of the internet, internet technology, computer technology, information technology, cloud computing, cloud-based content management, online collaboration, file sharing services and software development, through a website; educational services, namely, conducting classes, workshops, conferences, courses, and seminars in the field of the internet, internet technology, computer technology, information technology, cloud computing, cloud-based content management, online collaboration, file sharing services and software development.
(2) Providing information in the fields of the internet, technology, cloud computing, online collaboration, file sharing and software development
Management of web conference assets in a content management system. At the conclusion of a web conferencing session, an event is raised at the content management system. Various web conference assets (e.g., recordings) and web conference parameters are analyzed in conjunction with content management system metadata. Based on the analysis, one or more actions to perform on the web conference assets are determined. The content management system metadata may include user profile information of at least one web conference participant. Rules and/or a classification model that considers then-current conditions at the content management system are used singly, or in combination, to determine action characteristics and/or labels such as a retention period or security classifications to apply to the web conference assets. The web conference assets are stored in a hierarchical directory at the content management system. The hierarchy of the directory is derived from aspects of the web conferencing facility.
Embodiments provide systems and methods for performing automated browser testing on different native file types by receiving files of different types. A preview version of each file can be generated and rendered in an output file type. Generating the preview version can be performed by a preview application executed by the testing system and rendering the preview version of the first file can be performed by a browser application executed by the testing system. The output file type can be different from the received file type. For example, the received file type can be a native file type of a first application different from the browser and the output file type comprises an HyperText Markup Language (HTML) file type. A test can be executed on the rendered preview version based on one or more assertions on the first file.
Methods, systems, and computer program products for content management systems. An unlabeled dataset comprising documents that at least potentially comprise personally identifiable information (PII) is used when training a PII content classifier. Such a classifier is trained by (1) determining, based on applying a PII rule to a first portion of a document selected from the unlabeled dataset, a confidence value that the first portion of the document does contain personally identifiable information, (2) selecting a second portion of the document selected from the unlabeled dataset such that the second portion does not include the first portion; and (3) assigning, based on the confidence value, a likelihood value that corresponds to whether characteristics of the second portion are indicative that the document does contain personally identifiable information. Such a PII content classifier is used over selected portions of subject content objects to determine whether the selected portions contain PII.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable software development kits (SDK) Providing computer technology information in the fields of the internet, technology, cloud computing, online collaboration, file sharing and software development
09 - Scientific and electric apparatus and instruments
Goods & Services
Downloadable computer programs for enabling users to download, edit and save electronic documents hosted on a cloud storage platform or for enabling users to edit and save electronic documents directly on one or more cloud storage platform; Downloadable application programming interface (API) software for enabling users to download, edit and save electronic documents hosted on a cloud storage platform or for enabling users to edit and save electronic documents directly on one or more cloud storage platform; Downloadable computer programs for controlling access to cloud storage platforms based on defined security criteria; Downloadable application programming interface (API) software for controlling access to cloud storage platforms based on defined security criteria
41 - Education, entertainment, sporting and cultural services
Goods & Services
Education services, namely, providing a website featuring on-line non-downloadable educational materials in the nature of instructional videos, user guides, support guides, developer guides, training guides, and publications in the nature of guides, journals and manuals, all in the fields of the internet, technology, cloud computing, online collaboration, file sharing and software development; Educational services, namely, conducting classes, workshops, conferences, courses, and seminars in the fields of the internet, technology, cloud computing, online collaboration, file sharing and software development
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable computer software enabling users to create, edit, download, upload, and share collaborative workspaces and virtual whiteboards; downloadable software enabling users to view, discuss, modify, comment on, embed, and update documents, text, images, voice and video in real time or asynchronously from remote locations featuring collaborative virtual whiteboards and workspaces; downloadable computer software used to create, edit and collaborate on content, documents, text, images, diagrams, information and materials for use in group communication and automated integrations with external service providers featuring collaborative virtual whiteboards and workspace Providing temporary use of online non-downloadable software enabling users to create, edit, download, upload, and share collaborative workspaces and virtual whiteboards; providing temporary use of online non-downloadable software enabling users to view, discuss, modify, comment on, embed, and update documents, text, images, voice and video in real time or asynchronously from remote locations featuring collaborative virtual whiteboards and workspaces; providing temporary use of online non-downloadable software used to create, edit and collaborate on content, documents, text, images, diagrams, information and materials for use in group communication and automated integrations with external service providers featuring collaborative virtual whiteboards and workspace
42 - Scientific, technological and industrial services, research and design
Goods & Services
Providing temporary use of online non-downloadable software enabling users to create, edit, download, upload, and share collaborative workspaces and virtual whiteboards; Providing temporary use of online non-downloadable software enabling users to view, discuss, modify, comment on, embed, and update documents, text, images, voice and video in real time or asynchronously from remote locations featuring collaborative virtual whiteboards and workspaces; Providing temporary use of online non-downloadable software used to create, edit and collaborate on content, documents, text, images, diagrams, information and materials for use in group communication and automated integrations with external service providers featuring collaborative virtual whiteboards and workspace
09 - Scientific and electric apparatus and instruments
Goods & Services
Downloadable computer software enabling users to create, edit, download, upload, and share collaborative workspaces and virtual whiteboards; downloadable software enabling users to view, discuss, modify, comment on, embed, and update documents, text, images, voice and video in real time or asynchronously from remote locations featuring collaborative virtual whiteboards and workspaces; Downloadable computer software used to create, edit and collaborate on content, documents, text, images, diagrams, information and materials for use in group communication and automated integrations with external service providers featuring collaborative virtual whiteboards and workspace
Methods, systems and computer program products for content management systems. A content management system is configured to manage a plurality of content objects. Unsupervised learning is performed over the plurality of content objects to identify document templates associated with content objects taken from the plurality of content objects. When a document template is identified, template metadata is associated with the document template. Additional content objects that are similar to the document template can take on the template metadata. In this way, many documents can be automatically populated with template metadata that corresponds to the identified document template. All or portions of the template metadata can be applied to policies, which policies serve to marshal ongoing document handling operations. During learning, document features are extracted and analyzed so as to define feature clusters, which feature clusters are in turn are used to form document template clusters.
Processing user-triggered, broker-assisted workflows. A content management system is configured to host a hierarchy of content objects that are partitioned into two or more user contexts. A first workflow object is configured and then stored into a first one of the two or more user contexts. A computer-implemented service agent is configured to receive a workflow trigger from an event raised in a second one of the two or more user contexts. The computer-implemented service agent executes in the second one of the two or more user contexts while processing the first workflow object using permissions that are associated with the first one of the two or more user contexts. The computer-implemented service agent processes the workflow object in the context of the first one of the two or more user contexts. Results from execution of the workflow objects are provided to the process that raised the workflow trigger.
Methods, systems and computer program products for managing workflows between multiple third-party systems. A content management system stores a workflow that operates over content objects by invoking third-party applications. The content management system invokes these third-party applications, and these applications make modifications to the progression of the workflows as the third-party applications carry-out their specific portions of the workflow. Upon receipt of a workflow variable value from a first third-party application, the content management system determines the semantics of the workflow variable value and caries out a next portion of the workflow. The content management system then invokes a further next portion of the workflow to be carried out by a second third-party application. Upon receipt of a workflow variable value from the second third-party application, the content management system determines the semantics of the workflow variable value to then carry out yet a further portion of the workflow.
Various corpora of content objects and other information sources beyond the corpora of content objects are processed to identify personally identifiable information (PII). PII that is associated with a named person is codified into a first portion of a graph-oriented data structure. Also, PII that is associated with an alias that might refer to a named person is codified into a second portion of the graph-oriented data structure. A determination is made that the alias that might refer to a named person is indeed an alias that is a coreference to the named person. Based on that determination then, since the first portion of the graph and the second portion of the graph refer to the same person, then the PII of the second portion of the graph can be deemed to be PII of the same person. PII in common and/or language processing can be used to establish coreferences.
Methods, systems, and computer program products for integrating content management systems with web conferencing facilities. An overlay annotation generated via a web conferencing facility is associated with a content object of a content management system. Integration code at the web conferencing facility displays a portion of the content object of the content management system. As user generates an overlay annotation during the web conferencing session while the content object is displayed in an interaction window of the web conferencing facility. After the overlay annotation has been captured, the content management system receives the overlay annotation from the web conferencing facility and stores the overlay annotation in an annotation content object separate from the content object of the content management system. Registrations and other associations between the overlay annotation object and the content object itself are stored for either or both of the overlay annotation object and the content object.
G06F 40/106 - Display of layout of documentsPreviewing
G06F 3/04845 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range for image manipulation, e.g. dragging, rotation, expansion or change of colour
G06F 40/169 - Annotation, e.g. comment data or footnotes
H04L 65/403 - Arrangements for multi-party communication, e.g. for conferences
H04L 65/401 - Support for services or applications wherein the services involve a main real-time session and one or more additional parallel real-time or time sensitive sessions, e.g. white board sharing or spawning of a subconference
G06F 16/957 - Browsing optimisation, e.g. caching or content distillation
A web conferencing system is hosted in a first computing environment and is Internet-connected with a content management system hosted in a second computing environment. Upon detection of an occurrence of a file or folder drag-and-drop event at the web conferencing system, the file or folder corresponding to the drag-and-drop event is made available to the content management system. A directory hierarchy of a file system of the content management system is generated on-the-fly. The content management system initiates operations to retrieve and store a copy of the file or folder into the director hierarchy. Access permissions corresponding to locations within the directory hierarchy where the copy of the file or folder is stored are established such that users of the web conferencing system who were not users of the content management system can access the copy of the file or folder that is stored in the content management system.
Various corpora of content objects and other information sources beyond the corpora of content objects are processed to identify personally identifiable information (PII). PII that is associated with a named person is codified into a first portion of a graph-oriented data structure. Also, PII that is associated with an alias that might refer to a named person is codified into a second portion of the graph-oriented data structure. A determination is made that the alias that might refer to a named person is indeed an alias that is a coreference to the named person. Based on that determination then, since the first portion of the graph and the second portion of the graph refer to the same person, then the PII of the second portion of the graph can be deemed to be PII of the same person. PII in common and/or language processing can be used to establish coreferences.
Content object operations over content objects of a content management system are prioritized to be performed immediately, or at a later time. The immediate scheduling of an operation is determined by policies, rules, and/or predictive model outcomes. The determination for later time scheduling is based on analysis of a history of events on content objects. If the content object operation is deemed to be at least potentially delayable to a later time, then a scheduling model is consulted to determine an urgency of performing the content object operation on the content object. The urgency value resulting from consulting the scheduling model is combined with then-current resource availability to determine a timeframe for performance of the content object operation on the content object relative to other entries in a continuously updated list of to-be-performed operations. The performance of the content object operation on the content object is initiated in due course.
Methods, systems, and computer program products for content management systems. Multiple components are operatively interconnected to carry out operations for establishing a user device trust level. A content management system facilitates interactions between a plurality of user devices and a plurality of shared content objects. The plurality of user devices are network connected to the content management system. One of the user devices issues a request to access a particular one of the content objects. Responsive to the request, a two-step device check is performed before granting access to the particular one of the content objects. A first step of the two-step device check process is based on login information, and a second step of the two-step device check process is based at least in part on analysis of the content of the particular one of the content objects. The actual bits of the content object itself are inspected.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable computer software for use with electronic data
verification, in the transmission of electronic documents,
messages, for user authentication, and to facilitate
assignment of a legally binding electronic signature to a
document or file for communication via a global computer
network; downloadable software for managing, providing,
electronically verifying, signing, storing and securely
distributing a document or file; mobile applications for
managing, providing, electronically verifying, signing,
storing and securely distributing a document or file;
downloadable software for the issuance of encrypted digital
signature certificates; downloadable software for electronic
signature verification services; downloadable software for
electronic data management services, namely, verifying
documents and files. Providing non-downloadable software or online services for
generating, obtaining, managing, capturing, storing,
processing, and viewing electronic signature and electronic
signature data; providing non-downloadable software for
electronic data verification; offering a website with
non-downloadable software for electronic data verification
and secure digital transactions via global information works
(term considered too vague by the International Bureau -
Rule 13 (2) (b) of the Regulations); providing a website
featuring non-downloadable software for use with electronic
data verification and secure digital transactions via global
information networks (term considered too vague by the
International Bureau - Rule 13 (2) (b) of the Regulations);
providing non-downloadable software or online services for
signing electronic documents; providing non-downloadable
software for digital signature verification services;
providing non-downloadable software for electronic data
verification services, namely, providing services for the
issuance of legally binding electronic signatures for
documents or files via a global computer network; providing
non-downloadable software or online services for managing,
providing, electronically verifying, signing, storing and
securely distributing a document or file; software as a
service (SaaS) service featuring software for the issuance
of encrypted digital signature certificates; providing
non-downloadable software for electronic signature
verification services; providing non-downloadable software
for electronic data management services, namely, verifying
documents and files; provision of electronic digitizing and
storage of document images, data and text onto computer
readable media; electronic signature authorization services;
digital signature authorization services; computer services
in relation to electronic signature verification and
authorization services; computer services in relation to
digital signature verification and authorization services;
issuing encrypted digital signature certificates; providing
a website with technology to enable users to manage,
provide, electronically verify, sign, store and securely
distribute a document or file through global information
works (term considered too vague by the International Bureau
- Rule 13 (2) (b) of the Regulations); hosting of platforms
as a service; electronic storage of files and documents;
cloud storage services for electronic data; cloud storage
services for electronic files; electronic storage of files
and documents for others, including in the cloud; secure
storage of electronic documents for others; secure
electronic storage of files and documents, including in the
cloud; maintenance of security of electronically stored
files and documents; data encryption and decryption
services; design and development of computer software for
on-line attestation and verification of internet users;
design, creation and maintenance of electronic computer
programs; consultancy and advice in the field of computer
programs for identity management platforms; designing,
research and development of programs and software for
electronic identification; electronic data storage;
maintaining security and providing controlled access to
electronically stored files and documents; on-line
authentication of user's digital signatures in electronic
commerce; electronic document time-stamping services;
information, advisory and consultancy services related to
all the aforesaid services; application service provider
featuring application programming interface software for
sending electronic signature requests, completing contracts,
opening accounts, confirming deliveries, completing
employment forms, electronically signing documents,
automating forms and form-field data, tracking documents in
real-time, routing and controlling document workflow,
configuring platform notifications, downloading
digitally-sealed documents, and enforcing multi-factor
authentication; providing electronic notarization services
via a global computer network for others to legally notarize
electronic documents or files; providing transferable record
services for identification of the owners of documents or
chattel; providing a website featuring technology that
enables users to upload, electronically authenticate, store
and securely distribute a document or file via global
information networks (term considered too vague by the
International Bureau - Rule 13 (2) (b) of the Regulations).
36 - Financial, insurance and real estate services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Charitable services, namely, organizing volunteer programs
aimed at helping non-profit organizations implement and
utilize technology. Charitable foundation services, namely, providing financial
assistance for programs and services of others; charitable
services, namely, providing financial sponsorship of
nonprofit digital-capacity ecosystems, and organizations
that facilitate capacity-building volunteerism; charitable
fundraising to support nonprofit entities, nonprofit
digital-capacity ecosystems, and organizations that
facilitate capacity-building volunteerism. Charitable services, namely, providing non-downloadable
computer software to non-profit organizations for creating,
capturing, organizing, searching, storing, synchronizing,
reorganizing, recognizing, sharing, and editing any number
of typed or imaged documents, notes, graphics, tables,
presentations, spreadsheets within a collaborative work
environment.
91.
Methods and systems for making file requests in a collaboration environment
Embodiments of the disclosure provide systems and methods for obtaining content for a workspace of a collaboration environment. According to one embodiment, a method for requesting and obtaining a content item for a workspace of a collaboration environment can comprise generating, by a cloud-based collaboration environment system, a content request identifying the content item and metadata for the content item. The requested metadata for the content item can be defined by a requestor of the content item and the content item and the metadata for the content item can be requested from a submitter. The generated content request can be provided by the cloud-based collaboration environment system to a computing device associated with the submitter. In response to the provided request, the content item and the requested metadata for the content item can be obtained by the cloud-based collaboration environment system from the computing device associated with the submitter.
Embodiments of the disclosure provide systems and methods for obtaining content for a workspace of a collaboration environment. According to one embodiment, requesting and obtaining one or more content items for a workspace of a collaboration environment can comprise generating a content request identifying the one or more content items and metadata for the one or more content items requested from a submitter. The content request can be provided to a computing device associated with the submitter. A determination can be made as to whether the content item can be submitted anonymously. In response to determining the content items may be submitted anonymously, the content items and the metadata can be obtained while maintaining the anonymity of the submitter.
Scalable architectures, systems, and services are provided herein for generating jobs by applying user-specified metadata rules to metadata events. More specifically, the scalable architecture described herein uses metadata to drive automations and/or polices in a cloud-based environment. In one embodiment, the architecture integrates a metadata service with an event-based automation engine to automatically trigger polices and/or automations based on metadata and/or changes in metadata changes. The metadata service can include customizable and/or pre-build metadata templates which can be used to automatically apply a metadata framework (e.g., particular fields) to files based on, for example, the upload or placement of a particular file in a particular folder. The architecture also provides for advanced metadata searching and data classification.
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable computer software for enabling users to convert
digital files for embedding converted digital files in web
applications and to enable users to access, upload,
download, create, view, edit, print, store, exchange, manage
workflow, publish, distribute, transfer, secure, share,
transmit, collaborate, control access to and manage those
documents collaboratively on line and offline, for tracking
changes and modifications to software and for managing
software development projects; downloadable computer
software and computer software applications for use on
electronic devices and over global, mobile, and local
computer networks to access, upload, download, create, view,
edit, print, store, exchange, manage workflow, publish,
distribute, transfer, secure, share, transmit, collaborate,
control access to and manage digital media and information,
data, documents, files, text, graphics, images, photographs,
and electronic messages; downloadable computer software to
provide content, mobile application, mobile device, desktop
computer and desktop application management; downloadable
computer software for enabling users to upload and store
files to computer storages in the cloud and enable users to
access, upload, download, create, view, edit, print, store,
exchange, manage workflow, publish, distribute, transfer,
secure, share, transmit, collaborate, control access to and
manage those documents collaboratively on line and offline. Providing on-line non-downloadable software for enabling
users to convert digital files for embedding converted
digital files in web applications and to enable users to
access, upload, download, create, view, edit, print, store,
exchange, manage workflow, publish, distribute, transfer,
secure, share, transmit, collaborate, control access to and
manage those documents collaboratively on line and offline,
for tracking changes and modifications to software and for
managing software development projects; providing on-line
non-downloadable software for automating, personalizing,
designing and updating web sites, website templates, web
site graphics, text and animation for a global computer
network, internal and external computer networks, and local
and wide area computer networks; providing on-line
non-downloadable software for enabling users to upload and
store files to computer storages in the cloud and enable
users to access, upload, download, create, view, edit,
print, store, exchange, manage workflow, publish,
distribute, transfer, secure, share, transmit, collaborate,
control access to and manage those documents collaboratively
on line and offline.
42 - Scientific, technological and industrial services, research and design
Goods & Services
Providing on-line non-downloadable software for enabling
users to convert native document file formats to web-based
file format for embedding converted documents in web
applications and to enable users to access, upload,
download, create, view, edit, print, store, exchange,
publish, distribute, transfer, secure, share, transmit,
control access to and manage those documents collaboratively
on line and offline, for tracking changes and modifications
to software and for managing software development projects;
providing on-line non-downloadable software for automating,
personalizing, designing and updating web sites, website
templates, web site graphics, text and animation for a
global computer network, internal and external computer
networks, and local and wide area computer networks;
providing on-line non-downloadable software for use on
electronic devices and over global, mobile, and local
computer networks to access, upload, download, create, view,
edit, print, store, exchange, publish, distribute, transfer,
secure, share, transmit, control access to and manage
digital media and information, data, documents, files, text,
graphics, images, photographs, and electronic messages;
providing on-line non-downloadable computer software to
provide content, mobile application, mobile device, desktop
computer and desktop application management; providing
on-line non-downloadable software for enabling users to
upload and store files to computer storages in the cloud and
enable users to access, upload, download, create, view,
edit, print, store, exchange, publish, distribute, transfer,
secure, share, transmit, control access to and manage those
documents collaboratively on line and offline.
System and methods for summarizing collaboration activity events into a plurality of pages that are then scored with respect to user-specific relevance that is based on a set of comprehensibility characteristic parameters. The collaboration activity events are summarized into groups of activities based on certain common attributes that are deemed to have quantitatively measurable relevance to the user. The groups of activities are assembled into a plurality of personalized candidate pages. The candidate summary pages are then scored using a function that includes parameters that serve to quantify how interesting or readable the particular user would find the particular candidate summary page. One or more of the higher scoring candidate summary pages are selected for presentation to the user.
G06F 16/28 - Databases characterised by their database models, e.g. relational or object models
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
G06F 16/25 - Integrating or interfacing systems involving database management systems
G06F 16/9535 - Search customisation based on user profiles and personalisation
G06F 16/9536 - Search customisation based on social or collaborative filtering
Disclosed is an improved systems, methods, and computer program products that use a cluster-based probability model to perform anomaly detection, where the clusters are based upon entities and interactions that exist in content management platforms.
A server in a cloud-based environment interfaces with storage devices that store shared content accessible by two or more users. Individual items within the shared content are associated with respective object metadata that is also stored in the cloud-based environment. Download requests initiate downloads of instances of a virtual file system module to two or more user devices associated with two or more users. The downloaded virtual file system modules capture local metadata that pertains to local object operations directed by the users over the shared content. Changed object metadata attributes are delivered to the server and to other user devices that are accessing the shared content. Peer-to-peer connections can be established between the two or more user devices. Object can be divided into smaller portions such that processing the individual smaller portions of a larger object reduces the likelihood of a conflict between user operations over the shared content.
H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
G06F 12/0891 - Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches using clearing, invalidating or resetting means
G06F 12/122 - Replacement control using replacement algorithms of the least frequently used [LFU] type, e.g. with individual count value
H04L 67/06 - Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
H04N 19/40 - Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using video transcoding, i.e. partial or full decoding of a coded input stream followed by re-encoding of the decoded output stream
Systems for fast views of items in file directories or file folders when interacting with a cloud-based service platform. A server in a cloud-based environment interfaces with one or more storage devices to provide storage of shared content accessible by two or more user devices. A file tree request to view the file directory or file folder of a particular sought after item is issued from an application operating on one of the user devices. Additional file tree items in a file tree hierarchy are prefetched by the cloud-based service platform. The application closes the file tree metadata stream after receiving the portion of the file tree that pertains to the particular item and before receiving the entirety of the metadata pertaining to all of the file tree metadata of all of the items in the directory or folder that contains the particular sought after item.
G06F 16/17 - Details of further file system functions
G06F 16/174 - Redundancy elimination performed by the file system
G06F 16/176 - Support for shared access to filesFile sharing support
G06F 16/957 - Browsing optimisation, e.g. caching or content distillation
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
G06F 12/1081 - Address translation for peripheral access to main memory, e.g. direct memory access [DMA]
H04L 29/06 - Communication control; Communication processing characterised by a protocol
G06F 12/0891 - Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches using clearing, invalidating or resetting means
G06F 12/122 - Replacement control using replacement algorithms of the least frequently used [LFU] type, e.g. with individual count value
H04N 19/40 - Methods or arrangements for coding, decoding, compressing or decompressing digital video signals using video transcoding, i.e. partial or full decoding of a coded input stream followed by re-encoding of the decoded output stream
42 - Scientific, technological and industrial services, research and design
Goods & Services
(1) Providing on-line non-downloadable software for enabling users to convert native document file formats to web-based file format for embedding converted documents in web applications and to enable users to access, upload, download, create, view, edit, print, store, exchange, publish, distribute, transfer, secure, share, transmit, control access to and manage those documents collaboratively on line and offline, for tracking changes and modifications to software and for managing software development projects; providing on-line non-downloadable software for automating, personalizing, designing and updating web sites, website templates, web site graphics, text and animation for a global computer network, internal and external computer networks, and local and wide area computer networks; providing on-line non-downloadable computer software for use on electronic devices, namely, computers, smart phones, tablet computers, and computer hardware and over global, mobile, and local computer networks to access, upload, download, create, view, edit, print, store, exchange, publish, distribute, transfer, secure, share, transmit, control access to and manage digital content being images, videos, photos, music, and movies, documents, files, text, graphics, images, photographs, and electronic messages; providing on-line non-downloadable computer software for hosting and managing digital content being images, videos, photos, electronic files, and documents, and management of mobile and desktop computer applications for others; providing on-line nondownloadable software for enabling users to upload and store files to computer storages in the cloud and enable users to access, upload, download, create, view, edit, print, store, exchange, publish, distribute, transfer, secure, share, transmit, control access to and manage those documents collaboratively on line and offline.