Embodiments of the disclosure provide systems and methods for curating access-only content items of user groups in a cloud-based collaboration environment by creating a content hub in the cloud-based collaboration environment. The content hub can comprise a logical representation of a collection of content items stored in a repository. The content hub can be populated with hub information defining the content hub and selected content items of the content items stored in the repository can be added to the content hub. The content hub can then be published in the cloud-based collaboration environment with the selected content items added to the content hub being available for access only to one or more users.
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Providing temporary use of online non-downloadable file
sharing software; electronic data storage; electronic
storage of digital images; electronic storage of files and
documents; electronic storage of digital audio files;
electronic storage of digital video files; cloud storage
services for electronic data; cloud storage services for
electronic files; hosting of digital content on the
Internet; computer services, namely, cloud hosting provider
services; file sharing services, namely, providing temporary
use of online non-downloadable software via a website
enabling users to upload and download electronic files;
providing a secure electronic online system featuring
technology which allows electronic storage of files,
documents, and digital media; computer services, namely,
providing application servers, web servers, file servers,
co-location servers, load balancing servers, redundancy
servers, media servers and database servers to others;
computer security services, namely, enforcing, restricting
and controlling access privileges of users of computing
resources for cloud, mobile or network resources based on
assigned credentials; platform as a service (PAAS) featuring
computer software platforms for managing retention,
preservation, classification, access control, security
policy control, compliance management, deletion, and
disposition of electronic files and documents; platform as a
service (PAAS) featuring computer software platforms for
cloud content management; platform as a service (PAAS)
featuring computer software platforms for the collection,
editing, organizing, modifying, book marking, transmission,
storage, and sharing of data and information; software as a
service (SAAS) services featuring software using artificial
intelligence (AI) for data processing, generation,
understanding and analysis; providing on-line
non-downloadable software for cloud storage of data;
providing on-line non-downloadable software for file
sharing; providing on-line non-downloadable software for
document management; providing on-line non-downloadable
software for collaborating on shared documents; providing
temporary use of on-line non-downloadable cloud computing
software for use in electronic storage of data; artificial
intelligence as a service (AIAAS) services featuring
software using artificial intelligence (AI) for processing,
analyzing, organizing, and managing files and documents and
defining, generating, extracting, editing, and displaying
metadata; providing on-line non-downloadable software using
artificial intelligence (AI) for natural language and data
processing, generation, understanding and analysis;
providing on-line non-downloadable software using artificial
intelligence (AI) for processing, analyzing, and managing
multimedia, video, audio, and images; providing on-line
non-downloadable software using artificial intelligence (AI)
for natural language processing, generation, understanding
and analysis; providing on-line non-downloadable software
using artificial intelligence (AI) for workflow management
and facilitating business processes; providing on-line
non-downloadable software using artificial intelligence (AI)
for data security; software as a service (SAAS) services
featuring software for accessing, controlling access to,
uploading, downloading, creating, viewing, editing,
printing, storing, managing, exchanging, publishing,
distributing, transferring, securing, and sharing digital
media, information, data, documents, files, text,
multimedia, graphics, images, photographs, videos, digital
audio, music, and electronic messages; electronic storage of
files, documents, and digital media; providing temporary use
of online non-downloadable software via a website that
enables users to electronically store files, documents,
text, digital images, digital audio files, and digital video
files; providing temporary use of online non-downloadable
software via a web site that enables users to create,
bookmark, annotate, and publicly share data.
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Providing online non-downloadable workflow management
software; providing temporary use of online non-downloadable
file sharing software; electronic data storage; electronic
storage of digital images; electronic storage of files and
documents; electronic storage of digital audio files;
electronic storage of digital video files; providing a
secure electronic online system featuring technology which
allows electronic storage of files, documents, and digital
media; cloud storage services for electronic data; cloud
storage services for electronic files; hosting of digital
content on the Internet; computer services, namely, cloud
hosting provider services; file sharing services, namely,
providing temporary use of online non-downloadable software
via a website enabling users to upload and download
electronic files; computer security services, namely,
enforcing, restricting and controlling access privileges of
users of computing resources for cloud, mobile or network
resources based on assigned credentials; computer services,
namely, providing application servers, web servers, file
servers, co-location servers, load balancing servers,
redundancy servers, media servers and database servers to
others; platform as a service (PAAS) featuring computer
software platforms for no-code development of computer
software applications; platform as a service (PAAS)
featuring computer software platforms for no-code
development of webpages and web applications; platform as a
service (PAAS) featuring computer software platforms for
managing retention, preservation, classification, access
control, security policy control, compliance management,
deletion, and disposition of electronic files and documents;
platform as a service (PAAS) featuring computer software
platforms for cloud content management; platform as a
service (PAAS) featuring computer software platforms for the
collection, editing, organizing, modifying, book marking,
transmission, storage, and sharing of data and information;
providing temporary use of on-line non-downloadable software
for cloud storage of data; providing temporary use of
on-line non-downloadable software for file sharing;
providing temporary use of on-line non-downloadable software
for document management; providing temporary use of on-line
non-downloadable software for collaborating on shared
documents; providing temporary use of on-line
non-downloadable software for processing and analyzing files
and documents and defining, generating, extracting, editing,
and displaying metadata; providing temporary use of on-line
non-downloadable cloud computing software for use in
electronic storage of data; providing on-line
non-downloadable software using artificial intelligence (AI)
for natural language and data processing, generation,
understanding and analysis; software as a service (SAAS)
services featuring software for automating document
management and filing; software as a service (SAAS) services
featuring software for designing, creating, customizing,
editing, maintaining, and viewing data dashboards; software
as a service (SAAS) services featuring software for
designing, creating, customizing, editing, maintaining, and
viewing digital dashboards featuring information and
metadata extracted and generated from documents, files,
text, spreadsheets, multimedia, graphics, images, videos,
digital audio, music, and electronic messages; software as a
service (SAAS) services featuring software for developing
customized web pages and other data feed formats featuring
user-defined information; software as a service (SAAS)
services featuring software for accessing, controlling
access to, uploading, downloading, creating, viewing,
editing, printing, storing, managing, exchanging,
publishing, distributing, transferring, securing, and
sharing digital media, information, data, documents, files,
text, multimedia, graphics, images, photographs, videos,
digital audio, music, and electronic messages; artificial
intelligence as a service (AIAAS) services featuring
software using artificial intelligence (AI) for processing
and analyzing files and documents and defining, generating,
extracting, editing, and displaying metadata; electronic
storage of files, documents, and digital media; providing
temporary use of online non-downloadable software via a
website that enables users to electronically store files,
documents, text, digital images, digital audio files, and
digital video files; providing temporary use of online
non-downloadable software via a web site that enables users
to create, bookmark, annotate, and publicly share data.
Methods, systems, and computer program products for malevolent intent detection. Multiple cloud-based computer components are operatively interconnected to carry out operations for malevolent intent detection and remediation. In operation, a content management system (CMS) collects collaboration activities over time and over a content object so as to form a historical record of collaborator activities that includes a time-wise tracking of collaboration events over the content object. The CMS is interfaced with an electronic signature system (ESS) that captures e-signing events at the electronic signature system. Operational modules are invoked so as to recognize an occurrences of an e-signing event, and thereafter to perform a risk analysis of the e-signing event using both (a) portions of the historical record of collaborator activities for the content object at the CMS and (b) any information from an interaction with the ESS. Recommended remediation actions are emitted based on results of the risk analysis.
Disclosed is an improved systems, methods, and computer program products that use a cluster-based probability model to perform anomaly detection, where the clusters are based upon entities and interactions that exist in content management platforms.
Embodiments of the disclosure provide systems and methods for automated generation of computer source code across multiple programming languages. According to one embodiment, a method for automated generation of computer source code can comprise receiving information defining a coding node. The coding node can comprise a definition of an object within an object tree for the computer source code. The coding node can be created based on the received information defining the coding node and the coding node can be transformed into an intermediate, transformed coding node. The intermediate, transformed coding node can then be transpiled into software source code in a target programming language of a plurality of programming languages.
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
(1) Providing temporary use of online non-downloadable file sharing software; electronic data storage; electronic storage of digital images; electronic storage of files and documents; electronic storage of digital audio files; electronic storage of digital video files; cloud storage services for electronic data; cloud storage services for electronic files; hosting of digital content on the Internet; computer services, namely, cloud hosting provider services; file sharing services, namely, providing temporary use of online non-downloadable software via a website enabling users to upload and download electronic files; providing a secure electronic online system featuring technology which allows electronic storage of files, documents, and digital media; computer services, namely, providing application servers, web servers, file servers, co-location servers, load balancing servers, redundancy servers, media servers and database servers to others; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; platform as a service (PAAS) featuring computer software platforms for managing retention, preservation, classification, access control, security policy control, compliance management, deletion, and disposition of electronic files and documents; platform as a service (PAAS) featuring computer software platforms for cloud content management; platform as a service (PAAS) featuring computer software platforms for the collection, editing, organizing, modifying, book marking, transmission, storage, and sharing of data and information; software as a service (SAAS) services featuring software using artificial intelligence (AI) for data processing, generation, understanding and analysis; providing on-line non-downloadable software for cloud storage of data; providing on-line non-downloadable software for file sharing; providing on-line non-downloadable software for document management; providing on-line non-downloadable software for collaborating on shared documents; providing temporary use of on-line non-downloadable cloud computing software for use in electronic storage of data; artificial intelligence as a service (AIAAS) services featuring software using artificial intelligence (AI) for processing, analyzing, organizing, and managing files and documents and defining, generating, extracting, editing, and displaying metadata; providing on-line non-downloadable software using artificial intelligence (AI) for natural language and data processing, generation, understanding and analysis; providing on-line non-downloadable software using artificial intelligence (AI) for processing, analyzing, and managing multimedia, video, audio, and images; providing on-line non-downloadable software using artificial intelligence (AI) for natural language processing, generation, understanding and analysis; providing on-line non-downloadable software using artificial intelligence (AI) for workflow management and facilitating business processes; providing on-line non-downloadable software using artificial intelligence (AI) for data security; software as a service (SAAS) services featuring software for accessing, controlling access to, uploading, downloading, creating, viewing, editing, printing, storing, managing, exchanging, publishing, distributing, transferring, securing, and sharing digital media, information, data, documents, files, text, multimedia, graphics, images, photographs, videos, digital audio, music, and electronic messages; electronic storage of files, documents, and digital media; providing temporary use of online non-downloadable software via a website that enables users to electronically store files, documents, text, digital images, digital audio files, and digital video files; providing temporary use of online non-downloadable software via a web site that enables users to create, bookmark, annotate, and publicly share data.
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
(1) Providing online non-downloadable workflow management software; providing temporary use of online non-downloadable file sharing software; electronic data storage; electronic storage of digital images; electronic storage of files and documents; electronic storage of digital audio files; electronic storage of digital video files; providing a secure electronic online system featuring technology which allows electronic storage of files, documents, and digital media; cloud storage services for electronic data; cloud storage services for electronic files; hosting of digital content on the Internet; computer services, namely, cloud hosting provider services; file sharing services, namely, providing temporary use of online non-downloadable software via a website enabling users to upload and download electronic files; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; computer services, namely, providing application servers, web servers, file servers, co-location servers, load balancing servers, redundancy servers, media servers and database servers to others; platform as a service (PAAS) featuring computer software platforms for no-code development of computer software applications; platform as a service (PAAS) featuring computer software platforms for no-code development of webpages and web applications; platform as a service (PAAS) featuring computer software platforms for managing retention, preservation, classification, access control, security policy control, compliance management, deletion, and disposition of electronic files and documents; platform as a service (PAAS) featuring computer software platforms for cloud content management; platform as a service (PAAS) featuring computer software platforms for the collection, editing, organizing, modifying, book marking, transmission, storage, and sharing of data and information; providing temporary use of on-line non-downloadable software for cloud storage of data; providing temporary use of on-line non-downloadable software for file sharing; providing temporary use of on-line non-downloadable software for document management; providing temporary use of on-line non-downloadable software for collaborating on shared documents; providing temporary use of on-line non-downloadable software for processing and analyzing files and documents and defining, generating, extracting, editing, and displaying metadata; providing temporary use of on-line non-downloadable cloud computing software for use in electronic storage of data; providing on-line non-downloadable software using artificial intelligence (AI) for natural language and data processing, generation, understanding and analysis; software as a service (SAAS) services featuring software for automating document management and filing; software as a service (SAAS) services featuring software for designing, creating, customizing, editing, maintaining, and viewing data dashboards; software as a service (SAAS) services featuring software for designing, creating, customizing, editing, maintaining, and viewing digital dashboards featuring information and metadata extracted and generated from documents, files, text, spreadsheets, multimedia, graphics, images, videos, digital audio, music, and electronic messages; software as a service (SAAS) services featuring software for developing customized web pages and other data feed formats featuring user-defined information; software as a service (SAAS) services featuring software for accessing, controlling access to, uploading, downloading, creating, viewing, editing, printing, storing, managing, exchanging, publishing, distributing, transferring, securing, and sharing digital media, information, data, documents, files, text, multimedia, graphics, images, photographs, videos, digital audio, music, and electronic messages; artificial intelligence as a service (AIAAS) services featuring software using artificial intelligence (AI) for processing and analyzing files and documents and defining, generating, extracting, editing, and displaying metadata; electronic storage of files, documents, and digital media; providing temporary use of online non-downloadable software via a website that enables users to electronically store files, documents, text, digital images, digital audio files, and digital video files; providing temporary use of online non-downloadable software via a web site that enables users to create, bookmark, annotate, and publicly share data.
Securely acquiring and managing electronic-based signatures by a content management system. A content management system exposes content objects to a plurality of collaborators. Executable modules of the content management system implement an Internet-based interface that is configured to acquire electronic-based signatures from a user device. A particular user device is configured to access particular content objects over the Internet-based interface and to acquire an electronic-based signature corresponding to one or more of the particular content objects. When one or more conditions are detected that would at least potentially influence how the acquisition of the electronic-based signature is carried out, then one or more remediation actions are invoked. Various security-specific remediation actions address corresponding security vulnerabilities. Various document-specific remediation actions are determined based on the document conditions that had been detected. In some cases, a plurality of remediation actions are carried out to securely acquire electronic-based signatures from a user device.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Securely acquiring and managing electronic-based signatures by a content management system. A content management system exposes content objects to a plurality of collaborators. Executable modules of the content management system implement an Internet-based interface that is configured to acquire electronic-based signatures from a user device. A particular user device is configured to access particular content objects over the Internet-based interface and to acquire an electronic-based signature corresponding to one or more of the particular content objects. When one or more conditions are detected that would at least potentially influence how the acquisition of the electronic-based signature is carried out, then one or more remediation actions are invoked. Various security-specific remediation actions address corresponding security vulnerabilities. Various document-specific remediation actions are determined based on the document conditions that had been detected. In some cases, a plurality of remediation actions are carried out to securely acquire electronic-based signatures from a user device.
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
11.
CALCULATING AND REPORTING COLLABORATION SYSTEM RISKS
Methods, systems, and computer program products for a content management system. Embodiments operate within or in conjunction with such a content management system. The content management system stores content objects for access by various collaborators, including extra-system collaborators. A user of the content management system configures extra-enterprise shared link URLs that permit the extra-system collaborators to access shared content objects over an Internet connection. A shared link event graph data structure is formed based on access requests over the extra-enterprise shared link URLs. An interactive user interface module is generated by processing a shared link report query over the shared link event graph data structure to select a subject set of the extra-enterprise shared link URLs, and to generate a data set of the interactive user interface module based at least in part on results from the query. A user interacts with the interactive user interface module to generate insights.
Methods, systems, and computer program products for collaboration systems. A method for identifying selected portions of a set of content objects for use in generating a large language model (LLM) prompt comprises: identifying a content management system (CMS) wherein collaboration activities occur over time and over content objects maintained in the CMS, and wherein the CMS maintains a historical record of occurrences of the collaborator activities over the content objects. Upon receiving a natural language query from a CMS collaborator, reducing a larger corpus of content objects to a smaller corpus of context passages that are used in an LLM prompt. The smaller corpus of passages is formed using a two-phase reduction scheme whereby firstly, selected constituents from the larger corpus of content objects are identified based on CMS metadata; and then, rather than considering the larger corpus, instead considering only the selected constituents when generating the LLM prompt.
G06F 16/335 - Filtrage basé sur des données supplémentaires, p. ex. sur des profils d’utilisateurs ou de groupes
G06F 16/383 - Recherche caractérisée par l’utilisation de métadonnées, p. ex. de métadonnées ne provenant pas du contenu ou de métadonnées générées manuellement utilisant des métadonnées provenant automatiquement du contenu
Disclosed is an improved approach to implement metadata extraction, to extract metadata that can be used for metadata queries. The query may be applied against metadata extracted from content stored in a cloud-based content management system.
Methods, systems, and computer program products for electronic signature systems. Multiple components are operatively interconnected to carry out operations for securing e-signatures applied to content objects. A data processing system that interacts with user devices over a network that carries e-signature events raised by the user devices is configured to implement a content management system (CMS) that maintains a single CMS e-signature object within an object storage repository. The single CMS e-signature object is representative of multiple different versions or renditions of CMS objects. Upon an e-sign event, the data processing system modifies the single CMS e-signature object. Human cognition is aided by presentation of two different and independently operable graphical user interface (GUI) renderings, wherein a first rendering presents the single CMS e-signature object and wherein a second rendering displays at least some of the multiple different versions or renditions or properties that constituent the single CMS e-signature object.
Methods, systems, and computer program products for gathering electronic signatures to be applied to collaboration system content objects (e.g., contracts, letters, insurance claims, riders, etc.). A collaboration system monitors changes made to the collaboration system content objects during electronic signature processing. A module of the content management system is configured to associate one or more instances of e-signing metadata to one or more of the stored content objects of the content management system. The e-signing metadata indicates whether or not a particular portion of the one or more of the stored content objects has been e-signed by a designated e-signatory. A collaborator who is not one of the designated e-signatories makes a change to one or more of the stored content objects (e.g., contracts, letters, insurance claims, riders, etc.). The change is remediated on-the-fly and the e-signing process continues without having to restart the e-signing process from the beginning.
G06Q 10/101 - Création collaborative, p. ex. développement conjoint de produits ou de services
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
16.
METHODS AND SYSTEMS FOR MAKING FILE REQUESTS IN A COLLABORATION ENVIRONMENT
Embodiments of the disclosure provide systems and methods for obtaining content for a workspace of a collaboration environment. According to one embodiment, requesting and obtaining one or more content items for a workspace of a collaboration environment can comprise generating a content request identifying the one or more content items and metadata for the one or more content items requested from a submitter. The content request can be provided to a computing device associated with the submitter. A determination can be made as to whether the content item can be submitted anonymously. In response to determining the content items may be submitted anonymously, the content items and the metadata can be obtained while maintaining the anonymity of the submitter.
G06Q 10/101 - Création collaborative, p. ex. développement conjoint de produits ou de services
G06F 16/907 - Recherche caractérisée par l’utilisation de métadonnées, p. ex. de métadonnées ne provenant pas du contenu ou de métadonnées générées manuellement
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Downloadable computer software for document management; Downloadable file sharing software; Downloadable mobile applications for accessing, controlling access to, uploading, downloading, creating, viewing, editing, printing, storing, managing, exchanging, publishing, distributing, transferring, securing, and sharing digital media, information, data, documents, files, text, multimedia, graphics, images, photographs, videos, digital audio, music, and electronic messages; Downloadable mobile applications for natural language processing, generation, understanding and analysis using artificial intelligence (AI); Downloadable computer software using artificial intelligence (AI) for natural language processing, generation, understanding and analysis; Downloadable computer software using artificial intelligence (AI) for data processing, generation, understanding and analysis; Downloadable computer software using artificial intelligence (AI) for processing, analyzing, organizing, and managing files and documents and defining, generating, extracting, editing, and displaying metadata; Downloadable computer software using artificial intelligence (AI) for processing, analyzing, and managing multimedia, video, audio, and images; Downloadable computer software using artificial intelligence (AI) for data security; Downloadable computer software for the collection, editing, organizing, modifying, book marking, transmission, storage, and sharing of data and information; Downloadable software for cloud storage of data; Downloadable software for cloud content management; Downloadable software for accessing, controlling access to, uploading, downloading, creating, viewing, editing, printing, storing, managing, exchanging, publishing, distributing, transferring, securing, and sharing digital media, information, data, documents, files, text, multimedia, graphics, images, photographs, videos, digital audio, music, and electronic messages; Downloadable computer programs for downloading, uploading, sharing, editing, and saving electronic documents hosted on a cloud storage platform; Downloadable chatbot software using artificial intelligence (AI) for natural language processing, generation, understanding and analysis Providing temporary use of online non-downloadable file sharing software; Electronic data storage; Electronic storage of digital images; Electronic storage of files and documents; Electronic storage of digital audio files; Electronic storage of digital video files; Cloud storage services for electronic data; Cloud storage services for electronic files; Hosting of digital content on the Internet; Computer services, namely, cloud hosting provider services; File sharing services, namely, providing a website featuring technology enabling users to upload and download electronic files; Providing a secure electronic online system featuring technology which allows electronic storage of files, documents, and digital media; Computer services, namely, providing application servers, web servers, file servers, co-location servers, load balancing servers, redundancy servers, media servers and database servers to others; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Platform as a service (PAAS) featuring computer software platforms for managing retention, preservation, classification, access control, security policy control, compliance management, deletion, and disposition of electronic files and documents; Platform as a service (PAAS) featuring computer software platforms for cloud content management; Platform as a service (PAAS) featuring computer software platforms for the collection, editing, organizing, modifying, book marking, transmission, storage, and sharing of data and information; Software as a service (SAAS) services featuring software using artificial intelligence (AI) for data processing, generation, understanding and analysis; Providing on-line non-downloadable software for cloud storage of data; Providing on-line non-downloadable software for file sharing; Providing on-line non-downloadable software for document management; Providing on-line non-downloadable software for collaborating on shared documents; Providing temporary use of on-line non-downloadable cloud computing software for use in electronic storage of data; Artificial intelligence as a service (AIAAS) services featuring software using artificial intelligence (AI) for processing, analyzing, organizing, and managing files and documents and defining, generating, extracting, editing, and displaying metadata; Providing on-line non-downloadable software using artificial intelligence (AI) for natural language and data processing, generation, understanding and analysis; Providing on-line non-downloadable software using artificial intelligence (AI) for processing, analyzing, and managing multimedia, video, audio, and images; Providing on-line non-downloadable software using artificial intelligence (AI) for natural language processing, generation, understanding and analysis; Providing on-line non-downloadable software using artificial intelligence (AI) for workflow management and facilitating business processes; Providing on-line non-downloadable software using artificial intelligence (AI) for data security; Software as a service (SAAS) services featuring software for accessing, controlling access to, uploading, downloading, creating, viewing, editing, printing, storing, managing, exchanging, publishing, distributing, transferring, securing, and sharing digital media, information, data, documents, files, text, multimedia, graphics, images, photographs, videos, digital audio, music, and electronic messages; Electronic storage of files, documents, and digital media; Providing a website featuring technology that enables users to electronically store files, documents, text, digital images, digital audio files, and digital video files; Providing a web site featuring technology that enables users to create, bookmark, annotate, and publicly share data
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Providing online non-downloadable workflow management software; Providing temporary use of online non-downloadable file sharing software; Electronic data storage; Electronic storage of digital images; Electronic storage of files and documents; Electronic storage of digital audio files; Electronic storage of digital video files; Providing a secure electronic online system featuring technology which allows electronic storage of files, documents, and digital media; Cloud storage services for electronic data; Cloud storage services for electronic files; Hosting of digital content on the Internet; Computer services, namely, cloud hosting provider services; File sharing services, namely, providing a website featuring technology enabling users to upload and download electronic files; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, providing application servers, web servers, file servers, co-location servers, load balancing servers, redundancy servers, media servers and database servers to others; Platform as a service (PAAS) featuring computer software platforms for no-code development of computer software applications; Platform as a service (PAAS) featuring computer software platforms for no-code development of webpages and web applications; Platform as a service (PAAS) featuring computer software platforms for managing retention, preservation, classification, access control, security policy control, compliance management, deletion, and disposition of electronic files and documents; Platform as a service (PAAS) featuring computer software platforms for cloud content management; Platform as a service (PAAS) featuring computer software platforms for the collection, editing, organizing, modifying, book marking, transmission, storage, and sharing of data and information; Providing temporary use of on-line non-downloadable software for cloud storage of data; Providing temporary use of on-line non-downloadable software for file sharing; Providing temporary use of on-line non-downloadable software for document management; Providing temporary use of on-line non-downloadable software for collaborating on shared documents; Providing temporary use of on-line non-downloadable software for processing and analyzing files and documents and defining, generating, extracting, editing, and displaying metadata; Providing temporary use of on-line non-downloadable cloud computing software for use in electronic storage of data; Providing on-line non-downloadable software using artificial intelligence (AI) for natural language and data processing, generation, understanding and analysis; Software as a service (SAAS) services featuring software for automating document management and filing; Software as a service (SAAS) services featuring software for designing, creating, customizing, editing, maintaining, and viewing data dashboards; Software as a service (SAAS) services featuring software for designing, creating, customizing, editing, maintaining, and viewing digital dashboards featuring information and metadata extracted and generated from documents, files, text, spreadsheets, multimedia, graphics, images, videos, digital audio, music, and electronic messages; Software as a service (SAAS) services featuring software for developing customized web pages and other data feed formats featuring user-defined information; Software as a service (SAAS) services featuring software for accessing, controlling access to, uploading, downloading, creating, viewing, editing, printing, storing, managing, exchanging, publishing, distributing, transferring, securing, and sharing digital media, information, data, documents, files, text, multimedia, graphics, images, photographs, videos, digital audio, music, and electronic messages; Artificial intelligence as a service (AIAAS) services featuring software using artificial intelligence (AI) for processing and analyzing files and documents and defining, generating, extracting, editing, and displaying metadata; Electronic storage of files, documents, and digital media; Providing a website featuring technology that enables users to electronically store files, documents, text, digital images, digital audio files, and digital video files; Providing a web site featuring technology that enables users to create, bookmark, annotate, and publicly share data
19.
GENERATING A LARGE LANGUAGE MODEL PROMPT BASED ON COLLABORATION ACTIVITIES OF A USER
Methods, systems, and computer program products for managing interactions between a content management system (CMS) and a large language model (LLM) system. The semantics of user questions can be considered before prompting an LLM, or alternatively, before querying datasets that are local to the CMS. Given a user question to be answered, the embedding of the user question can be matched against preconfigured sample question embeddings to determine a best match. A prompt corresponding to the determined best match is then configured based on identification of the class or classes that correspond to the matched question. Prompts for provision to LLMs can be synthesized based on a particular user's identity and/or based on the particular user's historical collaboration activities over objects of the CMS. The LLM can be hosted by a third-party provider. Alternatively all or portions of a large language model system can be hosted within the CMS.
A method for processing content management system workflows. Systems and subsystems are established for configuring a content management system to implement workflow processes wherein the content management system (CMS) exposes instances of stored content objects to a plurality of user devices through an electronic interface. Further systems and subsystem are established for identifying metadata maintained by the CMS for the stored content objects, and for identifying a generative AI entity (GAIE) to interact with the CMS. On an ongoing basis, the foregoing systems and subsystems carry out steps for (1) forming a GAIE prompt, wherein the GAIE prompt comprises at least a portion of the metadata identified from the CMS for the stored content objects, (2) receiving a response from the GAIE, wherein the response corresponds to the GAIE prompt; and (3) using, by the CMS, the response from the GAIE to implement processing of a content management system workflow.
Methods, systems, and computer program products for managing interactions between a content management system (CMS) and a large language model (LLM) system. The semantics of user questions can be considered before prompting an LLM, or alternatively, before querying datasets that are local to the CMS. Given a user question to be answered, the embedding of the user question can be matched against preconfigured sample question embeddings to determine a best match. A prompt corresponding to the determined best match is then configured based on identification of the class or classes that correspond to the matched question. Prompts for provision to LLMs can be synthesized based on a particular user's identity and/or based on the particular user's historical collaboration activities over objects of the CMS. The LLM can be hosted by a third-party provider. Alternatively all or portions of a large language model system can be hosted within the CMS.
Methods, systems, and computer program products for managing interactions between a content management system (CMS) and a large language model (LLM) system. The semantics of user questions can be considered before prompting an LLM, or alternatively, before querying datasets that are local to the CMS. Given a user question to be answered, the embedding of the user question can be matched against preconfigured sample question embeddings to determine a best match. A prompt corresponding to the determined best match is then configured based on identification of the class or classes that correspond to the matched question. Prompts for provision to LLMs can be synthesized based on a particular user's identity and/or based on the particular user's historical collaboration activities over objects of the CMS. The LLM can be hosted by a third-party provider. Alternatively all or portions of a large language model system can be hosted within the CMS.
Methods, systems, and computer program products for managing interactions between a content management system (CMS) and a large language model (LLM) system. The semantics of user questions can be considered before prompting an LLM, or alternatively, before querying datasets that are local to the CMS. Given a user question to be answered, the embedding of the user question can be matched against preconfigured sample question embeddings to determine a best match. A prompt corresponding to the determined best match is then configured based on identification of the class or classes that correspond to the matched question. Prompts for provision to LLMs can be synthesized based on a particular user's identity and/or based on the particular user's historical collaboration activities over objects of the CMS. The LLM can be hosted by a third-party provider. Alternatively all or portions of a large language model system can be hosted within the CMS.
Systems and methods of real time notification of activities that occur in a web-based collaboration environment are disclosed. In one aspect, embodiments of the present disclosure include a method, which may be implemented on a system, for selecting a recipient of a notification an activity according to criteria determined based on a workspace in which the activity was performed in the online collaboration platform and/or sending the notification of the activity to the recipient such that the recipient is notified in real time or near real time to when the activity occurred.
Content object operations over content objects of a content management system are prioritized to be performed immediately, or at a later time. The immediate scheduling of an operation is determined by policies, rules, and/or predictive model outcomes. The determination for later time scheduling is based on analysis of a history of events on content objects. If the content object operation is deemed to be at least potentially delayable to a later time, then a scheduling model is consulted to determine an urgency of performing the content object operation on the content object. The urgency value resulting from consulting the scheduling model is combined with then-current resource availability to determine a timeframe for performance of the content object operation on the content object relative to other entries in a continuously updated list of to-be-performed operations. The performance of the content object operation on the content object is initiated in due course.
Methods, systems and computer program products for managing workflows between multiple third-party systems. A content management system stores a workflow that operates over content objects by invoking third-party applications. The content management system invokes these third-party applications, and these applications make modifications to the progression of the workflows as the third-party applications carry-out their specific portions of the workflow. Upon receipt of a workflow variable value from a first third-party application, the content management system determines the semantics of the workflow variable value and caries out a next portion of the workflow. The content management system then invokes a further next portion of the workflow to be carried out by a second third-party application. Upon receipt of a workflow variable value from the second third-party application, the content management system determines the semantics of the workflow variable value to then carry out yet a further portion of the workflow.
G06F 16/901 - IndexationStructures de données à cet effetStructures de stockage
G06F 16/955 - Recherche dans le Web utilisant des identifiants d’information, p. ex. des localisateurs uniformisés de ressources [uniform resource locators - URL]
Disclosed is an improved systems, methods, and computer program products that performs user behavior analysis to identify malicious behavior in a computing system. The approach may be implemented by generating feature vectors for two time periods, performing scoring, and then performing anomaly detection.
H04L 67/1097 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour le stockage distribué de données dans des réseaux, p. ex. dispositions de transport pour le système de fichiers réseau [NFS], réseaux de stockage [SAN] ou stockage en réseau [NAS]
Methods, systems and computer program products for recommendation systems. Embodiments commence by gathering a set of pathnames that refer to content objects of a collaboration system. A tokenizer converts at least some of the pathnames into vectors. The vectors comprise hierarchical path components such as folder names or file names, which vectors are labeled with an indication as to whether or not the folder or file referred to in a particular vector had been clicked on by one or more users. Some portion of the labeled vectors are used to train a predictive model. Collaboration recommendations may be generated that pertain to security-related recommendations.
Methods, systems, and computer program products for automated document generation within a collaboration system. Multiple components are operatively interconnected to carry out automated document generation operations. Collaboration activity limitations are enforced over newly-generated documents. The document generation process produces newly-generated documents and other outputs that are stored in the collaboration system. Operational elements of the collaboration system are able to access the generated document and other document generation system outputs to perform content analysis. Based at least in part on results of the content analysis, characteristics of the generated document and characteristics of the corresponding document system I/O, the collaboration system assigns and/or modifies access parameters of the newly-generated document and its metadata. The access parameters control ongoing enforcement of document handling policies. The document generation process gathers information from third-party systems to produce situation- or application-specific generated documents.
G06F 16/908 - Recherche caractérisée par l’utilisation de métadonnées, p. ex. de métadonnées ne provenant pas du contenu ou de métadonnées générées manuellement utilisant des métadonnées provenant automatiquement du contenu
H04L 65/1093 - Procédures en session en ajoutant des participantsProcédures en session en supprimant des participants
30.
THIRD PARTY RESOLUTION OF TEMPLATE PARAMETERS DURING AUTOMATED DOCUMENT GENERATION PROCESSING
Methods, systems, and computer program products for automated document generation within a collaboration system. Multiple components are operatively interconnected to carry out automated document generation operations. Collaboration activity limitations are enforced over newly-generated documents. The document generation process produces newly-generated documents and other outputs that are stored in the collaboration system. Operational elements of the collaboration system are able to access the generated document and other document generation system outputs to perform content analysis. Based at least in part on results of the content analysis, characteristics of the generated document and characteristics of the corresponding document system I/O, the collaboration system assigns and/or modifies access parameters of the newly-generated document and its metadata. The access parameters control ongoing enforcement of document handling policies. The document generation process gathers information from third-party systems to produce situation- or application-specific generated documents.
Methods, systems, and computer program products for detection of personally identifiable information (PII). A first detector and a second detector are configured to interoperate. The first detector is different from the second detector and the second detector incurs a greater computational cost than the first detector when processing identical content. Content is presented to the first detector so as to implement a first type of PII detection that is based at least in part on regular expression analysis using regular expressions. The content is presented to the second detector. The second detector performs PII detection based on content analysis that is different from the first detector's regular expression analysis. The second detector causes generation of new regular expressions based on the content analysis and the first detector is updated with such new regular expressions. Performance of the first detector is continually improved as new regular expressions are generated.
Systems and methods for folder synchronization and offline synchronization via a mobile platform in a web-based collaboration environment are disclosed. One embodiment includes synchronizing user selected folders and/or sub-folders via the mobile platform, using portable devices including smart phones and tablets using any mobile operating system to allow offline access. Child or sub-folders of the selected folders and/or sub-folders are automatically detected and synchronized for offline access. Any change or new content detected on the client side or on the server side is also synchronized such that the selected folders and/or sub-folders on the client and server sides are up to date.
G06F 16/00 - Recherche d’informationsStructures de bases de données à cet effetStructures de systèmes de fichiers à cet effet
G06F 16/176 - Support d’accès partagé aux fichiersSupport de partage de fichiers
G06F 16/178 - Techniques de synchronisation des fichiers dans les systèmes de fichiers
G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuéesArchitectures de systèmes de bases de données distribuées à cet effet
Disclosed is an improved systems, methods, and computer program products that use a cluster-based probability model to perform anomaly detection, where the clusters are based upon entities and interactions that exist in content management platforms.
According to one embodiment, a method for performing domain-wide authentication and authorization in a cloud-based environment can comprise receiving, from a third-party service of the cloud-based environment, a request to perform authentication and authorization of a user of the third-party service for accessing a cloud-based storage system of the cloud-based environment. A mapping of the user of the third-party service to a user account of the cloud-based storage system can be generated and one or more tokens for the user of the third-party service can in turn be generated based on the mapping of the user of the third-party service to the user account of the cloud-based storage system. The one or more tokens can provide access to services of the cloud-based storage system. The one or more tokens can be provided to the third-party service.
Methods, systems, and computer program products for content management systems. Multiple components are operatively interconnected to carry out operations for content management systems. Content objects of a content management system (CMS) are managed from original creation through to final disposition (e.g., deletion). The CMS communicates with a security threat management facility (STMF). In operation, the STMF establishes a first set of security parameters corresponding to information derived from packet inspection, whereas the CMS establishes a second set of security parameters corresponding to information derived at least in part by analysis of user activities or contents of the content object. A security perimeter is formed by combining the first set of security parameters and a second set of security parameters. Risks or vulnerabilities corresponding to the content object are minimized by choosing the lower of any two compared parameters to define a lower risk perimeter for the content object.
Methods, systems, and computer program products for content management systems. Multiple components are operatively interconnected to carry out operations for content management systems. A security threat management facility (STMF) is identified. The STMF contains a database of threat assessment values in addition to further information pertaining to one or more users. Concurrent with operation of the STMF, a content management system (CMS) tracks user-initiated content object interaction events. Based on analysis of the tracked user-initiated content object interaction events, a further threat assessment value is generated by the CMS. Such a further threat assessment is determined based on one or more user-to-user relationships or one or more user-to-file relationships as determined at the content management system. An augmented threat assessment is formed using both the threat assessment values of the STMF with the further threat assessment value from the CMS. The augmented threat assessment is then provided to the STMF.
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
A recommendation system integrated with a content management system (CMS). The CMS stores instances of shared content objects and coordinates user interactions by and between a plurality of CMS users. Shared content objects are divided into a plurality of portions, after which any user interactions over the various portions of the content object are observed and analyzed. User interest inferences are drawn from analysis of the observed user interactions taken user over respective particular portions of the content object. Based on the inferred user interests, fine-grained recommendations are formed and propagated. Some fine-grained recommendations refer to further content objects (e.g., content objects of different types). Some fine-grained recommendations are propagated to other CMS users (e.g., to a plurality of CMS users that are related in some way). The fine-grained recommendations refer to one or more specific portions of a content object as well as to the content object itself.
H04N 21/25 - Opérations de gestion réalisées par le serveur pour faciliter la distribution de contenu ou administrer des données liées aux utilisateurs finaux ou aux dispositifs clients, p. ex. authentification des utilisateurs finaux ou des dispositifs clients ou apprentissage des préférences des utilisateurs pour recommander des films
H04N 21/258 - Gestion de données liées aux clients ou aux utilisateurs finaux, p. ex. gestion des capacités des clients, préférences ou données démographiques des utilisateurs, traitement des multiples préférences des utilisateurs finaux pour générer des données collaboratives
38.
WEB MEETING INTEGRATIONS WITH CONTENT MANAGEMENT SYSTEMS
Methods, systems, and computer program products. A virtual canvas is presented in an active area of an online meeting facility that renders participant-specific online virtual canvas interactions raised by a respective plurality of users' devices. Users can see and hear each other's interactions during an virtual canvas session. Annotations include drawings, content object edits, voice annotations, etc. that correspond to a displayed portion of a content object of a content management system (CMS). Based on the interactions and/or inferences made based on those interactions, the virtual canvas system generates commands to be executed by the content management system. Characteristics of interactions between users can be enriched by drawing information from the content management system and using such information in combination with the interactions themselves. The CMS can recommend teams, and action items, and the CMS can provide hints to participants, so as to facilitate more effective engagement between the participants.
G06F 3/0484 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p. ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs
G06F 3/0482 - Interaction avec des listes d’éléments sélectionnables, p. ex. des menus
G06F 40/169 - Annotation, p. ex. données de commentaires ou notes de bas de page
39.
CONTENT MANAGEMENT SYSTEM INTEGRATIONS WITH WEB MEETINGS
Methods, systems, and computer program products. A virtual canvas is presented in an active area of an online meeting facility that renders participant-specific online virtual canvas interactions raised by a respective plurality of users' devices. Users can see and hear each other's interactions during an virtual canvas session. Annotations include drawings, content object edits, voice annotations, etc. that correspond to a displayed portion of a content object of a content management system (CMS). Based on the interactions and/or inferences made based on those interactions, the virtual canvas system generates commands to be executed by the content management system. Characteristics of interactions between users can be enriched by drawing information from the content management system and using such information in combination with the interactions themselves. The CMS can recommend teams, and action items, and the CMS can provide hints to participants, so as to facilitate more effective engagement between the participants.
Methods, systems and computer program products for content management systems. The techniques of the methods, systems and/or computer program products automatically determine activity-based content object access permissions and/or make a recommendation of activity-based content object access permissions. A machine learning model is formed from observations of user interactions over a plurality of content objects. The model is continually updated based on ongoing observation and analysis of user interaction events. When a collaborative relationship is formed between an invitor and one or more invitees, the activity-based permissions model is accessed to determine a set of access permissions to assign to the collaborative relationship. A single collaborative relationship may cover many collaboration objects. In some cases, a set of access permissions are automatically assigned to the collaborative relationship. In other cases, a set of access permissions is presented to the invitor as a recommendation. A user can accept or reject any recommendation.
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
G06F 16/11 - Administration des systèmes de fichiers, p. ex. détails de l’archivage ou d’instantanés
G06F 21/53 - Contrôle des utilisateurs, des programmes ou des dispositifs de préservation de l’intégrité des plates-formes, p. ex. des processeurs, des micrologiciels ou des systèmes d’exploitation au stade de l’exécution du programme, p. ex. intégrité de la pile, débordement de tampon ou prévention d'effacement involontaire de données par exécution dans un environnement restreint, p. ex. "boîte à sable" ou machine virtuelle sécurisée
G06N 5/04 - Modèles d’inférence ou de raisonnement
G06F 21/57 - Certification ou préservation de plates-formes informatiques fiables, p. ex. démarrages ou arrêts sécurisés, suivis de version, contrôles de logiciel système, mises à jour sécurisées ou évaluation de vulnérabilité
Scalable architectures, systems, and services are provided herein for generating jobs by applying user-specified rules to events in an action log framework (ALF) stream is disclosed. More specifically, collaboration environments can include features or mechanisms that allow end-users or collaborators to perform a variety of actions such as, for example, file uploads and previews, or collaboration operations such as, for example, task assignment and comments. These actions can be captured or logged by an action log framework and, as described herein, automatically translated into one or more jobs by applying customizable user-specified rules.
H04L 65/401 - Prise en charge des services ou des applications dans laquelle les services impliquent une session principale en temps réel et une ou plusieurs sessions parallèles additionnelles en temps réel ou sensibles au temps, p. ex. accès partagé à un tableau blanc ou mise en place d’une sous-conférence
G06F 3/048 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI]
Methods, systems and computer program products for content management systems. In a computing environment having multiple interconnected computer systems, one or more network communication links between a first computer system that hosts a first application and a second computer system that hosts one or more second applications are established. The first computer system hosts a plurality of shared content objects that can be operated over by any second applications that are interfaced with the first application. Particular interaction events over a shared content object take place at the second applications and/or at the interfaces between the first and second applications. Such particular interaction events are recorded as they occur, after which, based on event attributes associated with the particular interaction events, at least one workflow of the first application is selected. The selected workflow of the first application is executed to perform operations over the shared content object.
Embodiments of the disclosure provide systems and methods for identifying collaborators on migrated content and determining which, if any, of those collaborators should be allowed access to the content on the target system of that migration. According to one embodiment, a method for migrating content and a plurality of collaborators on the content from a source system to a target system can comprise initiating, by a migration control system, migration of the content from the source system to the target system and analyzing, by the migration control system, while the migration is being conducted, the content being migrated from the source system to the target system. One or more policies can be applied to the content and the plurality of collaborators on the content being migrated from the source system to the target system by the migration control system while the migration is being conducted.
Embodiments of the disclosure provide systems and methods for reducing the capacity used to provide High Availability (HA) and Disaster Recovery (DR) in a distributed computing environment. According to one embodiment, dynamic recovery of a cloud-based resource can comprise setting a current latency value to an initial latency value and handling received requests with the current latency value. Current resource utilization can be detected while requests are being processed and a determination can be made as to whether the detected current resource utilization exceeds a predetermined threshold amount of resource utilization. In response to determining the detected current resource utilization does not exceed the threshold, the current latency amount can be maintained at the initial latency value. In response to determining the detected current resource utilization exceeds the threshold, the current latency value can be adjusted and injected into handling of received client requests.
Systems and methods for forming collaboration recommendations. Techniques for forming event-based recommendations use time-decayed event values. A shared content management system supports a plurality of users that generate events by interacting with content objects of the shared content management system. Events over the content objects are captured as event objects. Method steps are invoked upon receiving event objects that describes user-to-object interaction events that arise from interactions by users over content objects. Different types of interactions carry different importance values. The importance values can be applied as weights when scoring user-to-object interaction activities. The importance can decay over time. As time progresses and as the importance of older interactions decay, score components of a user-to-object interaction can be updated based at least in part on a time decay function. The system emits collaboration recommendations based on the decayed user-to-user collaboration scores.
G06Q 10/1093 - Ordonnancement basé sur un agenda pour des personnes ou des groupes
G06Q 10/02 - Réservations, p. ex. pour billetterie, services ou manifestations
G06F 16/435 - Filtrage basé sur des données supplémentaires, p. ex. sur des profils d'utilisateurs ou de groupes
G06F 16/48 - Recherche caractérisée par l’utilisation de métadonnées, p. ex. de métadonnées ne provenant pas du contenu ou de métadonnées générées manuellement
46.
VIRTUAL FILE SYSTEM FOR CLOUD-BASED SHARED CONTENT
A server in a cloud-based environment interfaces with storage devices that store shared content accessible by two or more users. Individual items within the shared content are associated with respective object metadata that is also stored in the cloud-based environment. Download requests initiate downloads of instances of a virtual file system module to two or more user devices associated with two or more users. The downloaded virtual file system modules capture local metadata that pertains to local object operations directed by the users over the shared content. Changed object metadata attributes are delivered to the server and to other user devices that are accessing the shared content. Peer-to-peer connections can be established between the two or more user devices. Object can be divided into smaller portions such that processing the individual smaller portions of a larger object reduces the likelihood of a conflict between user operations over the shared content.
H04L 67/1097 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour le stockage distribué de données dans des réseaux, p. ex. dispositions de transport pour le système de fichiers réseau [NFS], réseaux de stockage [SAN] ou stockage en réseau [NAS]
G06F 12/0891 - Adressage d’un niveau de mémoire dans lequel l’accès aux données ou aux blocs de données désirés nécessite des moyens d’adressage associatif, p. ex. mémoires cache utilisant des moyens d’effacement, d’invalidation ou de réinitialisation
G06F 12/122 - Commande de remplacement utilisant des algorithmes de remplacement du type le moins fréquemment utilisé [LFU], p. ex. avec valeur de comptage individuelle
H04L 67/06 - Protocoles spécialement adaptés au transfert de fichiers, p. ex. protocole de transfert de fichier [FTP]
H04N 19/40 - Procédés ou dispositions pour le codage, le décodage, la compression ou la décompression de signaux vidéo numériques utilisant le transcodage vidéo, c.-à-d. le décodage partiel ou complet d’un flux d’entrée codé suivi par un ré-encodage du flux de sortie décodé
H04L 65/80 - Dispositions, protocoles ou services dans les réseaux de communication de paquets de données pour prendre en charge les applications en temps réel en répondant à la qualité des services [QoS]
Methods, systems and computer program products for shared content management systems that provide performance analytics pertaining to a project. Embodiments include establishing one or more network communication links between a content management system that manages a plurality of shared content objects and a plurality of applications that cause modifications to the shared content objects in accordance with workflows of the project. Iteraction events that correspond to modifications over the shared content objects are recorded such that interaction events associated with the plurality of applications are selected based at least in part on attributes associated with the interaction events. Relationships between the recorded interaction events such as time durations between certain of the interaction events are calculated. Project performance measurements are generated based on the calculations and/or based on other relationships between the interaction events. The calculations may span across many different applications and/or many different departments and/or many different enterprises.
G06Q 10/0637 - Gestion ou analyse stratégiques, p. ex. définition d’un objectif ou d’une cible pour une organisationPlanification des actions en fonction des objectifsAnalyse ou évaluation de l’efficacité des objectifs
G06Q 10/0639 - Analyse des performances des employésAnalyse des performances des opérations d’une entreprise ou d’une organisation
G06Q 30/0201 - Modélisation du marchéAnalyse du marchéCollecte de données du marché
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Downloadable computer software for document management;
downloadable file sharing software; downloadable software
for enabling users to access, upload, download, create,
view, edit, print, store, exchange, publish, distribute,
transfer, secure, share, transmit, control access to and
manage digital media and information, data, documents,
files, text, graphics, images, photographs, and electronic
messages and to manage, organize, distill, query, interpret,
and create workflow with such content collaboratively online
and offline leveraging ai technology; downloadable software
for creating, generating, editing, querying, interpreting,
distilling, summarizing, and managing content leveraging ai
technology, and for providing chatbot software for
simulating conversations; recorded software for creating,
generating, editing, querying, interpreting, distilling,
summarizing, and managing content leveraging ai technology,
and for providing chatbot software for simulating
conversations; recorded software for enabling users to
access, upload, download, create, view, edit, print, store,
exchange, publish, distribute, transfer, secure, share,
transmit, control access to and manage digital media and
information, data, documents, files, text, graphics, images,
photographs, and electronic messages and to manage,
organize, distill, query, interpret, and create workflow
with such content collaboratively online and offline
leveraging ai technology. Providing temporary use of online non-downloadable software
enabling users to upload and download electronic files via a
website; providing on-line non-downloadable software for
creating, generating, editing, querying, interpreting,
distilling, summarizing, and managing content leveraging ai
technology, and for providing chatbot software for
simulating conversations; providing on-line non-downloadable
software for enabling users to access, upload, download,
create, view, edit, print, store, exchange, publish,
distribute, transfer, secure, share, transmit, control
access to and manage digital media and information, data,
documents, files, text, graphics, images, photographs, and
electronic messages and to manage, organize, distill, query,
interpret, and create workflow with such content
collaboratively online and offline leveraging ai technology;
providing temporary use of online non-downloadable file
sharing software; software as a service (saas) services
featuring software for creating, generating, editing,
querying, interpreting, distilling, summarizing, and
managing content leveraging ai technology, and for providing
chatbot software for simulating conversations; software as a
service (saas) services featuring software for enabling
users to access, upload, download, create, view, edit,
print, store, exchange, publish, distribute, transfer,
secure, share, transmit, control access to and manage
digital media and information, data, documents, files, text,
graphics, images, photographs, and electronic messages and
to manage, organize, distill, query, interpret, and create
workflow with such content collaboratively online and
offline leveraging ai technology.
Methods, systems, and computer program products for content management systems. Multiple components are operatively interconnected to carry out operations for establishing a user device trust level. A content management system facilitates interactions between a plurality of user devices and a plurality of shared content objects. The plurality of user devices are network connected to the content management system. One of the user devices issues a request to access a particular one of the content objects. Responsive to the request, a two-step device check is performed before granting access to the particular one of the content objects. A first step of the two-step device check process is based on environmental information, and a second step of the two-step device check process is based at least in part on analysis of the content of the particular one of the content objects. The actual bits of the content object itself are inspected.
G06F 21/00 - Dispositions de sécurité pour protéger les calculateurs, leurs composants, les programmes ou les données contre une activité non autorisée
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
G06F 21/64 - Protection de l’intégrité des données, p. ex. par sommes de contrôle, certificats ou signatures
50.
Low latency and low defect media file transcoding using optimized storage, retrieval, partitioning, and delivery techniques
Systems, methods and computer program products for high-performance, low latency start-up of large shared media files. A method for low latency startup with low defect playback commences upon identifying a first media file having a first format to be converted to a second media file having a second format. A scheduler divides the first media file into multiple partitions separated by partition boundaries. The method continues by converting the partitions into respective converted partitions that comport with the second format. Determinations as to the position of the partition boundaries is made based on measurable conditions present at a particular moment in time. Different formats receive different treatment based on the combination of characteristics of the first format, characteristics of the second format, as well as on characteristics of measurable conditions present at the moment in time just before conversion of a segment.
H04N 19/40 - Procédés ou dispositions pour le codage, le décodage, la compression ou la décompression de signaux vidéo numériques utilisant le transcodage vidéo, c.-à-d. le décodage partiel ou complet d’un flux d’entrée codé suivi par un ré-encodage du flux de sortie décodé
G06F 9/46 - Dispositions pour la multiprogrammation
G06F 12/0891 - Adressage d’un niveau de mémoire dans lequel l’accès aux données ou aux blocs de données désirés nécessite des moyens d’adressage associatif, p. ex. mémoires cache utilisant des moyens d’effacement, d’invalidation ou de réinitialisation
G06F 12/1081 - Traduction d'adresses pour accès périphérique à la mémoire principale, p. ex. accès direct en mémoire [DMA]
G06F 12/122 - Commande de remplacement utilisant des algorithmes de remplacement du type le moins fréquemment utilisé [LFU], p. ex. avec valeur de comptage individuelle
G06F 16/11 - Administration des systèmes de fichiers, p. ex. détails de l’archivage ou d’instantanés
G06F 16/17 - Détails d’autres fonctions de systèmes de fichiers
G06F 16/172 - Mise en cache, pré-extraction ou accumulation de fichiers
G06F 16/174 - Élimination de redondances par le système de fichiers
G06F 16/176 - Support d’accès partagé aux fichiersSupport de partage de fichiers
H04L 65/70 - Mise en paquets adaptés au réseau des données multimédias
H04L 65/75 - Gestion des paquets du réseau multimédia
H04L 65/80 - Dispositions, protocoles ou services dans les réseaux de communication de paquets de données pour prendre en charge les applications en temps réel en répondant à la qualité des services [QoS]
H04L 67/00 - Dispositions ou protocoles de réseau pour la prise en charge de services ou d'applications réseau
H04L 67/06 - Protocoles spécialement adaptés au transfert de fichiers, p. ex. protocole de transfert de fichier [FTP]
H04L 67/1097 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour le stockage distribué de données dans des réseaux, p. ex. dispositions de transport pour le système de fichiers réseau [NFS], réseaux de stockage [SAN] ou stockage en réseau [NAS]
Management of web conference assets in a content management system. At the conclusion of a web conferencing session, an event is raised at the content management system. Various web conference assets (e.g., recordings) and web conference parameters are analyzed in conjunction with content management system metadata. Based on the analysis, one or more actions to perform on the web conference assets are determined. The content management system metadata may include user profile information of at least one web conference participant. Rules and/or a classification model that considers then-current conditions at the content management system are used singly, or in combination, to determine action characteristics and/or labels such as a retention period or security classifications to apply to the web conference assets. The web conference assets are stored in a hierarchical directory at the content management system. The hierarchy of the directory is derived from aspects of the web conferencing facility.
G06F 16/907 - Recherche caractérisée par l’utilisation de métadonnées, p. ex. de métadonnées ne provenant pas du contenu ou de métadonnées générées manuellement
52.
SYNTHETIC TRAINING DATASETS FOR PERSONALLY IDENTIFIABLE INFORMATION CLASSIFIERS
Handling user-demanded privacy controls over data of an electronic document collaboration system. A storage facility is configured to store content objects and associated metadata that pertains to the content objects. A user raises a privacy action request that comprises a demand to change how certain content objects that contain personally identifiable information (PII) of the user are handled. A plurality of content objects are classified using a PII classifier that is trained using synthetically-generated training set entries where, rather than reading actual contents from electronic documents of the collaboration system to generate training set entries, instead, the training set entries are generated using words that are randomly selected from a repository of natural language words. When PII corresponding to the user who raised the privacy action request is discovered in content objects, then the content management system modifies those content objects and/or its metadata in accordance with the demand.
Techniques for monitoring local and/or remote file systems by a synchronization component (e.g., client/server) of a cloud-based platform are disclosed. In some embodiments, a method of building synchronization events by a synchronization component (e.g., a synchronization server/client) includes obtaining a set of items that have been changed and their new states and retrieving last known states of the set of items that are stored in a reference snapshot inside a filesystem scanner. The method further includes generating differences between the new states and the last known states of the set of items as item changes and utilizing information provided by the item changes to translate the item changes into synchronization events for execution on the opposing file system. A method of handling failed synchronization events by a synchronization component of the cloud-based platform by collapsing a subsequent event with the failed synchronization event is also disclosed.
G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuéesArchitectures de systèmes de bases de données distribuées à cet effet
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
(1) Downloadable computer software for document management; downloadable file sharing software; downloadable software for enabling users to access, upload, download, create, view, edit, print, store, exchange, publish, distribute, transfer, secure, share, transmit, control access to and manage digital media and information, namely, data, documents, files, text, graphics, images, photographs, and electronic messages and to manage, organize, distill, query, interpret, and create workflow with such content collaboratively online and offline leveraging AI technology; downloadable software leveraging AI technology for creating, generating, editing, querying, interpreting, distilling, summarizing, and managing digital content in the nature of business, corporate, and personal records and documents, spreadsheets, presentations, electronic messages, audio and video recordings, images, and photographs, and for providing chatbot software for simulating conversations; recorded software leveraging AI technology for creating, generating, editing, querying, interpreting, distilling, summarizing, and managing digital content in the nature of business, corporate, and personal records and documents, spreadsheets, presentations, electronic messages, audio and video recordings, images, and photographs, and for providing chatbot software for simulating conversations; recorded software for enabling users to access, upload, download, create, view, edit, print, store, exchange, publish, distribute, transfer, secure, share, transmit, control access to and manage digital media and information, namely, data, documents, files, text, graphics, images, photographs, and electronic messages and to manage, organize, distill, query, interpret, and create workflow with such content collaboratively online and offline leveraging AI technology. (1) Providing temporary use of online non-downloadable software enabling users to upload and download electronic files via a website; providing on-line non-downloadable software leveraging AI technology for creating, generating, editing, querying, interpreting, distilling, summarizing, and managing digital content in the nature of business, corporate, and personal records and documents, spreadsheets, presentations, electronic messages, audio and video recordings, images, and photographs, and for providing chatbot software for simulating conversations; providing on-line non-downloadable software for enabling users to access, upload, download, create, view, edit, print, store, exchange, publish, distribute, transfer, secure, share, transmit, control access to and manage digital media and information, namely, data, documents, files, text, graphics, images, photographs, and electronic messages and to manage, organize, distill, query, interpret, and create workflow with such content collaboratively online and offline leveraging AI technology; providing temporary use of online non-downloadable file sharing software; software as a service (saas) services featuring software leveraging AI technology for creating, generating, editing, querying, interpreting, distilling, summarizing, and managing digital content in the nature of business, corporate, and personal records and documents, spreadsheets, presentations, electronic messages, audio and video recordings, images, and photographs, and for providing chatbot software for simulating conversations; software as a service (saas) services featuring software for enabling users to access, upload, download, create, view, edit, print, store, exchange, publish, distribute, transfer, secure, share, transmit, control access to and manage digital media and information, namely, data, documents, files, text, graphics, images, photographs, and electronic messages and to manage, organize, distill, query, interpret, and create workflow with such content collaboratively online and offline leveraging AI technology.
55.
Synchroniznig files having filenames with illegal characters
Embodiments are directed to synchronizing files between client devices utilizing different file systems with different filename restrictions. Generally speaking, a server of a cloud-based storage environment can, upon generation of a file or receiving a file from a first client device, detect any “illegal” characters therein, i.e., characters that are predefined by a file system of a second client device of the environment as being impermissible for use in a filename, and substitute a replacement character for those illegal characters. This replacement character can comprise a character that is permissible by the file system of both the first and second client devices, thereby allowing synchronization and access. Additionally, the server(s) can identify the original filename from the first client device and substitute the replacement characters back to the original filename when the file is being accessed by or synchronized with the first client device.
Disclosed is an approach for performing auto-classification of documents. A machine learning framework is provided to analyze the document, where labels associated with certain documents can be propagated to other documents.
G06F 16/383 - Recherche caractérisée par l’utilisation de métadonnées, p. ex. de métadonnées ne provenant pas du contenu ou de métadonnées générées manuellement utilisant des métadonnées provenant automatiquement du contenu
Methods, systems, and computer program products for a content management system. Embodiments operate within or in conjunction with such a content management system. The content management system stores content objects for access by various collaborators, including extra-system collaborators. A user of the content management system configures extra-enterprise shared link URLs that permit the extra-system collaborators to access shared content objects over an Internet connection. A shared link event graph data structure is formed based on access requests over the extra-enterprise shared link URLs. An interactive user interface module is generated by processing a shared link report query over the shared link event graph data structure to select a subject set of the extra-enterprise shared link URLs, and to generate a data set of the interactive user interface module based at least in part on results from the query. A user interacts with the interactive user interface module to generate insights.
According to one embodiment, distributing data across a plurality of storage shards can comprise generating a file key for each file of a plurality of files stored in a plurality of physical shards, each physical shard maintained by a node of a plurality of nodes in one or more clusters. The file key can comprise a hash of an enterprise identifier for an entity to which the creator of the file is a member, a hash of a folder identifier for a location in which the file is stored, and a hash of a file identifier uniquely identifying the file. The generated file keys can be sorted into an ordered list and the ordered list can be logically partitioning into a plurality of logical shards. Each logical shard of the plurality of logical shards can then be mapped to one of the plurality of physical shards.
09 - Appareils et instruments scientifiques et électriques
Produits et services
Downloadable computer software for document management; Downloadable file sharing software; Downloadable software for enabling users to access, upload, download, create, view, edit, print, store, exchange, publish, distribute, transfer, secure, share, transmit, control access to and manage digital media and information, data, documents, files, text, graphics, images, photographs, and electronic messages and to manage, organize, distill, query, interpret, and create workflow with such content collaboratively online and offline leveraging AI technology; Downloadable software for creating, generating, editing, querying, interpreting, distilling, summarizing, and managing content leveraging AI technology, and for providing chatbot software for simulating conversations; Recorded software for creating, generating, editing, querying, interpreting, distilling, summarizing, and managing content leveraging AI technology, and for providing chatbot software for simulating conversations; Recorded software for enabling users to access, upload, download, create, view, edit, print, store, exchange, publish, distribute, transfer, secure, share, transmit, control access to and manage digital media and information, data, documents, files, text, graphics, images, photographs, and electronic messages and to manage, organize, distill, query, interpret, and create workflow with such content collaboratively online and offline leveraging AI technology
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
File sharing services, namely, providing a website featuring technology enabling users to upload and download electronic files; Providing on-line non-downloadable software for creating, generating, editing, querying, interpreting, distilling, summarizing, and managing content leveraging AI technology, and for providing chatbot software for simulating conversations; Providing on-line non-downloadable software for enabling users to access, upload, download, create, view, edit, print, store, exchange, publish, distribute, transfer, secure, share, transmit, control access to and manage digital media and information, data, documents, files, text, graphics, images, photographs, and electronic messages and to manage, organize, distill, query, interpret, and create workflow with such content collaboratively online and offline leveraging AI technology; Providing temporary use of online non-downloadable file sharing software; Software as a service (SAAS) services featuring software for creating, generating, editing, querying, interpreting, distilling, summarizing, and managing content leveraging AI technology, and for providing chatbot software for simulating conversations; Software as a service (SAAS) services featuring software for enabling users to access, upload, download, create, view, edit, print, store, exchange, publish, distribute, transfer, secure, share, transmit, control access to and manage digital media and information, data, documents, files, text, graphics, images, photographs, and electronic messages and to manage, organize, distill, query, interpret, and create workflow with such content collaboratively online and offline leveraging AI technology
61.
User device processing of information from a network-accessible collaboration system
Executable code comprising a local file system is stored at a collaboration system server for downloading. The remote collaboration system responds to a message from a user device to download the local file system. The local file system to be downloaded is configured to operate on the user device so as to issue requests from the user device to perform an initial access to server-side collaboration data. The collaboration system responds to such requests by predicting interests of the user, which predictions are used to retrieve additional server-side collaboration data. The additional server-side collaboration data is sent to the user device and stored on the user device in an area for locally-stored collaboration system information. The user provides search terms for searching the locally-stored collaboration system information, and results are displayed on the user device. The results are displayed without the need to perform additional communications with remote collaboration system.
H04L 65/401 - Prise en charge des services ou des applications dans laquelle les services impliquent une session principale en temps réel et une ou plusieurs sessions parallèles additionnelles en temps réel ou sensibles au temps, p. ex. accès partagé à un tableau blanc ou mise en place d’une sous-conférence
G06F 16/14 - Détails de la recherche de fichiers basée sur les métadonnées des fichiers
G06F 16/16 - Opérations sur les fichiers ou les dossiers, p. ex. détails des interfaces utilisateur spécialement adaptées aux systèmes de fichiers
G06F 16/248 - Présentation des résultats de requêtes
G06F 16/9535 - Adaptation de la recherche basée sur les profils des utilisateurs et la personnalisation
H04L 67/06 - Protocoles spécialement adaptés au transfert de fichiers, p. ex. protocole de transfert de fichier [FTP]
H04L 67/1097 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour le stockage distribué de données dans des réseaux, p. ex. dispositions de transport pour le système de fichiers réseau [NFS], réseaux de stockage [SAN] ou stockage en réseau [NAS]
62.
Methods and systems for storing and associating objects in a storage system
Embodiments are directed to association of storage objects in a multi-tenant, cloud-based storage environment. More specifically, a first object can be made available in the file system of the environment and can be accessed, for example, by its file or object name. At some point thereafter, an auxiliary object can be provided that is related to the first object. For example, this auxiliary object can comprise metadata or other content associated with or related to the first object. According to one embodiment, this auxiliary object can be assigned an identifier that not only uniquely identifies the auxiliary object but also identifies, within the identifier itself, the relationship to the first object. This relational naming can be used to track the relationship between objects, e.g., to update the auxiliary object based on changes to the first object, but without a separate mapping of the objects.
Methods, systems, and computer program products for application-specific, real-time modification of application programming interface behavior. Meaning is derived from analysis of human-readable intelligence found in a collaboration object of a content management system. The meaning is used to inform the behavior of an application programming interface that is exposed to applications that interface with the content management system. The content management system invokes a range of analysis modules that examine the human-intelligible contents of a requested collaboration object to determine meaning from the human-intelligible contents. Content-derived tags are emitted based on the analysis. When the application invokes an entry point of the API, a set of content-derived tags are associated with the application, and the occurrence and/or values of the content-derived tags are then used in rules. The results of evaluation of the rules determine how the API will respond to the application.
Methods, systems, and computer program products. A virtual canvas is presented in an active area of an online meeting facility that renders participant-specific online virtual canvas interactions raised by a respective plurality of users' devices. Users can see and hear each other's interactions during an virtual canvas session. Annotations include drawings, content object edits, voice annotations, etc. that correspond to a displayed portion of a content object of a content management system (CMS). Based on the interactions and/or inferences made based on those interactions, the virtual canvas system generates commands to be executed by the content management system. Characteristics of interactions between users can be enriched by drawing information from the content management system and using such information in combination with the interactions themselves. The CMS can recommend teams, and action items, and the CMS can provide hints to participants, so as to facilitate more effective engagement between the participants.
Methods, systems, and computer program products for gathering electronic signatures to be applied to collaboration system content objects (e.g., contracts, letters, insurance claims, riders, etc.). A collaboration system monitors changes made to the collaboration system content objects during electronic signature processing. A module of the content management system is configured to associate one or more instances of e-signing metadata to one or more of the stored content objects of the content management system. The e-signing metadata indicates whether or not a particular portion of the one or more of the stored content objects has been e-signed by a designated e-signatory. A collaborator who is not one of the designated e-signatories makes a change to one or more of the stored content objects (e.g., contracts, letters, insurance claims, riders, etc.). The change is remediated on-the-fly and the e-signing process continues without having to restart the e-signing process from the beginning.
G06Q 10/101 - Création collaborative, p. ex. développement conjoint de produits ou de services
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Methods, systems and computer program products for shared content management systems. In a content management system that supports multiple applications that operate on shared documents, multiple modules are operatively interconnected to make and present activity-based application recommendations. Techniques for making activity-based application recommendations include recording a series of interaction events from multiple users, which events correspond to a series of interactions performed by a plurality of applications over a shared content object. Constituent interaction events from the series of interactions are analyzed to determine a set of recommended applications. The set of recommended applications is presented to a user in a dynamically-populated user interface.
G06F 16/00 - Recherche d’informationsStructures de bases de données à cet effetStructures de systèmes de fichiers à cet effet
G06F 9/451 - Dispositions d’exécution pour interfaces utilisateur
G06F 16/9535 - Adaptation de la recherche basée sur les profils des utilisateurs et la personnalisation
G06F 16/9536 - Personnalisation de la recherche basée sur le filtrage social ou collaboratif
G06F 16/955 - Recherche dans le Web utilisant des identifiants d’information, p. ex. des localisateurs uniformisés de ressources [uniform resource locators - URL]
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
H04L 65/401 - Prise en charge des services ou des applications dans laquelle les services impliquent une session principale en temps réel et une ou plusieurs sessions parallèles additionnelles en temps réel ou sensibles au temps, p. ex. accès partagé à un tableau blanc ou mise en place d’une sous-conférence
H04L 65/403 - Dispositions pour la communication multipartite, p. ex. pour les conférences
H04L 67/141 - Configuration des sessions d'application
Systems for centralized processing of regulatory control events. A method embodiment applies regulatory compliance rules against regulatory control events that occur at a plurality of heterogeneous remote cloud-based systems. A centralized cloud-based platform manages the compliance of the plurality of heterogeneous remote cloud-based systems by applying a set of data compliance rules pertaining to regulatory controls. The regulatory controls pertain to data access events and data manipulation events that occur on the plurality of computing systems. The centralized cloud-based platform receives control event messages, the control event messages being raised any one or more of the heterogeneous remote cloud-based systems. Rules are processed against the received control event messages to determine a set of compliance actions. Compliance action occurrences are logged in a log facility such that at any moment in time, an audit can be run over the logged events so as to verify and report compliance or non-compliance.
G06Q 10/06 - Ressources, gestion de tâches, des ressources humaines ou de projetsPlanification d’entreprise ou d’organisationModélisation d’entreprise ou d’organisation
68.
Mobile platform file and folder selection functionalities for offline access and synchronization
Systems and methods for folder synchronization and offline synchronization via a mobile platform in a web-based collaboration environment are disclosed. One embodiment includes synchronizing user selected folders and/or sub-folders via the mobile platform, using portable devices including smart phones and tablets using any mobile operating system to allow offline access. Child or sub-folders of the selected folders and/or sub-folders are automatically detected and synchronized for offline access. Any change or new content detected on the client side or on the server side is also synchronized such that the selected folders and/or sub-folders on the client and server sides are up to date.
G06F 16/00 - Recherche d’informationsStructures de bases de données à cet effetStructures de systèmes de fichiers à cet effet
G06F 16/27 - Réplication, distribution ou synchronisation de données entre bases de données ou dans un système de bases de données distribuéesArchitectures de systèmes de bases de données distribuées à cet effet
G06F 16/176 - Support d’accès partagé aux fichiersSupport de partage de fichiers
G06F 16/178 - Techniques de synchronisation des fichiers dans les systèmes de fichiers
69.
Configurable metadata-based automation and content classification architecture for cloud-based collaboration platforms
Scalable architectures, systems, and services are provided herein for generating jobs by applying user-specified metadata rules to metadata events. More specifically, the scalable architecture described herein uses metadata to drive automations and/or polices in a cloud-based environment. In one embodiment, the architecture integrates a metadata service with an event-based automation engine to automatically trigger polices and/or automations based on metadata and/or changes in metadata changes. The metadata service can include customizable and/or pre-build metadata templates which can be used to automatically apply a metadata framework (e.g., particular fields) to files based on, for example, the upload or placement of a particular file in a particular folder. The architecture also provides for advanced metadata searching and data classification.
G06F 15/16 - Associations de plusieurs calculateurs numériques comportant chacun au moins une unité arithmétique, une unité programme et un registre, p. ex. pour le traitement simultané de plusieurs programmes
H04L 65/403 - Dispositions pour la communication multipartite, p. ex. pour les conférences
H04L 67/10 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau
H04W 4/60 - Services basés sur un abonnement qui utilisent des serveurs d’applications ou de supports d’enregistrement, p. ex. boîtes à outils d’application SIM
G06F 16/11 - Administration des systèmes de fichiers, p. ex. détails de l’archivage ou d’instantanés
G06F 16/14 - Détails de la recherche de fichiers basée sur les métadonnées des fichiers
09 - Appareils et instruments scientifiques et électriques
41 - Éducation, divertissements, activités sportives et culturelles
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Downloadable software development kits (SDK). Education services, namely providing a website featuring
on-line non-downloadable educational material in the fields
of the internet, technology, cloud computing, online
collaboration, file sharing and software development (terms
considered too vague by the International Bureau - Rule 13
(2) (b) of the Regulations); educational services, namely,
conducting classes, workshops, conferences, courses, and
seminars in the field of the internet, technology, cloud
computing, online collaboration, file sharing and software
development. Providing information in the fields of the internet,
technology, cloud computing, online collaboration, file
sharing and software development.
Methods, systems, and computer program products for detection of personally identifiable information (PII). A first detector and a second detector are configured to interoperate. The first detector is different from the second detector and the second detector incurs a greater computational cost than the first detector when processing identical content. Content is presented to the first detector so as to implement a first type of PII detection that is based at least in part on regular expression analysis using regular expressions. The content is presented to the second detector. The second detector performs PII detection based on content analysis that is different from the first detector's regular expression analysis. The second detector causes generation of new regular expressions based on the content analysis and the first detector is updated with such new regular expressions. Performance of the first detector is continually improved as new regular expressions are generated.
Embodiments provide for identifying and resolving conflicts in access permissions migrated data by receiving a set of mappings including path mappings of a hierarchy of data objects on the source system to locations on the target system for migrated data objects. Based on the received set of mappings, permissions controlling access to data objects of the hierarchy of data objects on the source system can be translated to permissions controlling access to the migrated data objects on the target system for one or more user accounts on the target system. One or more conflicts can be detected between permissions on the source system and permissions on the target system. A conflict resolution strategy can be selected from a plurality of conflict resolution strategies and the selected conflict resolution strategy can be applied to the permissions controlling access to the migrated data objects on the target system.
A user interface is configured to present a stream of activities that arise from operation of two or more heterogeneous applications that access shared content objects of a content management system. A first application of a first type among the heterogeneous applications interoperates with a second application of a second type. Application activity records that correspond to interactions by the second application over the shared content objects are stored. Additional interactions that are raised by the first application and that pertain to a common content object are also stored. When a user requests access to a content object of the content management system, recent application activity records are selected. Some of the selected activity records are filtered out based on permissions attributes corresponding to the content object and/or based on permissions attributes corresponding to the requesting user. An application activity stream is generated based on the selected application activity records.
H04L 67/141 - Configuration des sessions d'application
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
G06F 9/451 - Dispositions d’exécution pour interfaces utilisateur
H04L 65/403 - Dispositions pour la communication multipartite, p. ex. pour les conférences
G06F 16/955 - Recherche dans le Web utilisant des identifiants d’information, p. ex. des localisateurs uniformisés de ressources [uniform resource locators - URL]
G06F 16/9535 - Adaptation de la recherche basée sur les profils des utilisateurs et la personnalisation
G06F 16/9536 - Personnalisation de la recherche basée sur le filtrage social ou collaboratif
H04L 65/401 - Prise en charge des services ou des applications dans laquelle les services impliquent une session principale en temps réel et une ou plusieurs sessions parallèles additionnelles en temps réel ou sensibles au temps, p. ex. accès partagé à un tableau blanc ou mise en place d’une sous-conférence
Policy-informed e-signature processing. An electronic signature system (ESS) is interfaced to a content management system (CMS) that stores instances of shared files and coordinates policy-informed interactions with the shared files. Upon detection of an occurrence of an e-signature request event, electronic signature processing is carried out in a manner that observes one or more governance policies that control handling of shared files. When responding to an e-signature request event, the CMS observes the governance policies by issuing an electronic query to a database of parameters, wherein the parameters define metes and bounds of the governance policies. Upon determination that at least some of the governance policies at least potentially apply to the e-signature processing, the ESS and/or the CMS modifies metadata pertaining to one or more workflow objects that are associated with a computer-implemented workflow. The workflow may terminate or be terminated based upon the one or more governance policies.
Securely acquiring and managing electronic-based signatures by a content management system. A content management system exposes content objects to a plurality of collaborators. Executable modules of the content management system implement an Internet-based interface that is configured to acquire electronic-based signatures from a user device. A particular user device is configured to access particular content objects over the Internet-based interface and to acquire an electronic-based signature corresponding to one or more of the particular content objects. When one or more conditions are detected that would at least potentially influence how the acquisition of the electronic-based signature is carried out, then one or more remediation actions are invoked. Various security-specific remediation actions address corresponding security vulnerabilities. Various document-specific remediation actions are determined based on the document conditions that had been detected. In some cases, a plurality of remediation actions are carried out to securely acquire electronic-based signatures from a user device.
H04L 29/06 - Commande de la communication; Traitement de la communication caractérisés par un protocole
H04L 9/32 - Dispositions pour les communications secrètes ou protégéesProtocoles réseaux de sécurité comprenant des moyens pour vérifier l'identité ou l'autorisation d'un utilisateur du système
Scalable architectures, systems, and services are provided herein for generating jobs by applying user-specified rules to events in an action log framework (ALF) stream is disclosed. More specifically, collaboration environments can include features or mechanisms that allow end-users or collaborators to perform a variety of actions such as, for example, file uploads and previews, or collaboration operations such as, for example, task assignment and comments. These actions can be captured or logged by an action log framework and, as described herein, automatically translated into one or more jobs by applying customizable user-specified rules.
G06F 9/451 - Dispositions d’exécution pour interfaces utilisateur
H04L 65/401 - Prise en charge des services ou des applications dans laquelle les services impliquent une session principale en temps réel et une ou plusieurs sessions parallèles additionnelles en temps réel ou sensibles au temps, p. ex. accès partagé à un tableau blanc ou mise en place d’une sous-conférence
Embodiments of the disclosure provide systems and methods for providing random access to segmented and encrypted or compressed data stored in a repository. Retrieving at least a portion of a file stored in a repository can comprise storing a plurality of files in the repository. A request to retrieve at least a portion of one of the plurality of files can be received and object metadata for the requested one of the plurality of files can be obtained. A determination can be made based on the obtained metadata as to whether the requested one of the plurality of files is a multipart file. In response to determining the requested one of the plurality of files is not a multipart file, a single file retrieval process performing and in response to determining the requested one or the plurality of files is a multipart file, a multipart retrieval process can be performed.
G06F 21/78 - Protection de composants spécifiques internes ou périphériques, où la protection d'un composant mène à la protection de tout le calculateur pour assurer la sécurité du stockage de données
H04L 29/08 - Procédure de commande de la transmission, p.ex. procédure de commande du niveau de la liaison
H04L 67/1097 - Protocoles dans lesquels une application est distribuée parmi les nœuds du réseau pour le stockage distribué de données dans des réseaux, p. ex. dispositions de transport pour le système de fichiers réseau [NFS], réseaux de stockage [SAN] ou stockage en réseau [NAS]
H04L 67/06 - Protocoles spécialement adaptés au transfert de fichiers, p. ex. protocole de transfert de fichier [FTP]
A cloud-based content object management system responds to download requests from user devices to provide access to synchronization code. Using the synchronization code, a user device requests, receives, and stores a user-device-local copy of a subject content object. The cloud-based content object management system determines that at least one security-related parameter pertaining to the subject content object has undergone a change and reaches a determination that the user-device-local copy of the subject content object is to be either deleted or quarantined. Upon such determination, the cloud-based content object management system forms eviction instructions and sends them to the user device, which in turn causes deletion or quarantining of the remote content object copy at the user device, while still retaining directory structure metadata that refers to the now evicted subject content object. The subject content object stored at the cloud-based content object management system is synchronized with other user devices.
H04L 67/1095 - Réplication ou mise en miroir des données, p. ex. l’ordonnancement ou le transport pour la synchronisation des données entre les nœuds du réseau
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
(1) Downloadable computer software enabling users to create, edit, download, upload, and share collaborative workspaces and virtual whiteboards; downloadable software enabling users to view, discuss, modify, comment on, embed, and update documents, text, images, voice and video in real time or asynchronously from remote locations featuring collaborative virtual whiteboards and workspaces; downloadable computer software used to create, edit and collaborate on content, documents, text, images, diagrams, information and materials for use in group communication and automated integrations with external service providers featuring collaborative virtual whiteboards and workspace. (1) Providing temporary use of online non-downloadable software enabling users to create, edit, download, upload, and share collaborative workspaces and virtual whiteboards; providing temporary use of online non-downloadable software enabling users to view, discuss, modify, comment on, embed, and update documents, text, images, voice and video in real time or asynchronously from remote locations featuring collaborative virtual whiteboards and workspaces; providing temporary use of online non-downloadable software used to create, edit and collaborate on content, documents, text, images, diagrams, information and materials for use in group communication and automated integrations with external service providers featuring collaborative virtual whiteboards and workspace.
09 - Appareils et instruments scientifiques et électriques
41 - Éducation, divertissements, activités sportives et culturelles
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
(1) Downloadable software development kits (SDK), namely downloadable computer software development programs for assisting developers in creating and developing computer programs and computer software applications for others. (1) Education services, namely, providing on-line non-downloadable educational digital publications and videos in the fields of the internet, internet technology, computer technology, information technology, cloud computing, cloud-based content management, online collaboration, file sharing services and software development, through a website; educational services, namely, conducting classes, workshops, conferences, courses, and seminars in the field of the internet, internet technology, computer technology, information technology, cloud computing, cloud-based content management, online collaboration, file sharing services and software development.
(2) Providing information in the fields of the internet, technology, cloud computing, online collaboration, file sharing and software development
Management of web conference assets in a content management system. At the conclusion of a web conferencing session, an event is raised at the content management system. Various web conference assets (e.g., recordings) and web conference parameters are analyzed in conjunction with content management system metadata. Based on the analysis, one or more actions to perform on the web conference assets are determined. The content management system metadata may include user profile information of at least one web conference participant. Rules and/or a classification model that considers then-current conditions at the content management system are used singly, or in combination, to determine action characteristics and/or labels such as a retention period or security classifications to apply to the web conference assets. The web conference assets are stored in a hierarchical directory at the content management system. The hierarchy of the directory is derived from aspects of the web conferencing facility.
H04L 12/18 - Dispositions pour la fourniture de services particuliers aux abonnés pour la diffusion ou les conférences
G06F 16/907 - Recherche caractérisée par l’utilisation de métadonnées, p. ex. de métadonnées ne provenant pas du contenu ou de métadonnées générées manuellement
Embodiments provide systems and methods for performing automated browser testing on different native file types by receiving files of different types. A preview version of each file can be generated and rendered in an output file type. Generating the preview version can be performed by a preview application executed by the testing system and rendering the preview version of the first file can be performed by a browser application executed by the testing system. The output file type can be different from the received file type. For example, the received file type can be a native file type of a first application different from the browser and the output file type comprises an HyperText Markup Language (HTML) file type. A test can be executed on the rendered preview version based on one or more assertions on the first file.
Methods, systems, and computer program products for content management systems. An unlabeled dataset comprising documents that at least potentially comprise personally identifiable information (PII) is used when training a PII content classifier. Such a classifier is trained by (1) determining, based on applying a PII rule to a first portion of a document selected from the unlabeled dataset, a confidence value that the first portion of the document does contain personally identifiable information, (2) selecting a second portion of the document selected from the unlabeled dataset such that the second portion does not include the first portion; and (3) assigning, based on the confidence value, a likelihood value that corresponds to whether characteristics of the second portion are indicative that the document does contain personally identifiable information. Such a PII content classifier is used over selected portions of subject content objects to determine whether the selected portions contain PII.
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Downloadable software development kits (SDK) Providing computer technology information in the fields of the internet, technology, cloud computing, online collaboration, file sharing and software development
09 - Appareils et instruments scientifiques et électriques
Produits et services
Downloadable computer programs for enabling users to download, edit and save electronic documents hosted on a cloud storage platform or for enabling users to edit and save electronic documents directly on one or more cloud storage platform; Downloadable application programming interface (API) software for enabling users to download, edit and save electronic documents hosted on a cloud storage platform or for enabling users to edit and save electronic documents directly on one or more cloud storage platform; Downloadable computer programs for controlling access to cloud storage platforms based on defined security criteria; Downloadable application programming interface (API) software for controlling access to cloud storage platforms based on defined security criteria
41 - Éducation, divertissements, activités sportives et culturelles
Produits et services
Education services, namely, providing a website featuring on-line non-downloadable educational materials in the nature of instructional videos, user guides, support guides, developer guides, training guides, and publications in the nature of guides, journals and manuals, all in the fields of the internet, technology, cloud computing, online collaboration, file sharing and software development; Educational services, namely, conducting classes, workshops, conferences, courses, and seminars in the fields of the internet, technology, cloud computing, online collaboration, file sharing and software development
09 - Appareils et instruments scientifiques et électriques
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Downloadable computer software enabling users to create, edit, download, upload, and share collaborative workspaces and virtual whiteboards; downloadable software enabling users to view, discuss, modify, comment on, embed, and update documents, text, images, voice and video in real time or asynchronously from remote locations featuring collaborative virtual whiteboards and workspaces; downloadable computer software used to create, edit and collaborate on content, documents, text, images, diagrams, information and materials for use in group communication and automated integrations with external service providers featuring collaborative virtual whiteboards and workspace Providing temporary use of online non-downloadable software enabling users to create, edit, download, upload, and share collaborative workspaces and virtual whiteboards; providing temporary use of online non-downloadable software enabling users to view, discuss, modify, comment on, embed, and update documents, text, images, voice and video in real time or asynchronously from remote locations featuring collaborative virtual whiteboards and workspaces; providing temporary use of online non-downloadable software used to create, edit and collaborate on content, documents, text, images, diagrams, information and materials for use in group communication and automated integrations with external service providers featuring collaborative virtual whiteboards and workspace
09 - Appareils et instruments scientifiques et électriques
Produits et services
Downloadable computer software enabling users to create, edit, download, upload, and share collaborative workspaces and virtual whiteboards; downloadable software enabling users to view, discuss, modify, comment on, embed, and update documents, text, images, voice and video in real time or asynchronously from remote locations featuring collaborative virtual whiteboards and workspaces; Downloadable computer software used to create, edit and collaborate on content, documents, text, images, diagrams, information and materials for use in group communication and automated integrations with external service providers featuring collaborative virtual whiteboards and workspace; none of the foregoing for software for the customization, management, administration, documentation, tracking, reporting, automation, standardization, delivery, sharing, and analytics of educational courses
42 - Services scientifiques, technologiques et industriels, recherche et conception
Produits et services
Providing temporary use of online non-downloadable software enabling users to create, edit, download, upload, and share collaborative workspaces and virtual whiteboards; Providing temporary use of online non-downloadable software enabling users to view, discuss, modify, comment on, embed, and update documents, text, images, voice and video in real time or asynchronously from remote locations featuring collaborative virtual whiteboards and workspaces; Providing temporary use of online non-downloadable software used to create, edit and collaborate on content, documents, text, images, diagrams, information and materials for use in group communication and automated integrations with external service providers featuring collaborative virtual whiteboards and workspace * none of the foregoing for software for the customization, management, administration, documentation, tracking, reporting, automation, standardization, delivery, sharing, and analytics of education courses *
Methods, systems and computer program products for content management systems. A content management system is configured to manage a plurality of content objects. Unsupervised learning is performed over the plurality of content objects to identify document templates associated with content objects taken from the plurality of content objects. When a document template is identified, template metadata is associated with the document template. Additional content objects that are similar to the document template can take on the template metadata. In this way, many documents can be automatically populated with template metadata that corresponds to the identified document template. All or portions of the template metadata can be applied to policies, which policies serve to marshal ongoing document handling operations. During learning, document features are extracted and analyzed so as to define feature clusters, which feature clusters are in turn are used to form document template clusters.
Various corpora of content objects and other information sources beyond the corpora of content objects are processed to identify personally identifiable information (PII). PII that is associated with a named person is codified into a first portion of a graph-oriented data structure. Also, PII that is associated with an alias that might refer to a named person is codified into a second portion of the graph-oriented data structure. A determination is made that the alias that might refer to a named person is indeed an alias that is a coreference to the named person. Based on that determination then, since the first portion of the graph and the second portion of the graph refer to the same person, then the PII of the second portion of the graph can be deemed to be PII of the same person. PII in common and/or language processing can be used to establish coreferences.
H04L 61/4523 - Répertoires de réseauCorrespondance nom-adresse en utilisant des répertoires normalisésRépertoires de réseauCorrespondance nom-adresse en utilisant des protocoles normalisés d'accès aux répertoires en utilisant un protocole allégé d’accès annuaire [LDAP]
Processing user-triggered, broker-assisted workflows. A content management system is configured to host a hierarchy of content objects that are partitioned into two or more user contexts. A first workflow object is configured and then stored into a first one of the two or more user contexts. A computer-implemented service agent is configured to receive a workflow trigger from an event raised in a second one of the two or more user contexts. The computer-implemented service agent executes in the second one of the two or more user contexts while processing the first workflow object using permissions that are associated with the first one of the two or more user contexts. The computer-implemented service agent processes the workflow object in the context of the first one of the two or more user contexts. Results from execution of the workflow objects are provided to the process that raised the workflow trigger.
Methods, systems and computer program products for managing workflows between multiple third-party systems. A content management system stores a workflow that operates over content objects by invoking third-party applications. The content management system invokes these third-party applications, and these applications make modifications to the progression of the workflows as the third-party applications carry-out their specific portions of the workflow. Upon receipt of a workflow variable value from a first third-party application, the content management system determines the semantics of the workflow variable value and caries out a next portion of the workflow. The content management system then invokes a further next portion of the workflow to be carried out by a second third-party application. Upon receipt of a workflow variable value from the second third-party application, the content management system determines the semantics of the workflow variable value to then carry out yet a further portion of the workflow.
G06F 9/38 - Exécution simultanée d'instructions, p. ex. pipeline ou lecture en mémoire
G06F 21/62 - Protection de l’accès à des données via une plate-forme, p. ex. par clés ou règles de contrôle de l’accès
G06F 16/955 - Recherche dans le Web utilisant des identifiants d’information, p. ex. des localisateurs uniformisés de ressources [uniform resource locators - URL]
G06F 16/901 - IndexationStructures de données à cet effetStructures de stockage
G06F 9/30 - Dispositions pour exécuter des instructions machines, p. ex. décodage d'instructions
A web conferencing system is hosted in a first computing environment and is Internet-connected with a content management system hosted in a second computing environment. Upon detection of an occurrence of a file or folder drag-and-drop event at the web conferencing system, the file or folder corresponding to the drag-and-drop event is made available to the content management system. A directory hierarchy of a file system of the content management system is generated on-the-fly. The content management system initiates operations to retrieve and store a copy of the file or folder into the director hierarchy. Access permissions corresponding to locations within the directory hierarchy where the copy of the file or folder is stored are established such that users of the web conferencing system who were not users of the content management system can access the copy of the file or folder that is stored in the content management system.
H04L 67/02 - Protocoles basés sur la technologie du Web, p. ex. protocole de transfert hypertexte [HTTP]
H04L 67/142 - Gestion des états de session pour les protocoles sans étatÉtats des sessions de signalisationSignalisation des états de sessionMécanismes de conservation d’état
H04L 51/04 - Messagerie en temps réel ou quasi en temps réel, p. ex. messagerie instantanée [IM]
H04L 12/18 - Dispositions pour la fourniture de services particuliers aux abonnés pour la diffusion ou les conférences
98.
Saving an overlay annotation in association with a shared document
Methods, systems, and computer program products for integrating content management systems with web conferencing facilities. An overlay annotation generated via a web conferencing facility is associated with a content object of a content management system. Integration code at the web conferencing facility displays a portion of the content object of the content management system. As user generates an overlay annotation during the web conferencing session while the content object is displayed in an interaction window of the web conferencing facility. After the overlay annotation has been captured, the content management system receives the overlay annotation from the web conferencing facility and stores the overlay annotation in an annotation content object separate from the content object of the content management system. Registrations and other associations between the overlay annotation object and the content object itself are stored for either or both of the overlay annotation object and the content object.
G06F 40/106 - Affichage de la mise en page des documentsPrévisualisation
G06F 3/04845 - Techniques d’interaction fondées sur les interfaces utilisateur graphiques [GUI] pour la commande de fonctions ou d’opérations spécifiques, p. ex. sélection ou transformation d’un objet, d’une image ou d’un élément de texte affiché, détermination d’une valeur de paramètre ou sélection d’une plage de valeurs pour la transformation d’images, p. ex. glissement, rotation, agrandissement ou changement de couleur
G06F 40/169 - Annotation, p. ex. données de commentaires ou notes de bas de page
H04L 65/403 - Dispositions pour la communication multipartite, p. ex. pour les conférences
H04L 65/401 - Prise en charge des services ou des applications dans laquelle les services impliquent une session principale en temps réel et une ou plusieurs sessions parallèles additionnelles en temps réel ou sensibles au temps, p. ex. accès partagé à un tableau blanc ou mise en place d’une sous-conférence
G06F 16/957 - Optimisation de la navigation, p. ex. mise en cache ou distillation de contenus
Various corpora of content objects and other information sources beyond the corpora of content objects are processed to identify personally identifiable information (PII). PII that is associated with a named person is codified into a first portion of a graph-oriented data structure. Also, PII that is associated with an alias that might refer to a named person is codified into a second portion of the graph-oriented data structure. A determination is made that the alias that might refer to a named person is indeed an alias that is a coreference to the named person. Based on that determination then, since the first portion of the graph and the second portion of the graph refer to the same person, then the PII of the second portion of the graph can be deemed to be PII of the same person. PII in common and/or language processing can be used to establish coreferences.
H04L 61/4523 - Répertoires de réseauCorrespondance nom-adresse en utilisant des répertoires normalisésRépertoires de réseauCorrespondance nom-adresse en utilisant des protocoles normalisés d'accès aux répertoires en utilisant un protocole allégé d’accès annuaire [LDAP]
Methods, systems, and computer program products for content management systems. Multiple components are operatively interconnected to carry out operations for establishing a user device trust level. A content management system facilitates interactions between a plurality of user devices and a plurality of shared content objects. The plurality of user devices are network connected to the content management system. One of the user devices issues a request to access a particular one of the content objects. Responsive to the request, a two-step device check is performed before granting access to the particular one of the content objects. A first step of the two-step device check process is based on login information, and a second step of the two-step device check process is based at least in part on analysis of the content of the particular one of the content objects. The actual bits of the content object itself are inspected.