摘要:
A method is provided in one example and includes receiving network traffic associated with a particular user; developing a personal vocabulary for the particular user based on the network traffic; determining areas of interest for the particular user based on the personal vocabulary; determining associations for the particular user in relation to additional users; and generating a feed based on a portion of the network traffic. The feed is delivered to a subset of the additional users.
摘要:
A method includes receiving a request over a network from a user to mount a shared folder, which is configured to store electronic data to be selectively accessed based on a policy. The method also includes evaluating whether the user is authenticated. The method also includes generating a random mount point for mounting the shared folder, and redirecting the user to the random mount point if the user is authenticated.
摘要:
A method is provided in one example and includes evaluating network traffic; identifying data within the network traffic that is associated with a uniform resource locator (URL); identifying at least one condition associated with the URL; and classifying the URL as a transitional web page or as a valuable web page based on the condition.
摘要:
A method is provided in one example and includes receiving network traffic associated with a first user and a second user; evaluating keywords in the network traffic in order to identify a topic of discussion involving the first and the second users; determining a first sentiment associated with a first data segment associated with the first user; determining a second sentiment associated with a second data segment associated with the second user; and generating an argument map based on the first data sentiment and the second data sentiment.
摘要:
A method is provided and includes discovering active participants and passive participants from a meeting recording, generating an active notification that includes an option to manipulate the meeting recording, and a passive notification without the option to manipulate the meeting recording, and sending the active notification and the passive notification to the active participants and the passive participants, respectively. The method can also include discovering followers from the meeting recording, generating a followers notification without the option to manipulate the meeting recording, and which includes access to a portion of meeting recording, and sending the followers notification to the followers. Discovering the active participants and the passive participants includes running speaker segmentation and recognition algorithms on the meeting recording, discovering attendees including speakers and non-speakers, and categorizing the speakers as the active participants, and the non-speakers as the passive participants.
摘要:
An example method includes receiving network traffic associated with an end user and evaluating the network traffic to identify network activity associated with the end user. The method includes generating a presence status associated with the end user based on the network activity, the presence status is deduced automatically without involving active participation from the end user. In more specific embodiments, the presence status is integrated into a directory in which presence status for a plurality of end users is stored. Initially, the end user can be marked in an unavailable state, where authentication to a network causes the presence status to change to an available state. In other embodiments, calendar events and telephone events can be tracked for the end user in order to update the presence status. Additionally, at least one parameter associated with the presence status is hidden based on configurable end user privacy preferences.
摘要:
A method is provided in one example and includes evaluating network traffic; identifying data within the network traffic that is associated with a uniform resource locator (URL); identifying at least one condition associated with the URL; and classifying the URL as a transitional web page or as a valuable web page based on the condition.
摘要:
A method is provided in one example and includes receiving data propagating in a network environment and separating the data into one or more fields. At least some of the fields are evaluated in order to identify nouns and noun phrases within the fields. The method also includes identifying selected words within the nouns and noun phrases based on a whitelist and a blacklist. The whitelist includes a plurality of designated words to be tagged and the blacklist includes a plurality of rejected words that are not to be tagged. A resultant composite is generated for the selected nouns and noun phrases that are tagged. The resultant composite is incorporated into the whitelist if the resultant composite is approved.
摘要:
A method is provided in one example and includes receiving network data from a plurality of users; identifying a data file within the network data; determining whether a particular user associated with the data file is authenticated for a communications platform; identifying an access right associated with the data file; and providing the data file to a video portal, wherein the access right associated with the data file is maintained as the data file is provided to the video portal.
摘要:
A method is provided in one example and includes receiving network traffic associated with a particular user; developing a personal vocabulary for the particular user based on the network traffic; determining areas of interest for the particular user based on the personal vocabulary; determining associations for the particular user in relation to additional users; and generating a feed based on a portion of the network traffic. The feed is delivered to a subset of the additional users.