Many entities utilize several independent systems for various operations. For example, a company may use a third-party email system for email services, a third-party web page system for web page services, a database management system for managing databases used by the company, and the like. Content from these disparate systems may be stored, accessed, and managed independently (e.g., by the third-party providing the service).
Some examples of the present application are described with respect to the following figures:
As described above, many entities may utilize several independent systems for various operations. For example, an entity may have employees working on projects that utilize these independent systems. Employees working on a project as a group or in a team may utilize various tools for communicating with one another, such as email, text messages, chat messages, tasks, documents, and the like. These communications may have a particular impact and/or may cause certain subsequent activities (e.g., subsequent activities carried out by a human and/or by a machine) based on the effectiveness of the communications.
A communication association model may be used to provide insight into the impact caused by propagation of various communications. A communication may be any data source that may be communicated from one user to another user, such as email, text messages, chat messages, tasks, documents, and the like. Information associated with communications may be tracked, such as where a communication has gone, who the communication has been sent from and/or forwarded to, who has accessed the communication, related attachments and/or links, and the like. The information tracked may be used to create a model showing the organizational impact associated with any communication. This may allow users to understand how their outbound communications may affect the greater organization in which they may operate and interact by automatically analyzing the context of various communications. For example, individual contributors and/or management of an organization may use the model to view, measure, and quantify organizational effects of communications over any period and/or length of time. In some examples, the model may be used to make any suitable recommendations to users, such as recommending people to contact based on an email a user is writing, recommending forwarding a particular communication to suggested people, and the like.
In some examples, a model may be generated by accessing related communications. Communications that are related may be related based on any type of channel and/or vector linking the communications (e.g., a communication that is subsequently forwarded in another communication, a communication created from a previous communication based on cutting and pasting content from the previous communication, etc.). However, related communications may be related even if they are related by different types of vectors (e.g., an email may be related to a text message). For example, an email may be received, and the recipient of the email may send an interactive chat message to a colleague on the topic. Subsequently, that colleague may draft an email to a manager to discuss the topic. The original email, the interactive chat message, and the subsequent email to the manager may be tracked and associated with each other independent of the particular vector of communication involved. For example, a first communication and a second communication may be accessed, where the second communication originates based on the first communication. The first communication may be analyzed to obtain first data associated with the first communication, where the first data includes any data associated with the first communication (e.g., the sender and/or the recipient of the first communication). The second communication may also be analyzed to obtain second data associated with the second communication, where the second data includes any data associated with the second communication (e.g., the sender and/or the recipient of the second communication). An association between the first and the second data may be created, and a model specifying the association may be generated based on the first and the second data. The association may be created in any suitable manner, such as by storing the data together, creating a cluster of the data, associating the data with a common identifier, and the like. The model may indicate an impact associated with the first and the second communication. For example, the model may indicate a temporal view of how the communication is distributed to various people, may identify where the information flows are (e.g., identify the users who forward communications frequently, users who are able to get other users to follow onto certain ideas and/or activities, etc.), and the like. In some examples, the model may be used to find actual networks of users (e.g., as opposed to lightweight directory access protocol (LDAP) company reporting infrastructure) to see how users interact and where various organizations of people are situated compared to the company organization). In some examples, privacy and/or visibility settings may be used to determine the contents of a model specifying communication associations. For example, a user viewing a model may be able to see the full names of people receiving communications related to a particular original communication or may only see vague descriptions of those people (e.g., an email was forwarded to a person in Atlanta, a text message was sent to a first-level manager, an email was opened by five people in a given business unit, etc.). In some examples, users may elect to participate or to not participate in communication tracking, and the model may reflect the associations accordingly (e.g., certain users may be specified as being anonymous).
When a communication is sent from a sender to one or more recipients, the communication and any suitable information associated with the communication may be tracked, including tracking to whom the original communication is sent, tracking the number of times someone opens a particular communication, and the like. Subsequent communications from the original sender and/or the original recipients in the context of and/or spawned from the original communication may be analyzed. A set of associated and analyzed communications that are related may be collected, and subsequent related communications may be added to the set. This set of associated and analyzed communications may be used to create a model specifying the association (e.g., a network model, a graph model, a historic model, etc.). Eventually, related communications may stop, or the context of communications may drift far enough from the original communications that the set stops growing. In some examples, the process of collecting communications for a particular set may continue indefinitely, and additional related communications may be added to the set at any time. In some examples, the process may be terminated based on any suitable specified criteria, such as after a particular amount of time has elapsed, after a period of inactivity of related communications, after a threshold number of hops exists between the subsequent communication of interest and the associated original communication, and the like. For example, when a communication is received, it may be determined whether to update the model based on the communication, and the determination may be made based on any suitable specified criteria that may be applied to the communication.
Communications may be collected and associated in any suitable manner. In some examples, communications may be filtered based on any suitable criteria, and communications may be added to a set of associated collected communications based on the criteria. In some examples, related communications may be collected without filtering or by filtering with less stringent criteria to collect a larger set of associated communications, and the communications in that set may be subsequently filtered based on more stringent criteria to arrive at a particular desired set of communications for a given original communication and set of criteria of interest. In some examples, communications collected may be identified using referencing identifications that may be used to access a set of communications of interest based on a set of criteria of interest.
At any time, a set of collected communications may be interacted with to gain useful insights, such as an overall impact of the original communication, where the most downstream communications was generated, an effect or ripple communication density over time after the original communication, and the like.
In some examples, the breadth of communications tracked may be specified by adjusting constraints and/or criteria on which communications may be contextually associated with a previous communication such that certain communications may be added to a set of communications associated with a particular original communication and/or ignored. For example, criteria may be set such that only explicitly related email messages (e.g., a direct email forward, a direct email reply, etc.) may be included in a set of associated communications. Any various constraints on context may be used. For example, constraints may specify that only contextually-related messages sent to an explicit list of team members may be associated with a particular original communication. The context similarity metric may be turned up or down, thereby changing membership in the set of communications. This may be implemented by reanalyzing communications related to an original communication using a revised context threshold.
The association of communications may be performed in any suitable manner. In some examples, a hidden image in a communication may be stored on a computing device managing the associations (e.g., a server). For example, a 1 pixel by 1 pixel transparent image may be included within a communication such that when the communication is opened by a recipient, the recipient's computing device may attempt to download the image from the server storing the image. The image's universal resource locator (URL) may be a unique path on the server, which may be tied directly to the communication, tying each access to the communication and thus monitoring how many people have viewed the communication. The recipient's internet protocol (IP) address and any other IP-derived data may be obtained when the recipient's computing device attempts to download the image from the server, and that data may be used to track the communication. This data may then be associated with a geographic location or with known registered computers (e.g., for a computer to get on a network, the computer must be registered to an owner who is then assigned an IP). Using a hidden image in a communication may allow the communication to be tracked without the recipient having to take any actions relating to tracking.
In some examples, a client-wrapper may be used to determine and manage associations between communications. For examples, a custom client or a plug-in for an existing client may be provided to communications for employees within a company to track communications that are received, opened, forwarded, replied to, and the like. The tracked information may be managed by a central server such that communications may be associated in any suitable manner and those associations may be used to generate a model specifying the associations.
In some examples, a customized communication standard may be used to track communications, including tracking a history of communications. History metadata may be stored in the header of a communication and may be transmitted back to the original source based on any suitable criteria (e.g., based on certain events occurring). In some examples, anyone who views the communication may view the history of the communication, or this ability to view the history may be based on permissions that may limit visibility of the history.
In some examples, communications may be tracked by asking a recipient of a communication to report the communication. For example, a hyperlink may be provided in a communication, and the recipient of the communication may be asked to click on the hyperlink and report information associated with the communication (e.g., whether the communication is forwarded and/or replied to, who the communication is forwarded to, downstream activity the recipient undertook as a result of receiving the communication, etc.).
In some examples, a company may set up a middleware service that may intercept communications before passing the communications to their respective recipient mail service (e.g., a proxy server). This may allow communications and/or traffic to be monitored and logged.
Referring now to the figures,
Server 102, senders 104, and recipients 106 may be in communication with each other directly or over a network, which may be any suitable network, such as an ad hoc network, an intranet, an extranet, a virtual private network (VPN), a local area network (LAN), a wireless LAN (WLAN), a wide area network (WAN), a wireless WAN (WWAN), a metropolitan area network (MAN), a portion of the Internet, a portion of the Public Switched Telephone Network (PSTN), a cellular telephone network, or any other type of network, or a combination of two or more such networks. Each sender 104 and each recipient 106 may be a computing device associated with a user that sends a communication via the computing device or receives a communication, respectively. For example, sender 104 may be a computing device through which a communication from a user is sent to another user, and recipient 106 may be a computing device through which a communication to a user is received from another user. Senders 104 may be capable of being a recipient of a communication, and recipients 106 may be capable of being a sender of a communication.
Computing device 200 may be, for example, a web-based server, a local area network server, a cloud-based server, a notebook computer, a desktop computer, an all-in-one system, a tablet computing device, a mobile phone, an electronic book reader, a printing device, or any other electronic device suitable for generating a model specifying an association between communications. Computing device 200 may include a processor 202 and a machine-readable storage medium 204. Computing device 200 may receive a first communication and a second communication, identify data associated with those communications, store the data and an association between the data, and generate a model specifying the association.
Processor 202 is a tangible hardware component that may be a central processing unit (CPU), a semiconductor-based microprocessor, and/or other hardware devices suitable for retrieval and execution of instructions stored in machine-readable storage medium 204. Processor 202 may fetch, decode, and execute instructions 206, 208, 210, and 212 to control a process of generating a model specifying an association between communications. As an alternative or in addition to retrieving and executing instructions, processor 202 may include at least one electronic circuit that includes electronic components for performing the functionality of instructions 206, 208, 210, 212, or a combination thereof.
Machine-readable storage medium 204 may be any electronic, magnetic, optical, or other physical storage device that contains or stores executable instructions. Thus, machine-readable storage medium 204 may be, for example, Random Access Memory (RAM), an EPROM, an Electrically Erasable Programmable Read-Only Memory (EEPROM), a storage device, an optical disc, and the like. In some examples, machine-readable storage medium 204 may be a non-transitory storage medium, where the term “non-transitory” does not encompass transitory propagating signals. As described in detail below, machine-readable storage medium 204 may be encoded with a series of processor executable instructions 206, 208, 210, and 212 for receiving a first communication and a second communication, the second communication originating from the first communication; identifying first data associated with the first communication, the first data including data associated with a first sender and a first recipient; identifying second data associated with the second communication, the second data including data associated with a second sender and a second recipient of the second communication; storing the first data, the second data, and an association between the first data and the second data; and generating a model specifying the association based on the first data and the second data, the model indicating an impact associated with the first communication and the second communication.
Communication access instructions 206 may manage and control the receipt of and access to any communications (e.g., emails, text messages, documents, chat messages, tasks, etc.) to and/or from users associated with computing device 200. For example, communication access instructions 206 may receive and/or access communications that may be related (e.g., communications that originate from the same communication). Communication access instructions 206 may receive and/or access these communications in any suitable manner. For example, communications may be accessed based on a request to download an image in a particular communication, where the request may include information associated with the particular communication (e.g., sender and/or recipient information, IP address of the requester, etc.). In some examples, a client-wrapper associated with a communication may be used to access the communication.
Communication analysis instructions 208 may manage and control identification and analysis of data associated with communications. For example, communication analysis instructions 208 may identify any suitable data associated with related communications, such as sender information, recipient information, and the like.
Association creation instructions 210 may manage and control the creation of associations between related communications. For example, association creation instructions 210 may create an association between data from related communications and store the data as well as the associations. In some examples, the associations may be created using clustering of data from related communications.
Model generation instructions 212 may manage and control the generation of models specifying associations between related communications based on the data identified from those communications. For example, model generation instructions 212 may generate a model that may indicate the impact of a communication based on the association between that communication and other related communications.
Method 300 includes, at 302, accessing a first communication and a second communication. The second communication may originate based on the first communication. For example, the second communication may be a communication that occurs in response to the first communication.
Method 300 also includes, at 304, extracting first data from the first communication. The first data may include any data associated with the first communication, such as data associated with a sender and/or a recipient of the first communication.
Method 300 also includes, at 306, extracting second data from the second communication. The second data may include any data associated with the second communication, such as data associated with a sender and/or a recipient of the second communication.
Method 300 also includes, at 308, associating the first data and the second data. The first data and the second data may be associated in any suitable manner, such as by storing the data together, associating the data with a common identifier, clustering the data together, and the like.
Method 300 also includes, at 310, providing a model specifying an association between the first data and the second data. The model may indicate an impact associated with the first communication and the second communication. For example, the model may specify individuals associated with the communications, the progression of communications, the context associated with the communications, and the like.
Examples provided herein (e.g., methods) may be implemented in hardware, software, or a combination of both. Example systems may include a controller/processor and memory resources for executing instructions stored in a tangible non-transitory medium (e.g., volatile memory, non-volatile memory, and/or machine-readable media). Non-transitory machine-readable media can be tangible and have machine-readable instructions stored thereon that are executable by a processor to implement examples according to the present disclosure.
An example system can include and/or receive a tangible non-transitory machine-readable medium storing a set of machine-readable instructions (e.g., software). As used herein, the controller/processor can include one or a plurality of processors such as in a parallel processing system. The memory can include memory addressable by the processor for execution of machine-readable instructions. The machine-readable medium can include volatile and/or non-volatile memory such as a random access memory (“RAM”), magnetic memory such as a hard disk, floppy disk, and/or tape memory, a solid state drive (“SSD”), flash memory, phase change memory, and the like.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/US2015/023138 | 3/27/2015 | WO | 00 |