Systems and methods herein generally relate to email systems, and more particularly to monitoring email accounts to improve email behavior.
Commentators have highlighted the fact that the number of Facebook accounts has recently reached the (psychological) threshold of one billion. Although this is a remarkable sign of worldwide diffusion, it should be remembered that the number of active email accounts, that is the number of accounts that have been actually installed and accessed at least once within the last 3 months recently passed the threshold of four billion, and this number keeps growing to over 5 billion expected by the end of 2018 (a steady growth rate of 6%).
It has been reported that the total number of worldwide email users, including both business and consumer users, is also increasing from over 2.5 billion in 2014 to over 2.8 billion in 2018, and this is not contrasting the increasing pervasiveness of mobile devices, which rather bring more than 1 billion mobile users to accessing their emails from every place where there is an internet connection. Even among the young, a recent survey by the National Cyber Security Alliance and Microsoft showed that almost three out of ten teens (aged 13 to 18) use Gmail and this is the second most used application (behind YouTube). This means that although the spread of social media is a fact under the eyes of everyone, email is still nowadays, after 40 years from its first adoption in an organizational domain, the most pervasive communication medium, especially in the business world, where it is estimated that over 187 billion emails were sent and received every day in 2013.
With these figures in mind it is no surprise that there is a growing concern that email use 1) is one of the major sources of stress at work, 2) affects organizational effectiveness, 3) contributes to the carbon footprint in a non-negligible way, and 4) disrupts personal life by keeping employees reachable anytime and anywhere. Work organizations are thus starting to search for a solution to counterbalance the pervasive use of email and its negative effects.
A typical approach often adopted at the organizational level to relieve employees from email overload and related stress is to restrict the access to email services, e.g., limiting email delivery to business hours only, introducing email-free work days, or automatically deleting all incoming emails while employees are on holidays.
However, all these solutions impose top-down strict limits and policies on the employees and fail to acknowledge that email overload is also and primarily a symptom of organizational issues and the lack of best practices.
Various methods herein automatically monitor an email account by, for example, monitoring an email server containing outgoing emails and incoming emails that are sent and received to and from the email account (e.g., using a processor in communication with the email server over a computer network). The outgoing emails can also include draft emails that are being prepared to be sent, before being sent, and the email server allows the email account to be accessed from multiple computerized devices over the computer network.
The methods herein automatically compare the outgoing emails and email threads to performance indicators, using the processor, to identify the problematic email behavior. The performance indicators can include, for example, the number of email recipients addressed in the outgoing emails, the subject matter within a regarding line of the outgoing emails, the length, content, and structure of text within a body of the outgoing emails, the number, and size of, attachments to the outgoing emails, the length, breadth, intensity, and continuity of the email threads, the ratios of the outgoing emails that remain without reply within the email threads, the repetitive emails within the email threads, etc.
The process of comparing the outgoing emails and email threads to the performance indicators can use different comparisons based on whether an outgoing email is internal to an organization or external, and whether an outgoing email is address to recurring recipients or recipient groups.
Such methods automatically match the problematic email behavior to suggestions for changing email behavior and to explanations of how the outgoing emails containing the problematic email behavior cause undesirable incoming emails (and such suggestions/explanations are stored in a computer storage) using the processor. The suggestions for changing email behavior include explanations of how to avoid email behavior that is superfluous, confusing, or ineffective; and suggestions to use different social communication formats instead of using an email format. Also, the methods herein automatically compare the problematic email behavior of the email account to goal standards, using the processor, to produce email behavior targets and goals.
Further, these methods can automatically develop such problematic email behavior for multiple email accounts maintained by the email server, to produce problematic email behavior of other email accounts. Thus, such methods can automatically compare the problematic email behavior of the email account to the problematic email behavior of other email accounts, using the processor, to produce societal email behavior comparisons of the email account relative to other email accounts.
The methods herein automatically provide behavioral feedback related to such problematic email behavior (e.g., on a display that is operatively connected to the processor), for example, while the display is displaying the email account. This behavioral feedback includes items such as matching suggestions for changing email behavior, matching explanations of how the outgoing emails containing the problematic email behavior cause undesirable incoming emails, the email behavior targets and goals, the societal email behavior comparisons relative to others, etc. The explanations of how the outgoing emails that contain the problematic email behavior cause undesirable incoming emails provides links between the outgoing emails and behavior of others; and provides an explanation of how the outgoing email impacts the quantity and quality of the incoming emails.
In one example, this behavioral feedback can be automatically displayed and constantly updated using a dashboard containing the behavioral feedback on the display. Such a dashboard includes graphical charts detailing, relative to the email behavior targets and goals the inbox volume, the volume of the incoming emails, the volume of the outgoing emails, the volume differences between new email threads and existing email threads, the ratios of the outgoing emails that remain without reply within the email threads, the mean response time to the outgoing emails, the mean number of incoming emails generated by the outgoing emails, etc. Such graphical charts can track performance over time.
Various systems herein include (among other components) a processor in communication with an email server over a computer network, a display operatively connected to the processor, a computer storage operatively connected to the processor, etc. The email server contains outgoing emails and incoming emails that are sent and received to and from an email account. The processor automatically monitors the outgoing emails and the incoming emails. The outgoing emails can include draft emails that are being prepared to be sent, before being sent. Further, the email server allows the email account to be accessed from multiple computerized devices over the computer network.
The processor automatically compares the outgoing emails and email threads to performance indicators, to identify problematic email behavior. In some examples, the performance indicators include the number of email recipients addressed in the outgoing emails; the subject matter within a regarding line of the outgoing emails; the length, content, and structure of text within a body of the outgoing emails; the number, and size of, attachments to the outgoing emails; the length, breadth, intensity, and continuity of the email threads; the ratios of the outgoing emails that remain without reply within the email threads; the repetitive emails within the email threads; etc. The processor can also compare the outgoing emails and the email threads to the performance indicators using different comparisons based on whether an outgoing email is internal to an organization or external, whether an outgoing email is address to recurring recipients or recipient groups, etc.
The processor automatically matches the problematic email behavior to suggestions for changing email behavior and to explanations of how the outgoing emails containing the problematic email behavior cause undesirable incoming emails (stored in the computer storage). The processor automatically compares the problematic email behavior of the email account to goal standards, to produce email behavior targets and goals.
The processor can also automatically develop the problematic email behavior for multiple email accounts maintained by the email server to produce problematic email behavior of other email accounts. The processor can then automatically compare the problematic email behavior of the email account to the problematic email behavior of other email accounts, to produce societal email behavior comparisons relative to others.
The processor automatically provides behavioral feedback related to the problematic email behavior on the display while the display is displaying the email account. For example, such behavioral feedback can include matching suggestions for changing email behavior, matching explanations of how the outgoing emails containing the problematic email behavior cause undesirable incoming emails, the email behavior targets and goals, the societal email behavior comparisons relative to others, etc. The suggestions for changing email behavior include explanations of how to avoid email behavior that is superfluous, confusing, or ineffective, as well as suggestions to use different social communication formats instead of using an email format.
These explanations of how the outgoing emails containing the problematic email behavior cause undesirable incoming emails can include, for example, links between the outgoing emails and behavior of others, an explanation of how the outgoing email impacts the quantity and quality of the incoming emails, etc.
The processor can provide such behavioral feedback by automatically displaying and constantly updating a dashboard containing the behavioral feedback on the display. Such a dashboard can include graphical charts detailing, relative to the email behavior targets and goals the inbox volume, the volume of the incoming emails, the volume of the outgoing emails, the volume differences between new email threads and existing email threads, the ratios of the outgoing emails that remain without reply within the email threads, the mean response time to the outgoing emails, the mean number of incoming emails generated by the outgoing emails, etc. The graphical charts track performance over time.
These and other features are described in, or are apparent from, the following detailed description.
Various exemplary systems and methods are described in detail below, with reference to the attached drawing figures, in which:
As mentioned above, a solution to counterbalance the pervasive use of email and its negative effects would be useful. Therefore, the systems and methods herein provide tackle the problem of email overload in a bottom up fashion, initiating and fostering the reflection on email usage starting at the individual user level, and focusing on informing and educating the user with respect to their email sending behavior. To do so the systems and methods herein provide the user with awareness on their personal email behavior, illustrating in particular the link between their personal behavior and the behavior of others, and how their personal behavior impacts the quantity and quality of email they receive.
The overall approach the systems and methods herein adopt includes the following elements. The first is initial self-assessment. The initial self-assessment triggers reflection and provides the user or employee with awareness of their personal behavior. Indeed, while the individual employee is often aware of problematic email behaviors existing in general within the organization, they do not associate such to themselves. The second is ambient awareness monitors. High-level ambient awareness monitors provide the user with continuous self-awareness of their behavior in real time. They trigger and maintain reflection over time and show whether changes put in place are effective. They illustrate as well how their personal behaviors are related to the behaviors of others. The third is consumption, targets, and tips. Consumption, targets and tips help the user to understand what their bad habits are. These indicators are personal, but also compared to the aggregated average behavior of other similar users. Consumptions and targets help to associate the notion of cost and savings to the (change in) behavior, and tips give hints about what could or should be changed to improve. Targets can also involve the behaviors of others. For instance, a target can be to reduce the amount of email received from particular email exchange partners.
The methods and systems herein focus on the email a user sends, rather than the email they receive, define basic metrics and appropriate key performance indicators (KPIs) to highlight the user's possibly problematic email practices, illustrate the link between the sent and received email in the sense that the quantity and quality of email a user receives is closely related to the quantity and quality of email they send. Therefore, the analysis also addresses the user's incoming email to identify the user's recurring email exchange partners or groups; and to relate, with respect to those identified exchange partners or groups, the amount and characteristics of email received from them with the amount and characteristics email sent to them. Further, the systems and methods herein perform the analysis exclusively on the user's personal mailbox, thereby avoiding any privacy threats for the user.
The aim of this disclosure is to provide email users with awareness about their own good or bad emailing practices, primarily with respect to their email sending behavior, rather than helping them to better deal with their overloaded Inbox. Bad email sending practices constitute indeed one of the main root causes of email overload and the aim herein is to highlight and address this root cause rather than palliating its effects. There is also evidence that by helping the individual to adopt better practices with sending email (i.e., by acting on what is under the individual's personal control) the incoming mailbox volume can also be reduced; and this is because these best practices will spread to others because if everyone starts to be conscious and thoughtful about the emails they sends and aims at reducing the outgoing volume, the volume of incoming email in return will get lower as well. This is particularly true when the intervention involves the executive layer.
Various metrics and KPIs are used by the systems and methods herein to detect possibly problematic email behaviors. Possibly ineffective emailing behaviors can exist and become apparent at three levels, the individual email considered in isolation, the thread or exchange an email belongs to, or through the way the user reacts on and replies to particular incoming email messages depending on the overall status of their mailbox. To identify bad practices on each of those levels the systems and methods herein therefore analyze the characteristics of the 1) individual email sent out by the user considered in isolation, 2) email exchanges or threads in which the user participates, 3) user's inbox and the way they reacts on and responds to incoming email.
With respect to individual email characteristics, one aim of this disclosure is to provide users with awareness of emails they send that can be considered as superfluous, confusing, or ineffective; and that are therefore a good candidate to question. The following attributes and characteristics allow detecting such emails (and each email can be problematic with respect to several of these characteristics at the same time). One attribute is the number of recipients, because emails with a large number of recipients (To, CC, Bcc etc.) are typically not very focused or efficient.
Another attribute is the email subject, because concise email subjects with recognizable speech acts allow the receiver to quickly understand the purpose of an email and to react efficiently. Speech acts have been recognized as a backbone of collaboration and coordination in the work place. Authors have provided taxonomies of what these are, and they are indeed an efficient way to let the recipient understand the purpose of an email (e.g., if it is a request to do something or only a provision of information). Furthermore, in work emails additional context, (e.g., the project the email relates to) can be stated in the email subject, content, or introduction to make the exchange more efficient. Work organizations can define corresponding policies that can then automatically be detected and verified.
An additional attribute is email length, content, and structure. Beyond the email subject, the email length, content, and structure are important indicators for unclear and thus inefficient communication. Long emails with unstructured textual content are not easy to grasp for the receiver, and thus not very efficient. The longer the email text, the more a good structure is important, for instance an introduction with a first paragraph explaining the purpose and structure of the remainder. Similarly, email without proper content (e.g., simply forwarding another email or distributing a document or link without explanatory text) should be avoided.
A further attribute is the number and size of attachments. Emails with attachments and especially with large attachments, illustrate the lack of (use of) shared repositories. Instead of sharing one unique document through a shared repository the attached document email attachments create one independent duplicate for each recipient, thus unnecessarily using and wasting additional resources like bandwidth and memory.
With respect to email exchange or thread characteristics, efficient email typically materializes as a short and focused exchange between two (or a few) individuals. The following email exchange or thread attributes and characteristics thus allow the detection of different and inefficient email exchanges. One attribute is the thread length, breadth, intensity, and continuity over time, because long, broad, intense and continuous email exchanges typically correspond to discussion threads that are better supported by other systems, more appropriate for long lasting conversations in focused groups such as project teams. An additional attribute is the proportion of outgoing versus incoming emails that remain without reply, and that do not turn into an exchange allows the systems and methods to measure the user's communicative effectiveness and responsiveness. The systems and methods herein analyze the user's communicative effectiveness by computing among the email the user sends the ratio of the messages that do not turn into a proper exchange and remain without reply. Similarly, the systems and methods herein analyze the communicative responsiveness of the user by computing, among the email the user receives, the ratio of messages to which the user does not reply (this concerns only the emails received by the user directly (i.e., where the user was in To and not in CC). Another attribute is repetitive emails (resending of approximately the same content to the approximately the same recipients). Repetitive emails are inefficient as such, because they either correspond to corrected and/or updated versions of their predecessor or constitute simple reminders.
Over time, the analysis of the user's email exchanges and, in particular of their email exchange partners, helps to put the user's behavior in context. This involves distinguishing internal and external emails (i.e., email sent to recipients inside the organization versus outside the organization (or mixed)). There might indeed be a difference in behavior between emails exchanged with direct collaborators only (internal email) versus email involving external partners. Additionally, the systems and methods herein identify recurring recipients or recipient groups. The identification of recurring exchange partners allows the systems and methods herein to analyze how the exchange with them evolves over time, and to understand whether the corresponding email practices evolve. The system also analyzes cases when email is used for other purposes (e.g., emails sent to the sender himself only which correspond generally to reminders or “to do” items).
With respect to mailbox characteristics, the situation of email overload itself impacts the users' emailing behavior because users can take time to carefully read all their incoming and formulate all their outgoing emails in “normal” (i.e., non-overload situations); whereas, they can not do this when under pressure (i.e., in heavy overloaded situations). The impact can be different for email exchanges with internal, and with external, partners. For instance, email exchanges with external partners can be taken more seriously and thus less impacted by email overload than internal email exchanges, as they reduce the portion of answered emails. To analyze the actual situation for each user and understand whether the actual situation corresponds to a no, a minor, or heavy email overload; the systems and methods herein monitor each user's mailbox over time. Therefore, the systems and methods herein contextualize it with respect to the user's general email management characteristics (i.e., being a no filer, a frequent filer, or a spring cleaner).
The following general mailbox attributes and characteristics allow the systems and methods herein to identify the current status of email overload for a given user, and to see how the user's email behavior evolves over time. Such attributes include the evolution of the overall size of mailbox in terms of number of emails in the Inbox; evolution of the number of threads and length of threads in the inbox to know how emails are managed (categorized or leave as it is in the mailbox); evolution in each unhealthy category described in the previous sections (e.g., use of attachments, emails without reply etc.); etc.
As shown, the email client 102 keeps a connection with the email server 204 to intercept incoming and outgoing emails. Each time a new email is leaving or entering the mailbox, the individual email analysis 104 process is activated. The individual email analysis 104 process computes the metrics and KPIs for this email and stores the results together with the email meta-data in the personal database 110. This process can use different tools, such as for instance linguistic parsers, to extract information.
Every time a new email is processed, or at a regular periods of time, the thread analysis 106 process is activated. This process associates the new emails (new with respect to the last time the process executed) to existing or new threads. Therefore, the thread analysis 106 process exploits the email metadata stored in the personal email stats database 110. The thread analysis 106 process updates the thread-based KPIs integrating the information corresponding to the new emails. The results are stored in the personal database 110.
Periodically (e.g., at scheduled times) the mailbox analysis 108 process is activated. The mailbox analysis 108 process verifies whether the user has read, deleted and/or moved emails between folders (i.e., whether they have been kept in the inbox or archived in another folder). The processed information is then stored in the personal database 110 with a new time stamp, in order to detect change over time. The personal email stats database 110 stores all relevant information, i.e., email meta-data, email thread descriptions, information about the user's mailbox organization and all the computed KPIs.
Also, a display 212 displays a personal dashboard 112 that accesses the email KPIs and usage information from the database 110. The personal dashboard 112 highlights the user's good and bad habits, and their impact.
With respect to the overall status of the user's mailbox, the personal dashboard 112 can display graphic elements that indicate whether the user's mailbox contains the usual load or amount of unread email (or more, or less) for total inbox volume 120, incoming email volume 122, outgoing email volume 124, etc. As shown in
The email efficacy part will inform the user about the impact of the emails they sent out. For instance, for the emails the user sent out initiating a new conversation, graphic elements 126-128 can display bar charts showing how many follow up emails these emails generated, on average; what the mean response time to these emails was, and what proportion of these emails have or have not yet received a reply. In the example shown in
In the example shown in
Therefore, as shown above, specific indicators can highlight the difference in impact that effective, versus ineffective, emailing behavior has; by, for instance, highlighting the impact of emails with an unclear, un-concise subject, or with long unstructured content. The dashboard 112 can be dynamically adapted to highlight the particular characteristics where the user's email behavior is ineffective. The interface can also indicate the evolution of the corresponding behavior over time (i.e., whether the user is improving or not) by comparing the user's actual behavior with their historical average and indicating positive or negative evolution (e.g., using different colors in the bar charts, etc.).
Therefore, the systems and methods herein replace or reduce the required training by automatically computing measures about bad practices and providing them to the user for permanent awareness (thus going beyond the sheer sent email volume).
Such a helper display 140 can also specify which contributors to email quality saw the greatest improvement over the last period (e.g., the top three indicators), where item 144 in
In
Additionally, any of the text shown in
In item 172, these methods automatically compare the outgoing emails and email threads to the limits of performance indicators (where a series of the outgoing emails and related incoming emails form the email threads), using the processor, to identify the problematic email behavior. The performance indicators can include limits on, for example, the number of email recipients addressed in the outgoing emails; the subject matter within a regarding line of the outgoing emails; the length, content, and structure of text within a body of the outgoing emails; the number, and size of, attachments to the outgoing emails; the length, breadth, intensity, and continuity of the email threads; the ratios of the outgoing emails that remain without reply within the email threads; the repetitive emails within the email threads; etc.
The process of comparing the outgoing emails and email threads to the performance indicator limits in item 172 can use different comparisons (e.g., different weights, different performance indicator limits, etc.) based on whether an outgoing email is internal to an organization or external, and whether an outgoing email is address to recurring recipients or recipient groups.
In item 174, such methods automatically match the problematic email behavior to suggestions for changing email behavior and to explanations of how the outgoing emails containing the problematic email behavior cause undesirable incoming emails (and such suggestions/explanations are stored in a computer storage) using the processor. The suggestions for changing email behavior include explanations of how to avoid email behavior that is superfluous, confusing, or ineffective; and suggestions to use different social communication formats (e.g., blogs, boards, posts, document repositories, etc.) instead of using an email format. Also, in item 176, the methods herein automatically compare the problematic email behavior of the email account to goal standards (e.g., percentage improvements, averages, other user's performance changes, etc.), using the processor, to produce email behavior targets and goals.
The process of matching the performance indicator limits that are exceeded to suggestions in item 176 can take many forms. For example, the matching explanation/suggestion can simply be the display of the user's performance relative to a goal, or previous performance average, as shown in
Alternatively, the process of matching the performance indicator limits violations to suggestions in item 176 can occur based on previously established logical relationships between the performance indicators and the explanations/suggestions that may be maintained with the suggestions, e.g., in item 160 (
Further, in item 178, these methods can automatically use the same processes to develop such problematic email behavior for multiple email accounts maintained by the email server, to produce problematic email behavior of other email accounts. Thus, in item 180, such methods can automatically compare the problematic email behavior of the email account to the problematic email behavior of other email accounts, using the processor, to produce societal email behavior comparisons of the email account relative to other email accounts.
In item 182, these methods automatically provide behavioral feedback related to such problematic email behavior (e.g., on a display that is operatively connected to the processor), for example, while the display is displaying the email account. This behavioral feedback provided in item 182 includes items such as matching suggestions for changing email behavior, matching explanations of how the outgoing emails containing the problematic email behavior cause undesirable incoming emails, the email behavior targets and goals, the societal email behavior comparisons relative to others, etc. The explanations of how the outgoing emails that contain the problematic email behavior cause undesirable incoming emails provides links between the outgoing emails and behavior of others; and provides an explanation of how the outgoing email impacts the quantity and quality of the incoming emails.
In one example, the behavioral feedback in 182 can be automatically displayed and constantly updated using a dashboard containing the behavioral feedback on the display. Such a dashboard can include graphical charts detailing, relative to the email behavior targets and goals the inbox volume, the volume of the incoming emails, the volume of the outgoing emails, the volume differences between new email threads and existing email threads, the ratios of the outgoing emails that remain without reply within the email threads, the mean response time to the outgoing emails, the mean number of incoming emails generated by the outgoing emails, etc. Such graphical charts can track performance over time.
As shown in
The input/output device 214 is used for communications to and from the computerized device 200/204 and comprises a wired device or wireless device (of any form, whether currently known or developed in the future). The tangible processor 216 controls the various actions of the computerized device. A non-transitory, tangible, computer storage medium device 210 (which can be optical, magnetic, capacitor based, etc., and is different from a transitory signal) is readable by the tangible processor 216 and stores instructions that the tangible processor 216 executes to allow the computerized device to perform its various functions, such as those described herein. Thus, as shown in
Therefore, various systems herein include (among other components) a processor 216 in communication with an email server over a computer network, a display 212 operatively connected to the processor 216, a computer storage 210 operatively connected to the processor 216, etc. The email server contains outgoing emails and incoming emails that are sent and received to and from an email account. The processor 216 automatically monitors the outgoing emails and the incoming emails. The outgoing emails can include draft emails that are being prepared to be sent, before being sent. Further, the email server allows the email account to be accessed from multiple computerized devices over the computer network.
The processor 216 automatically compares the outgoing emails and email threads to performance indicators, to identify problematic email behavior. In some examples, the performance indicators include the number of email recipients addressed in the outgoing emails; the subject matter within a regarding line of the outgoing emails; the length, content, and structure of text within a body of the outgoing emails; the number, and size of, attachments to the outgoing emails; the length, breadth, intensity, and continuity of the email threads; the ratios of the outgoing emails that remain without reply within the email threads; the repetitive emails within the email threads; etc. The processor 216 can also compare the outgoing emails and the email threads to the performance indicators using different comparisons based on whether an outgoing email is internal to an organization or external, whether an outgoing email is address to recurring recipients or recipient groups, etc.
The processor 216 automatically matches the problematic email behavior to suggestions for changing email behavior and to explanations of how the outgoing emails containing the problematic email behavior cause undesirable incoming emails (stored in the computer storage 210). The processor 216 automatically compares the problematic email behavior of the email account to goal standards, to produce email behavior targets and goals.
The processor 216 can also automatically develop the problematic email behavior for multiple email accounts maintained by the email server to produce problematic email behavior of other email accounts. The processor 216 can then automatically compare the problematic email behavior of the email account to the problematic email behavior of other email accounts, to produce societal email behavior comparisons relative to others.
The processor 216 automatically provides behavioral feedback related to the problematic email behavior on the display 212 while the display 212 is displaying the email account. For example, such behavioral feedback can include matching suggestions for changing email behavior, matching explanations of how the outgoing emails containing the problematic email behavior cause undesirable incoming emails, the email behavior targets and goals, the societal email behavior comparisons relative to others, etc. The suggestions for changing email behavior include explanations of how to avoid email behavior that is superfluous, confusing, or ineffective, as well as suggestions to use different social communication formats instead of using an email format.
These explanations of how the outgoing emails containing the problematic email behavior cause undesirable incoming emails can include, for example, links between the outgoing emails and behavior of others, an explanation of how the outgoing email impacts the quantity and quality of the incoming emails, etc.
The processor 216 can provide such behavioral feedback by automatically displaying and constantly updating a dashboard containing the behavioral feedback on the display 212. Such a dashboard can include graphical charts detailing, relative to the email behavior targets and goals the inbox volume, the volume of the incoming emails, the volume of the outgoing emails, the volume differences between new email threads and existing email threads, the ratios of the outgoing emails that remain without reply within the email threads, the mean response time to the outgoing emails, the mean number of incoming emails generated by the outgoing emails, etc. The graphical charts track performance over time.
While some exemplary structures are illustrated in the attached drawings, those ordinarily skilled in the art would understand that the drawings are simplified schematic illustrations and that the claims presented below encompass many more features that are not illustrated (or potentially many less) but that are commonly utilized with such devices and systems. Therefore, Applicants do not intend for the claims presented below to be limited by the attached drawings, but instead the attached drawings are merely provided to illustrate a few ways in which the claimed features can be implemented.
Many computerized devices are discussed above. Computerized devices that include chip-based central processing units (CPU's), input/output devices (including graphic user interfaces (GUI), memories, comparators, tangible processors, etc.) are well-known and readily available devices produced by manufacturers such as Dell Computers, Round Rock Tex., USA and Apple Computer Co., Cupertino Calif., USA. Such computerized devices commonly include input/output devices, power supplies, tangible processors, electronic storage memories, wiring, etc., the details of which are omitted herefrom to allow the reader to focus on the salient aspects of the systems and methods described herein. Further, the terms automated or automatically mean that once a process is started (by a machine or a user), one or more machines perform the process without further input from any user. In the drawings herein, the same identification numeral identifies the same or similar item.
It will be appreciated that the above-disclosed and other features and functions, or alternatives thereof, can be desirably combined into many other different systems or applications. Various presently unforeseen or unanticipated alternatives, modifications, variations, or improvements therein can be subsequently made by those skilled in the art which are also intended to be encompassed by the following claims. Unless specifically defined in a specific claim itself, steps or components of the systems and methods herein cannot be implied or imported from any above example as limitations to any particular order, number, position, size, shape, angle, color, or material.