Presentation of organized personal and public data using communication mediums

Information

  • Patent Grant
  • 9584343
  • Patent Number
    9,584,343
  • Date Filed
    Monday, January 5, 2009
    15 years ago
  • Date Issued
    Tuesday, February 28, 2017
    7 years ago
Abstract
Systems, methods and computer program products for providing information associated with an attachment (e.g., attachment received through an instant message system, online collaboration tool, electronic message and the like). A sidebar may allow a user to view comprehensive profile and content information associated with the attachment using an attachment information viewer. The sidebar also may allow the user to switch between a message attachment information view (e.g., to facilitate browsing of the document or attachment) and a person profile information view (e.g., to facilitate browsing of personal or public data).
Description
TECHNICAL FIELD

The subject matter of this application is generally related to electronic messaging (e.g., “email”).


BACKGROUND

Electronic messaging systems can be used to transmit information between users. Content can include the body of a message along with one or more attachments. Conventional messaging systems provide few organizational tools for presenting information associated with an attachment. For example, a conventional messaging system such as Yahoo® mail can be used to display attachments without the need to open or display the underlying message in which the attachment was received.


SUMMARY

In some implementations, email may be organized and navigated by attachments. In these implementations, email may be navigated and organized by chronological list of emails. An attachment may be selected and metadata associated with the attachment may be displayed including, but are not limited to, related attachments, related people, related conversations, revision history and the like.


In some implementations, attachment profile may be displayed based off implicit user actions such as, for example, viewing an email that contains an attachment or opening an attachment. When an email containing an attachment is opened or an attachment is opened through a native application, an attachment profile may be automatically displayed which may provide context to the attachment.


In some implementations, an attachment to an email message may be identified. Metadata associated with the attachment also may be identified that may include information selected from a group comprising related attachments, related people, related conversations or revision histories. The attachment and the metadata may be stored in an searchable database.


In some implementations, content on a web page that is linked to or from within an email may be identified. In some implementations, the content in a searchable database may be aggregated. In some implementations, an action of a user that relates to the content in the searchable database may be identified. In some implementations, the related content may be retrieved and the retrieved content may be presented to the user.


In some implementations, a time period in which one or more messages are to be monitored may be identified. One or more user actions of a user associated with the one or more messages may be monitored. Training data based on the one or more monitored user actions may be developed. One or more subsequent messages may be presented to the user based on the training data.


In some implementations, a computer-readable medium may be provided. The computer-readable medium may include instructions stored thereon, which, when executed by a processor, causes the processor to perform operations comprising: displaying a sidebar tool to facilitate a selection of an message attachment information view and a personal profile information view; displaying content associated with one or more message attachments when the message attachment information is selected; and displaying personal or public data of one or more users associated with the one or more message attachments when the personal profile information view is selected.


In some implementations, attachment profiles may be displayed alongside emails, such as in implementations which utilize sidebar, or alongside attachment content in various applications such as, for example, Microsoft® Word, Adobe Acrobat®, in a web browser such as Firefox® and the like.


The details of one or more embodiments of the invention are set forth in the accompanying drawings and the description below. Other features, objects, and advantages of the invention will be apparent from the description and drawings, and from the claims.





DESCRIPTION OF DRAWINGS


FIG. 1 shows an example attachment view of people, messaging conversations, and email attachments.



FIG. 2 shows an example API that integrates a user interface of a third party application called “invite friends to Xobni.”



FIG. 3 shows an example process for storing an attachment and associated metadata in a searchable form.



FIG. 4 shows an example generic computer architecture that may be used to execute the process shown in FIG. 3.





Like reference symbols in the various drawings indicate like elements.


DETAILED DESCRIPTION

As used herein, the term “participant” refers to a user of the described system. As used herein, the term “subject” refers to the sender, receiver, creator, or subject of a communication medium. As used herein, the term “information viewer” includes any method to display personal and public data.


Email Attachment Management

The following sections describe ways to manage, search, and browse attachments and integrate such information with external communication systems as well as methods for collaborating on the development of attachment materials.


The Email Attachment Entity or Object

In some implementations, the participant may view comprehensive profile and content information concerning an email attachment using an attachment information viewer or other viewers capable of receiving and presenting such information to the participant. The participant may view the email attachment information and the person profile information on a same computing system or platform. The participant may switch between the person profile view and the email attachment information view if desired. In some implementations, the participant may utilize a sidebar tool which allows the participant to switch between the email attachment information and the person profile view within the sidebar tool.


In some implementations, the participant may execute the email attachment information view using one of the following example techniques. One of ordinary skill would appreciate that other techniques also may be used. Such techniques include, but are not limited to: (1) selecting an email attachment that is associated with a subject's person profile, and launching using an email attachment information viewer; (2) hovering over the file attached to an email in the email viewer, and launching using an email attachment information viewer; (3) executing a search query from within the system's search mechanism for attachments, selecting an attachment from the search results and launching using an email attachment information viewer through the selected attachment; (4) executing a search query from within a third party system such as, for example, a desktop search system, an online search system, a web-based email application, an enterprise search system, an enterprise document management system, an online document management system, an enterprise resource planning system, a customer relationship management system, a social networking system or other systems with search mechanisms capable of leveraging the email attachment search mechanism through an integration mechanism such as, but is not limited to, Application Programming interfaces (API's) or Web Services provided by this system; selecting an email attachment from the search results; and launching using an email attachment information viewer or other viewers; (5) browsing a categorized list of all email attachments residing on a participant's email client or email server; selecting an email attachment from the search results; and launching using an email attachment information viewer or other viewers; and (6) browsing a categorized list of files (including email attachments) returned by a third party system such as, for example, a desktop browse system, or an enterprise data browse system, an enterprise document management system, an online document management system, an enterprise resource planning system, a customer relationship management system, a social networking system, other systems with browse mechanisms capable of leveraging an email attachment browse mechanism through an integration mechanism such as, but is not limited to, Application Programming interfaces (API's) or Web Services provided by this system; selecting the document from the browse results; and launching using an email attachment information viewer or other viewers. In other implementations, the participant may search and browse email attachments, persons (i.e. subjects) and the like on the same system. One such implementation of the system is the sidebar implementation.


Email Attachment Summary Information

In some implementations, using the email attachment information viewer (or other viewers that may receive and present the same information), the participant may, but is not limited to: (1) view a thumbnail that represents the content of an attachment where a content viewer may be launched to preview the content (as will be discussed further below under the section “Email Attachment Content Viewer”); (2) explore when an attachment was first sent or received; (3) determine from whom or to whom an attachment was first received or sent to; (4) view a list of emails containing an attachment; (5) view when an attachment was last viewed and opened by a participant; (5) view the mime type of an attachment (e.g., PDF, JPEG, Word document, MP3, WAV, etc.); (6) view the size of an attachment; (7) view a thumbnail of an attachment; (8) view the name of the author of an attachment; (9) view a textual description of an attachment; (10) view whether the attachment has been scanned for known computer viruses; (11) view other pertinent information unique to an attachment's mime type; and (12) view information about the local repository, network repository or online repository from which an attachment was sent or created.


In some implementations, a participant may view summary information related to an email attachment by, without limitation: (1) hovering over an email attachment in an email client's email content viewer to allow a window to be populated for displaying summary information associated with the email attachment; (2) hovering over an email attachment in the person profile viewer to allow a window to be populated for displaying summary information associated with the email attachment; (3) hovering over an email attachment in the search results set returned by the system's search mechanism to allow a window to be populated for displaying summary information associated with the email attachment; (4) hovering over an email attachment in the search results set returned by a third party system such as, without limitation, a desktop search system, an online search system, an enterprise search system, an enterprise document management system, an online document management system, an enterprise resource planning system, a customer relationship management system, a social networking system or other systems with search mechanisms to allow a window to be populated for displaying summary information associated with the email attachment; and (5) hovering over an email attachment in the browse results set returned by the system or a third party system such as, without limitation, a desktop browse system, an enterprise data browse system, an enterprise document management system, an online document management system, an enterprise resource planning system, a customer relationship management system, a social networking system, or other systems with search mechanisms to allow a window to be populated for displaying summary information associated with the email attachment.


Email Attachment Relationships and Associations

In some implementations, when a participant receives an email attachment, the participant may view which subject or person sent it, and which other subject(s) or persons received the same email attachment. In these implementations, the system also may indicate to the participant whether the sending and receiving subjects or persons are internal or external to the participant's group or organization. The participant may click on a subject or person to switch to a person profile view. In the person profile view, the participant may view an email conversation (or email thread) that has taken place that is related to the email attachment. Additionally, the participant may click a “Print” action mechanism to command the system to consolidate and print emails or threads related to the conversation.


In other implementations, a participant may click a “Forward Conversation” action mechanism to command the system to consolidate emails or threads (e.g., including attachments) related to the conversation into a single email, and forward the consolidated emails or threads to other subjects or persons.


Yet in other implementations, a participant may view a list of other email attachments that are related to an email attachment. In these implementations, an attachment-to-attachment relationship may be established explicitly by the participant or implicitly by the system based on, without limitation, the following qualifiers or relationship types: (1) manually designating that two or more email attachments are related; (2) email attachments that are part of an email conversation or thread; (3) email attachments having similar content; (4) email attachments that were attached to the same email; (5) email attachments that have the same content author; and (6) email attachments that were sent by the same subject.


A participant also may view a list of files containing similar content residing on the Internet such as, without limitation, web pages, web sites, Wikipedia®, online blogs, online document management systems, social networking systems, online video streaming and repository systems, online image repositories, e-commerce sites, governmental agencies (e.g., Library of Congress) and the like. The participant also may view a to-do list of items, instant messaging conversations, calendar events, phone call logs, web conferencing transcripts and recordings related to an attachment. FIG. 1 shows an example attachment view 100 of people 102, messaging conversations 104, and email attachments 106.


Email Attachment Search and Browse

In some implementations, a participant may search for email attachments using the system's search mechanism. The system's search mechanism may return one or more persons (or subjects), emails, web search results, and email attachment matches to the participant. The participant may enter one or more search keywords or phrases into the system, and the system may perform a search based on the input queries for email attachments containing matching metadata (e.g., subject, sender, title, etc), content, summary information and the like. The participant may optionally restrict a search for email attachments by specifying, without limitation: (1) a date range in which an email attachment was received or sent; (2) a subject or person who sent or received the attachment; (3) an attachment mime type or file name extension; and (4) a voting status (as will be discussed in greater detail below in “Email Attachment Collaboration”).


A participant may browse for email attachments that have been categorized by the following dimensions, such as, without limitation, the subject(s) who sent it or who received it (additional qualification may include the subject(s) listed as high-priority or very important), the external organization (i.e. partner or customer organization) that originated it (additional qualification may include the organization(s) listed as high-priority or very important), user generated tags used to describe the attachment, the department or sub-organization that originated the attachment for attachments originated from internal groups (additional qualification may include the department(s) listed as high-priority or very important), attachment mime type, date range (e.g. received less than 2 days ago, less than 1 week ago, less than 1 month ago, etc.), attachment size, voting status and number of recipients.


Email Attachment Content Viewer

A participant may view a thumbnail of the attachment on the email attachment information view. The thumbnails may be displayed for the following file types including, without limitation, a thumbnail image of the first page of a textual attachment (e.g. Word, TXT, HTML, XML etc), a thumbnail image of an image attachment (e.g. JPEG, GIF, TIF etc), a thumbnail image of the first page of a Power point attachment, a thumbnail image of an icon to represent an audio file (e.g. RAM, WAV, MP3 etc) which the system can show a different icon for each different audio file type, and a thumbnail image of a frame from the video file (e.g. AVI, FLV, GVI, WMV, MOV, etc.).


In some implementations, when the participant hover over a thumbnail in the email attachment information view, a window is populated with an enlarged view of the thumbnail. In these implementations, a sample of the content may be automatically displayed on the enlarged pop-up. For example, an abbreviated “slideshow” of different pages of the textual attachment may be presented. As another example, an image may be rendered at its original size and aspect ratio. As yet another example, an abbreviated “slideshow” of different pages of the power point attachment may be presented. As yet another example, a snippet from an audio file may be played. As yet another example, a short segment of a video file can be played. One of ordinary skill in the art would understand that other implementations in addition to those discussed above also are contemplated.


In some implementations, the participant may hit a “Play” or “View” action mechanism which may launch a content viewer. In this viewer, the participant may page through a slideshow view of a textual attachment (or set the slideshow to run automatically), or view an image attachment in its original size and aspect ratio. Additionally, the participant may zoom in and out of a specific portion(s) of an image, page through a slideshow view of a power point attachment (or set the slideshow to run automatically), listen to an audio file or watch a video which may allow the participant to go to a specific segment of the audio or video file for immediate playback.


Email Attachment Comparison

In some implementations, the participant may select two or more email attachments and perform a document comparison on the system (without having to download the attachments and to open a separate document comparison application). In these implementations, the system may integrate with document comparison applications to provide document comparison capabilities natively in the system.


Email Attachment Collaboration

In some implementations, the participant may view an email conversation (or email thread) that has taken place that is related to an email attachment. The participant may click a “Print” action mechanism and the system may consolidate and print the emails or threads in the conversation. The participant also may click a “Forward Conversation” action mechanism and the system may consolidate the emails or threads related to a conversation into a single email, and forward the consolidated emails or threads containing the emails and attachments to other subjects or persons. The participant also may view an email conversation related to a document residing in other document collaboration systems. This may be achieved through a data integration between the system and these other document collaboration systems.


In some implementations, the participant may view an email attachment's collaboration history in this system's email attachment's information view. This attachment collaboration history may be captured by this system. The system may piece together the collaboration history of an attachment based on, for example, an analysis of the attachment's metadata, content changes, tracking of the copies of the attachment that was sent out to other subjects, and comparison of the attachment's content with similar documents residing in other repositories. This collaboration history may include, but is not limited to, change tracking (e.g., who made the revisions and when were the revisions made), document comparison (e.g., what change(s) were made relative to an earlier version), and document trail (e.g., whether there is a first version, an immediate version or final version of a document). The participant generally may view a visual representation of this document trail.


In some implementations, the participant may view an email attachment collaboration history in the system that was captured by other document collaboration systems. This may be achieved through a data and security integration between the system and these other document collaboration systems.


In some implementations, the participant may view who has received this attachment and which other subjects or persons have access to one or more files (e.g., as defined in document collaboration, content management system, and other collaboration and file repository systems) but who may not have received the file(s) over email. This may be achieved through a data and security integration between the system and these other systems.


In some implementations, the participant sending out an email attachment may request a vote or rating from one or more receiving subjects about the email attachment. The vote or rating may include, without limitation, “Accept” a document, “Reject” a document, “Highly Recommend it”, “Hate it”, “Lukewarm about it”.


In some implementations, the participant and subjects or persons may comment on an email attachment. These comments may become visible to all subjects or persons who received the attachment. These subjects may view the comments together with, for example, the comment's date, author, parent and child relationships (e.g. a comment, “the child” may be in response to another comment, “the parent”). Alternatively, the participant or subject who created the comment(s) may choose to only display the comments to subjects internal or external to the organization, or only to specific/named subjects or persons. Comments also may be visible in other document collaboration, content management, file repository, and collaboration systems. In an event that the recipients receiving such an attachment containing comments and/or shared notes do not use this system, the comments may be appended to the email containing the email attachment so that such recipients may still view the comments and/or shared notes.


Email Attachment Distribution and Synchronization

In some implementations, the system may automatically distribute and synchronize email attachments to enterprise applications, enterprise systems and content management systems such as, without limitation, Enterprise content management systems, Desktop content management systems, Enterprise file server or repository systems, Enterprise application systems (e.g., deployed on-premise or hosted by a third party provider) such as, for example, Customer Relationship Management systems, Digital Asset Management systems, Enterprise Resource Planning systems, Product Data Management systems, Product Lifecycle Management systems, Supply Chain Management systems, Product Information Management systems, Marketing Automation systems, Product Management and Product Planning systems, and Project Management (PM) systems and the like, Online document repository, document sharing, collaboration sites, and Peer-to-peer and online document collaboration systems.


Integration to Web Conferencing Systems

In some implementations, the participant may launch a web conferencing session directly from the system and the system may automatically upload the selected email attachment(s) onto the web conferencing session. In these implementations, web conference session related message board messages, voting results, notes, visual transcripts, audio transcripts and other related conference generated artifacts supported by the web conference system may be automatically uploaded or downloaded and associated with an email attachment. After a web conference, attendees may receive an email containing one or more file(s) that was (were) discussed, and the associated conference information (e.g., as described in the previous bullet) also may be received and presented appropriately (e.g., properly associated with the email attachment) to the subject by the system.


In some implementations, if the conference leader launches the session directly from the web conference system and uploads the document(s) from a desktop or other document repository system, the conference leader and the attendees may still receive an email containing the document(s) and the associated conference information as described previously after the conference session has ended. This information may be presented appropriately (e.g., properly associated with the email attachment) to the subject by the system.


Collaborative Email Content Creation

In some implementations, the participant may create an email and save it as a draft document that may be circulated around to multiple subjects to be worked on as a work-in-process document. This supports collaborative email content creation.


In some implementations, the system may provide a locking mechanism which requires a subject or the participant to “check out and lock” the document while he or she is editing the document. In these implementations, others trying to access this document may view the document but may not edit the document until the subject or participant checks the document back in and releases the lock.


In some implementations, the participant and subject(s) may add comments or shared notes to the draft email for others to view.


In some implementations, the system may allow the participant and subject(s) to indicate that he or she is done either reviewing the document or have no more edits to make to the document. This can help the participant to know when the draft document is “completed” and is ready to be sent out to the appropriate subjects.


In some implementations, the subjects that receive the completed/final email may view the list of people who were involved in creating the content in the email.


In some implementations, when the draft email is still in the work-in-process state, the participant and subject(s) may invite others to take part in the creation of the content.


In some implementations, the system may indicate which subjects are internal or external to the organization.


In some implementations, the system may provide the ability to the participant to define different levels/types of access to the different subjects involved in the collaboration.


In some implementations, once an email has been completed, in addition to sending the email out to designated recipients, the participant may also publish the contents of the email to, without limitation, external websites, intranet sites, Wikipedia® sites, online blog sites, content management systems, online document repositories, online document sharing and collaboration sites, and peer-to-peer and online document collaboration systems.


Document Management for Task Management

In some implementations, the participant may synchronize email attachments to project management or task management systems. The participant also may associate an email attachment to a participant created task in the system. The system may automatically associate received email attachments to tasks based on, without limitation, file metadata including, for example, file naming conventions (e.g. all documents with “_ProductLaunch2008” as part of its filename are associated to a 2008 Product Launch Task), file descriptions, file keywords, and file mime type, subject(s) who sent the attachment (e.g. all email attachments received from Vendor ABC is related to the Product Sourcing Task), and email content and machine training/learning (e.g., over time the system learns that the existence of certain keywords in an email delivering the document attachment results in the attachment being associated with certain task(s)). In these implementations, the participant may search and browse for all email attachments related to one or more tasks.


Integration to Other Systems

In some implementations, other systems may send and receive data, conduct transactions, synchronize security access and documents related to email attachments with this system through a set of published Application Programming Interfaces (API's) and Web Services. These other systems may include, but are not limited to, enterprise content management systems, desktop content management systems, enterprise file server systems, enterprise application systems (deployed on-premise or hosted by a third party provider) such as customer relationship management systems, digital asset management systems, enterprise resource planning systems, product data management systems, product lifecycle management systems, supply chain management systems, product information management systems, marketing automation systems, product management and product planning systems, and project management (PM) systems, online document repository, document sharing and collaboration sites, peer-to-peer document collaboration systems, enterprise and online search systems, enterprise and online content tagging systems, enterprise and online content recommendation systems, and email analytical and forensic systems.


Searching Content Behind Hyperlinks Sent and Received

In some implementations, content existing on the web which is linked to from within an email or other communication medium may be aggregated and treated as a personal knowledge base. In these implementations, content from these web pages may be searched by the participant or be displayed to the participant based on implicit user actions such as looking at an email sent by someone who has sent the participant hyperlinks in past communications.


In some implementations, when a participant searches a personal knowledge base (based on content behind hyperlinks), the system may also display results which exist outside of the personal knowledge base but may be accessible through a standard web search engine.


In some implementations, when a participant searches the web using a standard web search engine, the system may use the same keywords to automatically provide search results from the personal hyperlinked knowledge base.


In some implementations, since the content behind hyperlinks is constantly changing, the system may distinguish between the content that existed on the hyperlinked webpage when the hyperlink was initially sent or received as well as what exists on the hyperlinked webpage at the current time.


In some implementations, when searching the personal knowledge base, the content that is being searched may include, for example, the body of the message a hyperlink was sent with, and the result may display both the matching body text as well as the content behind the attending hyperlink.


In general, hyperlink referenced website content may be presented through search or implicit user actions. The content of the information is discovered and created by analyzing all the hyperlinks sent or received via email, IM, or other electronic medium. The content (web pages) on the web referenced by these hyperlinks is crawled by the system and stored. Alternative to crawling the content itself, the system may fetch information about the content of the pages from a remote provider serving content. This may be useful for speeding up crawling, minimizing the number of outbound connections. Also, the content may already be preprocessed or compressed by the provider to save local processing time or transmission time and storage space.


In some implementations, stored with the content of the web pages may include the metadata associated with the source of the hyperlink including, without limitation, the body text of the email, subject, sender, recipient, email date, carbon-copied recipients, attachments and the like. This information may be presented alongside search results matching words in email bodies, results matching people's names, or content matching keywords on the web.


In one implementation, the system may include some or all of the following features: the system may present relevant hyperlinked web data with content matching keywords that are typed in a search box; the system may present relevant hyperlinked web data with content matching keywords ranked using techniques such as term frequency, or TF-IDF (Term frequency—inverse document frequency) where additional relevant results may be obtained by using a thesaurus or employing techniques such as LSI (latent semantic indexing) and presented automatically when viewing a body of text; the results of keyword searches in the hyperlinked web page content database may be presented alongside search results for the greater web; advertisements may be placed in, next to, or near hyperlinked web page search results based on the keywords used to search the hyperlinked web page content; and metadata associated with a hyperlinked web data result may be presented as part of the search result. This data may include, for example, the name of the person who sent the hyperlink referencing this data, the person who received it, when it was sent, how it was sent, who else received it, etc.


Hyperlink Process

In some implementations, the system may find some or all of the hyperlinks in a corpus of communication text including, for example, email, instant messaging and online chat.


In some implementations, the hyperlinks may be followed by the system to extract the content existing on the web.


In some implementations, the content from the web may be crawled and the textual information may be indexed. In these implementations, the web may be crawled in real time as the content behind hyperlinks may be dynamic and may change since last indexing. Alternatively, the web may be crawled synchronously at a predefined interval.


In some implementations, a crawling and subsequent indexing occur during the first time a communication corpus is pointed at the system. The indexing and crawling may be redone at the users' discretion or automatically at some interval or based on other factors.


In some implementations, new hyperlinks sent or received may be followed and indexed as the links are received or at regular intervals.


In some implementations, text from web pages may be displayed when keywords matching search keywords are found in the text of a webpage. In these implementations, the matching webpage text may be presented with associated metadata such as, for example, the website name, time of last updating, time of last indexing, author of the email containing the hyperlink, date the hyperlink was sent, etc. In one implementation, the webpage text matches may be displayed alongside email text matches, contact name or address matches, regular web search engine result matches and the like.


Adding or Removing Email Recipients From Messages Before Sending

In some implementations, the system may display visual cues before an email is sent to inform the participant of one, some or all of the individuals who may receive any given email. As an example, after a user clicks “reply all”, writes a response, and sends the email, but before the message is actually sent, a list of pictures of the designated recipients may be displayed to the participant. This may be accomplished to reduce the number of unintended recipients on any given email. In one implementation, the list of recipient pictures may be displayed at anytime during the composition of a message after the recipient's email address has been entered.


In some implementations, the system may pull image information from different sources and associate the image information with a subject's person profile. Such sources may include, but is not limited to, social networking web sites, professional networking web sites, people search and information web sites, image submitted by the subject or the participant, employee directory systems and the like.


In some implementations, when the participant chooses a list of email recipients, the system renders a view to show the images of the recipients to provide a visual check for the participant to ensure that there are no unintended recipients on the list. One such implementation of a recipient image view may include a system side bar, but the system is not limited to such an implementation. If a recipient is an email group list, then a group icon may be shown instead of a person's image or an image of each person in the group may be displayed.


In some implementations, the system may require that the participant confirm each image as an intended recipient of the email prior to allowing the email client to send the message. The participant may confirm a recipient by clicking an indicator next to the recipient's image. In these implementations, the recipient image view may, for example, indicate which recipients are internal and external to the participant's organization, indicating which recipients are “highly sensitive” recipients (as defined by the user) (e.g., if the recipient list includes the CEO of a company, then the image view indicates to the participant that the CEO is part of the recipient list), or indicating which recipients are email group lists.


In some implementations, the system also may suggest other people the participant may want to include on an email. For example, if the recipient has an assistant carbon-copied on 80% of the emails he sends or receives, the system may recommend to the participant that he include the assistant in the CC field. This recommendation may be made when the original recipient's email address is entered into the “TO:” field or prior to sending the message. The additional suggested recipients may be displayed using pictures of the recipients or by listing their names.


Integrating Data from Multiple Email Clients and Displaying the Data in Multiple Email Clients or Desktop Applications or Websites

In some implementations, the system may integrate a participant's work and personal email clients/accounts. When the system resides on a participant's work email client (e.g. Microsoft Outlook® client), it may provide an information feed from the participant's personal email client (e.g., Gmail®) to let the participant know he has received emails on his personal email client or give the participant access to historical communication data. The data from these multiple locations may be aggregated and be displayed together as part of the person profile (e.g., recent attachments shows all recent attachments sent from Jane to the participant's gmail account and their Outlook account). The data from these disparate sources may also be kept separate but made accessible within the same information display such as in implementations which utilize a sidebar. The information display may be stand alone or integrated with a particular email client or communication application (e.g., instant messaging, webmail, etc.). One example may include a web browser extension where the information display appears when the user enters the web address of an associated web mail account. The same data that is accessible through an information display in a desktop email client would then be visible when using a webmail interface.


In some implementations, the system may provide, without limitation, the following information together with an email attachment: subject title of email, sender, date and time sent, preview of the content in an email, a list of people related to a subject, contact information for a subject and the like. In some implementations, these information also may be displayed in other desktop applications or in a web browser so the participant may easily request information from the system while using these other applications.


In some implementations, content from the system may be automatically displayed when content from a webpage or application relates to content stored in the system. As an example, a participant visits the blog of Matt Smith, and the system recognizes the name of the author from the text of the webpage or from associating a person in the system with a specific web address (e.g., Matt Smith's signature always contains the blog's web address). The system may then provide information about the participant's relationship with the author such as “you haven't emailed Matt in 2 weeks”, “The last conversation you had with Matt was . . . ”, “Matt is currently available online using Skype”, “You and Matt have 3 friends in common on Facebook”, etc.


Displaying Web Content Related to Links Found in an Email

In some implementations, the system may extract web URL's present in emails received from a subject and add the extracted URL's to the subject's person profile information view.


In some implementations, the system may rank the URL's based on the frequency of occurrence in the emails received from the subject. In other implementations, the system may rank the URL based on the uniqueness of a URL as it relates to multiple URL's in an email or in all emails received from a subject.


In some implementations, the participant may update the list of web URL's associated to a subject. Alternatively, the participant may update the list of web URL's associated to his own system person profile.


In some implementations, the participant may hover over a web URL associated to a subject, and the system will automatically create a pop-up to let the participant preview the content related to the URL. In these implementations, previewing allows the participant to view, for example, without limitation, a web page, a “slideshow” of different pages of the textual document, an image with its original size and aspect ratio, an abbreviated “slideshow” of different pages of the Power point document, or play an audio file, an video file, a streaming video and the like. In addition, the system may use a thumbnail to represent the web URL. This thumbnail may include, without limitation, the homepage of a company webpage or a web site, the latest entry in a blog, a static frame of an online video, an online advertisement, a subject's social network or professional network public page and the like. If desired, the participant may hover over the thumbnail to launch a preview of the URL content.


Status Sharing

In some implementations, email status may be automatically determined from the activity of a user of the system. In these implementations, status indicators may indicate, without limitations, the number of emails a participant has sent or received during a time window, whether the participant has checked his email, whether the recipient has moved his mouse or entered keystrokes during a time period, the response time of the recipient to emails during a time window and the like.


In some implementations, the participant using the system may publish his/her current status to other subjects using the system. In these implementations, the participant's status may be visible only to other subjects who may be connected to the participant by, for example, emails exchanged in the past over the current email client or other email clients, a connection on professional networking site, a connection on social networking sites, membership to the same online group, a connection on a instant messaging system and an explicit system connection manually created between the participant and the subject.


In some implementations, the status information may be defined by the system. For example, the status information may include, without limitation, busy, away from the computer, out of the office, in a meeting, out of town, returning on “date DD/MM/YYYY”, and computer generated statistics about the participant's email activity (e.g., “Matt has sent 10 messages in the last hour”, “Matt hasn't sent or read a message in 2 days”, etc.) and the like.


In other implementations, the status information may be defined by the participant or free text entered by the participant. In these implementations, the participant may choose to hide status information from specific/named subject(s) participants even though the participant and the subject(s) may be connected. Status information also may be subject-specific. For example, for subject Matt, Adam's status is “Available”, but for everyone else, Adam's status is “Busy”. Alternatively, status information may be subject-specific and automatically generated by the system. For example, the following information may be automatically generated by the system when a subject tries to reach a participant named “Aamir”: “You've been trying to reach Aamir, and he has 10 unanswered emails from you. He's currently going through his emails and we expect that he will reply to your email soon/in less than 1 hr”.


In some implementations, the system may show a subject's status on a social networking website or instant messenger or some other system that allows a user to set and show a sharable status. This may be achieved through an integration between this system and those other systems.


In some implementations, the status messages may be displayed continuously in a list of the subject's top contacts, status messages may be displayed next the name of a person when the subject looks at an email from them, or the status message may be displayed when the subject enters the person's email address in the compose window of an email message.


In some implementations, the status message may have configurable “calls to action”. For example, when composing an email to Matt, the status message may be set up to say: “I'm going to be out of town until July 15th, set a reminder to contact me on July 15th by clicking here” or “ . . . delay the sending of this message until July 15th by clicking here”.


In implementations in which a sender and a recipient are using the status message system, a sender may compose messages that would not be sent until some predetermined action has taken place on the recipient's system (e.g., upon the notification from the system that a participant is at his/her computer, the participant switches a status from one state “busy” to another state “available”, the participant sends more than 10 message in one hour, or the participant reads more than 10 messages in one hour).


Payment, Banking and Remittance Support

In some implementations, the system may provide a side bar implementation of a payment, banking, and remittance information viewer and transaction support console.


In some implementations, an email address may act as a unique identifier for a payment and remittance system.


In other implementations, two or more individuals using the system may make payments between the systems without having to enter any additional login or credentials. In these implementations, payments may be made between systems without sending an email or encrypted payment information is sent in an file attached to an email which is recognized by the recipient's system and converted to a withdrawal or payment of funds. If a recipient receives a payment or payment request and isn't a user of the system, the recipient may be sent a hyperlink to a webpage where payments may be made and received.


Online Payment, Online Banking, and Remittance Information Related to Subjects

In some implementations, the participant may view information related to online payment, online banking, and remittance information related to one or more subjects. For example, the participant may, without limitation: (1) view a list of online payment, online banking, and remittance systems that a subject uses; (2) view the preferred payment system(s) that the subject uses; (3) view the list of outstanding invoices or remittance requests received from and sent to the subject, (4) view the list of completed and pending payments and remittances that were made to or received from the subject; (5) view the total amount of payments sent to or received from a subject; (6) view the total amount of remittances sent to or received from a subject; (7) search and sort lists (where appropriate) based on, for example, viewing a list over a date range specified by the participant, sorting through a list by, but not limited to, date, amount, payment processing system, processing status, and sorting by transaction category or type; and (8) search for subjects based on, for example, subjects who have yet to make payments on invoices or sent money to fulfill remittance requests sent by the participant, subjects whom the participant has received outstanding invoices from or remittance requests from, subjects whom the participant has paid money or remitted money to, subjects who have in total (or over a period of time) paid or remitted money to the participant beyond a certain amount, and/or subjects who have total outstanding invoices or unfulfilled remittance requests beyond a certain amount.


Online Payment, Online Banking, and Remittance System Account Information Dashboard

In some implementations, an online payment, online banking, and remittance system account information dashboard may be included. Through the dashboard, a participant may, without limitation: (1) view account related information with online payment, online banking, and remittance systems account on this system; (2) view the list of completed and pending money transfers (deposits and withdrawals) to the participant's accounts with online payment, online banking, and remittance systems; (3) view the participant's account balances with online payment, online banking, and remittance systems; (4) view, search and sort lists (where appropriate) including a list of system accounts sorted by account balances, a list of system account sorted by online system name and a list of system accounts sorted by system type (e.g. payment system, banking system, remittance system, etc.).


Originating Online Payment, Online Banking and Remittance Related Transactions

In some implementations, the participant may conduct transactions supported by online payment, online banking, and remittance systems. These transactions may include, but are not limited to, transferring money to and from their accounts, making payments and remitting money to others, creating and sending invoices and remittance requests to others, and buying and selling investment instruments.


Integrating to Online Payment, Online Banking, and Remittance Processing Systems

In some implementations, in order to support online payments, online banking and remittance transactions in the system, the system may support data, transaction and security integration with third party systems including, but not limited to, online payment systems, online banking systems, online money remittance systems and peer-to-peer lending systems. In these implementations, the system also may support a set of published Application Programming Interfaces (API's) and Web Services to enable these integrations.


Mobile Email Information System

In some implementation, the system may be extended to mobile phones to enhance existing email clients associated with the mobile phones.


In some implementations, a mobile version of the system may be used to facilitate multi-object search and browse for emails, people and attachments on existing mobile email clients. Participant may launch the system search mechanism directly from the existing phone email client or as a separate application on the phone.


In some implementations, a mobile version of the system may be used to extract, relate and present threaded conversations and people information on existing mobile email clients. The participant may switch to this system's information view directly from the email client's email content viewer by clicking on this system's icon on the email or selecting the appropriate menu option (to launch this system) on the email client while viewing the email.


In some implementations, these existing email clients may include, but are not limited to, flurry email clients, MovaMail clients and Google® and Yahoo® Mobile email clients.


In some implementations, contact information extracted from emails by the system may be synchronized with the phone's personal information management system or third party mobile product information management systems.


In some implementation, the system also may be extended to mobile phones to enhance existing Smart phone and PDA phone email clients.


In some implementation, a mobile version of the system may be used to facilitate multi-object search and browse for emails, people and attachments on existing smart phone and PDA phone mobile email clients. Participant may launch the system mechanism directly from the existing phone email client or as a separate application on the phone.


In some implementation, a mobile version of the system may be used to extract, relate and present threaded conversation, people, attachment, and contact information on existing smart phone and PDA phone mobile clients. The participant may switch to this system's information view directly from the email client's email content viewer by clicking on this system's icon on the email or selecting the appropriate menu option (to launch this system) on the email client while viewing the email.


In these implementation, existing email clients may include, but are not limited to, Blackberry® email clients, Motorola® Good clients, Palm Treo® email clients, Apple® iPhone email clients, Windows® Mobile email clients and Google® and Yahoo® Mobile email clients.


In some implementation, contact information extracted from emails by the system may be synchronized with the phone's personal information management system or third party mobile product information management systems.


In some implementation, the system may integrate with Blackberry enterprise server edition for Microsoft® Exchange, Lotus® Notes Domino, Novell® Groupwise to support the synchronization of Xobni® extracted information between the mobile and desktop clients. The system may also integrate with the enterprise/server editions of the Motorola® Good product suite.


In some implementation, the system may include its own data synchronization methods to ensure that desktop email clients are synchronized with mobile email clients. This applies to participants who are leveraging the enterprise/server editions of the Blackberry® or Motorola® Good product suites.


In some implementation, the system may include keyword search. The participant may search for people or keywords from their electronic communication mediums. Selecting a people result may pull up a person profile. The participant may use this to quickly view recent email conversations with the subject, recent appointments with the subject, a list of people related to the subject, contact information for the subject, attachments related to the subject, etc.


In some implementation, the keyword search may also be used to display keyword search matches from a communication medium corpus such as email, IM, transcribed voice calls, etc.


In some implementation, the searches for people or keywords may be done on the client mobile device using a local data store and processor or done on a webserver with a remote data store where the results transmitted back to the mobile device.


Email Store Analytical System to Enable Advertisement Targeting

In some implementation, the system may analyze emails in an email store that resides on a local email client, network server or an online email server to identify key attributes, habits, associations, activity profiles, current email client used and other relevant information about the participant and related subjects to enable advertisement targeting.


In some implementation, the system may create profile groups made up of anonymous participants whom advertisers may target advertisements at without revealing the identity of the participants. These profile groups may be created based on requirements dictated by the advertiser.


In some implementation, advertising effectiveness may be measured and different pricing models may be supported based on, without limitation, the number of impressions, the number of click-throughs, pay-per-action, pay-per-lead and other advertising metrics. In these implementations, the system also may support different pricing levels based on, but are not limited to, the time of day, the number of participants online at a specific time of day.


Collaborative Filtering and Recommendation Engine

In some implementation, the system may analyze a participant's email content and actions (e.g. clicking on web links and time spent on those website) to build a profile of the participant. Based on this profile, the system finds subjects with similar profiles, determines the most frequent content, websites and products collectively viewed/accessed/bought by these subjects, and then recommends these top content and web sites to the participant.


In some implementation, the system may leverage Collaborative Internet Discovery networks and Recommendations Engines like, but not limited to, those provided by Aggregate Knowledge, Inc. and Loomia, Inc., to recommend content, websites and products to the participant.


Communication Medium Store Access and System Integration

In some implementation, the system may provide a set of Application Programming Interfaces (API's) and Web services to allow other relevant systems to perform a set of activities on the system and the participant's communication information store (e.g., email, IM, social network data, etc.). These activities include, but are not limited: (1) querying and analyzing the participant's email store and system information (e.g., who they sent messages to today, who their top contacts of the month are, what domains they are sending emails to, etc.); (2) conducting transactions, synchronizing data, and synchronizing security access with the system (e.g., a participant may send a Facebook® friend request to subjects whom they have exchanged a certain minimum volume of emails with); (3) querying statistics; (4) querying participant status information (e.g., that was either created by the participant or the system); (5) querying the participant's current activity on the system (e.g., as to whether they are currently using the system based on keyboard and mouse movements, what application they are using the mouse pointer to click on, where on the application they are clicking, etc.); (6) querying the participant's implicit and explicit social network (e.g., implicit social network may include for example anyone the participant has sent and received more than 20 messages from whereas explicit social network may include those the participant has identified manually as connection, friend, co-worker, etc.); and (7) querying the text and metadata associated with emails, IMs, transcribed phone calls, etc that is stored and used by the system.


In some implementation, these API's and Web Services may provide the means for other systems to extract Transcript information generated by the system.


In some implementation, the API's also may allow a third party system to access the interface by which the system displays data and information to the user. One instantiation of this interface may include a sidebar. The third party system may add display areas to the sidebar which may be cued on user clicking or typing actions (such as selecting an email or typing a search query). The third party system may add new text, buttons, pictures, etc. to existing sidebar display areas. The third party system may add new menu items to the system menus. The third party system may also add visual elements to displays of the system information displayed in a web interface. FIG. 2 shows an example API 200 that integrates a user interface 202 of a third party applications called “invite friends to Xobni.”


Email Analytics to Support Decision-Making and Email Triage

In some implementation, the system may group emails into groups and rank these groups based on the number of unread emails. For example, the participant may view a ranked list of subjects (e.g., the ranking may be done based on the number of unread emails from the subject); the participant may view the ranked list of projects/tasks (e.g., the ranking may be done based on the number of unread emails associated to the project/task); the participant may view the ranked list of departments in the organization (e.g., the ranking may be done based on the number of unread emails coming from employees of the different department); and the participant may view the total number of emails from all internal and all external subjects that are in the queue to be read by the participant.


In some implementation, for each of the analytical views discussed above, the participant may “drill-down” to the details (i.e. the list of emails or the specific email). For example, the participant may see that there are 30 unread emails from external subjects versus 2 unread emails from internal sources. The participant may click onto the “30” unread external emails, and see the list of emails, and may also click into each email. This may facilitate a data analytical approach to triaging a participant's unread emails.


Improvements to Person Profile

In some implementation, the system may support a participant in performing activities related to, without limitations, email triage, viewing people connections etc. For example, from the person profile view, the participant may view which messages from a subject have been read or which are still unread. The participant also may mark a message or all messages from a subject as having been read. The participant also may view the list of all subjects that have been carbon copied on the email, and clicking a subject may take the participant to that subject's person profile page. If desired, the participant also may click (or some other appropriate action) on a subject's name listed in the body of the email or in the header of the email, and the system may open the person profile page for that subject.


Action Area for Current Email

In some implementation, the system may provide an “Actions” area in the system that allows the participant to undertake certain actions with the current email that is being viewed on the email client. One such implementation of this “Actions” area is in the sidebar implementation where an “Actions” area may be included with the person profile page. The participant may file current email to a folder suggested by the system, forward an email that is contained/attached in the current email and forward attachment(s) that is contained/attached in the current email.


Actionable Web Feeds

In some implementation, the system may be extended to the web feed feature previously described to provide the participant with ways to act on email content. The following are some samples, and hence are not limiting in nature: (1) an ISBN number where the system may provide a link to the page on amazon.com that has the information for the item; (2) web page link where the system may show a thumbnail of the web page that the participant may click to open in a browser screen; (3) EBay email where the system may provide a “View this auction page” action link; (4) a UPS tracking number where the system may provide a “Track this package” action link; (5) an Amazon receipt—the system may provide a “View this order page” action link; (6) YouTube® video where the system may provide a “Play Video” capability; (7) a MP3 link where the system may provide a “Play Audio” capability; (8) a LinkedIn® invitation where the system may provide the means for the participant to accept a friend invitation without having to go to the LinkedIn site; and (9) Facebook email where the system may show a message from an acquaintance or what an acquaintance may have written on the participant's Facebook wall without the participant having to go to the Facebook site.


Search for Actionable Email Content

In some implementation, the participant may search for email content to act on. For example, the participant may search for phone numbers in emails, and the system may return a search result list of numbers. From this list, the participant may click a number to call it via a Voice Over Internet Protocol (VOIP) phone client or other soft phone clients. The participant may also choose to save the phone number to an existing contact or to create a new contact.


As another example, the participant may search for physical addresses in emails, and the system may return a search result list of addresses. From this list, the participant may click an address and the system will open an online mapping system (such as Google Maps) to locate the address on the map. The participant may also choose to save the address to an existing contact or to create a new contact.


As yet another example, the participant may search for calendar event invitations (e.g. Microsoft Outlook event invitation), and the system may return a search result list of calendar event invitations. From this list, the participant may accept or reject the invitation.


As yet another example, the participant may search for appointment related information, and the system may return a list of emails that contain information that suggest the creation of an appointment, and the system will recommend creating an entry in the participant's calendar. The participant may create a calendar entry for a specific email directly from the search results list.


Calendar and Task Information Related to a Person

In some implementation, the participant may create and view “To-Do” tasks related to a subject as part of the Person Profile information. The participant also may view calendar appointments or events that are related to a subject. The system may associate a calendar appointment with a subject because either the subject created the appointment/event or is an invitee to the appointment/event. The system may show the upcoming appointments/events, their locations and time, or visually indicate (e.g. by flashing the appointment) to the participant that an appointment/event is coming up (e.g. 10 minutes before it starts). The participant may view when the subject (or person) is available or busy, or invite the subject for an appointment/event directly from the person profile information view.


Email Triage Service and Machine Learning

In some implementation, the system may provide an email triage service that presents to the participant within a participant-defined amount of time (e.g. 30 minutes) emails that may need attention. Over time, the system may learn about the types of emails that may need the participant's attention. As part of the learning process, for each email presented to the participant during the triage time period, the participant may reply to the email, may come back to it later, or decide not to attend to the email. From these responses/actions, the system may continue to get better at presenting the most important emails to the participant.


In addition, the participant may select and provide a set of past emails that will serve as “training data” for the system. The combination of mining the training data and learning from experience may give the system an accurate assessment of which emails need the most attention from the participant.


As part of this service, the system may provide email templates for standard responses. The system may predict the type of response (e.g. getting back in touch, apology for a late response etc) that an email might need, and propose an email response template that the participant may use and modify for the participant's purpose. The participant may choose to use the email triage service on an ad-hoc basis or to schedule it as an ongoing event (e.g. at 5 pm every Friday).


Email Client Menu and Function Finder

In some implementation, the system may provide a search and browse mechanism to help the participant search for and find a menu item or function supported by the email client that may be difficult to find or that the participant may have forgotten where it was located. The participant may perform activities including, without limitation, using keywords to search for the menu or function; browsing the categories of different menus and functions; and drilling down to the specific menu or function the participant is looking for (e.g., the system may organize the email client's menus and functions into easily identifiable and navigable categories); and saving some email client menus and functions as the most important ones and these will show up as a list in the search and browse mechanism page without the participant having to conduct a search or to browse to look for them.


SMS Notification for Important Emails

In some implementation, when an important email arrives for the participant, the system may send a SMS (short message service) message to the participant's cell phone. In these implementation, the participant may designate emails from specific subjects as important. In addition, similar to the email triage service, the system may decide which emails (and by implication the types of content) are important to the participant. The system may learn from experience and from mining a training data set provided by the participant. When a system decides that an email is important, it may send an SMS message to the participant's cell phone, and the participant may respond with a “Yes” or “No” via a SMS message to indicate whether the email was important.


Quick Email Content Sharing

In some implementation, the system may provide a “sharebox” mechanism where participants may drag and drop emails or other content: attachments, contact information, pictures, etc. Such content may be automatically published to Wikipedia® sites, online blog sites, RSS widgets, social and professional networking sites, content syndication and distribution sites and mechanisms, or shared with other users in the same group or organization.


In some implementation, content may be displayed in a ticker or “news feed” residing on the system (or email client) of other subjects who are connected to the participant via a social network site, professional network site, subscription to the participant's content feeds, an organization affiliation, and other connection means. Permissions also may be set so that content may be shared only with select individuals, other users of the system, “friends” as identified by users on the system, “coworkers” as identified by email address or directory service, “friends” as identified by existing social networks or professional networks and the like. Content also may be sent between individual systems or a central server, or alternatively pushed onto individual systems where the content appears automatically. Of course, if desired, the content also may be pulled only when a users request data, such that sharebox updates may create notifications that may be sent as emails or other methods of notification.


Adding Person Notes

In some implementation, the participant may add free text notes related to a person (i.e. subject). These notes may be exported to other desktop application systems such as, without limitation, Microsoft® Excel, Word, and other text processing applications. In addition, these notes may also be added to on-premise and hosted CRM systems and associated with the customer or partner record in the CRM system. In some implementation, these notes also may be shared with other subjects using the system. The participant may decide which subjects to share these notes with.


Manual and Auto Email Tagging

In some implementation, the participant may manually tag emails using free text terms. The system may also automatically tag the email based on an analysis of the email content. These tags may be used to facilitate the search for emails or to provide an email grouping mechanism to facilitating the participant in browsing these groups to find the email(s) the participant is looking for.


Contact Information Sharing

In some implementation, the participant may click on a “Send Contact Information” action mechanism, and the system may automatically create an email with a “send contact information” content template and the person's contact information. The participant may modify the email content before sending the email. This feature facilitates email introductions between people.


Analyzing Participant Preference

In some implementation, the system may infer the preferences (i.e., likes and dislikes) and inclinations of the participant and subjects by analyzing the email messages and attachments that they send and receive. The system may parse email content and relevant attachments to locate text such as, without limitation, “I like”, “I prefer”, “I have”, “I want”, “I was concerned” and “I was annoyed”.


In some implementation, the system also may develop profiles about the participant or subjects. Such a profile may be used to recommend content, products, services and activities to the participant and subjects. Likewise, such profiles may also be used by the system to understand what the participant and subjects already have, use or do, and the system may leverage these people to serve as recommenders or feedback providers for this content, product, services and activities. The system may harness these people to create a new consumer/people influence channel for this content, product, services and activities.


In some implementation, the system may harness this group of people as a source of information to drive, for example, product development, service development, policy development, process development, content development, etc.


Analyzing Participant Intent

In some implementation, the system may analyze the participant's activities to identify the goal of the participant. For example, if the participant starts a search for the word “matt”, then the system changes to a person profile for Matt. If the participant starts a search for “matt budget”, the system displays an interface showing all the attachments and emails with the word “budget” that were sent or received from Matt.


If a user is observed filtering messages from Matt, then filtering messages from Matt that contain an attachment, and then searching inside those attachments for the word “budget”, the system may suggest a search command to the user such as “matt budget” that would retrieve the information more quickly.


Example Processes


FIG. 3 is an example process for storing an attachment and associated metadata in an searchable form. The process 300 may be performed, for example, by a system executing the attachment view 100, and for clarity of presentation, the description that follows uses such a system as the basis of examples for describing the process 300. However, another system, or combination of systems, may be used to perform the process 300.


Process 300 begins with identifying an attachment to an email message (302). Metadata associated with the attachment may be identified (304). The attachment and the metadata may be stored in an searchable database (306).


In some implementations, a query associated with an attachment may be received. Upon receiving the query, the attachment may be located. Then, information associated the attachment (e.g., a preview of the attachment) may be displayed.


In some implementations, the identification of an attachment to an email message may include the identification of an email thread associated with the attachment; the determination of whether the email thread includes one or more additional attachments; and if it is determined that the email thread includes one or more additional attachments, consolidation of the attachment, the metadata and the email thread including the one or more additional attachments.


In some implementations, a collaboration history associated with the attachment using the metadata also may be determined.


In some implementations, storing the attachment and the metadata in an searchable database may include storing the collaboration history in the searchable database, the collaboration history being established based on one of an analysis of the metadata, content changes associated with the attachment, tracking of one or more copies of the attachment, or one or more content comparisons between the attachment and one or more similar attachments residing in the searchable database.


In some implementations, a voting status associated with the attachment also may be received. The voting status may be indicative of a characteristic of the attachment. Additionally, the identification of the metadata associated with the attachment may include the identification of the voting status, and the storage of the attachment and the metadata in an searchable database may include the storage of the attachment, the metadata and the voting status in the searchable database.


In some implementations, the attachment or email message may be parsed to identify one or more keywords. In some implementations, a personal profile for a user based on the one or more identified keywords may be developed. In some implementations, content (e.g., advertising content) may be presented to the user based on the personal profile.


In some implementations, one or more user queries may be received. The one or more user queries may include one or more search terms. In some implementations, at least one attachment associated with the one or more search terms may be identified. The identified attachment then may be displayed.


In some implementations, a recipient of the email message may be informed as to whether a sender of the mail message is internal or external to a group associated with the recipient.


In some implementations, an email attachment information view configured to present content of an attachment may be provided. In some implementations, a preview of the attachment may be displayed through the email attachment information view.


In some implementations, one or more related email attachments associated with the attachment may be identified based on one or more predetermined criteria. In some implementations, the attachment and the related email attachments may be presented to a user.


In some implementations, identifying one or more related email attachments associated with the attachment may include identifying one or more email threads associated with the attachment; and identifying one or more related email attachments contained in the one or more identified email threads.


In some implementations, one or more search queries may be received. In some implementations, in the searchable database, one or more attachments associated with the one or more search queries may be retrieved. In some implementations, the one or more retrieved attachments may be presented to a user.


In some implementations, receiving one or more search queries may include receiving one or more search queries specifying at least one of a date range, a sender, a recipient or an attachment type.


In some implementations, one or more attachments stored in the searchable database may be categorized. In some implementations, the one or more categorized attachments may be ranked based on one or more predetermined criteria.


In some implementations, one or more attachments stored in the searchable database may be selected. In some implementations, a document comparison between two related selected attachments may be performed. In some implementations, a difference between the two related selected attachments may be identified.


In some implementations, content on a web page that is linked to or from within an email may be identified. In some implementations, the content in a searchable database may be aggregated. In some implementations, an action of a user that relates to the content in the searchable database may be identified. In some implementations, the related content may be retrieved and the retrieved content may be presented to the user.


In some implementations, content outside the webpage may be identified. In some implementations, retrieving the related content may include retrieving the identified content outside the webpage, and presenting the related content to the user may include presenting the related content and the identified content to the user.


In some implementations, a time period in which one or more messages are to be monitored may be identified. One or more user actions of a user associated with the one or more messages may be monitored. Training data based on the one or more monitored user actions may be developed. One or more subsequent messages may be presented to the user based on the training data.


In some implementations, monitoring one or more user actions of a user associated with the one or more messages may include determining which of the one or more messages are important to the user based on the one or more monitored user actions; and identifying one or more characteristics associated with the determined messages.


In some implementations, determining which of the one or more messages are important to the user based on the one or more monitored user actions may include querying the user as to which of the one or more messages are important.


In some implementations, querying the user may include sending a short message service (SMS) text to a mobile device associated with the user.


In some implementations, developing training data based on the one or more monitored user actions may include developing training data based on the one or more identified characteristics.


In some implementations, presenting one or more subsequent messages to the user based on the training data may include identifying one or more messages among the one or more subsequent messages that contain the one or more identified characteristics; and presenting the one or more identified messages to the user.


In some implementations, a template may be provided based on the training data for responding to one or more subsequent messages.


In some implementations, a computer-readable medium may be provided. The computer-readable medium may include instructions stored thereon, which, when executed by a processor, causes the processor to perform operations comprising: displaying a sidebar tool to facilitate a selection of an message attachment information view and a personal profile information view; displaying content associated with one or more message attachments when the message attachment information is selected; and displaying personal or public data of one or more users associated with the one or more message attachments when the personal profile information view is selected.


In some implementations, operations 302-306 may be performed in the order listed or in parallel (e.g., by the same or a different process, substantially or otherwise non-serially) to achieve the same result. Also, the order in which the operations are performed may depend, at least in part, on what entity performs the method. Operations 302-306 also may be performed by the same or different entities or systems.


Advertising Management System Architecture


FIG. 4 is a schematic diagram of a generic computer system 400. The system 400 may be used for the operations described in association with any of the computer-implement methods described previously, according to one implementation. The system 400 includes a processor 410, a memory 420, a storage device 430, and an input/output device 440. Each of the components 410, 420, 430, and 440 are interconnected using a system bus 450. The processor 410 (e.g., dual-core Intel® Xeon® Processors) is capable of processing instructions for execution within the system 400. In one implementation, the processor 410 is a single-threaded processor. In another implementation, the processor 410 is a multi-threaded processor. The processor 410 is capable of processing instructions stored in the memory 420 or on the storage device 430 to display graphical information for a user interface on the input/output device 440.


The memory 420 stores information within the system 400. In one implementation, the memory 420 is a computer-readable medium. In one implementation, the memory 420 is a volatile memory unit. In another implementation, the memory 420 is a non-volatile memory unit.


The storage device 430 is capable of providing mass storage for the system 400. In one implementation, the storage device 430 is a computer-readable medium. In various different implementations, the storage device 430 may be a floppy disk device, a hard disk device, an optical disk device, or a tape device.


The input/output device 440 provides input/output operations for the system 400. In one implementation, the input/output device 440 includes a keyboard and/or pointing device. In another implementation, the input/output device 440 includes a display unit for displaying graphical user interfaces.


In some implementations, the system 400 also may include one or more repositories, one or more network interfaces, an optional administrative computer and one or more computer-readable mediums (e.g., RAM, ROM, SDRAM, hard disk, optical disk, flash memory, etc.). These components can exchange communications and data over one or more communication channels, which can include various known network devices (e.g., routers, hubs, gateways, buses) and software (e.g., middleware) for facilitating the transfer of data and control signals between devices.


The term “computer-readable medium” refers to any medium that participates in providing instructions to a processor for execution, including without limitation, non-volatile media (e.g., optical or magnetic disks), volatile media (e.g., memory) and transmission media. Transmission media includes, without limitation, coaxial cables, copper wire and fiber optics. Transmission media can also take the form of acoustic, light or radio frequency waves.


The computer-readable medium further also may include an operating system (e.g., Linux server, Mac OS® server, Windows® NT server), a network communication module, and the like.


The operating system used by the system 400 can be multi-user, multiprocessing, multitasking, multithreading, real-time and the like. The operating system can perform basic tasks, including but not limited to: recognizing input from and providing output to the administrator computer; keeping track of files and directories on computer-readable mediums (e.g., memory or a storage device); controlling peripheral devices (e.g., repositories and 509); and managing traffic on the one or more communication channels.


The features described herein can be implemented in digital electronic circuitry, or in computer hardware, firmware, software, or in combinations of them. The apparatus can be implemented in a computer program product tangibly embodied in an information carrier, e.g., in a machine-readable storage device or in a propagated signal, for execution by a programmable processor; and method steps can be performed by a programmable processor executing a program of instructions to perform functions of the described implementations by operating on input data and generating output. The described features can be implemented advantageously in one or more computer programs that are executable on a programmable system including at least one programmable processor coupled to receive data and instructions from, and to transmit data and instructions to, a data storage system, at least one input device, and at least one output device. A computer program is a set of instructions that can be used, directly or indirectly, in a computer to perform a certain activity or bring about a certain result. A computer program can be written in any form of programming language, including compiled or interpreted languages, and it can be deployed in any form, including as a stand-alone program or as a module, component, subroutine, or other unit suitable for use in a computing environment.


Suitable processors for the execution of a program of instructions include, by way of example, both general and special purpose microprocessors, and the sole processor or one of multiple processors of any kind of computer. Generally, a processor will receive instructions and data from a read-only memory or a random access memory or both. The essential elements of a computer are a processor for executing instructions and one or more memories for storing instructions and data. Generally, a computer will also include, or be operatively coupled to communicate with, one or more mass storage devices for storing data files; such devices include magnetic disks, such as internal hard disks and removable disks; magneto-optical disks; and optical disks. Storage devices suitable for tangibly embodying computer program instructions and data include all forms of non-volatile memory, including by way of example semiconductor memory devices, such as EPROM, EEPROM, and flash memory devices; magnetic disks such as internal hard disks and removable disks; magneto-optical disks; and CD-ROM and DVD-ROM disks. The processor and the memory can be supplemented by, or incorporated in, ASICs (application-specific integrated circuits).


The network communications module includes various components for establishing and maintaining network connections (e.g., software for implementing communication protocols, such as TCP/IP, HTTP, Ethernet, etc.).


The disclosed embodiments can be implemented in a computing system that includes a back-end component, e.g., as a data server, or that includes a middleware component, e.g., an application server, or that includes a front-end component, e.g., a client computer having a graphical user interface or a web browser through which a user can interact with an implementation of what is disclosed here, or any combination of one or more such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication, e.g., a communication network. Examples of communication networks include a local area network (“LAN”) and a wide area network (“WAN”), e.g., the Internet.


The computing system can include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.


While this specification contains many specifics, these should not be construed as limitations on the scope of what being claims or of what may be claimed, but rather as descriptions of features specific to particular embodiments. Certain features that are described in this specification in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable sub-combination. Moreover, although features may be described above as acting in certain combinations and even initially claimed as such, one or more features from a claimed combination can in some cases be excised from the combination, and the claimed combination may be directed to a sub-combination or variation of a sub-combination.


A number of embodiments of the invention have been described. Nevertheless, it will be understood that various modifications may be made without departing from the spirit and scope of the invention.

Claims
  • 1. A method comprising: storing, via a computing device, in a searchable database, information associated with an attachment to an email message from a person;parsing, via the computing device, the attachment or the email message in order to identify one or more keywords;developing, via the computing device, a personal profile based on the one or more identified keywords;extracting, via the computing device, links present in a plurality of email messages received from the person, where each of the links is a link to a web page;storing, in the searchable database, content obtained from a plurality of web pages linked to by the links;presenting, via the computing device, content based on the personal profile, the content comprising content obtained from the searchable database;receiving, via the computing device, a query comprising search terms;in response to receiving the query, displaying, via the computing device, text from the searchable database for a first web page of the plurality of web pages, wherein the search terms are found in the text of the first web page;determining, via the computing device, a ranking for the links based on a frequency of occurrence in the plurality of email messages; anddisplaying, via the computing device, the links in an order based on the ranking.
  • 2. The method of claim 1, further comprising: identifying an email thread associated with the attachment;determining whether the email thread includes one or more additional attachments; andin response to determining that the email thread includes the one or more additional attachments, consolidating the attachment, the metadata and the email thread.
  • 3. The method of claim 2, further comprising: determining a collaboration history associated with the attachment using the metadata.
  • 4. The method of claim 3, where storing the metadata in a searchable database includes storing the collaboration history in the searchable database, the collaboration history being established based on an analysis of the metadata.
  • 5. The method of claim 1, further comprising: receiving a voting status associated with the attachment, the voting status indicative of a characteristic of the attachment; andwhere the information stored in the searchable database includes the voting status.
  • 6. The method of claim 1, further comprising: indicating to a recipient of the email message whether a sender of the email message is internal or external to a group associated with the recipient.
  • 7. The method of claim 1, further comprising: providing an email attachment information view configured to present content of the attachment.
  • 8. The method of claim 7, further comprising: displaying a preview of the attachment through the email attachment information view.
  • 9. The method of claim 1, further comprising: identifying one or more related email attachments associated with the attachment based on one or more predetermined criteria; andpresenting the attachment and the related email attachments.
  • 10. The method of claim 9, where identifying the one or more related email attachments includes: identifying one or more email threads associated with the attachment; andidentifying one or more related email attachments contained in the one or more identified email threads.
  • 11. The method of claim 1, further comprising: receiving one or more search queries;retrieving, in the searchable database, one or more attachments associated with the one or more search queries; andpresenting the one or more retrieved attachments.
  • 12. The method of claim 11, where receiving the one or more search queries includes receiving one or more search queries specifying at least one of a date range, a sender, a recipient, or an attachment type.
  • 13. The method of claim 1, further comprising: categorizing one or more attachments stored in the searchable database; and
  • 14. The method of claim 1, further comprising: selecting one or more attachments stored in the searchable database;performing a document comparison between the selected attachments; andidentifying a difference between the selected attachments.
  • 15. The method of claim 1, further comprising: receiving a query associated with an attachment;retrieving an attachment from the searchable database based on the query; anddisplaying information associated with the retrieved attachment.
  • 16. The method of claim 1, where the links are web URLs.
  • 17. A non-transitory computer-readable storage medium storing thereon computer-readable instructions, that when executed by at least one processor associated with a computing device, perform: storing, in a database, metadata associated with an attachment to a message from a person;parsing, via the computing device, the attachment or the email message in order to identify one or more keywords;extracting, via the computing device, links present in a plurality of email messages received from the person, where each of the links is a link to a web page;storing, in the database, content obtained from a plurality of web pages linked to by the links;presenting, via the computing device, content based on a personal profile, the content comprising content obtained from the database, the personal profile based on the one or more identified keywords;receiving, via the computing device, a query comprising search terms;in response to receiving the query, displaying, via the computing device, text from the database for a first web page of the plurality of web pages, wherein the search terms are found in the text of the first web page;determining a ranking for the links based on uniqueness of each link as related to other links in messages received from the person; anddisplaying the links in an order based on the ranking.
  • 18. A system comprising: a database for storing metadata associated with an attachment to a message from a person; andat least one processor coupled to communicate with the database and configured to: parse the attachment to identify one or more keywords;develop a personal profile based on the one or more identified keywords;extract links present in a plurality of messages received from the person, where each of the links is a link to a web page;store, in the database, content obtained from a plurality of web pages linked to by the links;present content based on the personal profile, the content comprising content obtained from the database;receive a query comprising search terms;in response to receiving the query, display text from the database for a first web page of the plurality of web pages, wherein the search terms are found in the text of the first web page;determine a ranking for the links based on a frequency of occurrence in the plurality of messages;add the links to a person profile information view for the person; andpresent the person profile information view, the links being displayed in an order based on the ranking.
  • 19. The system of claim 18, where the metadata includes information selected from the group consisting of: related attachments, related people, related conversations, related web content, revision histories, and combinations of the foregoing.
CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims priority to U.S. Provisional Application Ser. No. 61/018,883 titled “PRESENTATION OF ORGANIZED PERSONAL AND PUBLIC DATA USING COMMUNICATION MEDIUMS,” filed on Jan. 3, 2008, the disclosure of which is incorporated herein by reference in its entirety.

US Referenced Citations (584)
Number Name Date Kind
5396647 Thompson et al. Mar 1995 A
5610915 Elliott et al. Mar 1997 A
5966714 Huang et al. Oct 1999 A
6020884 MacNaughton et al. Feb 2000 A
6154205 Carroll et al. Nov 2000 A
6285999 Page Sep 2001 B1
6385644 Devine et al. May 2002 B1
6405197 Gilmour Jun 2002 B2
6484196 Maurille Nov 2002 B1
6510453 Apfel et al. Jan 2003 B1
6546393 Khan Apr 2003 B1
6560620 Ching May 2003 B1
6594654 Salam et al. Jul 2003 B1
6615348 Gibbs Sep 2003 B1
6721748 Knight et al. Apr 2004 B1
6931419 Lindquist Aug 2005 B1
6952805 Tafoya et al. Oct 2005 B1
6965918 Arnold et al. Nov 2005 B1
6996777 Hiipakka Feb 2006 B2
7003724 Newman Feb 2006 B2
7058892 MacNaughton et al. Jun 2006 B1
7076533 Knox et al. Jul 2006 B1
7085745 Klug Aug 2006 B2
7103806 Horvitz Sep 2006 B1
7181518 Matsumoto et al. Feb 2007 B1
7185065 Holtzman et al. Feb 2007 B1
7237009 Fung et al. Jun 2007 B1
7246045 Rappaport et al. Jul 2007 B1
7289614 Twerdahl et al. Oct 2007 B1
7328242 McCarthy et al. Feb 2008 B1
7333976 Auerbach et al. Feb 2008 B1
7359894 Liebman et al. Apr 2008 B1
7383307 Kirkland et al. Jun 2008 B2
7444323 Martinez et al. Oct 2008 B2
7454464 Puthenkulam et al. Nov 2008 B2
7475109 Fletcher et al. Jan 2009 B1
7475113 Stolze Jan 2009 B2
7512788 Choi et al. Mar 2009 B2
7512814 Chen et al. Mar 2009 B2
7536384 Venkataraman et al. May 2009 B2
7539676 Aravamudan May 2009 B2
7580363 Sorvari et al. Aug 2009 B2
7593995 He et al. Sep 2009 B1
7606860 Puthenkulam et al. Oct 2009 B2
7620407 Donald et al. Nov 2009 B1
7624103 Wiegering et al. Nov 2009 B2
7627598 Burke Dec 2009 B1
7634463 Katragadda et al. Dec 2009 B1
7639157 Whitley et al. Dec 2009 B1
7653695 Flury et al. Jan 2010 B2
7685144 Katragadda Mar 2010 B1
7692653 Petro et al. Apr 2010 B1
7698140 Bhardwaj et al. Apr 2010 B2
7702730 Spataro et al. Apr 2010 B2
7707249 Spataro et al. Apr 2010 B2
7707509 Naono et al. Apr 2010 B2
7716140 Nielsen et al. May 2010 B1
7720916 Fisher et al. May 2010 B2
7724878 Timmins et al. May 2010 B2
7725492 Sittig May 2010 B2
7730010 Kishore et al. Jun 2010 B2
7743051 Kashyap et al. Jun 2010 B1
7752081 Calabria Jul 2010 B2
7756895 Emigh Jul 2010 B1
7756935 Gaucas Jul 2010 B2
7761436 Norton et al. Jul 2010 B2
7788260 Lunt Aug 2010 B2
7805492 Thatcher Sep 2010 B1
7818396 Dolin et al. Oct 2010 B2
7827208 Bosworth Nov 2010 B2
7827265 Cheever et al. Nov 2010 B2
7831676 Nagar Nov 2010 B1
7831692 French et al. Nov 2010 B2
7836045 Schachter Nov 2010 B2
7836132 Qureshi et al. Nov 2010 B2
7836134 Pantalone Nov 2010 B2
7849141 Bellegarda et al. Dec 2010 B1
7849142 Clegg et al. Dec 2010 B2
7853602 Gorti et al. Dec 2010 B2
7853881 Aly Assal et al. Dec 2010 B1
7865562 Nesbitt et al. Jan 2011 B2
7870197 Lewis et al. Jan 2011 B2
7899806 Aravamudan Mar 2011 B2
7899871 Kumar et al. Mar 2011 B1
7908647 Polis et al. Mar 2011 B1
7925690 Smith et al. Apr 2011 B2
7930430 Thatcher et al. Apr 2011 B2
7949611 Nielsen et al. May 2011 B1
7949627 Aravamudan May 2011 B2
7970832 Perry et al. Jun 2011 B2
7979569 Eisner et al. Jul 2011 B2
7991764 Rathod Aug 2011 B2
7996456 Gross Aug 2011 B2
8005806 Rupp et al. Aug 2011 B2
8028032 Laird-McConnell Sep 2011 B2
8055715 Bensky et al. Nov 2011 B2
8073928 Dolin et al. Dec 2011 B2
8086676 Palahnuk et al. Dec 2011 B2
8086968 McCaffrey et al. Dec 2011 B2
8140566 Boerries et al. Mar 2012 B2
8145791 Thatcher et al. Mar 2012 B2
8151358 Herold Apr 2012 B1
8161122 Sood et al. Apr 2012 B2
8200761 Tevanian Jun 2012 B1
8200808 Ishida Jun 2012 B2
8204897 Djabarov et al. Jun 2012 B1
8239197 Webb et al. Aug 2012 B2
8244848 Narayanan et al. Aug 2012 B1
8284783 Maufer et al. Oct 2012 B1
8291019 Rochelle et al. Oct 2012 B1
8296179 Rennison Oct 2012 B1
8316315 Portnoy et al. Nov 2012 B2
8363803 Gupta Jan 2013 B2
8365235 Hunt et al. Jan 2013 B2
8392409 Kashyap et al. Mar 2013 B1
8392836 Bau et al. Mar 2013 B1
8412174 Khosravi Apr 2013 B2
8423545 Cort et al. Apr 2013 B2
8433762 Wald et al. Apr 2013 B1
8443441 Stolfo et al. May 2013 B2
8463872 Pounds et al. Jun 2013 B2
8468168 Brezina et al. Jun 2013 B2
8495045 Wolf et al. Jul 2013 B2
8510389 Gurajada et al. Aug 2013 B1
8522257 Rupp et al. Aug 2013 B2
8549412 Brezina et al. Oct 2013 B2
8600343 Brezina et al. Dec 2013 B2
8606335 Ozaki Dec 2013 B2
8620935 Rubin et al. Dec 2013 B2
8661002 Smith et al. Feb 2014 B2
8666035 Timmins et al. Mar 2014 B2
8694633 Mansfield et al. Apr 2014 B2
8717933 Fisher et al. May 2014 B2
8745060 Brezina et al. Jun 2014 B2
8754848 Holzer et al. Jun 2014 B2
8793625 Rhee et al. Jul 2014 B2
8819234 Bauer et al. Aug 2014 B1
8849816 Burba et al. Sep 2014 B2
8850343 Klassen et al. Sep 2014 B2
8972257 Bonforte Mar 2015 B2
8982053 Holzer et al. Mar 2015 B2
8984074 Monaco Mar 2015 B2
8990323 Hein et al. Mar 2015 B2
9020938 Cort et al. Apr 2015 B2
9058366 Brezina et al. Jun 2015 B2
9087323 Hein et al. Jul 2015 B2
9159057 Monaco Oct 2015 B2
9195753 King Nov 2015 B1
9275118 Brezina et al. Mar 2016 B2
9275126 Smith et al. Mar 2016 B2
9298783 Brezina et al. Mar 2016 B2
20010022792 Maeno et al. Sep 2001 A1
20010037407 Dragulev et al. Nov 2001 A1
20010049628 Icho Dec 2001 A1
20020016818 Kirani et al. Feb 2002 A1
20020024536 Kahan et al. Feb 2002 A1
20020049751 Chen et al. Apr 2002 A1
20020054587 Baker et al. May 2002 A1
20020059402 Belanger May 2002 A1
20020059418 Bird et al. May 2002 A1
20020059425 Belfiore et al. May 2002 A1
20020073011 Brattain et al. Jun 2002 A1
20020073058 Kremer et al. Jun 2002 A1
20020076004 Brockenbrough et al. Jun 2002 A1
20020078090 Hwang et al. Jun 2002 A1
20020087647 Quine et al. Jul 2002 A1
20020091777 Schwartz Jul 2002 A1
20020103873 Ramanathan et al. Aug 2002 A1
20020103879 Mondragon Aug 2002 A1
20020107991 Maguire et al. Aug 2002 A1
20020116396 Somers et al. Aug 2002 A1
20020143871 Meyer et al. Oct 2002 A1
20020152216 Bouthors Oct 2002 A1
20020163539 Srinivasan Nov 2002 A1
20020194502 Sheth et al. Dec 2002 A1
20030028525 Santos et al. Feb 2003 A1
20030037116 Nolan et al. Feb 2003 A1
20030041030 Mansfield Feb 2003 A1
20030093483 Allen et al. May 2003 A1
20030114171 Miyamoto Jun 2003 A1
20030114956 Cullen et al. Jun 2003 A1
20030120608 Pereyra Jun 2003 A1
20030131062 Miyashita Jul 2003 A1
20030142125 Salmimaa et al. Jul 2003 A1
20030167324 Farnham et al. Sep 2003 A1
20030204439 Cullen Oct 2003 A1
20030220835 Barnes, Jr. Nov 2003 A1
20030220978 Rhodes Nov 2003 A1
20030220989 Tsuji et al. Nov 2003 A1
20030233419 Beringer Dec 2003 A1
20040002903 Stolfo et al. Jan 2004 A1
20040015547 Griffin et al. Jan 2004 A1
20040015554 Wilson Jan 2004 A1
20040034537 Gengarella et al. Feb 2004 A1
20040039630 Begole et al. Feb 2004 A1
20040056901 March et al. Mar 2004 A1
20040068545 Daniell et al. Apr 2004 A1
20040073616 Fellenstein et al. Apr 2004 A1
20040078443 Malik Apr 2004 A1
20040078444 Malik Apr 2004 A1
20040078445 Malik Apr 2004 A1
20040100497 Quillen et al. May 2004 A1
20040122904 Kim Jun 2004 A1
20040128355 Chao et al. Jul 2004 A1
20040128356 Bernstein et al. Jul 2004 A1
20040133561 Burke Jul 2004 A1
20040153504 Hutchinson et al. Aug 2004 A1
20040162878 Lewis et al. Aug 2004 A1
20040174964 Koch Sep 2004 A1
20040177048 Klug Sep 2004 A1
20040186851 Jhingan et al. Sep 2004 A1
20040202117 Wilson et al. Oct 2004 A1
20040205002 Layton Oct 2004 A1
20040210827 Burg et al. Oct 2004 A1
20040215726 Arning et al. Oct 2004 A1
20040215734 Nagai et al. Oct 2004 A1
20040260756 Forstall et al. Dec 2004 A1
20040268229 Paoli et al. Dec 2004 A1
20050015432 Cohen Jan 2005 A1
20050027779 Schinner Feb 2005 A1
20050038687 Galdes Feb 2005 A1
20050044152 Hardy et al. Feb 2005 A1
20050049896 Giunta Mar 2005 A1
20050055409 Alsarraf et al. Mar 2005 A1
20050055639 Fogg Mar 2005 A1
20050060638 Mathew et al. Mar 2005 A1
20050076090 Thuerk Apr 2005 A1
20050076221 Olkin et al. Apr 2005 A1
20050080868 Malik Apr 2005 A1
20050091272 Smith et al. Apr 2005 A1
20050091314 Blagsvedt et al. Apr 2005 A1
20050091401 Keohane et al. Apr 2005 A1
20050102257 Onyon et al. May 2005 A1
20050102361 Winjum et al. May 2005 A1
20050108273 Brebner May 2005 A1
20050131888 Tafoya et al. Jun 2005 A1
20050138070 Huberman et al. Jun 2005 A1
20050138631 Bellotti et al. Jun 2005 A1
20050140653 Pletikosa et al. Jun 2005 A1
20050149620 Kirkland et al. Jul 2005 A1
20050159970 Buyukkokten et al. Jul 2005 A1
20050164704 Winsor Jul 2005 A1
20050165584 Boody et al. Jul 2005 A1
20050165893 Feinberg et al. Jul 2005 A1
20050188028 Brown, Jr. et al. Aug 2005 A1
20050198159 Kirsch Sep 2005 A1
20050198299 Beck et al. Sep 2005 A1
20050198305 Pezaris et al. Sep 2005 A1
20050203929 Hazarika et al. Sep 2005 A1
20050204009 Hazarika et al. Sep 2005 A1
20050210111 Fukudome Sep 2005 A1
20050213511 Reece et al. Sep 2005 A1
20050216300 Appelman et al. Sep 2005 A1
20050222890 Cheng et al. Oct 2005 A1
20050223315 Shimizu et al. Oct 2005 A1
20050228881 Reasor et al. Oct 2005 A1
20050228899 Wendkos et al. Oct 2005 A1
20050235224 Arend et al. Oct 2005 A1
20050278317 Gross et al. Dec 2005 A1
20060004892 Lunt Jan 2006 A1
20060004914 Kelly et al. Jan 2006 A1
20060015533 Wolf et al. Jan 2006 A1
20060020398 Vernon et al. Jan 2006 A1
20060031340 Mathew et al. Feb 2006 A1
20060031775 Sattler et al. Feb 2006 A1
20060041508 Pham et al. Feb 2006 A1
20060047747 Erickson et al. Mar 2006 A1
20060053199 Pricken et al. Mar 2006 A1
20060056015 Nishiyama Mar 2006 A1
20060059151 Martinez et al. Mar 2006 A1
20060059238 Slater et al. Mar 2006 A1
20060064431 Kishore et al. Mar 2006 A1
20060064434 Gilbert et al. Mar 2006 A1
20060065733 Lee et al. Mar 2006 A1
20060074932 Fong et al. Apr 2006 A1
20060075046 Yozell-Epstein et al. Apr 2006 A1
20060085752 Beadle et al. Apr 2006 A1
20060095331 O'Malley et al. May 2006 A1
20060095502 Lewis et al. May 2006 A1
20060101285 Chen et al. May 2006 A1
20060101334 Liao et al. May 2006 A1
20060101350 Scott May 2006 A1
20060123357 Okamura Jun 2006 A1
20060129844 Oshikiri Jun 2006 A1
20060136494 Oh Jun 2006 A1
20060168059 Chang et al. Jul 2006 A1
20060168073 Kogan et al. Jul 2006 A1
20060173824 Bensky et al. Aug 2006 A1
20060173961 Turski et al. Aug 2006 A1
20060179415 Cadiz et al. Aug 2006 A1
20060195361 Rosenberg Aug 2006 A1
20060195474 Cadiz et al. Aug 2006 A1
20060195785 Portnoy et al. Aug 2006 A1
20060217116 Cassett et al. Sep 2006 A1
20060218111 Cohen Sep 2006 A1
20060224675 Fox et al. Oct 2006 A1
20060224938 Fikes et al. Oct 2006 A1
20060242609 Potter et al. Oct 2006 A1
20060242663 Gogerty Oct 2006 A1
20060248151 Belakovskiy et al. Nov 2006 A1
20060256008 Rosenberg Nov 2006 A1
20060271630 Bensky et al. Nov 2006 A1
20060281447 Lewis et al. Dec 2006 A1
20060282303 Hale et al. Dec 2006 A1
20070005702 Tokuda et al. Jan 2007 A1
20070005715 LeVasseur et al. Jan 2007 A1
20070005750 Lunt et al. Jan 2007 A1
20070011367 Scott et al. Jan 2007 A1
20070016647 Gupta et al. Jan 2007 A1
20070022447 Arseneau et al. Jan 2007 A1
20070038720 Reding et al. Feb 2007 A1
20070050711 Walker et al. Mar 2007 A1
20070060328 Zrike et al. Mar 2007 A1
20070071187 Apreutesei et al. Mar 2007 A1
20070083651 Ishida Apr 2007 A1
20070088687 Bromm et al. Apr 2007 A1
20070106780 Farnham et al. May 2007 A1
20070112761 Xu et al. May 2007 A1
20070115991 Ramani et al. May 2007 A1
20070118528 Choi et al. May 2007 A1
20070123222 Cox et al. May 2007 A1
20070124432 Holtzman et al. May 2007 A1
20070129977 Forney Jun 2007 A1
20070130527 Kim Jun 2007 A1
20070135110 Athale et al. Jun 2007 A1
20070143414 Daigle Jun 2007 A1
20070153989 Howell et al. Jul 2007 A1
20070156732 Surendran et al. Jul 2007 A1
20070162432 Armstrong et al. Jul 2007 A1
20070174304 Shrufi et al. Jul 2007 A1
20070174432 Rhee et al. Jul 2007 A1
20070177717 Owens et al. Aug 2007 A1
20070185844 Schachter Aug 2007 A1
20070192490 Minhas Aug 2007 A1
20070192699 Lee et al. Aug 2007 A1
20070198500 Lucovsky Aug 2007 A1
20070203991 Fisher et al. Aug 2007 A1
20070208802 Barman et al. Sep 2007 A1
20070214141 Sittig Sep 2007 A1
20070218900 Abhyanker Sep 2007 A1
20070244881 Cha et al. Oct 2007 A1
20070250585 Ly et al. Oct 2007 A1
20070255794 Coutts Nov 2007 A1
20070266001 Williams et al. Nov 2007 A1
20070271527 Paas et al. Nov 2007 A1
20070273517 Govind Nov 2007 A1
20070282956 Staats Dec 2007 A1
20070288578 Pantalone Dec 2007 A1
20070294428 Guy et al. Dec 2007 A1
20080005247 Khoo Jan 2008 A9
20080005249 Hart Jan 2008 A1
20080031241 Toebes et al. Feb 2008 A1
20080037721 Yao et al. Feb 2008 A1
20080040370 Bosworth Feb 2008 A1
20080040435 Buschi et al. Feb 2008 A1
20080040474 Zuckerberg Feb 2008 A1
20080040475 Bosworth Feb 2008 A1
20080055263 Lemay et al. Mar 2008 A1
20080056269 Madhani et al. Mar 2008 A1
20080065701 Lindstrom et al. Mar 2008 A1
20080071872 Gross Mar 2008 A1
20080077614 Roy Mar 2008 A1
20080104052 Ryan et al. May 2008 A1
20080113674 Baig May 2008 A1
20080114758 Rupp et al. May 2008 A1
20080119201 Kolber et al. May 2008 A1
20080120411 Eberle May 2008 A1
20080122796 Jobs et al. May 2008 A1
20080134081 Jeon et al. Jun 2008 A1
20080147639 Hartman et al. Jun 2008 A1
20080147810 Kumar et al. Jun 2008 A1
20080154751 Miles Jun 2008 A1
20080162347 Wagner Jul 2008 A1
20080162649 Lee et al. Jul 2008 A1
20080162651 Madnani Jul 2008 A1
20080163164 Chowdhary et al. Jul 2008 A1
20080170158 Jung et al. Jul 2008 A1
20080172362 Shacham et al. Jul 2008 A1
20080172464 Thattai et al. Jul 2008 A1
20080183832 Kirkland et al. Jul 2008 A1
20080216092 Serlet Sep 2008 A1
20080220752 Forstall et al. Sep 2008 A1
20080222279 Cioffi et al. Sep 2008 A1
20080222546 Mudd et al. Sep 2008 A1
20080235353 Cheever et al. Sep 2008 A1
20080235681 Barnett Sep 2008 A1
20080242277 Chen et al. Oct 2008 A1
20080243841 Bonnet et al. Oct 2008 A1
20080244070 Kita et al. Oct 2008 A1
20080261569 Britt et al. Oct 2008 A1
20080270038 Partovi et al. Oct 2008 A1
20080270939 Mueller Oct 2008 A1
20080275748 John Nov 2008 A1
20080275865 Kretz et al. Nov 2008 A1
20080293403 Quon et al. Nov 2008 A1
20080301166 Sugiyama et al. Dec 2008 A1
20080301175 Applebaum et al. Dec 2008 A1
20080301245 Estrada et al. Dec 2008 A1
20080307046 Baek et al. Dec 2008 A1
20080307066 Amidon et al. Dec 2008 A1
20080319943 Fischer Dec 2008 A1
20080320417 Begley et al. Dec 2008 A1
20090005076 Forstall et al. Jan 2009 A1
20090010353 She et al. Jan 2009 A1
20090012806 Ricordi et al. Jan 2009 A1
20090029674 Brezina et al. Jan 2009 A1
20090030872 Brezina et al. Jan 2009 A1
20090030919 Brezina et al. Jan 2009 A1
20090030927 Cases et al. Jan 2009 A1
20090030933 Brezina et al. Jan 2009 A1
20090030940 Brezina et al. Jan 2009 A1
20090031232 Brezina et al. Jan 2009 A1
20090031244 Brezina et al. Jan 2009 A1
20090031245 Brezina et al. Jan 2009 A1
20090037541 Wilson Feb 2009 A1
20090041224 Bychkov et al. Feb 2009 A1
20090048994 Applebaum et al. Feb 2009 A1
20090054091 van Wijk et al. Feb 2009 A1
20090070412 D'Angelo Mar 2009 A1
20090077026 Yanagihara Mar 2009 A1
20090083278 Zhao et al. Mar 2009 A1
20090100384 Louch Apr 2009 A1
20090106415 Brezina et al. Apr 2009 A1
20090106676 Brezina et al. Apr 2009 A1
20090111495 Sjolin et al. Apr 2009 A1
20090112678 Luzardo Apr 2009 A1
20090119678 Shih et al. May 2009 A1
20090132949 Bosarge May 2009 A1
20090156170 Rossano et al. Jun 2009 A1
20090157717 Palahnuk et al. Jun 2009 A1
20090164902 Cohen et al. Jun 2009 A1
20090171930 Vaughan et al. Jul 2009 A1
20090171979 Lubarski et al. Jul 2009 A1
20090174680 Anzures et al. Jul 2009 A1
20090182552 Fyke et al. Jul 2009 A1
20090182788 Chung et al. Jul 2009 A1
20090191899 Wilson et al. Jul 2009 A1
20090198688 Venkataraman et al. Aug 2009 A1
20090204903 Edelen et al. Aug 2009 A1
20090209286 Bentley et al. Aug 2009 A1
20090213088 Hardy et al. Aug 2009 A1
20090217178 Niyogi et al. Aug 2009 A1
20090228555 Joviak et al. Sep 2009 A1
20090234815 Boerries et al. Sep 2009 A1
20090234925 Seippel, III et al. Sep 2009 A1
20090240669 Ando et al. Sep 2009 A1
20090248415 Jablokov et al. Oct 2009 A1
20090249198 Davis et al. Oct 2009 A1
20090271370 Jagadish et al. Oct 2009 A1
20090271409 Ghosh Oct 2009 A1
20090276713 Eddy Nov 2009 A1
20090299824 Barnes, Jr. Dec 2009 A1
20090300127 Du Dec 2009 A1
20090300546 Kwok et al. Dec 2009 A1
20090306981 Cromack et al. Dec 2009 A1
20090313573 Paek et al. Dec 2009 A1
20090319329 Aggarwal et al. Dec 2009 A1
20090327849 Kavanagh et al. Dec 2009 A1
20090328161 Puthenkulam et al. Dec 2009 A1
20100009332 Yaskin et al. Jan 2010 A1
20100030715 Eustice et al. Feb 2010 A1
20100036833 Yeung et al. Feb 2010 A1
20100049534 Whitnah Feb 2010 A1
20100057858 Shen et al. Mar 2010 A1
20100057859 Shen et al. Mar 2010 A1
20100060595 Lee et al. Mar 2010 A1
20100062753 Wen et al. Mar 2010 A1
20100070875 Turski et al. Mar 2010 A1
20100073284 Dods et al. Mar 2010 A1
20100077041 Cowan et al. Mar 2010 A1
20100082693 Hugg et al. Apr 2010 A1
20100083182 Liu et al. Apr 2010 A1
20100088340 Muller et al. Apr 2010 A1
20100094869 Ebanks Apr 2010 A1
20100100899 Bradbury et al. Apr 2010 A1
20100121831 Lin et al. May 2010 A1
20100131447 Creutz et al. May 2010 A1
20100153832 Markus et al. Jun 2010 A1
20100158214 Gravino et al. Jun 2010 A1
20100161547 Carmel et al. Jun 2010 A1
20100161729 Leblanc et al. Jun 2010 A1
20100162171 Felt et al. Jun 2010 A1
20100164957 Lindsay Jul 2010 A1
20100167700 Brock et al. Jul 2010 A1
20100169327 Lindsay Jul 2010 A1
20100174784 Levey et al. Jul 2010 A1
20100185610 Lunt Jul 2010 A1
20100191844 He et al. Jul 2010 A1
20100216509 Riemer et al. Aug 2010 A1
20100228560 Balasaygun et al. Sep 2010 A1
20100229096 Maiocco et al. Sep 2010 A1
20100229223 Shepard Sep 2010 A1
20100235375 Sidhu et al. Sep 2010 A1
20100241579 Bassett et al. Sep 2010 A1
20100250682 Goldberg et al. Sep 2010 A1
20100273456 Wolovitz et al. Oct 2010 A1
20100281535 Perry et al. Nov 2010 A1
20100306185 Smith Dec 2010 A1
20100312837 Bodapati et al. Dec 2010 A1
20100318614 Sager et al. Dec 2010 A1
20100330972 Angiolillo Dec 2010 A1
20110010423 Thatcher et al. Jan 2011 A1
20110035451 Smith et al. Feb 2011 A1
20110040726 Crosbie et al. Feb 2011 A1
20110072052 Skarin et al. Mar 2011 A1
20110078259 Rashad et al. Mar 2011 A1
20110086627 Khosravi Apr 2011 A1
20110087969 Hein et al. Apr 2011 A1
20110119593 Jacobson et al. May 2011 A1
20110145192 Quintela et al. Jun 2011 A1
20110145219 Cierniak et al. Jun 2011 A1
20110173274 Sood Jul 2011 A1
20110173547 Lewis et al. Jul 2011 A1
20110191337 Cort et al. Aug 2011 A1
20110191340 Cort et al. Aug 2011 A1
20110191717 Cort et al. Aug 2011 A1
20110196802 Ellis et al. Aug 2011 A1
20110201275 Jabara et al. Aug 2011 A1
20110219317 Thatcher et al. Sep 2011 A1
20110225293 Rathod Sep 2011 A1
20110231407 Gupta et al. Sep 2011 A1
20110235790 Strope et al. Sep 2011 A1
20110252383 Miyashita Oct 2011 A1
20110276396 Rathod Nov 2011 A1
20110282905 Polis et al. Nov 2011 A1
20110291860 Ozaki et al. Dec 2011 A1
20110291933 Holzer Dec 2011 A1
20110298701 Holzer Dec 2011 A1
20120011204 Morin et al. Jan 2012 A1
20120017158 Maguire et al. Jan 2012 A1
20120023416 Khoo Jan 2012 A1
20120036254 Onuma Feb 2012 A1
20120041907 Wang et al. Feb 2012 A1
20120054681 Cort et al. Mar 2012 A1
20120060102 Shohfi et al. Mar 2012 A1
20120079023 Tejada-Gamero et al. Mar 2012 A1
20120084461 Athias et al. Apr 2012 A1
20120089678 Cort et al. Apr 2012 A1
20120089690 Hein et al. Apr 2012 A1
20120110080 Panyam et al. May 2012 A1
20120110096 Smarr et al. May 2012 A1
20120150970 Peterson et al. Jun 2012 A1
20120150978 Monaco et al. Jun 2012 A1
20120150979 Monaco Jun 2012 A1
20120166999 Thatcher et al. Jun 2012 A1
20120197871 Mandel et al. Aug 2012 A1
20120198348 Park Aug 2012 A1
20120204089 Boudreau et al. Aug 2012 A1
20120246065 Yarvis et al. Sep 2012 A1
20120259834 Broder et al. Oct 2012 A1
20120271822 Schwendimann et al. Oct 2012 A1
20120278428 Harrison et al. Nov 2012 A1
20120310977 Bush et al. Dec 2012 A1
20120330658 Bonforte Dec 2012 A1
20120330980 Rubin et al. Dec 2012 A1
20120331418 Bonforte Dec 2012 A1
20130007627 Monaco Jan 2013 A1
20130014021 Bau et al. Jan 2013 A1
20130053074 Sanchez et al. Feb 2013 A1
20130080915 Lewis et al. Mar 2013 A1
20130091288 Shalunov et al. Apr 2013 A1
20130173712 Monjas Llorente et al. Jul 2013 A1
20130246931 Harris et al. Sep 2013 A1
20130260795 Papakipos et al. Oct 2013 A1
20140011481 Kho Jan 2014 A1
20140081914 Smith et al. Mar 2014 A1
20140081964 Rubin et al. Mar 2014 A1
20140087687 Brezina et al. Mar 2014 A1
20140089304 Rubin et al. Mar 2014 A1
20140089411 Rubin et al. Mar 2014 A1
20140095433 Cort et al. Apr 2014 A1
20140100861 Ledet Apr 2014 A1
20140115086 Chebiyyam Apr 2014 A1
20140156650 Jacobson Jun 2014 A1
20140207761 Brezina et al. Jul 2014 A1
20140214981 Mallet et al. Jul 2014 A1
20140215626 Pam et al. Jul 2014 A1
20140280097 Lee et al. Sep 2014 A1
20140287786 Bayraktar et al. Sep 2014 A1
20150074213 Monaco Mar 2015 A1
20150170650 Bonforte Jun 2015 A1
20150222719 Hein et al. Aug 2015 A1
20160070787 Brezina et al. Mar 2016 A1
20160182661 Brezina et al. Jun 2016 A1
Foreign Referenced Citations (14)
Number Date Country
101351818 Jan 2009 CN
0944002 Sep 1999 EP
2003006116 Jan 2003 JP
2007249307 Sep 2007 JP
20060056015 May 2006 KR
1020090068819 Jun 2009 KR
1020090112257 Oct 2009 KR
1020090115239 Nov 2009 KR
1020020060386 Aug 2012 KR
03098515 Nov 2003 WO
2007037875 Apr 2007 WO
2007143232 Dec 2007 WO
2012082886 Jun 2012 WO
2012082929 Jun 2012 WO
Non-Patent Literature Citations (33)
Entry
Android-Tips.com, “Android Tips & Tricks: How to Import Contacts into Android Phone,” located at http://android-tips.com/how-to-import-contacts-into-android/, Nov. 17, 2008.
Bernstein, Michael S. et al., “Enhancing Directed Content Sharing on the Web,” Proceedings of the 28th International Conference on Human Factors in Computing Systems, Atlanta, GA, Apr. 10-15, 2010, pp. 971-980.
Carvalho, Vitor R. et al., “Ranking Users for Intelligent Message Addressing,” Proceedings of the 30th European Conference on Information Retrieval, Glasgow, England, Mar. 30-Apr. 3, 2008, pp. 321-333.
Culotta, Aron et al., “Extracting Social Networks and Contact Information from Email and the Web,” Proceedings of the First Conference on Email and Anti-Spam (CEAS), Mountain View, CA, Jul. 30-31, 2004.
Elsayed, Tamer et al., “Personal Name Resolution in Email: A Heuristic Approach,” University of Maryland Technical Report No. TR-LAMP-150, Mar. 17, 2008.
Fitzpatrick, Brad, “AddressBooker,” Github Social Coding, located at http://addressbooker.appspot.com/, Nov. 28, 2008.
Google Inc. “OpenSocial Tutorial,” located at http://code.google.com/apis/opensocial/articles/tutorial/tutorial-0.8.html, Aug. 2008.
Google Inc., “Automatic Updating of Contacts,” Gmail help forum, located at http://74.125.4.16/support/forum/p/gmail/thread?tid=03f7b692150d9242&hl=en, Apr. 27, 2009.
Hillebrand, Tim, “Plaxo: The Smart Auto Update Address Book,” Smart Phone Mag, located at http://www.smartphonemag.com/cms/blogs/9/plaxo—the—smart—auto—update—address—book, Nov. 6, 2006.
International Patent Application PCT/US10/34782, International Search Report, Dec. 22, 2010.
International Patent Application PCT/US10/34782, Written Opinion, Dec. 22, 2010.
International Patent Application PCT/US10/35405, International Search Report and Written Opinion, Jan. 3, 2011.
International Patent Application PCT/US10/52081, International Search Report and Written Opinion, May 20, 2011.
International Patent Application PCT/US10/56560, International Search Report and Written Opinion, Jun. 21, 2011.
International Patent Application PCT/US11/64958, International Search Report and Written Opinion, Jul. 31, 2012.
International Patent Application PCT/US12/043523, International Search Report and Written Opinion, Nov. 28, 2012.
International Patent Application PCT/US2011/064892, International Search Report and Written Opinion, Aug. 22, 2012.
International Patent Application PCT/US2012/043507, International Search Report and Written Opinion, Jan. 3, 2013.
Microsoft Corporation, “About AutoComplete Name Suggesting,” Microsoft Outlook 2003 help forum, located at http://office.microsoft.com/en-us/outlook/HP063766471033.aspx, 2003.
OpenSocial Foundation, “Social Application Tutorial (v0.9),” located at http://wiki.opensocial.org/index.php? title=Social—Application—Tutorial, accessed Oct. 8, 2010.
PCWorld Communications, Inc., “Your Contacts Are Forever: Self-Updating Address Book,” located at http://www.pcworld.com/article/48192/your—contacts—are—forever—selfupdating—address book.html, May 1, 2001.
U.S. Appl. No. 61/407,018, filed Oct. 27, 2010.
European Patent Application No. 11849271.9, Extended Search Report, Apr. 3, 2014.
Extended European Search Report, EP 10 78 3783, dated Mar. 24, 2014.
European Patent Application 12801998.1, Extended Search Report, Feb. 10, 2015.
European Patent Application No. 12801970.0, Extended Search Report, Oct. 23, 2014.
Epstein, “Harnessing User Data to Improve Facebook Features”, Doctoral dissertation, Boston College, May 12, 2010.
Hannon et ai., “Recommending Twitter Users to Follow Using Content and Collaborative Filtering Approaches”, RecSys2010, Sep. 26-30, 2010, Barcelona, Spain.
“OpenSocial Specification v0.9”, OpenSocial and Gadgets Specification Group, Apr. 2009.
“The Ultimate Guide for Everything Twitter”, Webdesigner Depot, archive.org webpage https://web.archive.org/web/20090325042115/http://www.webdesignerdepot.com/2009/03/the-ultimate-guide-for-everything-twitter/ from Mar. 25, 2009.
Oberhaus, Kristin, “Look for Cues: Targeting Without Personally Identifiable Information,” W3i, LLC blog entry located at http://blog.w3i.com/2009/09/03/looking-for-cues-targeting-without-personally-identifiable-information/, Sep. 3, 2009.
W3i, LLC, “Advertiser Feedback System (AFS),” company product description. Sep. 22, 2009.
Wikimedia Foundation, Inc., “Machine Learning,” Wikipedia encyclopedia entry located at http://en.wikipedia.org/wiki/Machine—learning, Jan. 30, 2011.
Related Publications (1)
Number Date Country
20090177754 A1 Jul 2009 US
Provisional Applications (1)
Number Date Country
61018883 Jan 2008 US