US20120246187A1 - Automatic correction of contact list errors in a collaboration system - Google Patents
Automatic correction of contact list errors in a collaboration system Download PDFInfo
- Publication number
- US20120246187A1 US20120246187A1 US13/053,738 US201113053738A US2012246187A1 US 20120246187 A1 US20120246187 A1 US 20120246187A1 US 201113053738 A US201113053738 A US 201113053738A US 2012246187 A1 US2012246187 A1 US 2012246187A1
- Authority
- US
- United States
- Prior art keywords
- user
- identifier
- replacement
- contact list
- collaboration system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
Definitions
- the disclosure relates to computer network-based communications in general, and in particular to real-time collaboration systems.
- Real-time collaboration systems such as instant messaging systems
- each party must provide his or her collaboration system with an identifier that the collaboration system uses to identify the other party.
- identifiers include email addresses and collaboration system-specific user IDs, which are typically maintained in contact lists.
- Collaboration systems typically provide their users with “presence” notifications regarding the current status of the contacts in their contact lists, such as whether or not a contact is currently logged-in to his/her collaboration system and available to receive communications.
- Some collaboration systems provide gateways to allow their users to communicate with, and receive presence notifications regarding, contacts belonging to other collaboration systems.
- a method for managing a contact list in a collaboration system including detecting if a contact has been offline for at least a predefined period of time, where the contact is identified by a target identifier in a contact list of a first user of a first collaboration system, searching a collaboration system directory to find a replacement identifier associated with a second user, where the second user meets a predefined peer criterion with respect to the first user, and where the replacement identifier a) is different from the target identifier, and b) meets a predefined similarity criterion with respect to the target identifier, and adding the replacement identifier into the contact list of the first user.
- a method for managing a contact list in a collaboration system including detecting if a target identifier is being entered into a contact list of a first user of a first collaboration system, where the contact is identified by a target identifier in a contact list of a first user of a first collaboration system, searching a collaboration system directory to find a replacement identifier associated with a second user, where the second user meets a predefined peer criterion with respect to the first user, and where the replacement identifier a) is different from the target identifier, and b) meets a predefined similarity criterion with respect to the target identifier, and adding the replacement identifier into the contact list of the first user.
- FIG. 1 is an illustration of a system for managing a contact list in a collaboration system, constructed and operative in accordance with an embodiment of the invention.
- FIG. 2 is a flowchart of a method of operation of the system of FIG. 1 , operative in accordance with an embodiment of the invention.
- FIG. 3 is an illustration of an operational scenario of the system of FIG. 1 and the method of FIG. 2 in accordance with an embodiment of the invention.
- FIG. 4 is an illustration of a system for managing a contact list in a collaboration system, constructed and operative in accordance with an embodiment of the invention.
- FIG. 5 is a flowchart of a method of operation of the system of FIG. 1 , operative in accordance with an embodiment of the invention.
- FIG. 6 is a block diagram of a hardware implementation of a computing system, constructed and operative in accordance with an embodiment of the invention.
- Some collaboration systems provide gateways to allow their users to communicate with and receive presence notifications regarding contacts belonging to other collaboration systems. Unfortunately, if a user of one collaboration system incorrectly enters into his/her contact list the identifier of a contact in another collaboration system, the user might not become aware of the error. This problem with conventional approaches was discovered by the inventors of the disclosure in the course of developing the invention.
- One embodiment of the disclosure is for managing a contact list in a collaboration system, by detecting if a contact has been offline for at least a predefined period of time and/or detecting if a target identifier is being entered into a contact list of a first user of a first collaboration system.
- the contact can be identified by a target identifier in a contact list of a first user of a first collaboration system.
- a collaboration system directory can be searched to find a replacement identifier associated with a second user of the first collaboration system.
- the second user can satisfy predefined peer criteria with respect to the first user. For example, the criteria can ensure that the replacement identifier is different from a target identifier, and meets a predefined similarity criterion with respect to the target identifier. Responsive to the predefined peer criteria being satisfied, the target identifier can be replaced with the replacement identifier in the contact list of the first user.
- aspects of the present invention may be embodied as a system, method or computer program product. Accordingly, aspects of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” Furthermore, aspects of the present invention may take the form of a computer program product embodied in one or more computer readable medium(s) having computer readable program code embodied thereon.
- the computer readable medium may be a computer readable signal medium or a computer readable storage medium.
- a computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing.
- a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
- a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof.
- a computer readable signal medium may be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
- Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
- Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C++ or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages.
- the program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server.
- the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
- LAN local area network
- WAN wide area network
- Internet Service Provider an Internet Service Provider
- These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
- These computer program instructions may also be stored in a computer readable medium that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer readable medium produce an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
- the computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
- FIG. 1 is an illustration of a system for managing a contact list in a collaboration system, constructed and operative in accordance with an embodiment of the invention.
- an offline detector 100 is configured to detect if a contact associated with an identifier (hereinafter “the target identifier”) in a contact list 102 has been offline for at least a predefined period of time.
- Contact list 102 may, for example, be a contact list belonging to a user 104 of a collaboration system (hereinafter “collaboration system A”) such as IBM Lotus SametimeTM, commercially-available from International Business Machines Corporation, Armonk, N.Y.
- collaboration system A such as IBM Lotus SametimeTM, commercially-available from International Business Machines Corporation, Armonk, N.Y.
- the target identifier may, for example, have been previously entered by user 104 using a contact list manager 106 , where the target identifier identifies an entity, such as a user 108 , belonging to a different collaboration system (hereinafter “collaboration system B”), such as Yahoo MessengerTM, commercially-available from Yahoo! Inc., Sunnyvale, Calif.
- collaboration system B such as Yahoo MessengerTM, commercially-available from Yahoo! Inc., Sunnyvale, Calif.
- a subscriptions manager 110 previously requested or otherwise created or attempted to create a subscription for information regarding user 108 , such as for presence notifications regarding the current status user 108 , where the subscription was associated with the target identifier that identifies user 108 .
- the information regarding user 108 is also preferably received by collaboration system A from collaboration system B via a gateway 112 through which collaboration system A communicates with collaboration system B in accordance with conventional techniques.
- a replacement searcher 114 is configured to respond by searching a collaboration system directory 116 to find one or more identifiers (hereinafter “replacement identifiers”) that are associated with users of collaboration system A who are other than user 104 and who meet predefined peer criteria with respect to user 104 .
- the predefined peer criteria may require that the other users be in the same organizational unit or department as user 104 , such as where this information is found in collaboration system directory 116 .
- an identifier found by replacement searcher 114 is different from (i.e., not identical to) the target identifier and meets predefined similarity criteria with respect to the target identifier.
- the predefined similarity criteria may be expressed using any known measure of similarity, such as, for example, those that are employed by software that checks the spelling of words in a document and suggests replacement words, or soundex algorithms that suggest replacement words that sound similar to a target word.
- Replacement searcher 114 preferably presents any replacement identifiers it finds for selection, such as via a computer display for selection by user 104 , whereupon contact list manager 106 adds the selected replacement identifier of user 108 into contact list 102 , such as by replacing the target identifier with the selected replacement identifier.
- FIG. 1 Any of the elements shown in FIG. 1 are preferably implemented by one or more computers, such as a computer 118 , by implementing any of the elements shown in FIG. 1 in computer hardware and/or in computer software embodied in a non-transient, computer-readable medium in accordance with conventional techniques.
- FIG. 2 is a flowchart illustration of a method of operation of the system of FIG. 1 , operative in accordance with an embodiment of the invention.
- a contact is detected as being offline for at least a predefined period of time, where the contact is identified by a target identifier in a contact list belonging to a first user of a first collaboration system (step 200 ).
- a collaboration system directory is searched to find one or more replacement identifiers associated with at least a second user of the collaboration system that meets predefined peer criteria with respect to the first user (step 202 ), where the replacement identifier is different from the target identifier and meets a predefined similarity criterion with respect to the target identifier.
- the replacement identifiers found during the search are preferably presented for selection, such as by the first user to whom the contact list belongs (step 204 ).
- a selected replacement identifier is added into the contact list, such as by replacing the target identifier (step 206 ).
- FIG. 3 is an illustration of an operational scenario of the system of FIG. 1 and the method of FIG. 2 in accordance with an embodiment of the invention.
- a window 300 is presented to a user indicating that a contact identified by the email address bob.bob.bob.bob@yahoo.com has been offline for three days, and that the contact identifier may, therefore, be incorrect.
- Window 300 indicates that a search was conducted for replacement identifiers that are similar to the contact identifier, and that several such email addresses were found.
- the user is invited to select one or more of the email addresses to replace the current email address for the contact in the user's contact list.
- FIG. 4 is an illustration of a system for managing a contact list in a collaboration system, constructed and operative in accordance with an alternative embodiment of the invention.
- the system of FIG. 4 is substantially similar to the system of FIG. 1 , but for the notable exception that in place of offline detector 100 that detects if the contact associated with the target identifier has been offline for at least the predefined period of time, the system of FIG. 4 includes an addition detector 400 that is configured to detect if the target identifier is being entered into contact list 102 , such as by user 104 using contact list manager 106 , whereupon replacement searcher 114 searches collaboration system directory 116 to find one or more replacement identifiers as described above.
- FIG. 5 is a flowchart of a method of operation of the system of FIG. 4 , operative in accordance with an embodiment of the invention.
- a target identifier identifying a contact is detected if it is being entered into a contact list belonging to a first user of a first collaboration system (step 500 ).
- a collaboration system directory is searched to find one or more replacement identifiers associated with at least a second user of the collaboration system that meets predefined peer criteria with respect to the first user (step 502 ), where the replacement identifier is different from the target identifier and meets a predefined similarity criterion with respect to the target identifier.
- the replacement identifiers found during the search are preferably presented for selection, such as by the first user to whom the contact list belongs (step 504 ).
- a selected replacement identifier is added to the contact list (step 506 ).
- block diagram 600 illustrates a hardware implementation of a computing system in accordance with which one or more components/methodologies of the invention (e.g., components/methodologies described in the context of FIGS. 1-5 ) may be implemented, according to an embodiment of the invention.
- the techniques for controlling access to at least one resource may be implemented in accordance with a processor 610 , a memory 612 , I/O devices 614 , and a network interface 616 , coupled via a computer bus 618 or alternate connection arrangement.
- processor as used herein is intended to include any processing device, such as, for example, one that includes a CPU (central processing unit) and/or other processing circuitry. It is also to be understood that the term “processor” may refer to more than one processing device and that various elements associated with a processing device may be shared by other processing devices.
- memory as used herein is intended to include memory associated with a processor or CPU, such as, for example, RAM, ROM, a fixed memory device (e.g., hard drive), a removable memory device (e.g., diskette), flash memory, etc. Such memory may be considered a computer readable storage medium.
- input/output devices or “I/O devices” as used herein is intended to include, for example, one or more input devices (e.g., keyboard, mouse, scanner, etc.) for entering data to the processing unit, and/or one or more output devices (e.g., speaker, display, printer, etc.) for presenting results associated with the processing unit.
- input devices e.g., keyboard, mouse, scanner, etc.
- output devices e.g., speaker, display, printer, etc.
- each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s).
- the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved.
- any of the elements described hereinabove may be implemented as a computer program product embodied in a computer-readable medium, such as in the form of computer program instructions stored on magnetic or optical storage media or embedded within computer hardware, and may be executed by or otherwise accessible to a computer (not shown).
Abstract
Managing a contact list in a collaboration system, by detecting if a contact has been offline for at least a predefined period of time and/or detecting if a target identifier is being entered into a contact list of a first user of a first collaboration system, where the contact is identified by a target identifier in a contact list of a first user of a first collaboration system, searching a collaboration system directory to find a replacement identifier associated with a second user of the first collaboration system, where the second user meets a predefined peer criterion with respect to the first user, and where the replacement identifier a) is different from a target identifier, and b) meets a predefined similarity criterion with respect to the target identifier, and replacing the target identifier with the replacement identifier in the contact list of the first user.
Description
- The disclosure relates to computer network-based communications in general, and in particular to real-time collaboration systems.
- Real-time collaboration systems, such as instant messaging systems, are increasingly used within and between businesses and other organizations to enhance communications and cooperation between parties. Typically, before two parties can communicate with each other, each party must provide his or her collaboration system with an identifier that the collaboration system uses to identify the other party. Common examples of such identifiers include email addresses and collaboration system-specific user IDs, which are typically maintained in contact lists. Collaboration systems typically provide their users with “presence” notifications regarding the current status of the contacts in their contact lists, such as whether or not a contact is currently logged-in to his/her collaboration system and available to receive communications. Some collaboration systems provide gateways to allow their users to communicate with, and receive presence notifications regarding, contacts belonging to other collaboration systems.
- In one aspect of the invention a method is provided for managing a contact list in a collaboration system, the method including detecting if a contact has been offline for at least a predefined period of time, where the contact is identified by a target identifier in a contact list of a first user of a first collaboration system, searching a collaboration system directory to find a replacement identifier associated with a second user, where the second user meets a predefined peer criterion with respect to the first user, and where the replacement identifier a) is different from the target identifier, and b) meets a predefined similarity criterion with respect to the target identifier, and adding the replacement identifier into the contact list of the first user.
- In another aspect of the invention a method is provided for managing a contact list in a collaboration system, the method including detecting if a target identifier is being entered into a contact list of a first user of a first collaboration system, where the contact is identified by a target identifier in a contact list of a first user of a first collaboration system, searching a collaboration system directory to find a replacement identifier associated with a second user, where the second user meets a predefined peer criterion with respect to the first user, and where the replacement identifier a) is different from the target identifier, and b) meets a predefined similarity criterion with respect to the target identifier, and adding the replacement identifier into the contact list of the first user.
- Systems and computer program products embodying embodiments of the invention are also provided.
-
FIG. 1 is an illustration of a system for managing a contact list in a collaboration system, constructed and operative in accordance with an embodiment of the invention. -
FIG. 2 is a flowchart of a method of operation of the system ofFIG. 1 , operative in accordance with an embodiment of the invention. -
FIG. 3 is an illustration of an operational scenario of the system ofFIG. 1 and the method ofFIG. 2 in accordance with an embodiment of the invention. -
FIG. 4 is an illustration of a system for managing a contact list in a collaboration system, constructed and operative in accordance with an embodiment of the invention. -
FIG. 5 is a flowchart of a method of operation of the system ofFIG. 1 , operative in accordance with an embodiment of the invention. -
FIG. 6 is a block diagram of a hardware implementation of a computing system, constructed and operative in accordance with an embodiment of the invention. - Some collaboration systems provide gateways to allow their users to communicate with and receive presence notifications regarding contacts belonging to other collaboration systems. Unfortunately, if a user of one collaboration system incorrectly enters into his/her contact list the identifier of a contact in another collaboration system, the user might not become aware of the error. This problem with conventional approaches was discovered by the inventors of the disclosure in the course of developing the invention.
- One embodiment of the disclosure is for managing a contact list in a collaboration system, by detecting if a contact has been offline for at least a predefined period of time and/or detecting if a target identifier is being entered into a contact list of a first user of a first collaboration system. The contact can be identified by a target identifier in a contact list of a first user of a first collaboration system. A collaboration system directory can be searched to find a replacement identifier associated with a second user of the first collaboration system. The second user can satisfy predefined peer criteria with respect to the first user. For example, the criteria can ensure that the replacement identifier is different from a target identifier, and meets a predefined similarity criterion with respect to the target identifier. Responsive to the predefined peer criteria being satisfied, the target identifier can be replaced with the replacement identifier in the contact list of the first user.
- The invention is now described within the context of one or more embodiments, although the description is intended to be illustrative of the invention as a whole, and is not to be construed as limiting the invention to the embodiments shown. It is appreciated that various modifications may occur to those skilled in the art that, while not specifically shown herein, are nevertheless within the true spirit and scope of the invention.
- As will be appreciated by one skilled in the art, aspects of the present invention may be embodied as a system, method or computer program product. Accordingly, aspects of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” Furthermore, aspects of the present invention may take the form of a computer program product embodied in one or more computer readable medium(s) having computer readable program code embodied thereon.
- Any combination of one or more computer readable medium(s) may be utilized. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
- A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
- Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing. Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C++ or the like and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
- Aspects of the present invention are described below with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions.
- These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
- These computer program instructions may also be stored in a computer readable medium that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer readable medium produce an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
- The computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
- Reference is now made to
FIG. 1 which is an illustration of a system for managing a contact list in a collaboration system, constructed and operative in accordance with an embodiment of the invention. In the system ofFIG. 1 , anoffline detector 100 is configured to detect if a contact associated with an identifier (hereinafter “the target identifier”) in acontact list 102 has been offline for at least a predefined period of time.Contact list 102 may, for example, be a contact list belonging to auser 104 of a collaboration system (hereinafter “collaboration system A”) such as IBM Lotus Sametime™, commercially-available from International Business Machines Corporation, Armonk, N.Y. The target identifier may, for example, have been previously entered byuser 104 using acontact list manager 106, where the target identifier identifies an entity, such as auser 108, belonging to a different collaboration system (hereinafter “collaboration system B”), such as Yahoo Messenger™, commercially-available from Yahoo! Inc., Sunnyvale, Calif. Preferably, asubscriptions manager 110 previously requested or otherwise created or attempted to create a subscription forinformation regarding user 108, such as for presence notifications regarding thecurrent status user 108, where the subscription was associated with the target identifier that identifiesuser 108. Theinformation regarding user 108 is also preferably received by collaboration system A from collaboration system B via agateway 112 through which collaboration system A communicates with collaboration system B in accordance with conventional techniques. - If the contact associated with the target identifier has been offline for at least the predefined period of time, a
replacement searcher 114 is configured to respond by searching acollaboration system directory 116 to find one or more identifiers (hereinafter “replacement identifiers”) that are associated with users of collaboration system A who are other thanuser 104 and who meet predefined peer criteria with respect touser 104. For example, the predefined peer criteria may require that the other users be in the same organizational unit or department asuser 104, such as where this information is found incollaboration system directory 116. Preferably, to qualify as a replacement identifier, an identifier found byreplacement searcher 114 is different from (i.e., not identical to) the target identifier and meets predefined similarity criteria with respect to the target identifier. The predefined similarity criteria may be expressed using any known measure of similarity, such as, for example, those that are employed by software that checks the spelling of words in a document and suggests replacement words, or soundex algorithms that suggest replacement words that sound similar to a target word. -
Replacement searcher 114 preferably presents any replacement identifiers it finds for selection, such as via a computer display for selection byuser 104, whereuponcontact list manager 106 adds the selected replacement identifier ofuser 108 intocontact list 102, such as by replacing the target identifier with the selected replacement identifier. - Any of the elements shown in
FIG. 1 are preferably implemented by one or more computers, such as acomputer 118, by implementing any of the elements shown inFIG. 1 in computer hardware and/or in computer software embodied in a non-transient, computer-readable medium in accordance with conventional techniques. - Reference is now made to
FIG. 2 which is a flowchart illustration of a method of operation of the system ofFIG. 1 , operative in accordance with an embodiment of the invention. In the method ofFIG. 2 , a contact is detected as being offline for at least a predefined period of time, where the contact is identified by a target identifier in a contact list belonging to a first user of a first collaboration system (step 200). A collaboration system directory is searched to find one or more replacement identifiers associated with at least a second user of the collaboration system that meets predefined peer criteria with respect to the first user (step 202), where the replacement identifier is different from the target identifier and meets a predefined similarity criterion with respect to the target identifier. The replacement identifiers found during the search are preferably presented for selection, such as by the first user to whom the contact list belongs (step 204). A selected replacement identifier is added into the contact list, such as by replacing the target identifier (step 206). -
FIG. 3 is an illustration of an operational scenario of the system ofFIG. 1 and the method ofFIG. 2 in accordance with an embodiment of the invention. InFIG. 3 awindow 300 is presented to a user indicating that a contact identified by the email address bob.bob.bob.bob@yahoo.com has been offline for three days, and that the contact identifier may, therefore, be incorrect.Window 300 indicates that a search was conducted for replacement identifiers that are similar to the contact identifier, and that several such email addresses were found. The user is invited to select one or more of the email addresses to replace the current email address for the contact in the user's contact list. - Reference is now made to
FIG. 4 which is an illustration of a system for managing a contact list in a collaboration system, constructed and operative in accordance with an alternative embodiment of the invention. The system ofFIG. 4 is substantially similar to the system ofFIG. 1 , but for the notable exception that in place ofoffline detector 100 that detects if the contact associated with the target identifier has been offline for at least the predefined period of time, the system ofFIG. 4 includes anaddition detector 400 that is configured to detect if the target identifier is being entered intocontact list 102, such as byuser 104 usingcontact list manager 106, whereuponreplacement searcher 114 searchescollaboration system directory 116 to find one or more replacement identifiers as described above. - Reference is now made to
FIG. 5 which is a flowchart of a method of operation of the system ofFIG. 4 , operative in accordance with an embodiment of the invention. In the method ofFIG. 5 , a target identifier identifying a contact is detected if it is being entered into a contact list belonging to a first user of a first collaboration system (step 500). A collaboration system directory is searched to find one or more replacement identifiers associated with at least a second user of the collaboration system that meets predefined peer criteria with respect to the first user (step 502), where the replacement identifier is different from the target identifier and meets a predefined similarity criterion with respect to the target identifier. The replacement identifiers found during the search are preferably presented for selection, such as by the first user to whom the contact list belongs (step 504). A selected replacement identifier is added to the contact list (step 506). - Referring now to
FIG. 6 , block diagram 600 illustrates a hardware implementation of a computing system in accordance with which one or more components/methodologies of the invention (e.g., components/methodologies described in the context ofFIGS. 1-5 ) may be implemented, according to an embodiment of the invention. - As shown, the techniques for controlling access to at least one resource may be implemented in accordance with a
processor 610, amemory 612, I/O devices 614, and anetwork interface 616, coupled via acomputer bus 618 or alternate connection arrangement. - It is to be appreciated that the term “processor” as used herein is intended to include any processing device, such as, for example, one that includes a CPU (central processing unit) and/or other processing circuitry. It is also to be understood that the term “processor” may refer to more than one processing device and that various elements associated with a processing device may be shared by other processing devices.
- The term “memory” as used herein is intended to include memory associated with a processor or CPU, such as, for example, RAM, ROM, a fixed memory device (e.g., hard drive), a removable memory device (e.g., diskette), flash memory, etc. Such memory may be considered a computer readable storage medium.
- In addition, the phrase “input/output devices” or “I/O devices” as used herein is intended to include, for example, one or more input devices (e.g., keyboard, mouse, scanner, etc.) for entering data to the processing unit, and/or one or more output devices (e.g., speaker, display, printer, etc.) for presenting results associated with the processing unit.
- The flowchart and block diagrams in the
FIGS. 1-6 illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions. - It will be appreciated that any of the elements described hereinabove may be implemented as a computer program product embodied in a computer-readable medium, such as in the form of computer program instructions stored on magnetic or optical storage media or embedded within computer hardware, and may be executed by or otherwise accessible to a computer (not shown).
- While the methods and apparatus herein may or may not have been described with reference to specific computer hardware or software, it is appreciated that the methods and apparatus described herein may be readily implemented in computer hardware or software using conventional techniques.
- While the invention has been described with reference to one or more specific embodiments, the description is intended to be illustrative of the invention as a whole and is not to be construed as limiting the invention to the embodiments shown. It is appreciated that various modifications may occur to those skilled in the art that, while not specifically shown herein, are nevertheless within the true spirit and scope of the invention.
Claims (25)
1. A method comprising:
detecting if a contact has been offline for at least a predefined period of time, wherein the contact is identified by a target identifier in a contact list of a first user of a first collaboration system;
searching a collaboration system directory to find a replacement identifier associated with a second user, wherein the second user meets a predefined peer criterion with respect to the first user, and wherein the replacement identifier
a) is different from the target identifier, and
b) meets a predefined similarity criterion with respect to the target identifier; and
adding the replacement identifier into the contact list of the first user, wherein the replacement identifier is not present in the contact list of the first user before the adding.
2. The method of claim 1 , wherein the replacement identifier of the searching is a replacement identifier associated with a second user of the first collaboration system.
3. The method of claim 1 , wherein the replacement identifier of the searching is a replacement identifier associated with a second user of a second collaboration system, wherein said second collaboration system is external of the first collaboration system.
4. The method of claim 1 , wherein the adding of the replacement identifier into the contact list, replaces the target identifier with the replacement identifier in the contact list of the first user so that after the replacement, the target identifier is no longer in the contact list of the first user.
5. The method of claim 1 , wherein the adding of the replacement identifier in the contact list of the first user results in the contact list of the first user including the target identifier and the replacement identifier.
6. The method of claim 1 , wherein the searching is performed responsive to detecting if the contact has been offline for at least the predefined period of time.
7. The method of claim 3 , wherein the replacement identifier identifies the contact as belonging to the second collaboration system.
8. The method of claim 1 and further comprising:
presenting, via a computer-controlled output device, the replacement identifier in a manner that shows that the replacement identifier is a candidate for replacing the target identifier; and
receiving, responsive to presenting the replacement identifier, an instruction for adding the replacement identifier into the contact list of the first user.
9. A method comprising:
detecting if a target identifier is being entered into a contact list of a first user of a first collaboration system;
searching a collaboration system directory to find a replacement identifier associated with a second user, wherein the second user meets a predefined peer criterion with respect to the first user, and wherein the replacement identifier
a) is different from the target identifier, and
b) meets a predefined similarity criterion with respect to the target identifier; and
adding the replacement identifier into the contact list of the first user, wherein the replacement identifier is not present in the contact list of the first user before the adding.
10. The method of claim 9 , wherein the replacement identifier of the searching is a replacement identifier associated with a second user of the first collaboration system.
11. The method of claim 9 , wherein the replacement identifier of the searching is a replacement identifier associated with a second user of a second collaboration system, wherein said second collaboration system is external of the first collaboration system.
12. The method of claim 9 , wherein the adding of the replacement identifier into the contact list, replaces the target identifier with the replacement identifier in the contact list of the first user so that after the replacement, the target identifier is no longer in the contact list of the first user.
13. The method of claim 9 , wherein the searching is performed responsive to detecting if the target identifier is being entered into the contact list.
14. A system comprising:
one or more processors;
one or more storage mediums storing program instructions;
an offline detector, comprising a subset of the program instructions stored in the one or more storage mediums, wherein the one or more processors execute the program instructions to detect if a contact has been offline for at least a predefined period of time, wherein the contact is identified by a target identifier in a contact list of a first user of a first collaboration system;
a replacement searcher, comprising a subset of the program instructions stored in the one or more storage mediums, wherein the one or more processors execute the program instructions to search a collaboration system directory to find a replacement identifier associated with a second user of the first collaboration system, wherein the second user meets a predefined peer criterion with respect to the first user, and wherein the replacement identifier
a) is different from a target identifier, and
b) meets a predefined similarity criterion with respect to the target identifier; and
a contact list manager, comprising a subset of the program instructions stored in the one or more storage mediums, wherein the one or more processors execute the program instructions to add the replacement identifier into the contact list of the first user, wherein the replacement identifier is not present in the contact list of the first user before the adding.
15. The system of claim 14 , wherein the adding of the replacement identifier into the contact list, replaces the target identifier with the replacement identifier in the contact list of the first user so that after the replacement, the target identifier is no longer in the contact list of the first user.
16. The system of claim 14 wherein the replacement searcher is configured to search responsive to detecting if the contact has been offline for at least the predefined period of time.
17. The system of claim 14 wherein the replacement searcher is configured to present, via a computer-controlled output device, the replacement identifier in a manner that shows that the replacement identifier is a candidate for replacing the target identifier, and
receive, responsive to presenting the replacement identifier, an instruction for adding the replacement identifier into the contact list of the first user.
18. A system comprising:
one or more processors;
one or more storage mediums storing program instructions;
an addition detector, comprising a subset of the program instructions stored in the one or more storage mediums, wherein the one or more processors execute the program instructions to detect if a target identifier is being entered into a contact list of a first user of a first collaboration system;
a replacement searcher, comprising a subset of the program instructions stored in the one or more storage mediums, wherein the one or more processors execute the program instructions to search a collaboration system directory to find a replacement identifier associated with a second user of the first collaboration system,
wherein the second user meets a predefined peer criterion with respect to the first user, and
wherein the replacement identifier
a) is different from a target identifier, and
b) meets a predefined similarity criterion with respect to the target identifier; and
a contact list manager, comprising a subset of the program instructions stored in the one or more storage mediums, wherein the one or more processors execute the program instructions to add the replacement identifier into the contact list of the first user.
19. The system of claim 18 , wherein the contact list manager is configured to add the replacement identifier into the contact list by replacing the target identifier with the replacement identifier in the contact list of the first user.
20. The system of claim 18 , wherein the searching is performed responsive to detecting if the target identifier is being entered into the contact list.
21. A computer program product comprising:
a computer-readable storage medium; and
computer-readable program code embodied in the computer-readable storage medium, wherein the computer-readable program code comprises a set of instructions able to be executed by a processor, wherein said computer-readable program code is configured, for a contact that is identified by a target identifier in a contact list of a first user of a first collaboration system, to
search a collaboration system directory to find a replacement identifier associated with a second user of the first collaboration system, wherein the second user meets a predefined peer criterion with respect to the first user, and wherein the replacement identifier
a) is different from a target identifier, and
b) meets a predefined similarity criterion with respect to the target identifier, and
computer-readable program code embodied in the computer-readable storage medium, wherein the computer-readable program code comprises a set of instructions able to be executed by a processor, wherein said computer-readable program code is configured to add the replacement identifier into the contact list of the first user.
22. The computer program product of claim 21 wherein the computer-readable program code is configured to add the replacement identifier into the contact list by replacing the target identifier with the replacement identifier in the contact list of the first user.
23. The computer program product of claim 21 wherein the computer-readable program code is configured to detect if the contact has been offline for at least a predefined period of time.
24. The computer program product of claim 23 wherein the wherein the computer-readable program code is configured to search responsive to detecting if the contact has been offline for at least the predefined period of time.
25. The computer program product of claim 23 wherein the replacement identifier identifies the contact as belonging to a second collaboration computer program product.
Priority Applications (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/053,738 US20120246187A1 (en) | 2011-03-22 | 2011-03-22 | Automatic correction of contact list errors in a collaboration system |
JP2014500217A JP5834131B2 (en) | 2011-03-22 | 2012-03-22 | Automatic correction of contact list errors in collaboration systems |
PCT/CA2012/050178 WO2012126121A1 (en) | 2011-03-22 | 2012-03-22 | Automatic correction of contact list errors in a collaboration system |
GB1315445.5A GB2503139A (en) | 2011-03-22 | 2012-03-22 | Automatic correction of contact list errors in a collaboration system |
CN2012800143358A CN103460651A (en) | 2011-03-22 | 2012-03-22 | Automatic correction of contact list errors in a collaboration system |
DE112012000774T DE112012000774T5 (en) | 2011-03-22 | 2012-03-22 | Automatic correction of contact list errors in a collaboration system |
US13/483,116 US9037602B2 (en) | 2011-03-22 | 2012-05-30 | Automatic correction of contact list errors in a collaboration system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/053,738 US20120246187A1 (en) | 2011-03-22 | 2011-03-22 | Automatic correction of contact list errors in a collaboration system |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/483,116 Continuation US9037602B2 (en) | 2011-03-22 | 2012-05-30 | Automatic correction of contact list errors in a collaboration system |
Publications (1)
Publication Number | Publication Date |
---|---|
US20120246187A1 true US20120246187A1 (en) | 2012-09-27 |
Family
ID=46878174
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/053,738 Abandoned US20120246187A1 (en) | 2011-03-22 | 2011-03-22 | Automatic correction of contact list errors in a collaboration system |
US13/483,116 Expired - Fee Related US9037602B2 (en) | 2011-03-22 | 2012-05-30 | Automatic correction of contact list errors in a collaboration system |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/483,116 Expired - Fee Related US9037602B2 (en) | 2011-03-22 | 2012-05-30 | Automatic correction of contact list errors in a collaboration system |
Country Status (6)
Country | Link |
---|---|
US (2) | US20120246187A1 (en) |
JP (1) | JP5834131B2 (en) |
CN (1) | CN103460651A (en) |
DE (1) | DE112012000774T5 (en) |
GB (1) | GB2503139A (en) |
WO (1) | WO2012126121A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160149839A1 (en) * | 2014-11-20 | 2016-05-26 | Superchat, LLC | Multi-Network Chat System |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8612522B1 (en) * | 2003-11-26 | 2013-12-17 | Apple Inc. | System and method for allowing an orginating user to use contact information in a prioritized list to contact a destination user |
DE202015006393U1 (en) | 2015-09-11 | 2017-03-31 | eStatik Software GmbH | System for identifying and marking a mathematical expression in an electronic text document |
DE102015011911A1 (en) | 2015-09-11 | 2017-03-16 | eStatik Software GmbH | Method and system for identifying and labeling a mathematical expression in an electronic text document |
DE112015006922A5 (en) | 2015-09-21 | 2018-10-25 | eStatik Software GmbH | METHOD AND SYSTEM FOR THE PURPOSES OF PROCESSING A MATHEMATICAL EXPRESSION IN AN ELECTRONIC DOCUMENT |
DK180171B1 (en) | 2018-05-07 | 2020-07-14 | Apple Inc | USER INTERFACES FOR SHARING CONTEXTUALLY RELEVANT MEDIA CONTENT |
US11074408B2 (en) * | 2019-06-01 | 2021-07-27 | Apple Inc. | Mail application features |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040133561A1 (en) * | 2002-10-02 | 2004-07-08 | Burke Thomas R. | System and method for identifying alternate contact information |
US20070233785A1 (en) * | 2006-03-30 | 2007-10-04 | International Business Machines Corporation | Communicating using collaboration spaces |
US20080021970A1 (en) * | 2002-07-29 | 2008-01-24 | Werndorfer Scott M | System and method for managing contacts in an instant messaging environment |
US7360164B2 (en) * | 2003-03-03 | 2008-04-15 | Sap Ag | Collaboration launchpad |
US20080311951A1 (en) * | 2007-06-15 | 2008-12-18 | Sony Ericsson Mobile Communications Ab | Methods and Apparatus for Supplying Alternative Contact Information in a Communication System |
US7487214B2 (en) * | 2004-11-10 | 2009-02-03 | Microsoft Corporation | Integrated electronic mail and instant messaging application |
US20090150968A1 (en) * | 2003-07-31 | 2009-06-11 | Groove Networks, Inc. | Method and apparatus for managing and displaying contact authentication in a peer-to-peer collaboration system |
US7620387B2 (en) * | 2004-12-22 | 2009-11-17 | Research In Motion Limited | Entering contacts in a communication message on a mobile device |
US20100005398A1 (en) * | 2003-06-27 | 2010-01-07 | Microsoft Corporation | Method and Apparatus for Viewing and Managing Collaboration Data from Within the Context of a Shared Document |
US20100175000A1 (en) * | 2009-01-08 | 2010-07-08 | Microsoft Corporation | Dynamically creating and managing alternate contacts list |
US7797293B2 (en) * | 2004-06-24 | 2010-09-14 | Oracle America, Inc. | Adaptive contact list |
Family Cites Families (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060288298A1 (en) * | 1999-08-12 | 2006-12-21 | Robert Haitani | System, method and technique for enabling users to interact with address fields of messaging applications |
WO2001093515A1 (en) | 2000-06-02 | 2001-12-06 | Kent Ridge Digital Labs | Method and device for correcting e-mail addresses |
US7716287B2 (en) * | 2004-03-05 | 2010-05-11 | Aol Inc. | Organizing entries in participant lists based on communications strengths |
US20040003046A1 (en) * | 2001-12-12 | 2004-01-01 | 3Com Corporation | System and methods for providing instant services in an internet protocol network |
US7124370B2 (en) * | 2003-05-20 | 2006-10-17 | America Online, Inc. | Presence and geographic location notification based on a delegation model |
US6973299B2 (en) | 2003-08-01 | 2005-12-06 | Microsoft Corporation | Unified contact list |
US20050141687A1 (en) * | 2003-12-31 | 2005-06-30 | Timucin Ozugur | Call treatment in a communications system based on instant messaging |
US7120455B1 (en) * | 2004-05-20 | 2006-10-10 | Cellco Partnership | Method and system for mobile instant messaging using multiple interfaces |
CN1297121C (en) * | 2004-07-12 | 2007-01-24 | 白而强 | Special purpose mail system and method for preserving original state of digital file in network |
FR2877178A1 (en) * | 2004-10-26 | 2006-04-28 | France Telecom | Message filtering method for e.g. Internet network, involves verifying if filtering is defined in list of contacts of one client intended to receive message, and sending message to third client, upon positive verification |
JP4635834B2 (en) * | 2005-11-10 | 2011-02-23 | コニカミノルタビジネステクノロジーズ株式会社 | E-mail address management device and program |
JP2007193611A (en) * | 2006-01-19 | 2007-08-02 | Looops Communications Inc | System for managing profile information in membership community site |
CN100536412C (en) * | 2006-06-07 | 2009-09-02 | 华为技术有限公司 | Trunked service monitoring method and system |
US8307038B2 (en) | 2006-06-09 | 2012-11-06 | Microsoft Corporation | Email addresses relevance determination and uses |
US9628490B2 (en) * | 2006-11-27 | 2017-04-18 | International Business Machines Corporation | Trusted contact name validation |
US7444351B1 (en) | 2007-12-18 | 2008-10-28 | International Business Machines Corporation | Systems, methods and computer products for name disambiguation by using private/global directories, and communication contexts |
US8756284B2 (en) | 2008-06-06 | 2014-06-17 | International Business Machines Corporation | Minimizing incorrectly addressed communications when working with ambiguous recipient designations |
US8645417B2 (en) * | 2008-06-18 | 2014-02-04 | Microsoft Corporation | Name search using a ranking function |
US8423905B2 (en) | 2008-07-17 | 2013-04-16 | International Business Machines Corporation | Automatically populating recipients in an instant messaging or other computer communication system |
US8233604B2 (en) * | 2008-09-16 | 2012-07-31 | International Business Machines Corporation | Automated call routing based on an active presence profile |
US20110055234A1 (en) * | 2009-09-02 | 2011-03-03 | Nokia Corporation | Method and apparatus for combining contact lists |
-
2011
- 2011-03-22 US US13/053,738 patent/US20120246187A1/en not_active Abandoned
-
2012
- 2012-03-22 JP JP2014500217A patent/JP5834131B2/en not_active Expired - Fee Related
- 2012-03-22 WO PCT/CA2012/050178 patent/WO2012126121A1/en active Application Filing
- 2012-03-22 DE DE112012000774T patent/DE112012000774T5/en active Pending
- 2012-03-22 GB GB1315445.5A patent/GB2503139A/en not_active Withdrawn
- 2012-03-22 CN CN2012800143358A patent/CN103460651A/en active Pending
- 2012-05-30 US US13/483,116 patent/US9037602B2/en not_active Expired - Fee Related
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080021970A1 (en) * | 2002-07-29 | 2008-01-24 | Werndorfer Scott M | System and method for managing contacts in an instant messaging environment |
US20080120387A1 (en) * | 2002-07-29 | 2008-05-22 | Werndorfer Scott M | System and method for managing contacts in an instant messaging environment |
US7631266B2 (en) * | 2002-07-29 | 2009-12-08 | Cerulean Studios, Llc | System and method for managing contacts in an instant messaging environment |
US20040133561A1 (en) * | 2002-10-02 | 2004-07-08 | Burke Thomas R. | System and method for identifying alternate contact information |
US7360164B2 (en) * | 2003-03-03 | 2008-04-15 | Sap Ag | Collaboration launchpad |
US20100005398A1 (en) * | 2003-06-27 | 2010-01-07 | Microsoft Corporation | Method and Apparatus for Viewing and Managing Collaboration Data from Within the Context of a Shared Document |
US7624421B2 (en) * | 2003-07-31 | 2009-11-24 | Microsoft Corporation | Method and apparatus for managing and displaying contact authentication in a peer-to-peer collaboration system |
US20090150968A1 (en) * | 2003-07-31 | 2009-06-11 | Groove Networks, Inc. | Method and apparatus for managing and displaying contact authentication in a peer-to-peer collaboration system |
US7797293B2 (en) * | 2004-06-24 | 2010-09-14 | Oracle America, Inc. | Adaptive contact list |
US7487214B2 (en) * | 2004-11-10 | 2009-02-03 | Microsoft Corporation | Integrated electronic mail and instant messaging application |
US7620387B2 (en) * | 2004-12-22 | 2009-11-17 | Research In Motion Limited | Entering contacts in a communication message on a mobile device |
US20070233785A1 (en) * | 2006-03-30 | 2007-10-04 | International Business Machines Corporation | Communicating using collaboration spaces |
US20080311951A1 (en) * | 2007-06-15 | 2008-12-18 | Sony Ericsson Mobile Communications Ab | Methods and Apparatus for Supplying Alternative Contact Information in a Communication System |
US20100175000A1 (en) * | 2009-01-08 | 2010-07-08 | Microsoft Corporation | Dynamically creating and managing alternate contacts list |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160149839A1 (en) * | 2014-11-20 | 2016-05-26 | Superchat, LLC | Multi-Network Chat System |
Also Published As
Publication number | Publication date |
---|---|
US9037602B2 (en) | 2015-05-19 |
DE112012000774T5 (en) | 2013-11-14 |
WO2012126121A1 (en) | 2012-09-27 |
CN103460651A (en) | 2013-12-18 |
JP5834131B2 (en) | 2015-12-16 |
GB201315445D0 (en) | 2013-10-16 |
GB2503139A (en) | 2013-12-18 |
US20120246123A1 (en) | 2012-09-27 |
JP2014516428A (en) | 2014-07-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9037602B2 (en) | Automatic correction of contact list errors in a collaboration system | |
US11736424B2 (en) | Searchable peer-to-peer system through instant messaging based topic indexes | |
US20080275957A1 (en) | Identifying and correlating electronic mail messages | |
US20140282553A1 (en) | Meta-application management in a multitasking environment | |
US10992612B2 (en) | Contact information extraction and identification | |
US9274879B2 (en) | System-level issue detection and handling | |
US10877994B2 (en) | Identifier based data replication | |
US9223558B2 (en) | Software installation and configuration | |
US9294372B2 (en) | Status determination in computer network-based communications system | |
US8719289B2 (en) | Automatic contact list aliasing in a collaboration system | |
US9785724B2 (en) | Secondary queue for index process | |
US10033737B2 (en) | System and method for cross-cloud identity matching | |
US9992143B2 (en) | Providing centralized message notification | |
US20150254266A1 (en) | Data duplication detection in an in memory data grid (imdg) | |
US9923857B2 (en) | Symbolic variables within email addresses | |
US9921901B2 (en) | Alerting service desk users of business services outages | |
US9256847B2 (en) | Detection, identification and integration of office squatters | |
US8892709B2 (en) | Early generation of service requests | |
US11151103B1 (en) | Method for providing an indication of the exact search hit within a large universe of contextual information | |
US8935343B2 (en) | Instant messaging network resource validation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GAMALEY, VLADIMIR;NACHUM, GILI;PERZY, GIL;REEL/FRAME:025997/0552 Effective date: 20110321 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO PAY ISSUE FEE |