Eugene Mandel - RingCentral | LinkedIn (original) (raw)

About

Experienced data science and machine learning product leader with a passion for helping…

Articles by Eugene

Activity

Experience & Education

View Eugene’s full experience

See their title, tenure and more.

Licenses & Certifications

Publications

Patents

Issued November 19, 2009 US 20090288168

Class: Monitoring or scanning of software or data including attack prevention intrusion detection virus detection
Read more: http://www.faqs.org/patents/app/20090288168#b#ixzz2KQFW3B8X
Techniques for managing instant message (IM) communications are provided. In various embodiments, IM communications in a plurality of network implementations are managed using one or more policies. A policy in the one or more policies includes an action applicable for an IM communication. Once an IM…
Class: Monitoring or scanning of software or data including attack prevention intrusion detection virus detection
Read more: http://www.faqs.org/patents/app/20090288168#b#ixzz2KQFW3B8X
Techniques for managing instant message (IM) communications are provided. In various embodiments, IM communications in a plurality of network implementations are managed using one or more policies. A policy in the one or more policies includes an action applicable for an IM communication. Once an IM communications is received from an IM client, a policy that is applicable for that IM communication is determined. After determining an applicable policy, an action associated with the policy for the instant message communication is performed. Examples of actions that may be taken include recording the IM communication, modifying the IM communication, blocking the IM communication, forwarding the IM communication, and the like.
Read more: http://www.faqs.org/patents/app/20090288168#b#ixzz2KQFW3B8X
Other inventors

Issued November 4, 2008 USPTO

Network flows are identified by analyzing network traffic and network host information. The network host information may be collected by network host monitors associated with network hosts. Network traffic and network host information are evaluated against network flow profiles to identify network flows. If a network flows are identified with high certainty and are associated with previously identified network applications, then network flow policies can be applied to the network flows to…
Network flows are identified by analyzing network traffic and network host information. The network host information may be collected by network host monitors associated with network hosts. Network traffic and network host information are evaluated against network flow profiles to identify network flows. If a network flows are identified with high certainty and are associated with previously identified network applications, then network flow policies can be applied to the network flows to block, throttle, accelerate, enhance, or transform the network flows. If a network flow is identified with lesser certainty or is not associated with a previously identified network application, then a new network flow profile can be created from further analysis of network traffic information, network host information, and possibly additional network host information collected to enhance the analysis. New network flow profiles can be communicated with a service provider for analysis and potential distribution to other networks.
See patent

Recommendations received

More activity by Eugene

Other similar profiles

Explore collaborative articles

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

Explore More

Others named Eugene Mandel

4 others named Eugene Mandel are on LinkedIn

See others named Eugene Mandel

Add new skills with these courses