Electronic device workspace restriction

ABSTRACT

The drive for multi-tasking and/or availability of numerous applications can interfere with productivity. Constant interruptions from email and real-time online communication can lead to decreased productivity. In addition, attempting to tackle a massive number of different projects with different applications can impede progress on any one of the projects. Functionality can be implemented in a workspace to focus interaction with one or more applications in the workspace. Focused interaction allows a user to limit distractions (e.g., email notifications, instant message notifications, etc) and restrict activities not related to his or her current task.

BACKGROUND

Embodiments of the inventive subject matter generally relate to thefield of computers, and, more particularly, to managing workspace.

Computers and software have greatly contributed to improvingproductivity and allowing multi-tasking. These tools allow people toaccomplish many tasks more efficiently in the past. Within a singleworkspace, a user can respond to instant messages, prepare an e-mailmessage, schedule meetings on a calendar, and prepare a reportconcurrently.

SUMMARY

Embodiments include a method directed to determining that a restrictedactivity state is to be imposed on an electronic device workspace based,at least in part, on an application related activity. The electronicdevice workspace is restricted to a first set of one or moreapplications that correspond to the application related activity. Asecond set of one or more applications is prevented from intruding intothe electronic device workspace during the restricted activity state.

BRIEF DESCRIPTION OF THE SEVERAL DRAWINGS

The present embodiments may be better understood, and numerous objects,features, and advantages made apparent to those skilled in the art byreferencing the accompanying drawings.

FIG. 1 depicts an example of instant message locking.

FIG. 2 depicts a flowchart of example operations for instant messagelocking.

FIG. 3 depicts a flowchart of example operations for automaticallylocking instant message chat windows.

FIG. 4 depicts an example of workspace locking.

FIG. 5 depicts a flowchart of example operations for lockingapplications.

FIG. 6 depicts a flowchart of example operations for automaticallylocking application windows.

FIG. 7 is a flowchart depicting example operations for imposing arestricted activity state on a workspace based on a policy.

FIG. 8 depicts an example computer system.

DESCRIPTION OF EMBODIMENT(S)

The description that follows includes exemplary systems, methods,techniques, instruction sequences and computer program products thatembody techniques of the present inventive subject matter. However, itis understood that the described embodiments may be practiced withoutthese specific details. For instance, although examples refer toreal-time online communication applications, embodiments can beimplemented in short message service applications (SMS). In otherinstances, well-known instruction instances, protocols, structures andtechniques have not been shown in detail in order not to obfuscate thedescription.

Everyday many people use real-time online communication applications(IBM® Sametime, Yahoo!® messenger, MSN® messenger, etc.) in businesscommunications. Even though instant message communications can be sentvia a secure channel, users can accidentally send instant messages tounintended recipients by typing or pasting text and images into thewrong instant message chat window. This can lead to unintendedinformation security failures. Implementing functionality to prioritizechat windows within a real-time online communication application reducesthe likelihood of sending messages to incorrect recipients.

FIG. 1 depicts an example of instant message locking. A computer desktop100 hosts two instant message chat windows 101 and 102 and an instantmessage contacts window 111. The instant message chat window 101includes a chat conversation area 103A, an outgoing text input area104A, a lock button 107A, and a send button 109A. Similarly, the instantmessage chat window 102 includes a chat conversation area 103B, anoutgoing text input area 104B, a lock button 107B, and a send button109B. The instant message contacts window 111 has a lock all button 113and an unlock all button 115.

The instant message chat window 101 is the active window and isunlocked. Instant messages can be sent or received in an unlocked chatwindow. The instant message chat window 102 is locked. Instant messagescannot be sent in a locked chat window. The outgoing input text area104B of instant message chat window 102 is restricted and contains anunlock button 105. In addition, the lock button 107B and the send button109B are disabled. Although not depicted in FIG. 1, the buttons 107B and109B can also be manipulated graphically to indicate the disabledfunctionality (e.g., greyed out, removed, made transparent, etc.). Theunlock button 105 unlocks the outgoing text input area 104B.

The lock all button 113 locks all chat windows except the active chatwindow, which is the instant message chat window 101 in thisillustration. The active chat window is the last window from which aninstant message was sent. The unlock all button 115 unlocks all chatwindows.

One or more instant message chat windows can be locked or unlocked at atime. As an example, a user may have four instant message chat windowsopen on the desktop. The user may wish to interact (e.g., send outgoingmessages) with only three of the four windows. The user clicks a lockbutton on the chat window he or she does not want to interact with. Asanother example, the user may wish to interact with two of the four openchat windows. The user clicks the lock all button, leaving the chatwindow with the latest sent message open. Then the user clicks on anunlock button of the second chat window of interest to interact with thesecond chat window.

Embodiments may utilize an automatic locking mechanism that locks and/orcloses chat windows after indicated time thresholds have been reachedsince the last sent message. Default values can be assigned to the timethresholds or the thresholds can be set by a user. For example, a usermay wish to lock chat windows when five minutes have elapsed since thelast sent message and close chat windows when thirty minutes has elapsedsince the last sent message.

FIG. 2 depicts a flowchart of example operations for instant messagelocking. Flow begins at block 201, where a restricted activity state fora first subset of instant message chat windows is detected. Examples ofdetection of a restricted activity state include manual locking of oneor more windows by a user, automatic locking of one or more windowsafter a certain time threshold has been reached since the last sentmessage, automatic locking of chat windows that do not involve aparticular contact, etc.

At block 203, performance of communication operations is prevented withthe first subset of instant message chat windows. Communicationoperations include sending a text message, sending a graphical image,transferring an electronic file, etc. Examples of preventing performanceof communications are preventing text entry in the outgoing text area ofthe first subset of instant message chat windows, closing the firstsubset of instant message chat windows, minimizing and preventingrestore of the first subset of instant message chat windows, etc. In oneexample, outgoing messages are disallowed, while incoming messages arereceived and immediately displayed on the screen. In another example,outgoing messages are disabled and display of incoming messages isdelayed until the end of the restricted activity state. Users can setconfigurations for receiving new instant messages during the restrictedactivity state. For example, new instant message chat windows may openin the background (i.e., behind one or more unlocked chat windows) ornew instant message chat windows may open at the end of the restrictedactivity state.

At block 205, performance of communication operations is allowed with asecond subset of instant message chat windows.

FIG. 3 depicts a flowchart of example operations for automaticallylocking instant message chat windows. Flow begins at block 301, where asending of an instant message is detected and a timer is started. Aninstant message may include text, a graphical image, an electronic file,etc.

At block 303, it is determined if a restricted activity time period haselapsed since the last instant message sent. The restricted activitytime period can be a default value or can be set by a user. If anotherinstant message is sent, flow continues at block 301. If the restrictedtime period has elapsed, flow continues at block 304. If the restrictedtime period has not elapsed, flow continues at block 303.

At block 304, the instant message chat window is locked.

At block 305, it is determined if a terminate time period has elapsedsince the instant message chat window was locked. The terminate timeperiod can be a default value or can be set by a user. If unlock inputis received, flow continues at block 307. Examples of unlock inputinclude manual selection of an unlock button, a particular contact(e.g., manager, CEO, etc.) sends an instant message, etc. For instance,it may be defined, perhaps in a policy for the real-time onlinecommunication application, that regardless of current state of theworkspace or desktop a message from a contact with manager in theirtitle will be permitted to open a new chat window and override locks. Ifthe terminate time period has elapsed, flow continues at block 309. Ifthe terminate time period has not elapsed, flow continues at block 305.

At block 307, the instant message chat window is unlocked.

At block 309, the instant message chat window is closed.

Locking schemes for real-time online communication applications can beextended to one or more workspaces in which one or more differentapplications may be running. The drive for multi-tasking and/oravailability of numerous applications can interfere with productivity.Constant interruptions from email and real-time online communication canlead to decreased productivity. In addition, attempting to tackle amassive number of different projects with different applications canimpede progress on any one of the projects. Functionality can beimplemented in a workspace to focus interaction with one or moreapplications in the workspace. Focused interaction allows a user tolimit distractions (e.g., email notifications, instant messagenotifications, etc) and restrict activities not related to his or hercurrent task.

FIG. 4 depicts an example of workspace locking. A computer desktop 400hosts a word processor window 401 and an Internet browser window 403.The word processor window 401 has a lock all button 407 and an unlockall button 409. The internet browser window 403 has an unlock button405. Embodiments may display interface objects differently whenapplications are in different locking states. For example, when anapplication is locked, a lock button may disappear or be grayed out. Asanother example, a lock all button may be disabled if all applicationsexcept the current one are locked.

The word processor window 401 is the active window and is unlocked.Application functionality is accessible in an unlocked window. Forexample, a user can create a new document; edit an existing document,etc. The Internet browser window 403 is locked. Applicationfunctionality is not accessible in a locked window. For example, a usercannot browse to a new webpage; click on a link on a webpage, etc. TheInternet browser window 403 is restricted and contains an unlock button405. The unlock button unlocks the functionality of the application.

The lock all button 407 locks all application windows except the activeapplication window. The active application window is the window withwhich a user is currently interacting. Examples of locking ofapplications includes minimizing and preventing restore of applications,restriction of starting new applications, turning off applicationnotifications (e.g., email receive notification, instant messagenotifications, etc.), etc. The unlock all button 409 unlocks allapplication windows.

One or more application windows can be locked or unlocked at a time. Asan example, a user may be working on a report in a word processorapplication that is a member of a restricted workspace. The user maywant to include some data from a spreadsheet. The spreadsheet can beopened in the restricted workspace so that the word processorapplication remains unlocked. In some embodiments, new applications maybe manually opened in the restricted workspace in response to a useraction (e.g., clicking a button, selecting an option from a drop downmenu, etc). In other embodiments, new applications may be automaticallyopened in the restricted workspace based on user configurations and/orpast usage behavior (e.g., previously opened applications, previouslyopened documents, etc). Restricted workspace configurations may includeoptions for the types of applications that can be opened, the number ofapplications that can be opened, etc. Embodiments may utilize anautomatic locking mechanism that locks and/or closes other applicationwindows after indicated time thresholds have been reached duringexclusive use of a certain application. Default values can be assignedto the time thresholds or the thresholds can be set by a user or anadministrator. For example, a user may wish to lock other applicationswhen he or she has been continuously working on a document in a wordprocessor for twenty minutes.

In addition, more than one workspace may be running on a computersystem. Application locking can be applied to lock down individualapplications within the individual workspaces. As an example, a user mayhave defined two workspaces, one for business activities and one forpersonal activities. The locking system can prevent the user fromopening personal email in the business workspace and business email inthe personal workspace. Instant message windows can also be controlledby application locking within multiple workspaces. For example, instantmessages for business contacts are opened in a business workspace andinstant messages from friends and family are opened in a personalworkspace. A locking mechanism can also be applied across the differentworkspaces. When a restricted activity state is entered in oneworkspace, other workspaces cannot be accessed.

FIG. 5 depicts a flowchart of example operations for lockingapplications. Flow begins at block 501, where it is determined that arestricted activity state is to be imposed on an electronic deviceworkspace based, at least in part, on application related activity.Examples of determining that a restricted activity state should beimposed include manual locking of one or more applications by a user,automatic locking of one or more applications after exclusive activityin an application is detected for a certain period of time, etc.

At block 503, the electronic workspace is restricted to a first set ofone or more applications that correspond to the application relatedactivity. Examples of application related activities includeaccumulation of a time period of a user working with the first set ofone or more applications, expiration of a lack of activity time periodfor the second set of one or more applications, and an activity tolaunch one of the first set of applications, etc.

At block 505, a second set of one or more applications is prevented fromintruding into the electronic device workspace during the restrictedactivity state. Examples of preventing applications from intruding theworkspace during a restricted activity state include minimizing thesecond set of, closing the second set of applications, disablingnotification functionality of the second set of applications, etc.

FIG. 6 depicts a flowchart of example operations for automaticallylocking application windows. Flow begins at block 601, where activity inan application is detected and a timer is started. Examples of activityin an application are typing a document in a word processor, enteringdata into a spreadsheet, composing an email, etc.

At block 603, it is determined if a restricted activity state timeperiod has elapsed. The restricted activity state time period can be adefault value or can be set by a user. If activity is detected inanother application, flow continues at block 601. If the restrictedactivity state time period has elapsed, flow continues at block 604. Ifthe restricted activity state time period has not elapsed, flowcontinues at block 603.

At block 604, other application windows are locked. If multipleworkspaces are available, switching between workspaces may berestricted.

At block 605, it is determined if a terminate time period has elapsedsince the other application windows were locked. The terminate timeperiod can be a default value or can be set by a user. If unlock inputis received, flow continues at block 607. If the terminate time periodhas elapsed, flow continues at block 609. If the terminate time periodhas not elapsed, flow continues at block 605.

At block 607, the other application windows are unlocked.

At block 609, the other application windows are closed or minimized.State and/or data of the applications minimized or closed is saved.

A restricted activity state can be imposed on workspaces based on morethan time thresholds. A restricted activity state can be imposed onworkspaces based on one or more policies that govern the workspace, inaddition to or in conjunction with time thresholds. A user and/oradministrator can define one or more policies that impose a restrictedactivity state on a workspace to allow the user to focus on specifictasks within the workspace. For example, an administrator can define apolicy that restricts a workspace to applications A and B if applicationA is opened. In some embodiments, an administrator can define policiesand associate the policies with particular tasks. For instance, a usercan be presented with a menu of tasks. When the user selects a task fromthe menu of tasks, the one or more policies associated with that taskare used to govern the workspace. For example, a policy may beassociated with a prepare financial reports task. An administrator candefine the policy to allow use of an accounting application, aspreadsheet application, and a calculator application in the workspace.The administrator can also define the policy to allow a word processingapplication to be opened for creation of a document, but only with anaccounting report template and disallow the drawing functionality of theword processing application. Policies can also be defined to restrictswitching between multiple workspaces.

FIG. 7 is a flowchart depicting example operations for imposing arestricted activity state on a workspace based on a policy. Flow beginsat block 701, where activity is detected in a workspace. Examples ofactivity in a workspace include selecting a command to open a wordprocessor document, clicking on an icon to open a word processorapplication, pressing keys to create a spreadsheet, clicking on a linkto join a web-meeting, etc. At block 702, a policy that governs theworkspace is accessed. For example, when a request to open anapplication is detected, a corresponding one or more policies isaccessed.

At block 703, it is determined if the policy indicates that a restrictedactivity state is to be imposed on the workspace. For example, theaccessed policy may indicate that the workspace should be restricted toan e-mail application and a word processing application when an e-mailis received from a particular sender during certain hours of the day. Ifthe policy indicates that the restricted activity state is to beimposed, then control flows to block 705. Otherwise, the flow ends.

At block 705, the restricted activity state is imposed. For example, aprocess that accessed the policy and monitors the workspace minimizesall applications except those allowed applications according to thepolicy. For example, the process may minimize all applications notrelated to media editing when a user has been working with a videoediting application for more than a given number of minutes. In anotherexample, an administrator defines a policy that restricts workspace usewhen a web based meeting is active in the workspace. Many companies useweb based meetings because employees are spread out in differentlocations across the country. Employees may multi-task during themeeting and miss critical information. The policy can be used to imposea restricted activity state while the web based meeting is beingconducted to prevent participants from being distracted by otherapplications, such as their e-mail application, a browser, etc. A policycan also be defined to impose a restricted activity state to protect thesecurity of a business. The policy can be defined to disallow use of ane-mail application while the user views certain documents.

It should be understood that the depicted flowchart are examples meantto aid in understanding embodiments and should not be used to limitembodiments or limit scope of the claims. Embodiments may performadditional operations, fewer operations, operations in a differentorder, operations in parallel, and some operations differently. Forinstance, referring to FIG. 3, in some embodiments, functionality maynot be implemented to close instant message chat windows after a certainperiod of time has elapsed since the last sent message.

Embodiments may take the form of an entirely hardware embodiment, anentirely software embodiment (including firmware, resident software,micro-code, etc.) or an embodiment combining software and hardwareaspects that may all generally be referred to herein as a “circuit,”“module” or “system.” Furthermore, embodiments of the inventive subjectmatter may take the form of a computer program product embodied in anytangible medium of expression having computer usable program codeembodied in the medium. The described embodiments may be provided as acomputer program product, or software, that may include amachine-readable medium having stored thereon instructions, which may beused to program a computer system (or other electronic device(s)) toperform a process according to embodiments, whether presently describedor not, since every conceivable variation is not enumerated herein. Amachine readable medium includes any mechanism for storing ortransmitting information in a form (e.g., software, processingapplication) readable by a machine (e.g., a computer). Themachine-readable medium may include, but is not limited to, magneticstorage medium (e.g., floppy diskette); optical storage medium (e.g.,CD-ROM); magneto-optical storage medium; read only memory (ROM); randomaccess memory (RAM); erasable programmable memory (e.g., EPROM andEEPROM); flash memory; or other types of medium suitable for storingelectronic instructions. In addition, embodiments may be embodied in anelectrical, optical, acoustical or other form of propagated signal(e.g., carrier waves, infrared signals, digital signals, etc.), orwireline, wireless, or other communications medium.

Computer program code for carrying out operations of the embodiments maybe written in any combination of one or more programming languages,including an object oriented programming language such as Java,Smalltalk, C++ or the like and conventional procedural programminglanguages, such as the “C” programming language or similar programminglanguages. The program code may execute entirely on a user's computer,partly on the user's computer, as a stand-alone software package, partlyon the user's computer and partly on a remote computer or entirely onthe remote computer or server. In the latter scenario, the remotecomputer may be connected to the user's computer through any type ofnetwork, including a local area network (LAN), a personal area network(PAN), or a wide area network (WAN), or the connection may be made to anexternal computer (for example, through the Internet using an InternetService Provider).

FIG. 8 depicts an example computer system. A computer system includes aprocessor unit 801 (possibly including multiple processors, multiplecores, multiple nodes, and/or implementing multi-threading, etc.). Thecomputer system includes memory 807. The memory 807 may be system memory(e.g., one or more of cache, SRAM, DRAM, zero capacitor RAM, TwinTransistor RAM, eDRAM, EDO RAM, DDR RAM, EEPROM, NRAM, RRAM, SONOS,PRAM, etc.) or any one or more of the above already described possiblerealizations of machine-readable media. The computer system alsoincludes a bus 803 (e.g., PCI, ISA, PCI-Express, HyperTransport®,InfiniBand®, NuBus, etc.), a network interface 809 (e.g., an ATMinterface, an Ethernet interface, a Frame Relay interface, SONETinterface, wireless interface, etc.), and a storage device(s) 811 (e.g.,optical storage, magnetic storage, etc.). A restricted activity statemanagement unit 821 performs the functionality described herein. Therestricted activity state management unit 821 and detects a restrictedactivity state for a real-time online communication application andmanages access of instant message chat windows during the restrictedactivity state. Any one of the functionalities described above may bepartially (or entirely) implemented in hardware and/or on the processingunit 801. For example, the functionality may be implemented with anapplication specific integrated circuit, in logic implemented in theprocessing unit 801, in a co-processor on a peripheral device or card,etc. Further, realizations may include fewer or additional componentsnot illustrated in FIG. 8 (e.g., video cards, audio cards, additionalnetwork interfaces, peripheral devices, etc.). The processor unit 801,the storage device(s) 811, and the network interface 809 are coupled tothe bus 803. Although illustrated as being coupled to the bus 803, thememory 807 may be coupled to the processor unit 801.

While the embodiments are described with reference to variousimplementations and exploitations, it will be understood that theseembodiments are illustrative and that the scope of the inventive subjectmatter is not limited to them. In general, techniques as describedherein may be implemented with facilities consistent with any hardwaresystem or hardware systems. Many variations, modifications, additions,and improvements are possible.

Plural instances may be provided for components, operations orstructures described herein as a single instance. Finally, boundariesbetween various components, operations and data stores are somewhatarbitrary, and particular operations are illustrated in the context ofspecific illustrative configurations. Other allocations of functionalityare envisioned and may fall within the scope of the inventive subjectmatter. In general, structures and functionality presented as separatecomponents in the exemplary configurations may be implemented as acombined structure or component. Similarly, structures and functionalitypresented as a single component may be implemented as separatecomponents. These and other variations, modifications, additions, andimprovements may fall within the scope of the inventive subject matter.

1. A method comprising: receiving an indication of a first of aplurality of tasks; accessing a policy associated with the first of theplurality of tasks; determining that a restricted activity state is tobe imposed on an electronic device workspace based, on the policy thatis associated with the first of the plurality of tasks and anapplication related activity, wherein the restricted activity stateimposes use of a first set of one or more applications on the electronicdevice and preventing use of a second set of one or more applications onthe electronic device, wherein the application related activitycomprises: accumulation of a first time period of a user working withthe first set of one or more applications, expiration of a lack ofactivity second time period for the second set of one or moreapplications, a first activity to launch one of the first set ofapplications, a second activity to close one of the second set of one ormore applications, and activation of one or more lock controls of thesecond set of one or more applications; restricting the electronicdevice workspace to the first set of one or more applications thatcorrespond to the application related activity and the policy; andpreventing the second set of one or more applications from intrudinginto the electronic device workspace during the restricted activitystate.
 2. The method of claim 1, wherein said preventing comprises atleast one of minimizing the second set of applications during therestricted activity state, closing the second set of applications,obscuring the second set of applications during the restricted activitystate, and disabling notification functionality of the second set ofapplications during the restricted activity state.
 3. The method ofclaim 2 further comprising saving state of the second set ofapplications.
 4. The method of claim 1 further comprising terminatingthe restricted activity state.
 5. The method of claim 4, wherein saidterminating comprises at least one of activation of an unlock controlassociated with the electronic device workspace, activation of an unlockcontrol associated with at least one of the first set of applications, achange in governing policy, completion of a task, and closing of thefirst set of applications.
 6. One or more computer storage having storedtherein a program product, which when executed a set of one or moreprocessor units causes the set of one or more processor units to performoperations that comprise: receiving an indication of a first of aplurality of tasks; accessing a policy associated with the first of theplurality of tasks; determining that a restricted activity state is tobe imposed on an electronic device workspace based on the policy that isassociated with the first of the plurality of tasks and an applicationrelated activity, wherein the restricted activity state imposes use of afirst set of one or more applications on the electronic device andpreventing use of a second set of one or more applications on theelectronic device, wherein the application related activity comprises:accumulation of a first time period of a user working with the first setof one or more applications, expiration of a lack of activity secondtime period for the second set of one or more applications, a firstactivity to launch one of the first set of applications, a secondactivity to close one of the second set of one or more applications, andactivation of one or more lock controls of the second set of one or moreapplications; restricting the electronic device workspace to the firstset of one or more applications that correspond to the applicationrelated activity and the policy; and preventing the second set of one ormore applications from intruding into the electronic device workspaceduring the restricted activity state.
 7. The computer storage of claim6, wherein said preventing operation comprises at least one ofminimizing the second set of applications during the restricted activitystate, closing the second set of applications, obscuring the second setof applications during the restricted activity state, and disablingnotification functionality of the second set of applications during therestricted activity state.
 8. The computer storage of claim 7, whereinthe operations further comprise saving state of the second set ofapplications.
 9. The computer storage of claim 6, wherein the operationsfurther comprise terminating the restricted activity state.
 10. Thecomputer storage of claim 9, wherein said terminating operationcomprises at least one of activation of an unlock control associatedwith the electronic device workspace, activation of an unlock controlassociated with at least one of the first set of applications, a changein governing policy, completion of a task, and closing of the first setof applications.
 11. An apparatus comprising: a set of one or moreprocessor units; memory; and one or more machine-readable media havingstored therein a program product, which when executed a set of one ormore processor units causes the set of one or more processor units toperform operations that comprise, receiving an indication of a first ofa plurality of tasks; accessing a policy associated with the first ofthe plurality of tasks; determining that a restricted activity state isto be imposed on an electronic device workspace based on the policy thatis associated with the first of the plurality of tasks and anapplication related activity, wherein the restricted activity stateimposes use of a first set of one or more applications on the electronicdevice and preventing use of a second set of one or more applications onthe electronic device, wherein the application related activitycomprises: accumulation of a first time period of a user working withthe first set of one or more applications, expiration of a lack ofactivity second time period for the second set of one or moreapplications, a first activity to launch one of the first set ofapplications, a second activity to close one of the second set of one ormore applications, and activation of one or more lock controls of thesecond set of one or more applications; restricting the electronicdevice workspace to the first set of one or more applications thatcorrespond to the application related activity and the policy; andpreventing the second set of one or more applications from intrudinginto the electronic device workspace during the restricted activitystate.
 12. The apparatus of claim 11 further comprising one or moreinput/output devices operable to display the first set of applicationsand operable to receive input that corresponds to the applicationrelated activity.
 13. The method of claim 1, wherein the first of theplurality of tasks comprise a web based meeting, wherein the second setof one or more applications comprise any applications that distractparticipants of the web based meeting.
 14. The method of claim 1,wherein the policy imposes the restricted activity state to protect asecurity of a business, wherein the first set of one or moreapplications comprise an application for document viewing, and whereinthe second set of one or more applications comprise an e-mailapplication.
 15. The one or more computer storage of claim 6, whereinthe first of the plurality of tasks comprise a web based meeting,wherein the second set of one or more applications comprise anyapplications that distract participants of the web based meeting. 16.The one or more computer storage of claim 6, wherein the policy imposesthe restricted activity state to protect a security of a business,wherein the first set of one or more applications comprise anapplication for document viewing, and wherein the second set of one ormore applications comprise an e-mail application.
 17. The apparatus ofclaim 11, wherein the first of the plurality of tasks comprise a webbased meeting, wherein the second set of one or more applicationscomprise any applications that distract participants of the web basedmeeting.
 18. The apparatus of claim 11, wherein the policy imposes therestricted activity state to protect a security of a business, whereinthe first set of one or more applications comprise an application fordocument viewing, and wherein the second set of one or more applicationscomprise an e-mail application.