Bypassing uploading of data from a wireless device using outbound attachment caching

ABSTRACT

In embodiments of bypassing uploading of data from a wireless device using outbound attachment caching, synchronization logic is implemented to determine whether an attachment of an electronic message to be sent from a wireless device is stored in a first memory of the wireless device or a second memory of the wireless device. The first memory can be configured to automatically replicate data stored in the first memory to a wireless data service. The electronic message can then be initiated for communication to the wireless data service without the attachment responsive to determining that the attachment is stored in the first memory. Alternately, the electronic message can be initiated for communication to the wireless data service without the attachment responsive to determining that the attachment is stored in the second memory and that the attachment was previously communicated to the wireless data service.

RELATED APPLICATIONS

This application is a continuation of, claims priority to, and incorporates by reference in its entirety, co-pending U.S. patent application Ser. No. 12/070,637, filed Feb. 19, 2008, entitled “Bypassing Uploading of Data from a Wireless Device Using Outbound Attachment Caching”.

BACKGROUND

E-mail (“email”) has become an irreplaceable tool in today's business environment. Virtually all corporate employees rely on email in one way or another to communicate both externally with customers and internally with other employees. Email access may be provided by a user's Internet Service Provider (e.g., Pacific Bell, AT&T WorldNet,™ America Online,™ . . . etc), or by an Internet website (e.g., Yahoo™ Mail or Hotmail™). The average email consists of a message body, header, and, optionally, one or more attachments. The message body is created using an email application which provides a window for entering text. The header is used by the Internet service to direct the routing of the message and also to communicate certain user-specific information (e.g. access rights, authentication, etc.). The message body and header are small in size, typically on the order of 5 kilobytes (kb) or so, and require a low amount of network bandwidth utilization for transmission.

Email may also include one or more file attachments which are used for sending data stored on a user's computer or other electronic device. Attachments can include file types such as computer data, applications, graphics, text documents, and etc. Email attachments are appended to an outgoing email message so that the content of the one or more attachments can be distributed to one or more intended addressees. Email is a just one method of distributing attachments that more than one person needs access to. However, bypassing uploading of data from a wireless device using outbound attachment caching is not limited to only email. Attachments may be appended to various other electronic messages including instant messages. Unlike the email message body and header, attachments are large in size, typically 500 kb and upwards. Attachments include files such as pictures, video clips, and audio streams, which require a large amount of bandwidth for transmission over a network.

In addition, a growing number of email users rely on portable, multi-purpose data processing devices such as Personal Digital Assistants (PDAs) which include both electronic messaging and personal information management (PIM) capabilities. As a result, portable data processing devices such as and programmable wireless telephones are becoming more powerful every day, providing users with a wide range of applications previously only available on personal computers. One limitation of current multi-purpose telephony and/or data processing devices such as PDAs is that they utilize a wireless network to communicate with a service provider. It is well-known that wireless networks have limited bandwidth which comes at a premium. Wireless service providers, for example, are required to pay per megabit for bandwidth utilization as well pay for data storage. As a result, there is a need for new methods to reduce bandwidth utilization and data storage requirements in wireless networks. In prior art wireless messaging systems; however, the message body, header and attachment(s) must be uploaded every time an email message is sent over the network. Thus, bandwidth must be used to send the attachment(s) every time an email message is sent whether or not the same attachment(s) is sent more than once. This creates a problem for wireless networks since wireless devices today have significant network bandwidth limitations.

SUMMARY

A method implemented on a data processing device is described where outbound attachments associated with an electronic message uploaded from a wireless device are stored into a cache memory located at the wireless service for possible subsequent use. When the wireless service receives electronic messages that include one or more attachments from wireless devices, it determines whether the attachment(s) are stored in the service cache memory. The wireless service then sends out the electronic messages to one or more intended addressees with the attachment(s), where the attachment(s) is either retrieved from the cache memory if it is stored there or uploaded from the wireless device if not.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates a wireless service communicating with a wireless data processing device according to one embodiment of bypassing uploading of data from a wireless device using outbound attachment caching.

FIG. 2 illustrates a prior art method of sending attachments by way of email messaging over a wireless service.

FIG. 3 illustrates a wireless service communicating with a remote wireless device according to one embodiment of bypassing uploading of data from a wireless device using outbound attachment caching.

FIG. 4 illustrates a method of sending electronic messages according to one embodiment of bypassing uploading of data from a wireless device using outbound attachment caching.

FIG. 5 illustrates a method of sending electronic messages according to one embodiment of bypassing uploading of data from a wireless device using outbound attachment caching.

FIG. 6 illustrates a method of sending electronic messages according to one embodiment of bypassing uploading of data from a wireless device using outbound attachment caching.

DETAILED DESCRIPTION

Embodiments of bypassing uploading of data from a wireless device using outbound attachment caching may be implemented on a wireless device 110 which communicates with a data processing service 100 as illustrated generally in FIG. 1. Embodiments of a service 100 and data processing device 110 are described in U.S. Pat. No. 6,721,804 entitled NETWORK PORTAL SYSTEM, APPARATUS AND METHOD, Ser. No. 09/714,897, filed Nov. 15, 2000, which is assigned to the assignee of the present application and which is incorporated herein by reference. Certain features of the service 100 and an exemplary data processing device 110 will now be described followed by a detailed description of a system and method for bypassing uploading of data from a wireless device using outbound attachment caching. As an initial matter, however, it should be noted that the specific data processing device and system architecture described in U.S. Pat. No. 6,721,804 are not required for implementing the underlying principles of bypassing uploading of data from a wireless device using outbound attachment caching. Rather, the embodiments of bypassing uploading of data from a wireless device using outbound attachment caching described below may be implemented on virtually any type of data processing device including standard personal computers, personal digital assistants and wireless telephones.

In one embodiment, the service 100 converts standard applications and data into a format which each data processing device 110 can properly interpret. Thus, as illustrated in FIG. 1, one embodiment of the service 110 includes content conversion logic 120 for processing requests for Internet content 140. More particularly, the service 100 acts as a proxy for the data processing device 110, forwarding Internet requests 140, 141 to the appropriate Internet site 130 on behalf of the data processing device 110, receiving responses from the Internet site 130 in a standard Internet format (e.g., web pages with embedded audio/video and graphical content, e-mail messages with attachments, . . . etc), and converting the standard Internet responses 124 into a format which the data processing device 110 can process (e.g., bytecodes as described in the co-pending applications).

For example, the conversion logic 120 may include a hypertext markup language (“HTML”) rendering module (not shown) for interpreting HTML code and downloading any embedded content in the HTML code (e.g., graphics, video, sound, . . . etc) to the service 100. The conversion logic 120 may then combine the HTML code and embedded content and generate a set of bytecodes for accurately reproducing the requested content on the data processing device 110. As described above, in one embodiment, the bytecodes may be Java bytecodes/applets. However, the conversion logic 120 may generate various other types of interpreted and/or non-interpreted code, depending on the particular type of data processing device 110 being used (e.g., one with an interpreter module or one without).

Because one embodiment of the service 100 maintains an intimate knowledge of the capabilities/configuration of each data processing device 110 (e.g., screen size, graphics/audio capabilities, available memory, processing power, user preferences, . . . etc) it can reconstruct the requested Internet content accurately, while at the same time minimizing the bandwidth required to transmit the content to the device 110. For example, the conversion logic 120 may perform pre-scaling and color depth adjustments to the requested content so that it will be rendered properly within the data processing device's 110's display. In making these calculations, the conversion may factor in the memory and processing power available on the data processing device 110. In addition, the conversion logic 120 may compress the requested content using a variety of compression techniques, and thereby preserve network bandwidth.

Refer now to FIG. 2, which illustrates a prior art method of sending emails across a wireless network from a remote wireless device. In method 200 and email is received at a server on a wireless service that includes an attachment from a wireless device at step 201. The attachment may be stored at various locations including on the device itself, on an expandable memory card inserted into the device, or other storages platforms known in the art. The email message is then uploaded in step 202. An email message includes a message body and header. An email message may also include one or more attachments. At step 202, the email message body, header and attachment(s) are uploaded from the wireless device to the wireless service over a wireless network. At step 203, the email message which has been uploaded with attachments to the wireless service is sent to one or more intended addressees. The method 200, repeats for every email message with an attachment at step 204.

Refer now to FIG. 3, which illustrates one embodiment of bypassing uploading of data from a wireless device using outbound attachment caching. System 300 includes a wireless device 301 connected across a wireless network 309 to a wireless service 310. Wireless device 301 includes device nonvolatile memory 302, device memory synchronization logic 303, email client 304, wireless transceiver 305, expandable memory interface 306, expandable memory synchronization logic 307, and expandable memory card 308. Wireless service 310 includes dispatcher 318, email server 312, user database 311, device memory synchronization logic 313, expandable memory synchronization logic 314, and service cache memory 315. Service cache memory 315 further includes cache snoop logic 317 and cache policy logic 316.

Wireless device 301 communicates with wireless service 310 via wireless transceiver 305 over wireless network 309. Specifically, wireless transceiver 305 sends electronic messages including a message body, header information, and optionally, one or more attachments (not pictured) over wireless network 301 to wireless messaging service 310. Attachments stored on the wireless device 301 may be stored in one or more memory locations and include file types, such as, pictures, video, PDFs, word files, as well as other file types known in the art to be amenable to electronic transmission. In one embodiment, communications between wireless device 301 and wireless service 310 includes the use of protocols including, for example, the inclusion of information in the message header that indicates network-specific information. Alternatively, communications between wireless device 301 and wireless service 310 may be accomplished by modifying the protocol that is used between wireless device 301 and wireless service 310. However, bypassing uploading of data from a wireless device using outbound attachment caching is not so limited and any protocol or set of protocols known in the art for communicating between wireless device 301 and wireless service 310 may be utilized for implementing the embodiments of bypassing uploading of data from a wireless device using outbound attachment caching discussed below. In any case, email server 312 is instructed to check service cache memory 315 for certain data and files to be discussed below.

In one embodiment, data can be stored in one of several locations on wireless device 301. For example, attachments can be stored on the device itself in built-in memory, such as device built-in memory 302 which can include nonvolatile memory (e.g., flash memory). Alternatively, data can be stored on an expandable memory such as Secure Digital (SD) cards, microSD cards, ISK3, or other such expandable memory platforms known in the art.

In one embodiment, a user can choose where to store a specific attachment on wireless device 301 including, for example, the built-in memory 302 or the expandable memory card 308. For example, a user may configure a camera/photo application to automatically store captured photos on either the built-in memory 302 or the expandable memory card 308 inserted into wireless device 301 via expandable memory interface 306. Additionally, in other embodiments, the user can move pictures or other data stored on device built-in memory 302 onto expandable memory card 308 and vice versa.

Wireless device 301 also includes synchronization logic 303 and 307 coupled to device built-in memory 302 and expandable memory interface 306, respectively. In one embodiment, all data stored on the device's built-in memory 302 is periodically uploaded to service 310 and stored in cache memory 315. Device memory synchronization logic 303 performs this task automatically without user intervention as a part of the service provided to users of wireless device 301. If a user deletes data from the device 301, then device memory synchronization logic 303 detects the deletion and sends a signal via transceiver 305 over wireless network 301 indicating to the device memory synchronization logic 313 that the corresponding files are to be deleted from cache memory 315. Likewise, every time a picture or other data is saved on the device's built-in memory 302, it is automatically uploaded to the service 310 and stored in cache memory 315 via communication between the device memory synchronization logic 303 and 313 on the device and service, respectively. In one embodiment, each time the user attempts to transmit an email (or other type of electronic message) containing an attachment, the device memory synchronization logic 303 or 307 determines if the attachment is already stored on the service and communicates this information to the email client 304 (or other email processing logic (not shown)). When an electronic message is sent with an attachment from device's built-in memory 302, the message body and header are transmitted to the email server 312, but any attachment(s) are not uploaded to email server 312 from wireless device 310 because they are already stored in cache memory 315. Email server 312 then retrieves the data associated with the attachment from cache memory 315 and sends the attachment along with the message body and header to the intended addressees. In this way, only the message body and header need to be transmitted to wireless service 310 decreasing the bandwidth utilization of the wireless network 309.

The above process is illustrated with reference to method 400 illustrated in FIG. 4. At step 401, files or other data stored on wireless device 301, are synchronized with wireless service 310 using device memory synchronization logic 303. In one embodiment, this is accomplished by copying files stored in built-in memory 302 into cache memory 315 at predetermined time intervals. Alternatively, synchronization may occur dynamically, each time users make changes to the data stored in the built-in memory 302.

At step 402, a determination is made as to whether an outbound electronic message includes one or more file attachments. In one embodiment, this is accomplished by a communication sent from wireless device 301 to email server 312 indicating that an outbound electronic message includes one or more file attachments. The communication can be placed, for example, in the electronic message's header. In this case, email server 312 uploads the message header or the entire email message from the wireless device to determine if the message includes an attachment. In an alternative embodiment, this communication may be sent by other signals known in the art.

At step 403, a determination is made as to whether the data associated with the outbound attachment(s) is stored in cache memory 315. If the attachment originated from device built-in memory 302, then it will have been automatically copied into cache memory 315 at some earlier time based on synchronization step 401. In one embodiment, this determination may be made at the service cache memory 315. When an electronic message is sent, the message body and header information are uploaded to the wireless service. The message header may contain information identifying the file attachment(s). File attachment identification information may include, for example, filenames, a checksum of the files size, or any combination of filenames and checksums of the file size, or other file identifiers known in the art. Email server 312 inspects the header to find the attachment(s) identification information. Cache snoop logic 317 then examines the cache to determine whether the files are stored in service cache memory 315. In an alternative embodiment, the wireless device itself makes this determination. In this embodiment, wireless device 301 tracks outbound attachments and maintains a list of filenames (or other file identifiers discussed above) which are already stored in service cache memory 315 based on the cache management policy. In this embodiment, wireless device 301 does not transmit file attachments which are in the list and known to be stored in cache memory 315.

At step 404, the file attachment(s) is either retrieved from service cache memory 315, or uploaded from wireless device 301 depending on whether the attachment(s) was stored in cache memory 315. Finally, at step 405, the electronic message with the file attachment(s) is sent to one or more intended addressees.

However, if the data associated with the attachment(s) is not stored on device built-in memory 302, then it will only be stored in cache memory 315 if it was part of a previous outbound electronic message. That is, if the data was stored on expandable memory card 308 instead of in device built-in memory, it will only be stored in cache memory 315 if it was sent as an earlier attachment from wireless device 301 over wireless network 309. This is because expandable memory 308 is not synchronized with wireless service 310. All data stored on expandable memory card 308, therefore, will not be stored in service cache memory 315 unless it was sent as a previous outbound attachment.

Expandable memory synchronization logic 307 is coupled to expandable memory card 308 through expandable memory interface 306. Unlike device memory synchronization logic 303, however, expandable memory synchronization logic 307 works in a different way as discussed below. Data stored on expandable memory card 308 is not automatically stored in wireless service 310 or cache memory 315. Instead, outbound attachments originating from expandable memory card 308 are stored in service cache memory 315. Expandable memory synchronization logic 307 performs the task of notifying expandable memory synchronization logic 314 located in wireless service 310 whenever data is deleted from expandable memory card 308. That is, attachments that are sent from expandable memory card 308 and later deleted from expandable memory card 308 will cause expandable memory synchronization logic 307 to send a deletion list to wireless service 310 over wireless network 301. Expandable memory synchronization logic 314 receives the deletion list and notifies service cache memory 315 that the data associated with a previously sent attachment is now deleted on expandable memory card 308. Cache memory 315 using cache snoop logic 317 then locates the data and deletes the file from cache memory 315 accordingly. Cache snoop logic 317 performs this operation by comparing the identification information (not pictured) of the attachment(s) with the identification information of files stored in cache memory 315 and determines when there is a match.

Sending a message from wireless device 301 with an attachment originating from expandable memory card 308 is detailed in method 500 of FIG. 5. At step 501, all received attachments are stored in service cache memory 315 whenever the attachment originated from expandable memory card 308 inserted in wireless device 301. At step 502, it is determined whether an outbound electronic message includes one or more file attachments. As discussed above, this can be accomplished in several ways including by placing this information in the message header. Once it is determined in step 503 that an outbound message includes one or more file attachments, the wireless service must further determine whether the attachment(s) is already stored in cache memory 315 using cache snoop logic 317. As discussed above, this determination can be made in several ways including by cache snoop logic 317. Cache snoop logic 317 compares the attachment identification information to the identification information of files stored in cache memory 315. If there is a match, then the attachment is already stored in cache memory 315. If cache snoop logic 317 does not detect a match, then the data associated with the attachment is not stored in cache memory 315. Alternatively, wireless device 301 can make this determination by checking the list of attachments previously sent from wireless device 301.

At step 504, the attachment is either uploaded from wireless device 301 or retrieved from cache memory 315 depending on whether the attachment is stored in cache memory 315. If the attachment(s) is already stored in service cache memory 315, then the attachment need not be uploaded from wireless device 301, but can be retrieved from cache memory 315. If attachment is not stored in cache memory 315, the attachment must be uploaded from wireless device 301 over wireless network 309. This completes step 504. In step 505, the appropriate files are attached to the outbound message and sent to the intended addressee(s).

In other embodiments, a cache management policy may be implemented. Cache policy logic 316 performs the function of determining when to delete data stored in cache memory 315 for a period of time. That is, cache policy logic 316 periodically updates the service cache memory 315 according to a predetermined cache update policy. The cache policy could be any one of several known in the art. For example, there could be a time-based expiration policy where data stored in cache memory 315 and that is unused for a period of time will be deleted after a period of time. Alternatively, cache policy logic 316 could implement a policy that maintains data in cache memory 315 as long as that attachment resides on expandable memory card 308 and the memory card 308 is inserted in wireless device 301. Additionally, there could be a cache policy based on how quickly the cache grows over time.

FIG. 6 illustrates another embodiment of bypassing uploading of data from a wireless device using outbound attachment caching for sending electronic messages. At step 601 a user sends an electronic message containing one or more attachments from wireless device 301 over wireless network 309. At step 602, a determination is made as to whether the attachment was stored in a synchronized or non-synchronized memory included in wireless device 301. If the attachment was stored in the synchronized memory (i.e., device built-in memory 302), it will likely have been synchronized with (and therefore stored at) wireless service 310. In such a case, at step 605 the message is sent without the file attachment because the file attachment will likely be stored in service cache memory 315. At step 607, it is determined whether the file attachment was, in fact, stored in service cache memory 315. If the file attachment is stored in service cache 315, then it is retrieved and the electronic message with attachment is transmitted to one or more intended addressees at step 609. If the file attachment is not stored in service cache 315, then wireless server 312 requests the file attachment from wireless device 301 and the attachment is subsequently uploaded over the wireless network 309 and stored in cache memory 315 at step 608.

On the other hand, if the attachment was stored in the non-synchronized memory (e.g., expandable memory card 308), it will only be stored at the wireless service based on the determination at steps 603 and 604. At step 603, it is determined whether the file attachment has been sent in a previous electronic message. If so, the file attachment would have been stored in service cache memory 315 when the prior electronic message was sent. At step 604, it is determined whether the file attachment is likely to still be in service cache memory 315, or whether the file attachment has been subsequently deleted based on the cache management policy (discussed above). If so, the electronic message is sent without the file attachment at step 605. If the file attachment has been subsequently deleted from service cache 315 based on the cache management policy, then the electronic message is sent from wireless device 301 and the file attachment is uploaded over wireless network 309 at step 606. The file attachment is then stored in service cache memory 315 for possible use by another subsequent electronic message sent from wireless device 301. Finally, at step 609, the electronic message is transmitted with the file attached to one or more intended addressees.

Although some of the embodiments described above focus on caching email attachments, the underlying principles of bypassing uploading of data from a wireless device using outbound attachment caching are not limited to any particular form of electronic messages. For example, in one embodiment of bypassing uploading of data from a wireless device using outbound attachment caching electronic messages associated with social networking sites may also be used. In this embodiment, when a user transmits an electronic message to post a picture (or other type of file) to a social networking Website (or other type of Website), the caching mechanisms described above may be employed to reduce bandwidth.

Embodiments of bypassing uploading of data from a wireless device using outbound attachment caching may include various steps as set forth above. The steps may be embodied in machine-executable instructions which cause a general-purpose or special-purpose processor to perform certain steps. Alternatively, these steps may be performed by specific hardware components that contain hardwired logic for performing the steps, or by any combination of programmed computer components and custom hardware components.

Elements of bypassing uploading of data from a wireless device using outbound attachment caching may also be provided as a machine-readable medium for storing the machine-executable instructions. The machine-readable medium may include, but is not limited to, floppy diskettes, optical disks, CD-ROMs, and magneto-optical disks, ROMs, RAMs, EPROMs, EEPROMs, magnetic or optical cards, propagation media or other type of media/machine-readable medium suitable for storing electronic instructions.

Throughout the foregoing description, for the purposes of explanation, numerous specific details were set forth in order to provide a thorough understanding of bypassing uploading of data from a wireless device using outbound attachment caching. It will be apparent, however, to one skilled in the art that bypassing uploading of data from a wireless device using outbound attachment caching may be practiced without some of these specific details. For example, although the embodiments described above are limited to a wireless implementation, the underlying principles of bypassing uploading of data from a wireless device using outbound attachment caching may be employed in a variety of different types of networks. Similarly, while the protocol stack described above is implemented using Java, the underlying principles of bypassing uploading of data from a wireless device using outbound attachment caching are not limited to any particular programming language. 

1. A wireless device, comprising: a memory device and a processor to implement synchronization logic configured to: determine whether an attachment of an electronic message to be sent from the wireless device is stored in a first memory of the wireless device or a second memory of the wireless device, the first memory configured to automatically replicate data stored in the first memory to a wireless data service; and initiate communication of the electronic message to the wireless data service without the attachment responsive to determining that the attachment is stored in the first memory.
 2. A wireless device as recited in claim 1, wherein the synchronization logic is further configured to initiate communication of the electronic message to the wireless data service without the attachment responsive to determining that the attachment is stored in the second memory and that the attachment was previously communicated to the wireless data service.
 3. A wireless device as recited in claim 1, wherein the synchronization logic is further configured to initiate communication of the electronic message to the wireless data service with the attachment responsive to determining that the attachment is stored in the second memory and that the attachment was not previously communicated to the wireless data service.
 4. A wireless device as recited in claim 1, wherein the synchronization logic is further configured to initiate communication of the electronic message to the wireless data service with the attachment responsive to determining that the attachment is stored in the second memory, that the attachment was previously communicated to the wireless data service, and that the attachment is likely to have been deleted from the wireless data service based on a cache management policy of the wireless data service.
 5. A wireless device as recited in claim 1, wherein the first memory is built into the wireless device and the second memory is an expandable memory that is removable from the wireless device.
 6. A wireless device as recited in claim 1, wherein the memory device and the processor are further configured to implement an expandable memory synchronization logic configured to communicate a deletion notification to the wireless data service when attachments stored in the second memory that were previously communicated to the wireless data service are deleted from the second memory.
 7. A wireless device as recited in claim 1, wherein electronic message is directed to a social networking site and the attachment comprises a file to be posted on the social networking site.
 8. A wireless device as recited in claim 1, wherein the electronic message comprises an email message.
 9. A method comprising: receiving an electronic message that is intended to include an attachment; determining that the attachment is stored at a server; and sending the electronic message with the attachment retrieved from the server.
 10. A method as recited in claim 9, wherein determining that the attachment is stored at the server further comprises comparing attachment identification information corresponding to the electronic message to identification information of attachments stored at the server to determine that the attachment that is intended to be included with the electronic message is the same as one of the attachments stored at the server.
 11. A method as recited in claim 9, wherein determining that the attachment is stored at the server further comprises comparing attachment identification information corresponding to the electronic message to a list of attachments previously received at the server to determine that the attachment that is intended to be included with the electronic message is the same as one of the attachments stored at the server.
 12. A method as recited in claim 9, wherein prior to receiving the electronic message, the method further comprising: receiving, at the server, an additional electronic message that includes an additional attachment; and storing the additional attachment at the server; wherein the determining that the attachment is stored at the server comprises determining that the attachment is the same as the additional attachment stored at the server.
 13. A method as recited in claim 12, wherein the additional electronic message that includes the additional attachment is received from an expandable memory of a wireless device.
 14. A method as recited in claim 13, further comprising deleting the additional attachment from the server if the additional attachment is unused for a predetermined period of time.
 15. A method as recited in claim 13, further comprising deleting the additional attachment from the server responsive to receiving a notification that the additional attachment is deleted from the expandable memory of the wireless device.
 16. A method as recited in claim 9, wherein prior to receiving the electronic message, the method further comprising: receiving the attachment from a memory of a wireless device via synchronization logic that synchronizes data stored in the memory of the wireless device with data stored at the server; and storing the attachment at the server.
 17. A method, comprising: determining whether an attachment of an electronic message to be sent from a wireless device is stored in a first memory of the wireless device or a second memory of the wireless device, the first memory configured to automatically replicate data stored in the first memory to a wireless data service; and initiating communication of the electronic message to the wireless data service without the attachment responsive to determining that the attachment is stored in the second memory and that the attachment was previously communicated to the wireless data service.
 18. A method as recited in claim 17, further comprising initiating communication of the electronic message to the wireless data service without the attachment responsive to determining that the attachment is stored in the first memory.
 19. A method as recited in claim 17, further comprising initiating communication of the electronic message to the wireless data service with the attachment responsive to determining that the attachment is stored in the second memory and that the attachment was not previously communicated to the data service.
 20. A method as recited in claim 17, further comprising initiating communication of the electronic message to the wireless data service with the attachment responsive to determining that the attachment is stored in the second memory, that the attachment was previously communicated to the wireless data service, and that the attachment is likely to have been deleted from the wireless data service based on a cache management policy of the wireless data service. 