In this first tutorial, discuss about the first component of timeNough enterprise software: the Time Logger bot. Each bot developed for our new enterprise software will be given a name, so it will be easier to recognize, and this one suggests that it may be used for logging something at some point. You can reach timeNough’s Time Logger by email or text message, SMS. An email address, and a phone number +1 (862) 305-8560 have been prepared for interactions with this it.

You have two options: first, you need to be whitelisted, which means letting timeNough know your personal email address and trust it. Second, use the email addresses of John Doeson or Lara Bowen, some fictitious characters imagined for demonstration purposes here. Because they are already whitelisted, they can directly use it and engage with him, no whitelisting required.

During the first part of the tutorial, you will learn how to follow the Whitelisting process and arrive at the preferences form. Starting point will be John Doeson’s email message dedicated to this topic. You will have to enter the email address of your choice in a particular field, and confirm a link you will receive in a confirmation message. In the end, you will be able to access a form that lets you configure settings about the timeNough MVP and the bots, but it will require credentials for extra security. In this part, you’ll also learn about the additional data that is used in the Time Logger bot’s algorithm: your estimates of reading speed and typing speed based on testing done with a recommended tool.

The Time Logger will also delete every witnessed email after counting words, so no surveillance will be conducted. Content of emails will never be used for intelligence purposes, post-analysis, or even espionage.
The man in the video, minute 11:21.

Part two is a demonstration of how to interact with this first bot by using John Doeson’s mailbox features and acting as if you are him. You will learn how to compose and send an email to the bot’s email address. The whitelisting will allow you to replicate all of this directly from your own mailbox interface, because it’s more convenient. The tutorial insists that the Time Logger is acting as a witness. It should be clear by the end of the guide that it is all about making a silent program aware of something manually

You’ll have to manually involve the program, which becomes worrisome after a while. Due to this, we begin talking in minute 11:43 about automation, and how to communicate with software hidden behind an email address, first, from your own email account, and second, automatically by using email forwarding. It explains how to configure email forwarding when your email is managed by Gmail, Microsoft Outlook, Yahoo mail or the Apple mail application. Thank you for watching this new video and subscribing to our YouTube channel.