1460709900-3fee1eec-002c-4d2c-9b17-c9a37270ed0f

1. A method comprising:
receiving, at a data analyzer, captured email over a network, the captured email being communicated between a sender and an intended recipient through the network;
analyzing the captured email including:
scanning the captured email for search terms defining personal or confidential information, and
identifying trends based on the personal or confidential information contained in the captured email including, after the scanning, evaluating occurrences in the captured email of the personal or confidential information and determining the nature and amount of personal or confidential information passing through the captured email; and

identifying, based on the identified trends, one or more security-related protocols for securing future communications between the sender and the intended recipient wherein the one or more security-related protocols are different than protocols used to send communications between the sender and the recipient that were included in the captured email.
2. The method of claim 1, where receiving the captured email includes copying the captured email for analysis.
3. The method of claim 2, wherein receiving the captured email includes receiving a sampling of the captured email.
4. The method of claim 2, wherein receiving the captured email includes receiving a selected ratio of all the captured email.
5. The method of claim 2, further comprising encrypting the captured email and decrypting the encrypted email before analysis.
6. The method of claim 1, further comprising receiving the captured email from and transferring the captured email to a server.
7. The method of claim 1, wherein scanning the captured email includes scanning one or more attachments contained in the captured email.
8. The method of claim 1, wherein analyzing the captured email includes:
identifying one or more categories of the personal or confidential information; and
storing the identified categories of personal or confidential information without storing the personal or confidential information.
9. The method of claim 1, further comprising identifying the personal or confidential information with the search terms.
10. The method of claim 1, wherein:
the search terms have an associated mask, the mask being a filter used to include or exclude values from the search terms based on a predefined criteria; and
analyzing the captured email includes searching the email for both the search terms and the associated mask of the search terms.
11. The method of claim 10, wherein the mask defines a specified format of digits.
12. The method of claim 10, wherein the mask defines a nine digit format for a social security number.
13. The method of claim 1, where identifying the one or more security-related protocols includes identifying information for developing one or more encryption protocols for securing a network that processes the captured email.
14. The method of claim 1, where identifying the one or more security-related protocols includes identifying information for developing one or more encryption protocols for securing the future communications.
15. The method of claim 1, wherein scanning the captured email includes scanning the captured email for search terms defining personal or confidential information that are stored in a lexicon, the lexicon having one or more categories each associated with a different class of personal or confidential information.
16. The method of claim 1 wherein the one or more trends relate to identification of a specific type of information that has been located when scanning, or individuals, context or types of communications associated with one or more of the occurrences.
17. A method of analyzing email, comprising:
identifying a copy of an email transferred over a network;
encrypting the copy of the email;
transferring the encrypted copied email to a data analyzer;
decrypting the encrypted copied email;
analyzing the copied email including:
scanning the copied email for search terms defining personal or confidential information, and
identifying trends based on the personal or confidential information contained in the copied email including, after the scanning, evaluating occurrences in the copied email of the personal or confidential information and determining the nature and amount of personal or confidential information passing through the copied email; and
identifying, based on the identified trends, one or more security-related protocols for securing future communications between the sender and the intended recipient wherein the one or more security-related protocols are different than protocols used to send communications between the sender and the recipient that were included in the captured email.
18. The method of claim 17, wherein scanning the copied email includes scanning the captured email for search terms defining personal or confidential information that are stored in a lexicon, the lexicon having one or more categories each associated with a different class of personal or confidential information.
19. The method of claim 17 wherein the one or more trends relate to identification of a specific type of information that has been located when scanning, or individuals, context or types of communications associated with one or more of the occurrences.
20. A method comprising:
receiving a plurality of messages transmitted over a network, each message being communicated between a sender and an intended recipient;
analyzing the messages to identify personal or confidential information contained in the messages including evaluating occurrences of the personal or confidential information and determining the nature and amount of personal or confidential information passing through one or more of the messages;
identifying a security protocol based on the analysis; and
securing future messages as between the sender and the intended recipient using the identified security protocol wherein the security-related protocol is different than a protocol used to send the message between the sender and the recipient.
21. The method of claim 20, wherein identifying a security protocol includes identifying an encryption protocol for encrypting the message.
22. The method of claim 21, wherein securing the message includes encrypting the message based on the encryption protocol prior to delivering the message.
23. The method of claim 20 wherein the nature relates to identification of a specific type of information that has been located based on the analysis, or individuals, context or types of communications associated with one or more of the occurrences in the messages.

The claims below are in addition to those above.
All refrences to claim(s) which appear below refer to the numbering after this setence.

What is claimed is:

1. A semiconductor laser device, comprising: a first conductivity type cladding layer; an active layer; and a second conductivity type cladding layer, which are on a substrate,
wherein the semiconductor laser device further comprises a stripe structure for injecting carriers therein,
a width of the stripe is wider at a front end face of a resonator from which laser light is emitted than at a rear end face that is located on an opposite side of the front end face, and
a reflectance of the front end face is lower than a reflectance of the rear end face.
2. The semiconductor laser device according to claim 1, wherein at least the active layer comprises a Group III-V nitride based semiconductor material.
3. The semiconductor laser device according to claim 2, wherein at least the active layer comprises an AlGaAs based semiconductor material.
4. The semiconductor laser device according to claim 2, wherein at least the active layer comprises an AlGaInP based semiconductor material.
5. The semiconductor laser device according to claim 1, wherein a ratio between the stripe width at the front end face and the stripe width at the rear end face satisfies a relationship of 1<(the stripe width at the front end face)(the stripe width at the rear end face)<2.
6. The semiconductor laser device according to claim 5, wherein the ratio between the stripe width at the front end face and the stripe width at the rear end face satisfies a relationship of 1.4<(the stripe width at the front end face)(the stripe width at the rear end face)<1.8.
7. The semiconductor laser device according to claim 1, wherein the width of the stripe decreases continuously from the front end face toward the rear end face.
8. The semiconductor laser device according to claim 1,
wherein the stripe structure has a region in which the width of the stripe varies continuously and a region in which the width of the stripe is constant, and
the stripe width at a boundary between the respective regions varies seamlessly.
9. The semiconductor laser device according to claim 1, wherein the stripe structure has regions adjacent to the front end face and the rear end face, the regions respectively extending inwardly from the front end face and the rear end face and each having a constant stripe width.
10. The semiconductor laser device according to claim 9, wherein the regions having the constant stripe widths extend inwardly from the front end face and the rear end face, respectively, by a length of one-twentieth or shorter of a length of the resonator.
11. The semiconductor laser device according to claim 1, wherein the reflectance of the front end face is lower than the reflectance of the rear end face by 15% or more.