Article Roundup Groupware.Indd
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
WS-Calendar Version 1.0
1 2 WS-Calendar Version 1.0 3 Working Draft 04 4 20100509 5 Specification URIs: 6 This Version: 7 http://docs.oasis-open.org/ws-calendar/v1.0/wd04/ws-calendar-1.0-spec-wd-04.pdf 8 http://docs.oasis-open.org/ws-calendar/v1.0/wd04/ws-calendar-1.0-spec-wd-04.html 9 http://docs.oasis-open.org/ws-calendar/v1.0/wd04/ws-calendar-1.0-spec-wd-04.doc 10 Previous Version: 11 http://docs.oasis-open.org/ws-calendar/v1.0/wd04/ws-calendar-1.0-spec-wd-03.pdf 12 http://docs.oasis-open.org/ws-calendar/v1.0/wd04/ws-calendar-1.0-spec-wd-03.html 13 http://docs.oasis-open.org/ws-calendar/v1.0/wd04/ws-calendar-1.0-spec-wd-03.doc 14 Latest Version: 15 http://docs.oasis-open.org/ws-calendar/v1.0/ws-calendar-1.0-spec.pdf 16 http://docs.oasis-open.org/ws-calendar/v1.0/ws-calendar-1.0-spec.html 17 http://docs.oasis-open.org/ws-calendar/v1.0/ws-calendar-1.0-spec.doc 18 Technical Committee: 19 OASIS WS-Calendar TC 20 Chair(s): 21 Toby Considine 22 23 Editor(s): 24 Toby Considine 25 Paul Tischhauser 26 27 Related work: 28 This specification replaces or supersedes: 29 N/A 30 This specification is related to: 31 IETF RFC 5545, ICalendar 32 IETF RFC 5546, ICalendar Transport 33 IETF RFC 2447, ICalendar Message Based Interoperability 34 IETF XCal in process 35 36 Declared XML Namespace(s): 37 http://docs.oasis-open.org/ns/ws-calendar/ws-calendar-201001 38 Abstract: 39 WS-Calendar describes a common set of message components for specifying schedules and intervals to 40 coordinate activities between services. -
BF Committee
BF Committee From: Kristin Holmes ASID <[email protected] > Sent: Wednesday, April 26, 2017 6:59 PM To: BF Committee Cc: erin Wade; Jonathan Starr; Ashley Lea hey Subject: testimony submission Attachments: C&S W.pages.pdf TNTLRJOR D[t5ICN S1UDKT) H()ML rTKNI5I--nNc5 TOKL 091 KUpLaU Drv 2I0 \Vet Vneard Street Kihe, HI 9675 Waluku, HI 07Q P 808 3 79- k P 808 2-51c 803 3797517 1 808 2-5l7 krist, n@swanpnteHorsrnau corn SWAN I N I r 2 1 0 P S To: County Council Members Date: 4/27/17 Re: Clean & Safe From: Kristin Holmes ASID I am a co-owner for the family owned commercial property at the corner of Church and Vineyard. I am also the owner of Swan Interiors with our Home Furnishings Store located on the corner. Added to that, I am the Vice-President of the Wailuku Community Association and on the PAC for the Parking & Events Center development. I support the Mayor's line item budget to fully fund the ongoing Clean and Safe Program for Wailuku as it is currently functioning. I feel strongly that it is very important to our business operation. We have established a more upscale business in Wailuku our ability to bring in people from areas like Wailea and Kapalua rides on the comfort level for our clientele. Frequently, clients will ask what the "story" is with this small community and question why I've chosen to locate my store in this area. I want to be able to respond with a supportive answer about the changes being affected by ReWailuku plans for a quaint historic town that still has many dilapidated pockets that attract a less desirable group of people. -
30-34 Feat-Chandler
Distant Voices: Distributed Learning at Royal Roads University A personal touch and ongoing technical support yield high student retention for a school dedicated to distance learning By Susan Chandler ecelia David leads a team well versed in the intricacies of Ccomputer programs and net- working configurations, but her “to do” list won’t be found on any hard drive or Palm Pilot. Instead, when adding to her list, she selects a large piece of chalk and faces a blackboard covering one wall of the office she shares with the rest of the Computer Service team at Royal Roads Univer- sity in Victoria, British Columbia. Her computer is reserved for emergencies only — pastel Post-it notes form a halo around the monitor, with mes- sages like “Must do before noon today!!!” and “Check on this by 4 p.m. at the latest.” David’s many “notes to self” are part and parcel of her job as a systems analyst and coordinator of the help desk at Royal Roads. But where a typi- cal university help desk assists stu- dents as they work in an on-campus computer lab, her group deals with requests from Toronto, Vancouver, Ottawa, and as far afield as the Philip- pines and South America. That’s 30 EDUCAUSE QUARTERLY • Number 4 2001 because Royal Roads is a new breed of I send and receive educational obvious interest in ensuring that we educational institution, one that states materials, keep our retention rate as high as pos- its goal of “increasing access to post- I check in to the Web site designed sible. -
Implementation of Proactive Spam Fighting Te Niques
Implementation of Proactive Spam Fighting Teniques Masterarbeit von Martin Gräßlin Rupret-Karls-Universität Heidelberg Betreuer: Prof. Dr. Gerhard Reinelt Prof. Dr. Felix Freiling 03. März 2010 Ehrenwörtlie Erklärung I versiere, dass i diese Masterarbeit selbstständig verfasst, nur die angegebenen ellen und Hilfsmiel verwendet und die Grundsätze und Empfehlungen „Verantwortung in der Wissensa“ der Universität Heidelberg beatet habe. Ort, Datum Martin Gräßlin Abstract One of the biggest allenges in global communication is to overcome the problem of unwanted emails, commonly referred to as spam. In the last years many approaes to reduce the number of spam emails have been proposed. Most of them have in common that the end-user is still required to verify the filtering results. ese approaes are reactive: before mails can be classified as spam in a reliable way, a set of similar mails have to be received. Spam fighting has to become proactive. Unwanted mails have to be bloed before they are delivered to the end-user’s mailbox. In this thesis the implementation of two proactive spam fighting teniques is discussed. e first concept, called Mail-Shake, introduces an authentication step before a sender is allowed to send emails to a new contact. Computers are unable to authenticate themselves and so all spam messages are automatically bloed. e development of this concept is discussed in this thesis. e second concept, called Spam Templates, is motivated by the fact that spam messages are generated from a common template. If we gain access to the template we are able to identify spam messages by mating the message against the template. -
Nextcloud User Manual Release Latest
Nextcloud User Manual Release latest The Nextcloud developers May 16, 2021 Contents 1 Nextcloud latest user manual introduction1 2 What’s new for users in Nextcloud latest3 3 The Nextcloud Web interface7 3.1 Web browser requirements........................................7 3.2 Navigating the main user interface....................................8 4 Files & synchronization 11 4.1 Accessing your files using the Nextcloud Web interface........................ 11 4.2 Accessing Nextcloud files using WebDAV................................ 17 4.3 Managing deleted files.......................................... 28 4.4 Desktop and mobile synchronization.................................. 29 4.5 Encrypting your Nextcloud files on the server.............................. 29 4.6 File Sharing............................................... 32 4.7 Federated Shares............................................. 36 4.8 Making anonymous uploads....................................... 38 4.9 Large file uploads............................................ 40 4.10 Storage quota............................................... 40 4.11 Version control.............................................. 41 4.12 Projects.................................................. 41 4.13 Transfer Ownership........................................... 44 5 Groupware 47 5.1 Using the Contacts app.......................................... 47 5.2 Using the Calendar app......................................... 50 5.3 Synchronizing with Android....................................... 58 5.4 Synchronizing -
Diplomarbeit Kalenderstandards Im Internet
Diplomarbeit Kalenderstandards im Internet Eingereicht von Reinhard Fischer Studienkennzahl J151 Matrikelnummer: 9852961 Diplomarbeit am Institut für Informationswirtschaft WIRTSCHAFTSUNIVERSITÄT WIEN Studienrichtung: Betriebswirtschaft Begutachter: Prof. DDr. Arno Scharl Betreuender Assistent: Dipl.-Ing. Mag. Dr. Albert Weichselbraun Wien, 20. August 2007 ii Inhaltsverzeichnis Abbildungsverzeichnis vi Abkürzungsverzeichnis vii 1 Einleitung 1 1.1 Problemstellung . 1 1.2 Inhalt und Vorgehensweise . 3 2 Standards für Kalender im Internet 5 2.1 iCalendar und darauf basierende Standards . 6 2.1.1 iCalendar und vCalendar . 6 2.1.2 Transport-Independent Interoperability Protocol (iTIP) . 8 2.1.3 iCalendar Message-Based Interoperability Protocol (iMIP) . 8 2.1.4 iCalendar über WebDAV (WebCAL) . 10 2.1.5 Storage of Groupware Objects in WebDAV (GroupDAV) . 11 2.1.6 Calendaring and Scheduling Extensions to WebDAV (CalDAV) . 12 2.1.7 IETF Calendar Access Protocol (CAP) . 13 2.2 XML-basierte Formate . 15 2.2.1 XML iCalendar (xCal) . 15 2.2.2 RDF Calendar (RDFiCal) . 16 2.2.3 RDFa (RDF/A) . 16 2.2.4 OWL-Time . 17 2.3 Mikroformate (hCalendar) . 18 2.4 SyncML . 20 2.5 Weitere Formate . 21 2.6 Zusammenfassung . 22 iii 3 Offene Kalenderanwendungen im Internet 24 3.1 Server . 24 3.1.1 Citadel/UX . 24 3.1.2 Open-Xchange . 26 3.1.3 OpenGroupware.org . 26 3.1.4 Kolab2 . 27 3.1.5 Weitere Server . 28 3.2 Clients . 29 3.2.1 Mozilla Calendar Project . 29 3.2.2 KDE Kontact . 30 3.2.3 Novell Evolution . 30 3.2.4 OSAF Chandler . 31 3.2.5 Weitere Open-Source- und Closed-Source-Clients . -
Total Cost of Ownership and Open Source Software
What Place Does Open Source Software Have In Australian And New Zealand Schools’ and Jurisdictions’ ICT Portfolios? TOTAL COST OF OWNERSHIP AND OPEN SOURCE SOFTWARE Research paper by Kathryn Moyle Department of Education and Children’s Services South Australia July 2004 1 Contents Contents 2 List of tables and diagrams 3 Abbreviations 4 Acknowledgements 5 Executive summary 6 Options for future actions 7 Introduction 9 Key questions 9 Open source software and standards 9 Comparison of open source and proprietary software licences 11 Building on recent work 12 Contexts 14 Use of ICT in schools 14 Current use of open source software in Australia and New Zealand 14 Procurement and deployment of ICT 15 Department of Education and Children’s Services, South Australia 16 What is total cost of ownership? 17 Purpose of undertaking a total cost of ownership analysis 17 Why undertake total cost of ownership work? 17 How can total cost of ownership analyses help schools, regions and central agencies plan? 17 Total cost of ownership analyses should not be undertaken in isolation 18 Total cost of ownership and open source software 18 Review of literature 19 Open source software in government schools 19 Total cost of ownership 20 Total cost of ownership in schools 21 Total cost of ownership, open source software and schools 23 Summary 25 Undertaking a financial analysis 26 Principles underpinning a total cost of ownership 26 Processes 27 Testing a financial model: Total Cost of Ownership in a school 33 Scenario 33 Future plans 40 ICT deployment options -
Postfix-Cyrus-Web-Cyradm-HOWTO
Postfix-Cyrus-Web-cyradm-HOWTO Luc de Louw luc at delouw.ch Revision History Revision 1.2.6 2004-03-30 Revised by: ldl Added minor additions and corrected to amavisd-new, corrected cronjob-time for freshclam Revision 1.2.5 2004-03-28 Revised by: ldl Added Anti-Virus and SPAM methods (amavisd-new, spamassassin, clamav), updated cyrus-imapd section with update instructions, added instruction to restrict imapd admin access. Revision 1.2.4 2003-11-30 Revised by: ldl Input from English proofreading, minor correction and enhancements from user-input, updated software mentioned in the HOWTO Revision 1.2.3 2003-03-24 Revised by: ldl Some minor correction and enhancements from user-input, updated software mentioned in the HOWTO Revision 1.2.2 2003-02-14 Revised by: ldl Lots of grammar and typos fixed. Some corrections to the pam_mysql Makefile Revision 1.2.1 2003-02-12 Revised by: ldl Non-official test-release: Added lots of fixes and updates. Added OpenSSL and more pam related stuff. Revision 1.2.0 2002-10-16 Revised by: ldl Added lot of user requests, updated the software mentioned in the HOWTO Revision 1.1.7 2002-10-15 Revised by: ldl Added Michael Muenz’ hints for SMTP AUTH, corrected ca-cert related mistake, improved SGML code (more metadata), updated the software mentioned in the document. Revision 1.1.6 2002-06-14 Revised by: ldl Added sasl_mech_list: PLAIN to imapd.conf, added web-cyradm mailinglist, added more to web-cyradm Revision 1.1.5 2002-06-11 Revised by: ldl Added new SQL query to initialize web-cyradm to have full data integrity in the MySQL Database, mysql-mydestination.cf reported to be operational as expected. -
Toward an Automated Vulnerability Comparison of Open Source IMAP Servers Chaos Golubitsky – Carnegie Mellon University
Toward an Automated Vulnerability Comparison of Open Source IMAP Servers Chaos Golubitsky – Carnegie Mellon University ABSTRACT The attack surface concept provides a means of discussing the susceptibility of software to as-yet-unknown attacks. A system’s attack surface encompasses the methods the system makes available to an attacker, and the system resources which can be used to further an attack. A measurement of the size of the attack surface could be used to compare the security of multiple systems which perform the same function. The Internet Message Access Protocol (IMAP) has been in existence for over a decade. Relative to HTTP or SMTP, IMAP is a niche protocol, but IMAP servers are widely deployed nonetheless. There are three popular open source UNIX IMAP servers – UW-IMAP, Cyrus, and Courier-IMAP – and there has not been a formal security comparison between them. In this paper, I use attack surfaces to compare the relative security risks posed by these three products. I undertake this evaluation in service of two complementary goals: to provide an honest examination of the security postures and risks of the three servers, and to advance the study of attack surfaces by performing an automated attack surface measurement using a methodology based on counting entry and exit points in the code. Introduction Contributions and Roadmap System administrators frequently confront the The paper makes two major contributions. First, problem of selecting a software package to perform a I undertake an in-depth discussion of the relative secu- desired function. Many considerations affect this deci- rity postures of the three major open source IMAP sion, including functionality, ease of installation, soft- servers in use today. -
Dynamic Allocation of Mail Server Resources Among Users
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 9, ISSUE 03, MARCH 2020 ISSN 2277-8616 Dynamic Allocation Of Mail Server Resources Among Users Basti M.Aliyeva Index:The article was dedicated to the solution of the problem on the dynamic allocation of mail server resources among users. It was noted that recently the electronic mail system had undergone serious changes and new features have been added to this system. The article examines the working principles of email and defines possible operating modes for subscribers. It was noted that mail server memory should be dynamically allocated among users so that the email can successfully perform its functions. In the article,the linear programming is applied to the problem of dynamic allocation of mail server memory. Known methods at every operation can resolve this issue.Proximity measure has been defined based on the Levenstein Distance (LD) for the determination of the renewal of documents on the server to improve the use of the server resources. This tool can be used to determine whether the documents have changed on the server.In the result, similar documents can be identified, and their number can be reduced up to one. Key Words: email server, dynamic allocation of the memory, operating modes of subscribes, Levenstein Distance (LD), Measures of document proximity. ———————————————————— 1. INTRODUCTİON information networks. In this case, it is essential to pay It is known that e-mail is one of the most important special attention to data transmission issues.Numerous information resources of the Internet, as well as it is the ways to transmit data and many software tools have been most massive communication tool. -
Interview with Scott Rosenberg About Dreaming in Code
By Geert Lovink “Software is a heap of trouble.” Scott Rosenberg Scott Rosenberg has written an excellent book on software and open source culture called “Dreaming in Code: Two Dozen Programmers, Three Years, 4,732 Bugs, and one Quest for Transcendent Software”. In it he writes: “Our civilization runs on software. Yet the art of creating software continues to be a dark history, even to the experts. Never in history have we depended so completely on a product that so few know how to make well.” West coast IT journalist and Salon.com cofounder Scott Rosenberg produced a very readable study on the internal dynamics of the Chandler open source calendar project. Chandler was supposed to “grow up into a powerful ‘personal information manager’ for organizing and sharing calendars, emails and to-do lists.” It would be cross-platform and open source, officially realized by the Open Source Applications Foundation. The book is chocking and boring at once. Many would recognize themselves in the stories about ‘slippage’, the delays and struggles to gain conceptual clarity amongst the drifting team members. Software is never ready and mal- functionality rules. Rosenberg spent three years as a member of the software developers team, financed and led by Lotus 1-2-3 creator and EFF cofounder Mitch Kapor, designing the Chandler calendar application that was meant to challenge the proprietary market leader Microsoft Outlook. At some point the reader gets lost in the level of detail but exactly at that moment the book takes a turn and puts the collective frustration in a wider historical perspective. -
1. Web Application (Basics)
INFORMATION TECHNOLOGY 402 NAME :________________________________ CLASS/ SEC :______________ ROLL: _____ SESSION :_____________________________ QUOTE :_______________________________ ______________________________________ 1. WEB APPLICATION (BASICS) Fill in the blanks 1. The option in Microsoft Windows XP used for helping users with physical disabilities and to reduce repetitive strain is ________. 2. SoundSentry is designed to help users with ________ impairments. 3. The High Contrast option in Microsoft Windows XP is designed to assist people with ________ impairments. 4. _______ is designed to assist people that have difficulty using a keyboard or a mouse. 5. The acronym for LAN is ________ 6. Three types of Wired Internet Connectivity are ________, ________ & ________ 7. Three types of Wireless Internet Connectivity are ________, ________ & ________ 8. ________ is a form of communication over the Internet that offers an instantaneous transmission of text-based messages from sender to receiver. 9. ________, ________ & ________ are required for audio and video conferencing. ANSWERS: 1. Sticky keys 7. Bluetooth, Wireless Fidelity, 2. Auditory Worldwide Microwave Access 3. Vision 8. Instant Messaging 4. Accessibility option 9. Web Camera, Computer, Fast 5. Local Area Network Internet Connection 6. Dial Up, Digital Subscribers Line, Cable Access SHEIKH ABDULLAH (2018-19) Page 1 INFORMATION TECHNOLOGY 402 Sample Questions to be referred to the notes provided earlier: 1. What is the definition of networking? 2. What are the advantages of networking? 3. What are the different types of networking? 4. Explain LAN and WAN. 5. List any five application based instant messaging software. 6. Sate any 03 rules and etiquettes to be followed while chatting on the Internet.