Draft Transcript Day2.Pdf (542.72

Total Page:16

File Type:pdf, Size:1020Kb

Draft Transcript Day2.Pdf (542.72 1 1 2 3 4 5 EMAIL AUTHENTICATION SUMMIT 6 7 8 9 SPONSORED BY 10 THE FEDERAL TRADE COMMISSION 11 AND THE 12 NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 13 14 15 WEDNESDAY, NOVEMBER 10, 2004 16 8:30 a.m. 17 18 19 FEDERAL TRADE COMMISSION 20 601 NEW JERSEY AVENUE, N.W. 21 WASHINGTON, D.C. 22 23 24 25 For The Record, Inc. Waldorf, Maryland (301) 870-8025 2 1 A G E N D A 2 PAGE 3 4 Opening Remarks, Commissioner Leibowitz 4 5 6 Email Authentication: How Spammers 7 Circumvent Authentication Methods 11 8 9 Email Authentication: Real World Effects 85 10 11 Global Impact of Email Authentication: 12 International Perspectives 149 13 14 Email Authentication: Overcoming 15 Spammers' Tricks and Moving Towards 16 Implementation 185 17 18 Beyond Email Authentication: The Role 19 of Reputation, Accreditation and 20 Other Tools 245 21 22 Closing Remarks, Commissioner Swindle 317 23 24 25 For The Record, Inc. Waldorf, Maryland (301) 870-8025 3 1 P R O C E E D I N G S 2 - - - - - 3 MS. ROBBINS: Thank you all for arriving back 4 for day two. We had a very exciting day yesterday and 5 we expect nothing less from today. Before we begin, I 6 just want to make a few housekeeping announcements. If 7 you have a cell phone or other device that beeps, please 8 make sure to turn it off. And panelists, if you could 9 speak directly into your microphone, and if you want to 10 respond to a question or comment, please just remember 11 to raise your table tent. 12 Again we would like to thank the Direct 13 Marketing Association and the Association For 14 Interactive Marketing and Cisco Systems for providing us 15 refreshments today. 16 Before we begin day two, I would like to 17 introduce Commissioner Jon Leibowitz who will start off 18 the day by giving us some introductory remarks. 19 Commissioner Leibowitz is our newest Commissioner and 20 started here in September of 2004. Prior to joining the 21 FTC, Commissioner Leibowitz was the Vice President of 22 Congressional Affairs for the Motion Picture Association 23 of America, and held several positions on Capitol Hill, 24 including Democratic Chief Counsel and Staff Director 25 for the U.S. Senate Antitrust Subcommittee. For The Record, Inc. Waldorf, Maryland (301) 870-8025 4 1 I am pleased this morning to introduce to you 2 Jon Leibowitz. 3 (Applause.) 4 COMMISSIONER LEIBOWITZ: Thank you, Colleen, for 5 making me look much more impressive than I know myself 6 to be. Good morning. As noted, I am Jon Leibowitz. 7 Thank you all for being here at this early hour, very 8 early, to participate in the Email Authentication 9 Summit. I want to open the second day by encouraging 10 everyone in this room with an interest in 11 authentication, whether an IP-based model, 12 signature-based model, some other technology or some 13 combination of technologies to work together to develop 14 the tools necessary to help solve the spam problem. 15 It's a goal we all share, and it's one that's attainable 16 through your cooperation and creativity. 17 With that said, let me also thank the National 18 Institute of Standards and Technology for cohosting this 19 event, doing some of the heavy lifting yesterday in 20 moderating the technical panels and helping us sort 21 through the various authentication proposals and 22 acronyms. From BATV, IIM and DomainKeys, to SIDF and 23 CSV, not to be confused, if you live in the Washington 24 area, with CVS. 25 Courtesy of my colleagues on the Commission, let For The Record, Inc. Waldorf, Maryland (301) 870-8025 5 1 me add the usual disclaimer: The views I express here 2 today are my own and not necessarily those of the 3 Federal Trade Commission or any other individual 4 Commissioner or of my staff. 5 As many of you know, the Federal Trade 6 Commission -- can you guys hear me in the back? Over 7 there? Okay. 8 As many of you know, the Federal Trade 9 Commission has a special interest in the electronic 10 marketplace. In the past decade, a whole new 11 free-flowing exchange of goods and information has 12 emerged, with huge benefits for consumers. As this 13 cybermarket has blossomed, in fact even expanded 14 exponentially, so, too, have technological challenges 15 and the creativity of those engaging in cyberfraud and I 16 suppose cybernuisance. Simply put, we can't let spam, 17 spyware and spoofing, undermine the promise of the 18 Internet. 19 Most people have a visceral reaction to spam, 20 and it's no wonder why. Consider the statistics: 21 Experts say that spam accounts for as much as 70 percent 22 of all email and costs businesses $10 billion a year, 23 much of that passed on to consumers. It also caused 24 consumers countless hours of wasted time and 25 immeasurable frustrations. Consider, also, that the For The Record, Inc. Waldorf, Maryland (301) 870-8025 6 1 vast majority of spam is deceptive, from false headers 2 and phony identities to simply fraudulent offerings. 3 Just look at the spam in our inboxes, and here's 4 some examples that came from one of my staffer's 5 computers in the last week, ads for discount software, 6 sometimes spelled W-E-A-R. Here's the tip: If they 7 can't spell it, you shouldn't buy it. Unbelievably low 8 interest rate mortgages, too unbelievable to be true, 9 phishing expeditions by anglers looking to steal your 10 financial account information and maybe even your 11 identity, and ads for herbal Viagra and so-called 12 vitality products that won't extend anything except the 13 time you spend on your computer. That was a joke. I 14 know it's early in the morning. 15 More seriously, spam is a problem that has 16 literally hit home with me. I have two young girls, 17 ages seven and nine, who have just started to navigate 18 the Internet. The oldest one has her own email account, 19 she's often online IMing her friends, and I am just 20 extremely concerned and more than a little nervous that 21 she and her younger sister are going to encounter this 22 type of brazen and offensive spam and something far 23 worse. Obviously we need a multifaceted approach to 24 combat this serious problem. 25 Aggressive law enforcement is one part of the For The Record, Inc. Waldorf, Maryland (301) 870-8025 7 1 solution. The Commission has brought dozens of 2 spam-related cases and the CAN-SPAM Act has given the 3 Commission and ISPs, I think, some additional tools to 4 go after illegal spammers. 5 Last month the Commission filed its first 6 spyware case against defendants who downloaded spyware, 7 changed consumers' homepages and search engines, 8 delivered a barrage of pop-up ads and caused CD-ROM 9 trays to open and close. Even more outrageous, the 10 defendants then sold anti-spyware products to the very 11 consumers to fix the same problems the defendants had 12 originally caused. 13 To my mind, this is not only wrong, it is just 14 unacceptable, and hopefully the Commission's law 15 enforcement efforts against spam and spyware will send a 16 strong signal to the Internet crooks that we are on the 17 beat. 18 It was also heartening to see AOL, Earthlink, 19 Yahoo! and Microsoft join together last month to file 20 more CAN'T-SPAM cases. For those of you who know me, 21 you know I am not a big fan of private litigation, too 22 often in America people say "I'll see you in court" 23 rather than "let's work this out," but these lawsuits or 24 this lawsuit and the criminal prosecution in Virginia 25 seem to me to be totally appropriate. For The Record, Inc. Waldorf, Maryland (301) 870-8025 8 1 Beyond law enforcement, though, we need consumer 2 and business education to increase awareness and help 3 users secure their computers and avoid being spammed and 4 scammed. 5 The Commission is vigorously pursuing education 6 initiatives and some corporations and consumer 7 organizations are also beginning to help build consumer 8 awareness. These efforts are crucial. But law 9 enforcement and education alone can't do the trick. And 10 rather than a do-not-email registry that could cause as 11 many problems as it would solve, at least until 12 technology improves, we do need to approach it beyond 13 filtering, which could be both over and underinclusive. 14 For example, one of my staffers emailed a draft 15 of my remarks home with "spam summit" in the subject 16 line and it was caught by her spam filter, and filed 17 along with the rest of the daily diluted spam. The next 18 day she emailed another draft and just labeled this one 19 "summit," again it was caught by a spam filter, but at 20 least it was retrievable. 21 Discussed at length during yesterday's session, 22 several authentication systems do show promise, 23 including both IP-based and signature-based approaches. 24 Market forces appear to be working, but in determining 25 some type of authentication system, or combination of For The Record, Inc. Waldorf, Maryland (301) 870-8025 9 1 systems, we need to ensure balance and flexibility to 2 accommodate various types of users.
Recommended publications
  • DMARC and Email Authentication
    DMARC and Email Authentication Steve Jones Executive Director DMARC.org Cloud & Messaging Day 2016 Tokyo, Japan November 28th, 2016 What is DMARC.org? • DMARC.org is an independent, non-profit advocate for the use of email authentication • Supported by global industry leaders: Sponsors: Supporters: Copyright © 2016 Trusted Domain Project 2 What Does DMARC Do, Briefly? • DMARC allows the domain owner to signal that fraudulent messages using that domain should be blocked • Mailbox providers use DMARC to detect and block fraudulent messages from reaching your customers • Organizations can use DMARC to perform this filtering on incoming messages – helps protect from some kinds of phishing and “wire transfer fraud” email, also known as Business Email Compromise (BEC) • Encourage your partners/vendors to deploy inbound DMARC filtering for protection when receiving messages • More information available at https://dmarc.org Copyright © 2016 Trusted Domain Project 3 Overview Of Presentation •DMARC Adoption •Case Study - Uber •Technical Challenges •Roadmap Copyright © 2016 Trusted Domain Project 4 DMARC Adoption This section will provide an overview of DMARC adoption since it was introduced, globally and within particular country-specific top-level domains. It will also show how the DMARC policies published by top websites has evolved over the past two years. Copyright © 2016 Trusted Domain Project 5 Deployment & Adoption Highlights 2013: • 60% of 3.3Bn global mailboxes, 80% consumers in US protected • Outlook.com users submitted 50% fewer phishing
    [Show full text]
  • The Cio's Guide to Quantum Computing
    THE CIO’S GUIDE TO QUANTUM COMPUTING November 2020 COPYRIGHT ©2020 CBS INTERACTIVE INC. ALL RIGHTS RESERVED. THE CIO’S GUIDE TO QUANTUM COMPUTING TABLE OF CONTENTS 3 Introduction 3 Quantum computers are coming. Get ready for them to change everything 10 Research: Quantum computing will impact the enterprise, despite being misunderstood 12 What is quantum computing? Understanding the how, why and when of quantum computers 23 Quantum computing has arrived, but we still don’t really know what to do with it 26 CIO Jury: How quantum computing will affect the enterprise 28 Quantum computing: Five ways you can get involved 31 Quantum computers could soon reveal all of our secrets. The race is on to stop that happening 36 8 companies leading in quantum computing endeavors in 2020 41 What classic software developers need to know about quantum computing 50 Quantum computing meets cloud computing: D-Wave says its 5,000-qubit system is ready for business 2 COPYRIGHT ©2020 CBS INTERACTIVE INC. ALL RIGHTS RESERVED. THE CIO’S GUIDE TO QUANTUM COMPUTING INTRODUCTION Quantum computers offer great promise for cryptography and optimization problems, and companies like IBM, Google, and D-Wave are racing to make them practical for business use. This special feature from TechRepublic and ZDNet explores what quantum computers will and won’t be able to do and the challenges we still face. QUANTUM COMPUTERS ARE COMING. GET READY FOR THEM TO CHANGE EVERYTHING Quantum computers are not yet creating business value, but CIOs should nonetheless lose no time in getting involved. BY DAPHNE LEPRINCE-RINGUET/ZDNET Supermarket aisles filled with fresh produce are probably not where you would expect to discover some of the first benefits of quantum computing.
    [Show full text]
  • Quantum Computing
    QUANTUM COMPUTING U N D E R S T A N D I N G Q U A N T U M C O M P U T I N G T O P R E P A R E F O R T H E U N E X P E C T E D Y R 0 A 2 U R 0 B E 2 F FEBRUARY 2020 Quantum Computing Understanding quantum computing to prepare for the unexpected Intellectual copyright All Cigref publications are made freely available to the general public but remain protected by the applicable laws on intellectual property. QUANTUM COMPUTING Editorial Just a few years ago, quantum computing was a utopian dream. Today, however, it is beginning to take root in people's minds. It promises to replace the law of Gordon Moore, a cofounder of Intel who predicted that computing capacity would double every year...up to the physical limit of the atom. Atoms are the starting point of quantum computing, which uses nanometric (10-9) resources to solve problems that current computers cannot tackle. The fields of application for quantum computing range from encryption, metrology, optimisation, simulation, data analysis and artificial intelligence, using a future 'universal quantum computer'. Led by several key players like Google, IBM, Microsoft and Atos, the emerging quantum computing ecosystem also includes many start-ups (primarily in North America but in France as well) and is growing. While companies are currently undergoing profound transformations to prepare for and adapt to unexpected technological developments, they cannot ignore the quantum revolution that will undoubtedly shake up IT: first sequential, then parallel, computing will become 'co-occurrent'1 and impact programming, algorithms, applications and computer security, resulting in new use cases.
    [Show full text]
  • Research Report Email Fraud Landscape, Q2 2018
    2018 Q2 Email Fraud Landscape The Fake Email Crisis 6.4 Billion Fake Messages Every Day Email Fraud Landscape, Q2 2018 Executive Summary The crisis of fake email continues. Far from being merely a “social engineering” issue, fake email is a direct result of technical issues with the way email is implemented: It lacks a built-in authentication mechanism making it all too easy to spoof senders. However, this problem is also amenable to a technical solution, starting with the email authentication standards DMARC, SPF, and DKIM. For the purposes of this report, Valimail used proprietary data from our analysis of billions of email message authentication requests, plus our analysis of more than 3 million publicly accessible DMARC and SPF records, to compile a unique view of the email fraud landscape. Now in its third consecutive quarter, our report shows how the fight against fake email is progressing worldwide, in a variety of industry categories. Key Findings • 6.4 billion fake emails (with fake From: addresses) are sent worldwide every day • The United States continues to lead the world as a source of fake email • The rate of DMARC implementation continues to grow in every industry • DMARC enforcement remains a major challenge, with a failure rate of 75-80 percent in every industry • The rate of SPF usage continues to grow in every industry • SPF errors remain a significant problem • The U.S. federal government leads all other sectors in DMARC usage and DMARC enforcement www.valimail.com 2 2018 Q2 Email Fraud Landscape Life on Planet Email Email continues to be a robust, effective medium for communications worldwide, and it is both the last remaining truly open network in wide use as well as the largest digital network, connecting half the planet.
    [Show full text]
  • Quantum in the Cloud: Application Potentials and Research Opportunities
    Quantum in the Cloud: Application Potentials and Research Opportunities Frank Leymann a, Johanna Barzen b, Michael Falkenthal c, Daniel Vietz d, Benjamin Weder e and Karoline Wild f Institute of Architecture of Application Systems, University of Stuttgart, Universitätsstr. 38, Stuttgart, Germany Keywords: Cloud Computing, Quantum Computing, Hybrid Applications. Abstract: Quantum computers are becoming real, and they have the inherent potential to significantly impact many application domains. We sketch the basics about programming quantum computers, showing that quantum programs are typically hybrid consisting of a mixture of classical parts and quantum parts. With the advent of quantum computers in the cloud, the cloud is a fine environment for performing quantum programs. The tool chain available for creating and running such programs is sketched. As an exemplary problem we discuss efforts to implement quantum programs that are hardware independent. A use case from machine learning is outlined. Finally, a collaborative platform for solving problems with quantum computers that is currently under construction is presented. 1 INTRODUCTION Because of this, the overall algorithms are often hybrid. They perform parts on a quantum computer, Quantum computing advanced up to a state that urges other parts on a classical computer. Each part attention to the software community: problems that performed on a quantum computer is fast enough to are hard to solve based on classical (hardware and produce reliable results. The parts executed on a software) technology become tractable in the next classical computer analyze the results, compute new couple of years (National Academies, 2019). parameters for the quantum parts, and pass them on Quantum computers are offered for commercial use to a quantum part.
    [Show full text]
  • God's Good Creation VBS
    GOD’S o s d od worl G the CREATIONGOOD For loved Vacation Bible School Dear Leaders and Friends, Welcome to “God’s Good Creation,” ELCA World Hunger’s vacation Bible school! Helping children learn about hunger, hope and the work to which God calls us in the world is key to ending hunger for good. This program celebrates the gifts that God has created – gifts that can help build a world where all are fed. Working together with all of creation, we can look forward to the future God has promised. The themes for each of the five days of vacation Bible school in this program are drawn from projects supported by gifts to ELCA World Hunger. As you run the program in your congregation, we encourage you to support this work by collecting gifts for ELCA World Hunger. The craft suggestion for the first day – a goat bank – can be a great way to do this! The days are divided into four main sections: a large group opening, “family” time with small groups, rotations of activities and a large group closing. Please feel free to adapt this anyway that you like! In the first pages, you will find a daily overview and a sample schedule, with customizable schedules that you can copy and hand out to group leaders for quick reference. When a large, hungry crowd gathered to hear Jesus, he fed all of them with loaves of bread and fish. Many of us remember how the story ends – with a miraculous banquet – but where it began is important, too: with a small child and the gifts of God’s creation.
    [Show full text]
  • Acid-H1-2021-Report.Pdf
    AGARI CYBER INTELLIGENCE DIVISION REPORT H1 2021 Email Fraud & Identity Deception Trends Global Insights from the Agari Identity Graph™ © Copyright 2021 Agari Data, Inc. Executive Summary Call it a case of locking the back window while leaving the front door wide open. A year into the pandemic and amid successful attacks on GoDaddy1, Magellan Health², and a continuous stream of revelations about the SolarWinds “hack of the decade,” cyber-attackers are proving all too successful at circumventing the elaborate defenses erected against them³. But despite billions spent on perimeter and endpoint security, phishing and business email compromise (BEC) scams continue to be the primary attack vectors into organizations, often giving threat actors the toehold they need to wreak havoc. In addition to nearly $7.5 billion in direct losses each year, advanced email threats like the kind implicated in the SolarWinds case⁴ suggest the price tag could be much higher. As corroborated in this analysis from the Agari Cyber Intelligence Division (ACID), the success of these attacks is growing far less reliant on complex technology than on savvy social engineering ploys that easily evade most of the email defenses in use today. Sophisticated New BEC Actors Signal Serious Consequences Credential phishing accounted for 63% of all phishing attacks during the second half of 2020 as schemes related to COVID-19 gave way to a sharp rise in payroll diversion scams, as well as fraudulent Zoom, Microsoft and Amazon alerts targeting millions of corporate employees working from home. Meanwhile, the state- sponsored operatives behind the SolarWinds hack were just a few of the more sophisticated threat actors moving into vendor email compromise (VEC) and other forms of BEC.
    [Show full text]
  • SECURITY GUIDE with Internet Use on the Rise, Cybercrime Is Big Business
    SECURITY GUIDE With internet use on the rise, cybercrime is big business. Computer savvy hackers and opportunistic spammers are constantly trying to steal or scam money from internet users. PayPal works hard to keep your information secure. We have lots of security measures in place that help protect your personal and financial information. PayPal security key Encryption This provides extra security when When you communicate with Here’s you log in to PayPal and eBay. When PayPal online or on your mobile, how to get you opt for a mobile security key, the information you provide is we’ll SMS you a random 6 digit encrypted. This means it can only a security key code to enter with your password be read by you. A padlock symbol when you log in to your accounts. is displayed on the right side of your 1. Log in to your PayPal You can also buy a credit card sized web browser to let you know you account at device that will generate this code. are viewing a secure web page. www.paypal.com.au Visit our website and click Security to learn more. Automatic timeout period 2. Click Profile then If you’re logged into PayPal and My settings. Website identity verification there’s been no activity for 15 3. Click Get started beside If your web browser supports an minutes, we’ll log you out to help “Security key.” Extended Validation Certificate, the stop anyone from accessing your address bar will turn green when information or transferring funds 4. Click Get security key you’re on PayPal’s site.
    [Show full text]
  • By Dr. Shiva Ghaed
    R O U T E 9 1 H e a l i n g f r o m M a s s V i o l e n c e & T r a u m a b y D r . S h i v a G h a e d Copyright 2018 by Shiva Geneviève Ghaed All Rights Reserved 1 TABLE OF CONTENTS Acknowledgments Prologue 1 150 Minutes of Terror 2 Getting in the Trenches with my Patients 3 Road to Recovery: My Story 4 Road to Recovery: The Community 5 Laying the Groundwork: Dr. G’s Bucket Rules 6 Trauma 411 7 How PTSD Develops 8 Sleep Basics 9 Why Avoidance Makes It Worse 10 Finding New Meaning After Trauma 11 Anxiety and Panic 12 How to Change Unhelpful Thinking 13 Healthy Communication 14 Tips on Managing Nightmares 15 Leading Change by Example 16 Understanding Emotions and De-Coding Anger 17 Why Compassion Matters 18 Intrusive Memories and Catastrophic Thoughts 19 Role of Depression in Trauma 20 Grief and Loss 21 Cumulative Trauma 22 The Lessons We Have Learned 23 Final Thoughts 2 ACKNOWLEDGEMENTS I would like to thank my parents for teaching me the value of public service and community involvement, my sister for staying with me in cyberspace through a terrifying night, and all my friends and family for their unconditional support. The following people also merit mention for their support of the Route 91 community. The world is a better place because of you: Gary Martin and Mike Stack, managers of InCahoots in San Diego, CA – without your generosity we would not have had a place to come together and heal.
    [Show full text]
  • Additional Karaoke Listings Updated February 2021! 1
    Artist Song Title 1975 Chocolate 1975, The Sincerity is Scary 5 Seconds of Summer Want you back 5 Seconds of Summer Easier ACDC Big Balls Adele All I Ask Adele Cold Shoulder Adele Melt My Heart to Stone Adele Million Years Ago Adele Sweetest Devotion Adele Hello Adele I Can't Make You Love Me Adele Love in The Dark Adele One and Only Adele Send My Love to Your New Lover Adele Take It All Adele When We Were Young Adele Remedy Adele Love Song Afroman Colt 45 AJR Burn the House Down Alabama Angels Among us Alabama Forty Hour Week Alabama Roll on Eighteen Wheeler Alabama Lady down on love Alaina, Lauren Road Less Traveled Alaina, Lauren Wings of an Angel Alaina, Lauren Ladies in the 90s Alaina, Lauren Getting Good Alaina, Lauren Other Side, The Aldean, Jason Tattoos on this town ADDITIONAL KARAOKE LISTINGS UPDATED FEBRUARY 2021! 1 Aldean, Jason Just Getting Started Aldean, Jason Lights Come On Aldean, Jason Little More Summertime, A Aldean, Jason This Plane Don't Go There Aldean, Jason Tonight Looks Good On You Aldean, Jason Gettin Warmed up Aldean, Jason Truth, The Aldean, Jason You make it easy Aldean, Jason Girl Like you Aldean, Jason Camouflage Hat Aldean, Jason We Back Aldean, Jason Rearview Town Aldean, Jason & Miranda Lambert Drowns The Whiskey Alice in Chains Man In The Box Alice in Chains No Excuses Alice in Chains Your Decision Alice in Chains Nutshell Alice in Chains Rooster Allan, Gary Every Storm (Runs Out of Rain) Allan, Gary Runaway Allen, Jimmie Best shot Anderson, John Swingin' Andress, Ingrid Lady Like Andress, Ingrid More Hearts Than Mine Angels and Airwaves Kiss & Tell Angston, Jon When it comes to loving you Animals, The Bring It On Home To Me Arctic Monkeys Do I Wanna Know Ariana Grande Breathin Arthur, James Say You Won't Let Go Arthur, James Naked Arthur, James Empty Space ADDITIONAL KARAOKE LISTINGS UPDATED FEBRUARY 2021! 2 Arthur, James Falling like the stars Arthur, James & Anne Marie Rewrite the Stars Arthur, James & Anne Marie Rewrite The Stars Ashanti Happy Ashanti Helpless (ft.
    [Show full text]
  • IGP® / VGL Emulation Code V™ Graphics Language Programmer's Reference Manual Line Matrix Series Printers
    IGP® / VGL Emulation Code V™ Graphics Language Programmer’s Reference Manual Line Matrix Series Printers Trademark Acknowledgements IBM and IBM PC are registered trademarks of the International Business Machines Corp. HP and PCL are registered trademarks of Hewlett-Packard Company. IGP, LinePrinter Plus, PSA, and Printronix are registered trademarks of Printronix, LLC. QMS is a registered trademark and Code V is a trademark of Quality Micro Systems, Inc. CSA is a registered certification mark of the Canadian Standards Association. TUV is a registered certification mark of TUV Rheinland of North America, Inc. UL is a registered certification mark of Underwriters Laboratories, Inc. This product uses Intellifont Scalable typefaces and Intellifont technology. Intellifont is a registered trademark of Agfa Division, Miles Incorporated (Agfa). CG Triumvirate are trademarks of Agfa Division, Miles Incorporated (Agfa). CG Times, based on Times New Roman under license from The Monotype Corporation Plc is a product of Agfa. Printronix, LLC. makes no representations or warranties of any kind regarding this material, including, but not limited to, implied warranties of merchantability and fitness for a particular purpose. Printronix, LLC. shall not be held responsible for errors contained herein or any omissions from this material or for any damages, whether direct, indirect, incidental or consequential, in connection with the furnishing, distribution, performance or use of this material. The information in this manual is subject to change without notice. This document contains proprietary information protected by copyright. No part of this document may be reproduced, copied, translated or incorporated in any other material in any form or by any means, whether manual, graphic, electronic, mechanical or otherwise, without the prior written consent of Printronix, LLC.
    [Show full text]
  • BP108: Be Open - Use Webservices and REST in Xpages
    BP108: Be Open - Use WebServices and REST in XPages Bernd Hort, assono GmbH Agenda ▪ Introduction / Motivation ▪ Consume Web Services from Java ▪ Consume RESTful Web Services from Java ▪ Consume Web Services from JavaScript ▪ Consume RESTful Web Services from JavaScript ▪ dojo Controls ▪ Questions and Answers INTRODUCTION / MOTIVATION Bernd Hort assono GmbH ▪ IBM® Notes® Developer/Designer since Notes 3.3 ▪ OpenNTF Contributer: assono Framework 2 ▪ An OOP LotusScript Framework ▪ Lately specialized in XPages development ▪ Working for assono GmbH, Germany ▪ Blog http://blog.assono.de ▪ Twitter @BerndHort Language Internet Independent Social Be Application Programming Standard Open Interface API RemoteSystems CONSUME WEB SERVICES FROM JAVA Web Services in a Nutshell ▪ Communication between two maschines ▪ Web Service Consumer and Web Service Provider ▪ Over a netwok ▪ Mostly using HTTP ▪ Data encoded as XML ▪ Messages transfered in SOAP envelops ▪ Specified by the World Wide Web Consortium (W3C) ▪ Definition of a Web Service in WSDL ▪ Web Service Description Language Consume Web Services in Java ▪ Java EE 6 has built-in classes to consume Web Services: Java API for XML Web Services (JAX-WS) ▪ The Apache project CXF provides a tool to generate Java files from a WSDL file wsdl2java ▪ The generated Java classes maps through Java Annotations the Web Service actions to Java methods using Java Architecture for XML Binding - JAXB ▪ XPages runtime builds on Java EE 6 Apache CXF – wsdl2java ▪ Download CXF from the Apache project site ▪ Download the wsdl file from the remote system or access it directly from the remote system ▪ Call the wsdl2java.bat file with the following parameters -client To generate a sample Java class calling the Web Service -exsh true Enables or disables processing of implicit SOAP headers (i.e.
    [Show full text]