Draft Transcript Day1.Pdf (461.92

Total Page:16

File Type:pdf, Size:1020Kb

Draft Transcript Day1.Pdf (461.92 1 1 FEDERAL TRADE COMMISSION 2 I N D E X 3 4 PAGE: 5 6 Introduction by Ms. Chriss 3 7 8 Remarks of Chairman Majoras 4 9 10 Defining the Problem 14 11 12 Evolving Methods for Sending Spam 13 and Malware 79 14 15 Uncovering the Malware Economy 150 16 17 Emerging Threats 211 18 19 20 21 22 23 24 25 For The Record, Inc. (301) 870-8025 - www.ftrinc.net - (800) 921-5555 2 1 2 3 4 5 6 FTC SPAM SUMMIT: 7 8 THE NEXT GENERATION OF THREATS AND SOLUTIONS 9 10 11 12 FEDERAL TRADE COMMISSION 13 601 NEW JERSEY AVENUE, N.W. 14 WASHINGTON, D.C. 15 16 17 18 DAY 1 19 WEDNESDAY, JULY 11, 2007 20 21 22 23 24 25 For The Record, Inc. (301) 870-8025 - www.ftrinc.net - (800) 921-5555 3 1 P R O C E E D I N G S 2 - - - - - 3 WELCOME 4 MS. CHRISS: Good morning, everyone. Hi there. 5 Please take your seats, we are about to begin. This is 6 it. Spam Summit, the Next Generation of Threats and 7 Solutions. I am so pleased and delighted to see all of 8 you here. This is wonderful. I see that we are going 9 to have some very good debate, just by the faces in the 10 audience. I recognize a lot of you from our past 11 events. So, thank you for being here. 12 Before we get started, I do have a few 13 housekeeping announcements. So, let's just get through 14 them. If you have a cell phone, or any other noise 15 maker, just turn it off. Just turn it off now. It is a 16 good time to turn it off. Otherwise, there's a risk, 17 you could receive spam from us if you don't, so turn it 18 off. Turn it off. 19 The other thing is, we are a Federal Government 20 agency and we do practice certain safety measures. If 21 there is an emergency, and that is very unlikely, you 22 have two exits, the way you came in, and then out 23 through the hallway and straight back. We also practice 24 something called shelter in place. If that happens, you 25 will go into the hallway and wait for further For The Record, Inc. (301) 870-8025 - www.ftrinc.net - (800) 921-5555 4 1 instructions. 2 This is the meat of the matter: You, the 3 audience, are so integral to this, so I want to tell you 4 the three ways you have to participate. We will have a 5 roaming microphone at the end of each panel, so wait for 6 the mic, state your name and your affiliation and go for 7 it. The other way, if you're out there in webcast land, 8 you can email us at [email protected], and you can also 9 use your question note cards if you are in the room and 10 they will be provided to the moderators. So, we want to 11 hear from you. 12 Now, without further delay, I would like to 13 introduce our chairman. She is a leader in this 14 technology arena, and she has been so incredibly 15 supportive of all of our consumer protection efforts in 16 this area, and I'm so pleased to introduce, without 17 further ado, Chairman Deborah Platt Majoras. 18 (Applause.) 19 OPENING REMARKS BY CHAIRMAN MAJORAS 20 CHAIRMAN MAJORAS: Well, thank you. Wow, we 21 don't usually have a stage. Thank you so very much, 22 Sana, and thanks to you and your team for all the great 23 work putting this together. Welcome to everyone here. 24 I'm particularly grateful to all of our very 25 distinguished panelists for joining us for the next two For The Record, Inc. (301) 870-8025 - www.ftrinc.net - (800) 921-5555 5 1 days. 2 In 1971, C. P. Snow, noted British author and 3 commentator on science and technology issues, said of 4 technology, "It brings you great gifts with one hand, 5 and it stabs you in the back with the other." Although 6 spam was known only as lunch meat, mystery meat, I don't 7 know, back in 1971 when he said this, his quote is 8 really spot-on with respect to email and spam. 9 Email technology has brought us great gifts in 10 the form of quick, efficient, ubiquitous communication, 11 but it's also brought us spam, which has the potential 12 to metaphorically stab us in the back by inundating 13 consumers' inboxes with unwanted email, facilitating 14 fraud and malware and frankly betraying consumers' trust 15 and confidence in the Internet and the electronic world. 16 In 2003, the FTC convened a spam forum to 17 discuss the technical, legal and financial issues 18 associated with spam. Now, today and tomorrow, in a 19 continuing effort to stay apprised of developments, we 20 want to explore the next generation of spam threats and 21 solutions. 22 The volume of unsolicited emails being reported 23 by email filtering companies is rising, creating 24 significant costs for businesses and consumers alike. 25 Botnets, the networks of hijacked personal computers For The Record, Inc. (301) 870-8025 - www.ftrinc.net - (800) 921-5555 6 1 that spammers are using to conceal their identities, has 2 become the preferred method for sending spam. Even more 3 troubling, spam reaching consumers' inboxes is more 4 often being used to launch phishing attacks and to 5 deliver malicious code or malware to consumers' 6 computers. 7 This new generation of malicious spam goes 8 beyond mere annoyance. It can result in significant 9 harm to consumers and undermine the stability of the 10 Internet and of email in particular. 11 If you click on a link in an email message, you 12 may be lured to a website that will either trick you 13 into you divulging your personally identifying 14 information, or infect your computer with spyware or 15 other types of malware. Even merely opening a malicious 16 email can subject you to harm. The surreptitious 17 development of such malware can result in slow computer 18 performance at a minimum. Installation of key logger 19 software that can record and then report on your every 20 key stroke. The spread of computer viruses, and the 21 hijacking of your computer for use as a botnet. 22 In addition, new threats to communication media 23 other than email are knocking on the door. Spam's 24 cousins, spim, which is spam over instant messaging, 25 spit, spam over Internet telephony -- spam to mobile For The Record, Inc. (301) 870-8025 - www.ftrinc.net - (800) 921-5555 7 1 devices threaten to undermine the benefits of mogul 2 services and Internet telephony in the same way as spam. 3 Social networking websites have become yet 4 another frontier for spam messages. The lessons we've 5 learned and continue to learn from spam, thus, are going 6 to be valuable as we address, or even better, try to 7 avoid similar problems in these other communications 8 technologies. 9 Now, we have to work to combat malicious spam in 10 several ways, and the first is through law enforcement. 11 We cannot permit the electronic frontier to become a 12 lawless world. The FTC has engaged in aggressive law 13 enforcement to combat spam, and since 1997, we have 14 aggressively pursued deceptive and unfair practices 15 perpetrated through spam in 89 law enforcement actions 16 against 142 individuals and 99 companies, with 26 of the 17 cases filed after Congress enacted the CAN-SPAM Act in 18 late 2003. 19 For example, in one recent case, FTC versus 20 Dugger, the FTC sought to stop the underlying use of 21 botnets to send spam. We allege that the defendants 22 relayed sexually explicit commercial emails through 23 other people's home computers without their knowledge or 24 consent, in violation of the CAN-SPAM Act, and under the 25 final order obtained in the case, these defendants are For The Record, Inc. (301) 870-8025 - www.ftrinc.net - (800) 921-5555 8 1 banned from continuing to violate the Act and they are 2 to turn over all of their ill-gotten gains. 3 Of course, malicious spam can also be used as a 4 means to disseminate spyware or other malware that 5 causes the same problems and the FTC has been actively 6 pursuing spyware companies using our authority under 7 Section 5 of the FTC Act, and we have brought about a 8 dozen law enforcement actions in the past two years. 9 In most instances, though, the acts of malicious 10 spammers are criminal. Criminal law enforcement 11 agencies are best suited to expertly shut down those 12 operations. So, for example, in June, the FBI and the 13 Department of Justice announced a crackdown on botnets 14 and those who control them. As part of this operation, 15 the FBI and DOJ identified more than one million 16 personal computers infected with malware that attack 17 them to be hijacked and used as a part an army of bots 18 to allow other computers to send malware and send spam. 19 Today the crackdown has noted three arrests: 20 Robert Soloway who allegedly sold spam kits and botnets 21 for spamming; James Brewer who allegedly compromised 22 more than 10,000 PCs around the world; and Jason Downey, 23 who allegedly ran a botnet used to conduct distributed 24 denial of service, DDoS attacks.
Recommended publications
  • IGP® / VGL Emulation Code V™ Graphics Language Programmer's Reference Manual Line Matrix Series Printers
    IGP® / VGL Emulation Code V™ Graphics Language Programmer’s Reference Manual Line Matrix Series Printers Trademark Acknowledgements IBM and IBM PC are registered trademarks of the International Business Machines Corp. HP and PCL are registered trademarks of Hewlett-Packard Company. IGP, LinePrinter Plus, PSA, and Printronix are registered trademarks of Printronix, LLC. QMS is a registered trademark and Code V is a trademark of Quality Micro Systems, Inc. CSA is a registered certification mark of the Canadian Standards Association. TUV is a registered certification mark of TUV Rheinland of North America, Inc. UL is a registered certification mark of Underwriters Laboratories, Inc. This product uses Intellifont Scalable typefaces and Intellifont technology. Intellifont is a registered trademark of Agfa Division, Miles Incorporated (Agfa). CG Triumvirate are trademarks of Agfa Division, Miles Incorporated (Agfa). CG Times, based on Times New Roman under license from The Monotype Corporation Plc is a product of Agfa. Printronix, LLC. makes no representations or warranties of any kind regarding this material, including, but not limited to, implied warranties of merchantability and fitness for a particular purpose. Printronix, LLC. shall not be held responsible for errors contained herein or any omissions from this material or for any damages, whether direct, indirect, incidental or consequential, in connection with the furnishing, distribution, performance or use of this material. The information in this manual is subject to change without notice. This document contains proprietary information protected by copyright. No part of this document may be reproduced, copied, translated or incorporated in any other material in any form or by any means, whether manual, graphic, electronic, mechanical or otherwise, without the prior written consent of Printronix, LLC.
    [Show full text]
  • BP108: Be Open - Use Webservices and REST in Xpages
    BP108: Be Open - Use WebServices and REST in XPages Bernd Hort, assono GmbH Agenda ▪ Introduction / Motivation ▪ Consume Web Services from Java ▪ Consume RESTful Web Services from Java ▪ Consume Web Services from JavaScript ▪ Consume RESTful Web Services from JavaScript ▪ dojo Controls ▪ Questions and Answers INTRODUCTION / MOTIVATION Bernd Hort assono GmbH ▪ IBM® Notes® Developer/Designer since Notes 3.3 ▪ OpenNTF Contributer: assono Framework 2 ▪ An OOP LotusScript Framework ▪ Lately specialized in XPages development ▪ Working for assono GmbH, Germany ▪ Blog http://blog.assono.de ▪ Twitter @BerndHort Language Internet Independent Social Be Application Programming Standard Open Interface API RemoteSystems CONSUME WEB SERVICES FROM JAVA Web Services in a Nutshell ▪ Communication between two maschines ▪ Web Service Consumer and Web Service Provider ▪ Over a netwok ▪ Mostly using HTTP ▪ Data encoded as XML ▪ Messages transfered in SOAP envelops ▪ Specified by the World Wide Web Consortium (W3C) ▪ Definition of a Web Service in WSDL ▪ Web Service Description Language Consume Web Services in Java ▪ Java EE 6 has built-in classes to consume Web Services: Java API for XML Web Services (JAX-WS) ▪ The Apache project CXF provides a tool to generate Java files from a WSDL file wsdl2java ▪ The generated Java classes maps through Java Annotations the Web Service actions to Java methods using Java Architecture for XML Binding - JAXB ▪ XPages runtime builds on Java EE 6 Apache CXF – wsdl2java ▪ Download CXF from the Apache project site ▪ Download the wsdl file from the remote system or access it directly from the remote system ▪ Call the wsdl2java.bat file with the following parameters -client To generate a sample Java class calling the Web Service -exsh true Enables or disables processing of implicit SOAP headers (i.e.
    [Show full text]
  • Linking USDA Nutrition Databases to IRI Household-Based and Store-Based Scanner Data, TB-1952, U.S
    Uniteited Sd Staates Ds Depaarrttmmeent of Af Aggricuultuuree Economic Research Linking USDA Nutrition Databases to IRI Service Household-Based and Store-Store-BasedBased Technical Bulletin Number 1952 Scanner Data March 2019 Andrea C. Carlson, Elina Tselepidakis Page, Thea Palmer Zimmerman, Carina E. Tornow, and Sigurd Hermansen United States Department of Agriculture Economic Research Service www.ers.usda.gov Recommended citation format for this publication: Andrea C. Carlson, Elina Tselepidakis Page, Thea Palmer Zimmerman, Carina E. Tornow, and Sigurd Hermansen. Linking USDA Nutrition Databases to IRI Household-Based and Store-Based Scanner Data, TB-1952, U.S. Department of Agriculture, Economic Research Service, March 2019. Cover image: Getty images. Use of commercial and trade names does not imply approval or constitute endorsement by USDA. To ensure the quality of its research reports and satisfy governmentwide standards, ERS requires that all research reports with substantively new material be reviewed by qualified technical research peers. This technical peer review process, coordinated by ERS' Peer Review Coordinating Council, allows experts who possess the technical background, perspective, and expertise to provide an objective and meaningful assessment of the output’s substantive content and clarity of communication during the publication’s review. In accordance with Federal civil rights law and U.S. Department of Agriculture (USDA) civil rights regulations and policies, the USDA, its Agencies, offices, and employees, and institutions participating in or administering USDA programs are prohibited from discriminating based on race, color, national origin, religion, sex, gender identity (including gender expression), sexual orientation, disability, age, marital status, family/parental status, income derived from a public assistance program, political beliefs, or reprisal or retaliation for prior civil rights activity, in any program or activity conducted or funded by USDA (not all bases apply to all programs).
    [Show full text]
  • Secure Email Gateway - Market Quadrant 2016 ∗
    . The Radicati Group, Inc. Palo Alto, CA 94301 . Phone: (650) 322-8059 . www.radicati.com . THE RADICATI GROUP, INC. Secure Email Gateway - Market Quadrant 2016 ∗ ......... An Analysis of the Market for Secure Email Gateway Solutions, Revealing Top Players, Trail Blazers, Specialists and Mature Players. November 2016 SM ∗ Radicati Market Quadrant is copyrighted November 2016 by The Radicati Group, Inc. Reproduction in whole or in part is prohibited without expressed written permission of the Radicati Group. Vendors and products depicted in Radicati Market QuadrantsSM should not be considered an endorsement, but rather a measure of The Radicati Group’s opinion, based on product reviews, primary research studies, vendor interviews, historical data, and other metrics. The Radicati Group intends its Market Quadrants to be one of many information sources that readers use to form opinions and make decisions. Radicati Market QuadrantsSM are time sensitive, designed to depict the landscape of a particular market at a given point in time. The Radicati Group disclaims all warranties as to the accuracy or completeness of such information. The Radicati Group shall have no liability for errors, omissions, or inadequacies in the information contained herein or for interpretations thereof. Secure Email Gateway - Market Quadrant 2016 TABLE OF CONTENTS RADICATI MARKET QUADRANTS EXPLAINED .................................................................................. 2 MARKET SEGMENTATION – SECURE EMAIL GATEWAYS .................................................................
    [Show full text]
  • Sejarah Perkembangan Dan Kemajuan the International Bussines Machines
    SEJARAH PERKEMBANGAN DAN KEMAJUAN THE INTERNATIONAL BUSSINES MACHINES Oleh : ANGGARA WISNU PUTRA 1211011018 CIPTA AJENG PRATIWI 1211011034 DERI KURNIAWAN 1211011040 FEBY GIPANTIUS ZAMA 1211011062 NOVITA LIANA SARI 1211011118 RAMA AGUSTINA 1211011128 FAKULTAS EKONOMI DAN BISNIS UNIVERSITAS LAMPUNG BANDAR LAMPUNG 2014 BAB II PEMBAHASAN 2.1 Sejarah berdirinya THE INTERNATIONAL BUSSINES MACHINES (IBM) 1880—1929 Pada tahun 1880-an, beberapa teknologi yang akan menjadi bisnis IBM ditemukan. Julius E. Pitrap menemukan timbangan komputer pada tahun 1885. Alexander Dey menemukan dial recorder tahun 1888. Herman Hollerith menemukan Electric Tabulating Machine 1989 dan pada tahun yang sama Williard Bundy menemukan alat untuk mengukur waktu kerja karyawan. Pada 16 Juni 1911, teknologi-teknologi tersebut dan perusahaan yang memilikinya digabungkan oleh Charles Ranlett Flint dan membentuk Computing Tabulating Recording Company (CTR). Perusahaan yang berbasis di New York ini memiliki 1.300 karyawan dan area perkantoran serta pabrik di Endicott dan Binghamton, New York; Dayton, Ohio; Detroit, Michigan; Washington, D.C.; dan Toronto, Ontario. CTR memproduksi dan menjual berbagai macam jenis mesin mulai dari timbangan komersial hingga pengukur waktu kerja. Pada tahun 1914, Flint merekrut Thomas J. Watson, Sr., dari National Cash Register Company, untuk membantunya memimpin perusahaan. Watson menciptakan slogan, ―THINK‖, yang segera menjadi mantra bagi karyawan CTR. Dalam waktu 11 bulan setelah bergabung, Watson menjadi presiden dari CTR. Perusahaan memfokuskan diri pada penyediaan solusi penghitungan dalam skala besar untuk bisnis. Selama empat tahun pertama kepemimpinannya, Watson sukses meningkatkan pendapatan hingga lebih dari dua kali lipat dan mencapai $9 juta. Ia juga sukses mengembangkan sayap ke Eropa, Amerika Selatan, Asia, dan Australia. Pada 14 Februari 1924, CTR berganti nama menjadi International Business Machines Corporation (IBM).
    [Show full text]
  • Account Administrator's Guide
    ePrism Email Security Account Administrator’s Guide - V10.4 4225 Executive Sq, Ste 1600 Give us a call: Send us an email: For more info, visit us at: La Jolla, CA 92037-1487 1-800-782-3762 [email protected] www.edgewave.com © 2001—2016 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks are hereby acknowledged. Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Other product and company names mentioned herein may be the trademarks of their respective owners. The Email Security software and its documentation are copyrighted materials. Law prohibits making unauthorized copies. No part of this software or documentation may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into another language without prior permission of EdgeWave. 10.4 Contents Chapter 1 Overview 1 Overview of Services 1 Email Filtering (EMF) 2 Archive 3 Continuity 3 Encryption 4 Data Loss Protection (DLP) 4 Personal Health Information 4 Personal Financial Information 5 Document Conventions 6 Other Conventions 6 Supported Browsers 7 Reporting Spam to EdgeWave 7 Contacting Us 7 Additional Resources 7 Chapter 2 Portal Overview 8 Navigation Tree 9 Work Area 10 Navigation Icons 10 Getting Started 11 Logging into the portal for the first time 11 Logging into the portal after registration 12 Changing Your Personal Information 12 Configuring Accounts 12 Chapter 3 EdgeWave Administrator
    [Show full text]
  • Barcodes and Rfids
    Barcodes and RFIDs Martin Dodge and Rob Kitchin For: Globalization in Practice (edited by Nigel Thrift, Adam Tickell and Steve Woolgar) Introduction One of the key phenomena of the globalization of commerce has been the internationalisation of goods and brands. A set of diverse practices and processes, including the transformation of transport infrastructure and logistics and the virtualisation of money, have enabled both producers (e.g., goods manufacturers) and sellers (e.g., wholesalers, supermarkets) to massively extend supply chains, to globally expand their markets, and to increase their turnover and profits. A key technology in improving the efficiency and productivity of logistical organisation and operation has been development of sophisticated identification systems that overcome the anonymity of manufactured products by assigning unique numerical identifiers – digital thumbprints - to material products. These identification systems allow products to be effectively and unambiguously processed, shipped and traced through complex logistical networks, to monitor sales, aid account management, refine supply chains and inform marketing strategies. Conceptually they have two distinct components, first an agreed allocation of unique id code numbers and, second, an agreed media to physical store the code. The most obvious manifestation of this technology for product identification and tracking are the parallel black and white printed stripes of barcodes. Barcodes Barcodes, visible on nearly all, retail products are the physical manifestation of UPCs (Universal Product Code) – a code that uniquely identifies a product regardless of location or language. The original UPC concept can be traced back to 1940s, but gained widespread acceptance and usage in the 1970s with the development of a UPC standard by a group of U.S.
    [Show full text]
  • IBM Infosphere
    Software Steve Mills Senior Vice President and Group Executive Software Group Software Performance A Decade of Growth Revenue + $3.2B Grew revenue 1.7X and profit 2.9X + $5.6B expanding margins 13 points $18.2B$18.2B $21.4B$21.4B #1 Middleware Market Leader * $12.6B$12.6B Increased Key Branded Middleware 2000 2006 2009 from 38% to 59% of Software revenues Acquired 60+ companies Pre-Tax Income 34% Increased number of development labs Margin globally from 15 to 42 27% 7 pts Margin 2010 Roadmap Performance Segment PTI Growth Model 12% - 15% $8.1B$8.1B 21% 6 pts • Grew PTI to $8B at a 14% CGR Margin • Expanded PTI Margin by 7 points $5.5B$5.5B $2.8B$2.8B ’00–’06’00–’06 ’06–’09’06–’09 Launched high growth initiatives CGRCGR CGRCGR 12%12% 14%14% • Smarter Planet solutions 2000 2006 2009 • Business Analytics & Optimization GAAP View © 2010 International Business Machines Corporation * Source: IBM Market Insights 04/20/10 Software Will Help Deliver IBM’s 2015 Roadmap IBM Roadmap to 2015 Base Growth Future Operating Portfolio Revenue Acquisitions Leverage Mix Growth Initiatives Continue to drive growth and share gain Accelerate shift to higher value middleware Capitalize on market opportunity * business • Middleware opportunity growth of 5% CGR Invest for growth – High growth products growing 2X faster than rest of • Developer population = 33K middleware Extend Global Reach – Growth markets growing 2X faster than major markets • 42 global development labs with skills in 31 – BAO opportunity growth of 7% countries Acquisitions to extend
    [Show full text]
  • Tips for Marketing Fresh Produce to Retail Grocers: Using PLU and UPC Codes a Guide for Producers
    Working with Local Fresh Produce in Retail Settings Tips for Marketing Fresh Produce to Retail Grocers: Using PLU and UPC Codes A Guide for Producers What is a PLU? What is a UPC? PLU and UPC codes help retailers identify or scan your product into their cash register system. Being knowledgeable about the differences in these labels in advance of approaching a retailer may help you get your foot in the door. These codes are not only a necessity for some retailers, but also a marketing tool for your farm, because they carry information about your farm and products along the supply chain. This informational sheet contains information adapted from the Produce Marketing Association. NC Growing Together, a CEFS-led initiative, is funded by the United States Department of Agriculture, National Institute of Food and Agriculture, grant #2012-68004-20363 www.ncgrowingtogether.org PLU and UPC Codes PLU Codes_________________________________________________________________ A PLU code, or price look up code, is a 4 or 5 digit code that is unique to a particular produce item; based upon the commodity, the variety and the size group; and will typically appear on a small sticker that is applied to the individual piece of fresh produce. These codes are standard across the produce industry and in all retail grocers. They help cashiers identify the variety and therefore the price of a product. For example, a hydroponic/greenhouse tomato has the PLU 4799, while a slicing tomato has the PLU 4805. The retailer may charge $2.99 per lb for a hydroponic, but $1.49 per lb for a slicing tomato.
    [Show full text]
  • Index Images Download 2006 News Crack Serial Warez Full 12 Contact
    index images download 2006 news crack serial warez full 12 contact about search spacer privacy 11 logo blog new 10 cgi-bin faq rss home img default 2005 products sitemap archives 1 09 links 01 08 06 2 07 login articles support 05 keygen article 04 03 help events archive 02 register en forum software downloads 3 security 13 category 4 content 14 main 15 press media templates services icons resources info profile 16 2004 18 docs contactus files features html 20 21 5 22 page 6 misc 19 partners 24 terms 2007 23 17 i 27 top 26 9 legal 30 banners xml 29 28 7 tools projects 25 0 user feed themes linux forums jobs business 8 video email books banner reviews view graphics research feedback pdf print ads modules 2003 company blank pub games copyright common site comments people aboutus product sports logos buttons english story image uploads 31 subscribe blogs atom gallery newsletter stats careers music pages publications technology calendar stories photos papers community data history arrow submit www s web library wiki header education go internet b in advertise spam a nav mail users Images members topics disclaimer store clear feeds c awards 2002 Default general pics dir signup solutions map News public doc de weblog index2 shop contacts fr homepage travel button pixel list viewtopic documents overview tips adclick contact_us movies wp-content catalog us p staff hardware wireless global screenshots apps online version directory mobile other advertising tech welcome admin t policy faqs link 2001 training releases space member static join health
    [Show full text]
  • WR Bulletin Vol 10 Issue #02 28-Jan-09
    The Wainhouse Research Bulletin NEWS AND VIEWS ON REAL-TIME UNIFIED COMMUNICATIONS As always, please feel free to forward this newsletter to your colleagues. To be added to our FREE automated email distribution list, simply visit www.wainhouse.com/bulletin. Andrew W. Davis, [email protected] Lotusphere 2009 Highlights WR analysts Andy Nilssen and Brent Kelly carried the Wainhouse Research banner at the Lotusphere 2009 conference held in Orlando January 18 – January 22. One surprising tidbit was that attendance for the 7,000+ end users attending the event was up 2% over last year, which correlates with our recent WRB survey that spending in conferencing and collaboration, and IT in general is expected to be slightly UP over 2008 levels in spite of the current economic difficulties. IBM Lotus and its partners made many announcements including: ¾ LotusLive (www.lotuslive.com), a cloud-based portfolio of social networking and collaboration services designed for business. For those familiar with Bluehouse, IBM’s year-long beta of its services offering, LotusLive is the resulting commercial version. The current quick services list includes IM/Presence (think Sametime), web conferencing (Unyte), colleague networking (think Connections), activities (to-do lists, project tracking), file repository (with access control, revision tracking); email will be added shortly (based in part on IBM’s recent acquisition of Outblaze). Proving that LotusLive is going to be more than just what Lotus can muster (and, it turns out, to help get the word out as well) Lotus also announced LotusLive will integrate with the service offerings from LinkedIn (people search), Skype (VoIP & video conferencing), and Salesforce.com – offerings that touch over 400 million users today.
    [Show full text]
  • Spam: History, Perceptions, Solutions
    Spam: History, Perceptions, Solutions Report written by Geneviève Reed and submitted to Industry Canada, Office of Consumer Affairs 2004 Spam: History, Perceptions and Solutions OPTION CONSOMMATEURS MISSION Option consommateurs is a nonprofit association whose mission is to defend and promote consumers’ rights by assisting them both individually and collectively, by providing them with information, and by advocating on their behalf to decision-makers. HISTORY The association has existed since 1983. In 1999, it merged with the Association des consommateurs du Québec (ACQ), an organization with a 50-year history and a mission similar to that of Option consommateurs. PRINCIPAL ACTIVITIES Option consommateurs’s staff of 20 are grouped into four departments: the Budgeting Department, the Legal Affairs Department, the Media Relations Department, and the Research and Representation Department. Over the years, Option consommateurs has developed expertise in the areas of financial services, health, agri-food, energy, travel, access to justice, trade practices, indebtedness, and protection of privacy. Each year, we reach 7,000–10,000 consumers directly and many more through our extensive media coverage. We participate in working groups and sit on boards of directors, carry out large-scale projects with important partners, and produce research reports, policy papers, buyer’s guides, and a consumer information and action magazine called Consommation. MEMBERSHIP Option consommateurs pursues a variety of activities aimed at making change, including research, class-action lawsuits, and lobbying of public- and private-sector bodies. You can help us do more for you by becoming a member of Option consommateurs at www.option-consommateurs.org. Report by Option consommateurs, 2004 ii Spam: History, Perceptions and Solutions ACKNOWLEDGMENTS This research report was written by Geneviève Reed, Director of Research and Representation, Option consommateurs, with the support of Annie Hudon, attorney, for the legislative analysis section.
    [Show full text]