IBM Sametime 9 Reviewer's Guide
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
DETECTING BOTS in INTERNET CHAT by SRITI KUMAR Under The
DETECTING BOTS IN INTERNET CHAT by SRITI KUMAR (Under the Direction of Kang Li) ABSTRACT Internet chat is a real-time communication tool that allows on-line users to communicate via text in virtual spaces, called chat rooms or channels. The abuse of Internet chat by bots also known as chat bots/chatterbots poses a serious threat to the users and quality of service. Chat bots target popular chat networks to distribute spam and malware. We first collect data from a large commercial chat network and then conduct a series of analysis. While analyzing the data, different patterns were detected which represented different bot behaviors. Based on the analysis on the dataset, we proposed a classification system with three main components (1) content- based classifiers (2) machine learning classifier (3) communicator. All three components of the system complement each other in detecting bots. Evaluation of the system has shown some measured success in detecting bots in both log-based dataset and in live chat rooms. INDEX WORDS: Yahoo! Chat room, Chat Bots, ChatterBots, SPAM, YMSG DETECTING BOTS IN INTERNET CHAT by SRITI KUMAR B.E., Visveswariah Technological University, India, 2006 A Thesis Submitted to the Graduate Faculty of The University of Georgia in Partial Fulfillment of the Requirements for the Degree MASTER OF SCIENCE ATHENS, GEORGIA 2010 © 2010 Sriti Kumar All Rights Reserved DETECTING BOTS IN INTERNET CHAT by SRITI KUMAR Major Professor: Kang Li Committee: Lakshmish Ramaxwamy Prashant Doshi Electronic Version Approved: Maureen Grasso Dean of the Graduate School The University of Georgia December 2010 DEDICATION I would like to dedicate my work to my mother to be patient with me, my father for never questioning me, my brother for his constant guidance and above all for their unconditional love. -
OS/2 Warp Catalogue
The OS/2 Software Source: www.xeu.com/blueware/ The OS/2 Warp Catalogue The Hottest Java The Strongest Platform The OS/2 Warp Catalogue In This Catalogue Anti-virus .......................................... 4 Backup .............................................. 4 It’s Java Time CD-ROMs ........................................ 4 Communications ........................ 6 Just when you thought that OS/2 was on its way back, it is receiving a strong Database Management .......... 9 infusion from Java and the internet. Development Tools ................ 10 As Dr. Michael Cowpland, president and CEO of Corel Disk Compression .................. 14 Corporation put it: “This platform is indeed one of the Games & Entertainment ..... 19 OS/2 Warp: best operating system solutions in which to run The Hottest Corel Office for Java (http://officeforjava.corel.com/), Graphics & Multimedia ........ 20 a suite of applications that is setting the standard for The Operating System ......... 21 Java Around! Java-based office suites, and marks another milestone OS/2 Warp is developing in the evolution of Java as a whole.” Productivity ................................. 21 into a strong and speedy Programmer’s Editors .......... 23 foundation for Java. The OS/2 Warp 4.0 Java implementation was recently This perfect fit is nicely updated with a better Virtual Machine (VM) and a REXX Programming ................ 23 symbolized by “Carmen” speedy Just In Time (JIT) compiler. Also, even older OS/2 the two-sided coffee cup versions, including Warp 3.0, Warp Connect Utilities & Tools ........................ 24 by dutch ceramist Erik-Jan |and Warp Server are now fully able to suppport Java. Books ............................................. 28 Kwakkel on the cover page. But the great work does not end with that: you can Registration Service ............. -
Expectation of Privacy in Internet Communications
Fourth Amendment Aspects of Internet Communications and Technology Dennis Nicewander Assistant State Attorney 17th Judicial Circuit Ft. Lauderdale, Florida The emergence of Internet technology has revolutionized the world of communication and information sharing. Unfortunately, criminals have seized this opportunity to enhance the efficiency and productivity of their criminal pursuits. The task ahead of law enforcement is daunting, to say the least. New forms of technology emerge before we are able to master the old ones. The most significant legal issue to arise in this struggle to make order out of chaos is the application of the Fourth Amendment to these emerging technologies. If our economy is going to continue to grow at the rapid pace promised by Internet technology, we must find a way to balance our citizens‟ right to privacy with the necessity of establishing law and order in this new frontier. As our culture and legal system suffer the growing pains of radical change, it is responsibility of prosecutors to work together with law enforcement to strike a balance between effective police work and privacy rights afforded by the Fourth Amendment. Understanding the role of “reasonable expectation of privacy” is critical to this role. Since most information placed on the Internet is designed for mass distribution, a reasonable expectation of privacy will not apply in the majority of cases. The purpose of this paper is to provide basic guidance and case law concerning this issue as it relates to some of the most common forms Internet technology. The topics will be divided into the following categories: General Privacy Cases Email Chatrooms Peer-to-Peer Internet Service Provider Records Websites Bulletin Boards University Usage Logs Text Messages General Privacy Cases Katz v. -
Introduction
Introduction Thank you. This is Patricia Murphy, Vice President of Investor Relations for IBM. I’m here with Mark Loughridge, IBM’s Senior Vice President and Chief Financial Officer. Thank you for joining our third quarter earnings presentation. The prepared remarks will be available in roughly an hour, and a replay of this webcast will be posted to our Investor Relations website by this time tomorrow. Our presentation includes certain non-GAAP financial measures, in an effort to provide additional information to investors. All non-GAAP measures have been reconciled to their related GAAP measures in accordance with SEC rules. You will find reconciliation charts at the end, and in the Form 8-K submitted to the SEC. Let me remind you that certain comments made in this presentation may be characterized as forward looking under the Private Securities Litigation Reform Act of 1995. Those statements involve a number of factors that could cause actual results to differ materially. Additional information concerning these factors is contained in the company’s filings with the SEC. Copies are available from the SEC, from the IBM web site, or from us in Investor Relations. Now, I’ll turn the call over to Mark Loughridge. Page 1 3Q 2009 Highlights Thank you for joining us today. We just finished another great quarter, driven by strong profit performance in software and services, and share gains in both hardware and software. This quarter our revenue was up sequentially, and our growth rate improved vs. second quarter. We expanded gross margin by almost 2 points and pre-tax margin by over 3 points year to year. -
Helpful Definitions
HELPFUL DEFINITIONS Internet – an immense, global network that connects computers via telephone lines and/or fiber networks to storehouses of electronic information. With only a computer, a modem, a telephone line and a service provider, people from all over the world can communicate and share information with little more than a few keystrokes. Bulletin Board Systems (BBSs) – electronic networks of computers that are connected by a central computer setup and operated by a system administrator or operator and are distinguishable from the internet by their “dial up” accessibility. BBS users link their individual computers to the central BBS computer by a modem which allows them to post messages, read messages left by others, trade information, or hold direct conversations. Access to a BBS can, and often is, privileged and limited to those users who have access privileges granted by the systems operator. Commercial Online Service (COS) – examples of COSs are America Online, Prodigy, CompuServe and Microsoft Network, which provide access to their service for a fee. COSs generally offer limited access to the internet as part of their total service package. Internet Service Provider (ISP) – These services offer direct, full access to the internet at a flat, monthly rate and often provide electronic mail service for their customers. ISPs often provide space on their servers for their customers to maintain World Wide Web (WWW) sites. Not all ISPs are commercial enterprises. Educational, governmental and nonprofit organizations also provide internet access to their members. Public Chat Rooms – created, maintained, listed and monitored by the COS and other public domain systems such as Internet Relay Chat. -
Lotus Roadmap: Enhancing Business Collaboration with Lotus Software
Lotus Roadmap: Enhancing Business Collaboration with Lotus Software By Michael Sampson, Principal The Michael Sampson Company January 2010 Executive Summary IBM is a major player in the collaboration software market. It offers numerous collaboration software products through its Lotus Software division, has a long track record of delivering collaboration software to the market, and is one of the two titans—Microsoft being the other—in the enterprise market for collaboration software. This report looks at the go-forward strategic role of Lotus Notes and other Lotus software by end-user organizations. The report investigates (and debunks) five common myths about Lotus Notes: 1. Because Lotus Notes is 20 years old, it should be replaced with something more modern. The evidence suggests a different interpretation. 2. IBM is not committed to Lotus Notes. By looking at IBM’s historical commitment to Lotus Notes, a different conclusion is reached. 3. IBM lacks a roadmap for Lotus Notes. By considering the role of a technical roadmap from a vendor, IBM actually does have a roadmap for Lotus Notes. 4. SharePoint will “solve all your problems”. Governance and the business approach is much more critical than the mere technology used, so switching technology without revisiting the non-technology elements will actually only exacerbate any problems. 5. Notes sucks, and it’s all IBM’s fault. IBM bears some fault, but a much greater degree of fault is frequently outside of IBM’s direct control. The report outlines the difference between a technical roadmap from IBM for Lotus products, and a business roadmap created by the organization to leverage the technology that’s available to deliver enhanced business outcomes. -
Trojans and Malware on the Internet an Update
Attitude Adjustment: Trojans and Malware on the Internet An Update Sarah Gordon and David Chess IBM Thomas J. Watson Research Center Yorktown Heights, NY Abstract This paper continues our examination of Trojan horses on the Internet; their prevalence, technical structure and impact. It explores the type and scope of threats encountered on the Internet - throughout history until today. It examines user attitudes and considers ways in which those attitudes can actively affect your organization’s vulnerability to Trojanizations of various types. It discusses the status of hostile active content on the Internet, including threats from Java and ActiveX, and re-examines the impact of these types of threats to Internet users in the real world. Observations related to the role of the antivirus industry in solving the problem are considered. Throughout the paper, technical and policy based strategies for minimizing the risk of damage from various types of Trojan horses on the Internet are presented This paper represents an update and summary of our research from Where There's Smoke There's Mirrors: The Truth About Trojan Horses on the Internet, presented at the Eighth International Virus Bulletin Conference in Munich Germany, October 1998, and Attitude Adjustment: Trojans and Malware on the Internet, presented at the European Institute for Computer Antivirus Research in Aalborg, Denmark, March 1999. Significant portions of those works are included here in original form. Descriptors: fidonet, internet, password stealing trojan, trojanized system, trojanized application, user behavior, java, activex, security policy, trojan horse, computer virus Attitude Adjustment: Trojans and Malware on the Internet Trojans On the Internet… Ever since the city of Troy was sacked by way of the apparently innocuous but ultimately deadly Trojan horse, the term has been used to talk about something that appears to be beneficial, but which hides an attack within. -
IBM Lotus Notes and Domino 6.5.1 Family of Products Maximizes Collaboration While Lowering Cost
Programming Announcement February 3, 2004 IBM Lotus Notes and Domino 6.5.1 family of products maximizes collaboration while lowering cost Overview • Lotus Instant Messaging (Sametime ) At a Glance The first maintenance release of the • Lotus Web Conferencing IBM Lotus Notes and Domino 6.5 Helping companies maintain a (Sametime) family of products includes: competitive advantage, this latest • release: • Lotus Team Workplace Lotus Domino: IBM Lotus (QuickPlace ) Domino Messaging Server, IBM • Gives users a single access Lotus Domino Enterprise Server, • Lotus Domino Document Manager point to their most valuable IBM Lotus Domino Utility Server (Domino.Doc ) messaging, collaborative, and personal information • Lotus Domino Express: IBM Lotus • Lotus Workflow management (PIM) through the Domino Collaboration Express, • new Lotus Workplace for IBM Lotus Domino Utility Express Lotus Workplace Web Content Management Notes Welcome page • Lotus Notes • Integrates Lotus Instant This means you can upgrade your Messaging functionality to • Lotus Domino Web Access programs to Release 6.5.1 without provide presence awareness extensive testing to ensure that all • Lotus Domino Access for and enable users to initiate products work together. That Microsoft Outlook chats with colleagues — without translates to faster time to value, launching a separate • lower costs, and increased Lotus Domino WebMail application productivity. • Lotus Domino Designer • Maximizes responsiveness • Lotus Enterprise Integrator for Key Prerequisites through a follow-up function and Domino visual indicators to show users Refer to the Hardware requirements when they′ve forwarded or • Lotus Connectors and Software requirements sections. replied to e-mail messages With Release 6.5.1, Lotus continues • Helps reduce total cost of ′ to build upon Domino s established Planned availability dates ownership through minimal themes of industry-leading flexibility training requirements, end-user and choice. -
Copyrighted Material
Index AAAS (American Association for adolescence Mali; Mauritania; the Advancement of Science), identity development among, Mozambique; Namibia; 91 306 Nigeria; Rwanda; Senegal; Aakhus, M., 178 identity practices of boys, 353 South Africa; Tanzania; Aarseth, Espen, 292n revelation of personal Uganda; Zambia abbreviations, 118, 120, 121, 126, information by, 463 African-Americans, 387 127, 133, 134 psychological framework of, 462 identity practices of adolescent ABC (American Broadcasting advertising, 156, 329, 354, 400, boys, 353 Company), 413, 416 415, 416, 420–1 political discussion, 174 ABC (Australian Broadcasting banner, 425 African Global Information Commission), 420 elaborate and sophisticated, 409 Infrastructure Gateway Aboriginal people, 251, 253, porn, 428 Project, see Leland 257–8, 262, 263 revenues, 417, 418, 419, 435 age, 280, 431, 432 abusive imageries, 431 Advertising Age, 417 porn images, 433 accessibility, 13, 50–1, 53, 424 aesthetics, 391, 425, 428, 430, agency, 44, 53, 55, 62, 312 balancing security and, 278 434 conditioned and dominated by control of, 388 alternative, 427 profit, 428 increasing, 223 digital, 407 technologically enhanced, 195 limited, 26 familiar, 435 AHA (American Historical private, 94 games designer, 75 Association), 86 public, 94, 95 play and, 373 Ahmed, Sara, 286–7, 288 see also Internet access promotional, 409 AILLA (Archive of the Indigenous accountability, 151, 191, 199, Afghanistan, 205 Languages of Latin America), 207, 273, 276, 277 AFHCAN (Alaska Federal 263 balancing privacy and, 278 Healthcare -
SOA Education Day for CMU Students and Faculty
IBM SOA Roadshow SOA Education Day For CMU Students and Faculty Frank Stein Program Director IBM Federal SOA Institute © 2007 IBM Corporation IBM SOA Architect Summit Agenda 9:00 – 9:15am Welcome – Dr. Randy Bryant, Dean, SCS 9:15 – 9:45am Introduction to SOA – Frank Stein 9:45 – 10:15am Leveraging Information in SOA – Mark Sherman 10:15 – 10:45am SOA Governance and SOA Lifecycle – Naveen Sachdeva 10:45 – 11:15am Reuse, Community, Ecosystems & Catalogs – Jay Palat 11:15 – 12:00pm IBM’s SOA Experience, Trends, Outlook – Sanjay Bose 12:00 – 1:15pm Lunch Break & Faculty Reception 1:15 – 2:00pm Business Process Modeling Overview – Tom McManus & Emilio Zegarra 2:00 – 3:15pm Innov8 3D BPM “Serious Game” – Dave Daniel 2 SOA Education Day at CMU IBM SOA Roadshow Overview Presentation: SOA: A Foundation for Improved Agility and Economic Value Frank Stein Program Director IBM Federal SOA Institute © 2007 IBM Corporation IBM SOA Architect Summit Cloud Computing Announcement – Oct 10, 2007 • IBM and Google will provide hw, sw, and services to assist the academic community to explore Internet-scale computing. •CMU, MIT, Stanford, U of Washington, UC-Berkeley, U of MD 4 SOA Education Day at CMU IBM SOA Architect Summit Agenda Why SOA SOA Technical Concepts What’s Next for SOA Summary 5 SOA Education Day at CMU IBM SOA Architect Summit Businesses are Placing a Premium on Innovation THINK THINK 6 SOA Education Day at CMU IBM SOA Architect Summit Innovation Impacts Business Models Is Your Architecture Ready? “ On a flat earth, the most important -
Carlos Guardia Rivas Ibm Spain
CARLOS GUARDIA RIVAS IBM SPAIN EXECUTIVE IT SPECIALIST - IBM SOFTWARE GROUP WHAT IS THE ROLE OF DATA WITHIN YOUR ACTIVITY AT IBM? IBM is closely related to data and is a big data producer. For example, a few years ago IBM bought The Weather Company. This company generates climate data, compiles it and sells it to, especially, insurance companies and also to other private companies that make use of this kind of data. Even if IBM uses external data repositories, it is mainly a data producer. As for the tools, at IBM we have a very complete portfolio of analytics tools, ranging from importing data from diverse sources, data integration in diverse formats, data cleaning, replication to other systems if needed… Our most famous analytics tool is Watson, which is basically a set of tools that allows you to do any kind of projection on the data: from visualization to prediction. In conclusion, we are a company that offers solutions in the main data-related areas. This is the field in which IBM is heavily investing. DOES IBM USE OPEN DATA FROM PUBLIC SOURCES? We mainly use our own IBM-produced data and tools. We have a big variety of databases: structured, non-structured, analysis-oriented… CONSIDERING THAT MOST OF THE DATA IS GENERATED BY IBM, WHAT KIND OF STANDARDS DO YOU APPLY? Our own customers demand us to adjust to specific standards when they use our tools. Therefore, we comply with all the typical standards in data management. If we didn’t do so, we wouldn’t sell anything! We are always keeping an eye on the market’s demand for specific standards. -
XLUPC: Developing an Optimizing Compiler UPC Programming Language
IBM Software Group | Rational ® XLUPC: Developing an optimizing compiler UPC Programming Language Ettore Tiotto IBM Toronto Laboratory [email protected] ScicomP 2012 IBM Disclaimer © Copyright IBM Corporation 2012. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, Rational, the Rational logo, Telelogic, the Telelogic logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Please Note: IBM’s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM’s sole discretion.