Collaboration

Get the tips and best practices for implementing, adapting, and changing the collaboration framework in your company.

  • White Papers // Jan 2011

    LoST: A Protocol for Mapping Geographic Locations to Public Safety Answering Points

    Public Safety Answering Points (PSAPs) serve limited geographic areas, so emergency callers must be directed to the most appropriate PSAP. As part of the overall Internet Engineering Task Force (IETF) emergency services architecture, the authors have developed a new protocol, LoST (Location-to-Service Translation), that allows end systems and VoIP proxies...

    Provided By Columbia University

  • White Papers // Sep 2009

    Regulating User Arrivals at a Mobile IP Home Agent

    With the increasing levels of data usage in mobile cellular networks, Mobile IP and its variants serve as the de facto standard for mobility management. At high user loads, the Mobile IP Home Agent is unable to support registration requests within the required delay limit, leading to registration failures during...

    Provided By Columbia University

  • White Papers // Jul 2009

    Adding Trust to P2P Distribution of Paid Content

    While Peer-To-Peer (P2P) file-sharing is a powerful and cost-effective content distribution model, most paid-for digital-Content Providers (CPs) use direct download to deliver their content. CPs are hesitant to rely on a P2P distribution model because it introduces a number of security concerns including content pollution by malicious peers, and lack...

    Provided By Columbia University

  • White Papers // Jan 2011

    Protocols and System Design, Reliability, and Energy Efficiency in Peer-to-Peer Communication Systems

    Modern Voice-over-IP (VoIP) communication systems provide a bundle of services to their users. These services range from the most basic voice-based services such as voice calls and voice mail to more advanced ones such as conferencing, voice mail-to-text, and online address books. Besides voice, modern VoIP systems provide video calls...

    Provided By Columbia University

  • White Papers // Apr 2009

    White Paper on Internationalization

    At an internationalized university, the international arena is not seen as one more dimension of the courses offer, the researches undertake, or the experiences offer students. Instead, it forms part of the fabric of support structure for research and instruction, pervading both the curriculum and the co-curriculum of students. An...

    Provided By University of Kentucky

  • White Papers // Sep 2008

    Concurrently Collaborative Spreadsheets in the Chemical Engineering Classroom

    A project investigating the viability of a concurrently collaborative online spreadsheet to improve the effectiveness of student teams when solving chemical engineering problems is described. Students in two classes representing sophomores and seniors were assigned a problem to be solved using a spreadsheet on Google Docs, an online browser-based suite...

    Provided By University of Kentucky

  • White Papers // Jul 2012

    Trustworthy TCB for DNS Servers

    A simple atomic relay function is proposed as a minimal Trusted Computing Base (TCB) for a Domain Name System (DNS) server. This TCB, composed of a fixed sequence of logical and cryptographic hash operations, can be amplified to ensure that a DNS server cannot violate rules. The paper also outlines...

    Provided By Mississippi State University

  • White Papers // Jun 2009

    Challenges in Mitigating Phishing and Spam e-Mails

    A credible threat on the Internet that is more serious than spam is phishing. In phishing attacks, attackers use forged e-mails and Websites to appear as if they originate from legitimate organization to deceive users into disclosing personal, financial, or computer account information. This stolen information can then be used...

    Provided By University at Buffalo

  • White Papers // Sep 2009

    The Asymptotic Behavior of Minimum Buffer Size Requirements in Large P2P Streaming Networks

    The growth of real-time content streaming over the Internet has resulted in the use of Peer-To-Peer (P2P) approaches for scalable content delivery. In such P2P streaming systems, each peer maintains a playout buffer of content chunks which it attempts to fill by contacting other peers in the network. The objective...

    Provided By Iowa State University

  • White Papers // Feb 2010

    Coping With Spam Using Microsoft Outlook Web Access

    Spam is a slang term for unsolicited commercial email. (It is not the same as SPAM, a canned meat product from the Hormel Corporation. SPAM is good, spam is bad.) If one has put the email address on a webpage, used it to post to an online forum or newsgroup,...

    Provided By Iowa State University

  • White Papers // Jan 2012

    Peer-to-Peer Communication

    Internet has changed a lot since its early days. At the beginning, goal of the Internet was to share computing resources between universities and scientists. In those days communication happened almost completely directly between computers or people. This is something the authors now call peer-to-peer communication. After the commercialization of...

    Provided By Helsinki University of Technology

  • White Papers // May 2009

    Gaussian Belief With Dynamic Data and in Dynamic Network

    Message-passing algorithms have over the last two decades turned out to be an important paradigm in fields as distant as iterative decoding, image processing and AI. It has been realized that systems where the message-passing algorithms are effective can often be assimilated to disordered systems in statistical physics, and that...

    Provided By Helsinki University of Technology

  • White Papers // Nov 2010

    Storytelling Security: User-Intention Based Traffic Sanitization

    Malicious software (malware) with decentralized communication infrastructure, such as peer-to-peer botnets, is difficult to detect. In this paper, the authors describe a traffic-sanitization method for identifying malware-triggered outbound connections from a personal computer. The solution correlates user activities with the content of outbound traffic. The key observation is that user-initiated...

    Provided By Virginia Polytechnic Institute and State University

  • White Papers // Jan 2010

    Collaboration Within the Telepresence Experience

    In the past three years, the telepresence concept has burst upon the corporate communications world, achieving acceptance in large and small enterprise, government agencies, and many educational institutions. Telepresence suites, which provide extremely high quality audio and video and life sized images of remote participants, have demonstrated how productive the...

    Provided By Wainhouse Research

  • White Papers // Apr 2010

    Roles of SmarterMail

    SmarterMail is a feature-rich Windows mail server that brings the power of enterprise-level functionality and collaboration to businesses and hosting environments. SmarterMail is powerful enough to be used as a complete mail system that performs all of the following roles from a single server. SmarterMail installations can also be used...

    Provided By SmarterTools

  • Case Studies // Jun 2009

    Children's Memorial Hospital Relies on ZixCorp to Help Secure Data

    Illinois' only freestanding hospital exclusively for kids, Children's Memorial Hospital is home to more than 1,100 pediatric experts in 70 specialties. It needed email encryption to send Protected Health Information (PHI) and other sensitive data pertaining to their patients. Hospital deployed ZixCorp's Email Encryption Service that benefited to communicate securely...

    Provided By Zix

  • Case Studies // Oct 2008

    Banking on ZixCorp for Email Encryption

    Banks are legally required to safeguard their customers' Non-Public Personal Information (NPPI) as defined by the Gramm-Leach-Bliley Act. They're also feeling increased pressure from regulators to encrypt their customers' NPPI. While ZixCorp's email encryption service provides total compliance with federal and state regulations, automatically and transparently securing all NPPI, it...

    Provided By Zix

  • Case Studies // Jan 2009

    Erie County's Human Services Department Turns to ZixCorp

    Erie County of Pennsylvania's Human Services Department needed email encryption to send Protected Health Information (PHI) and the other sensitive data pertaining to their constituents. Erie County deployed the ZixCorp's Email Encryption Service that was easy to install and maintain and HIPAA lexicon plus the ability to create own policies.

    Provided By Zix

  • White Papers // Sep 2012

    Comparison Guide: Proofpoint Enterprise Vs. Google Message Security (Postini)

    Join the many Google Postini customers who have seamlessly migrated to Proofpoint's best-in-class email security solutions. Looking for alternatives to Google's Message Security (aka Postini) email security solution? Learn how Proofpoint can better defend your organization from spam, viruses and data loss while significantly reducing your email security costs....

    Provided By Proofpoint

  • White Papers // Sep 2009

    Email Archiving: Understanding the Reasons, Risks and Rewards

    Statistics show that as much as 60 percent of business-critical data now resides in email, making it the most important repository of data your company may own. This huge amount of data translates into a significant burden on corporate storage resources. Having a system in place that takes this...

    Provided By Proofpoint

  • White Papers // Apr 2012

    Keeping email safe in the EU

    The speed and convenience of email have made it the most commonly used form of commercial communication. These features also potentially increase the legal risks for business since without proper tools it is difficult to exercise control over the contents of emails and their generation, use and storage. Businesses should...

    Provided By Proofpoint

  • White Papers // Apr 2012

    Email archiving: Should you choose SaaS?

    For today's increasingly overburdened IT departments, software-as-a-service (SaaS) solutions provide a compelling alternative to traditional software deployments. However, SaaS solutions do not make sense for every business in every situation. In order to make the case for or against a SaaS solution, IT departments need to have a complete and...

    Provided By Proofpoint

  • White Papers // Sep 2011

    Defeating spam in enterprise email

    Enterprises should expect the onslaught of spam to continue. Botnets aren't going away. Criminal syndicates won't abandon a profitable business. In 2011 and beyond, attacks will likely become more frequent, devious and malicious. The very best anti-spam solutions today deliver 95-percent effectiveness. That's not good enough for your business, your...

    Provided By Proofpoint

  • White Papers // May 2010

    Protecting Enterprise Data with Proofpoint Encryption

    Learn more about Proofpoint Encryption, Proofpoint's easy-to-deploy and easy-to-use policy-based email encryption solution and why email encryption is a critical component of today's email security solutions. Download this whitepaper to learn about: A brief overview of regulatory trends that are driving the adoption of encryption and DLP solutions. How email...

    Provided By Proofpoint

  • White Papers // Apr 2012

    Learn Why Proofpoint is the Email Security Solution of Choice

    Join the many Google Postini customers who have seamlessly migrated to Proofpoint's best-in-class email security solutions. Looking for alternatives to Google's Message Security (aka Postini) email security solution? Learn how Proofpoint can better defend your organization from spam, viruses and data loss while significantly reducing your email security costs. ...

    Provided By Proofpoint

  • Webcasts // Jan 2009

    Minimal IT Budget?: Maximize ROI With Email Security in the Cloud

    The attendee of this webcast will learn how "In the cloud" email security solutions can greatly reduce up-front investments, minimize ongoing administration costs and minimize time-to-value. The presenter will discuss how in-the-cloud and new hybrid email security solutions can deliver more value than purely on-premises solutions. The presenter also explains...

    Provided By Proofpoint

  • Webcasts // Jan 2009

    No Summer Vacation From Spam

    The presenter will discuss the latest email threats-including new spam techniques, phishing scams and blended threats- and how one can protect the organization, email system and end users this summer.

    Provided By Proofpoint

  • Webcasts // Jan 2009

    Cloud Computing for Maximum Email Security

    At a time when email-borne threats continue to escalate while IT budgets shrink, enterprises seek new ways to improve security while simultaneously lowering costs. New cloud computing-based email security solutions - that multiply the power of the email security appliances one already own - can help to meet both objectives....

    Provided By Proofpoint

  • Webcasts // Jan 2009

    Lower Your TCO: Email Security in the Cloud

    The attendee of this webcast will learn how "In the cloud" email security solutions can greatly reduce up-front investments, minimize ongoing administration costs and minimize time-to-value. Advances in cloud computing and SaaS hold the key to achieving the lowest TCO and maximizing the ROI, while providing the anti-spam, anti-virus, DLP,...

    Provided By Proofpoint

  • Webcasts // Jan 2009

    Leveraging Next-Generation Cloud Computing for Email Security and Archiving

    Want maximum control - managing custom policies, actions, users and reports? Or prefer a "Lights out" operation, which frees the administrators from ever having to spend time with the system? With the latest innovations, email security and archiving in the cloud can provide increased flexibility, control and security over traditional...

    Provided By Proofpoint

  • Webcasts // Jan 2009

    Time to Switch Your Email Security Solution? Top 5 Warning Signs

    With the continuing rise in email volumes and more aggressive spamming techniques, many organizations are struggling with tremendous growth in spam and other email-borne threats. And while most IT departments have email security solutions in place, many of these solutions are no longer adequate to deal with the increasing sophistication...

    Provided By Proofpoint

  • White Papers // Aug 2009

    HIPAA and Beyond: An Update on Healthcare Security Regulations for Email

    Healthcare regulations for IT security ? such as HIPAA and the new HITECH provisions of HIPAA ? are now broader than ever. And they apply not just to healthcare organizations, but to their business partners, as well. Learn about new provisions of the US economic stimulus legislation (ARRA) and...

    Provided By Proofpoint

  • White Papers // Aug 2009

    Outbound Email and Data Loss Prevention in Today's Enterprise, 2009

    This paper summarizes the findings of Proofpoint's sixth annual survey of enterprise attitudes about outbound email, content security and data protection. Its goal is to "take the pulse" of IT decision-makers with respect to outbound messaging and data loss issues and to help raise awareness of the policy, technology and...

    Provided By Proofpoint

  • White Papers // Jan 2010

    Anti-Spam Server 2004

    Email, being the most frequently used Internet application, is an essential tool for various types of businesses and personal communications. According to IDC in September 2000, email messages sent per year will increase from 9.7 billion in 2000 to 35 billion in 2005. Like any other technological development, the Internet...

    Provided By Uniwares

  • Case Studies // Apr 2009

    Protecting Patients' Personal Data

    For more than 60 years, Robert Wood Johnson University Hospital Hamilton (RWJ Hamilton) has provided top-notch health care to communities within a five-county area of New Jersey. It needed email encryption to send Protected Health Information (PHI) and other sensitive data pertaining to their patients. University deployed ZixCorp's Email Encryption...

    Provided By Zix

  • Case Studies // Jan 2010

    Policy Patrol Case Study: Radisson Edwardian Hotels

    Firstly, to comply with legal requirements, Radisson needed to ensure that no email was sent out without the company disclaimer. The UK Companies Act further requires all company emails to include the company registration number, place of registration and registered office address. Policy Patrol closely integrates with Exchange Server and...

    Provided By Red Earth Software

  • White Papers // Dec 2009

    Preventing Privacy Breach: Why You Need to Block Cc Mass Mailings

    In every company it happens: employees sending out mass email mailings to customers and contacts by creating one email and entering all the recipients in the Cc: field (or the Bcc: or To: field). It is something that can happen so easily, yet can also have serious consequences. Read more...

    Provided By Red Earth Software

  • White Papers // Mar 2010

    Email 101

    The flow of email on the Internet is both surprisingly simple and surprisingly complex. It is simple because the basic email protocols are decades-old plain-text protocols with very simple definitions. It is complex because many tiny details can have a profound influence on how mail flows and on how to...

    Provided By Roaring Penguin Software

  • White Papers // Mar 2009

    Total Cost of Ownership Comparison Kerio MailServer Vs. Microsoft Exchange

    For small to medium businesses wanting to improve email and collaboration efficiency, Kerio MailServer provides a powerful solution to more SMBs, with lower Total Cost of Ownership (TCO) when Exchange is not an option. This whitepaper identifies three considerations for TCO and compares the TCO of Kerio MailServer to Exchange...

    Provided By Kerio Technologies

  • White Papers // Feb 2010

    Performance of Prefix Delegation-Based Route Optimization Schemes: Intra Mobile Network Case

    Among the route optimization schemes in NEtwork MObility (NEMO), the prefix delegation-based schemes perform better than other schemes. Since the prefix delegation-based schemes are designed for communication between a mobile network and a wired network, they lack evaluation for the case of intra mobile network communication involving MIPv6 incapable hosts...

    Provided By University of Oklahoma