TITLE

FILTER

AUTHOR(S)
Macsai, Dan
PUB. DATE
July 2010
SOURCE
Fast Company;Jul/Aug2010, Issue 147, p26
SOURCE TYPE
Periodical
DOC. TYPE
Proceeding
ABSTRACT
The article presents information on the Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference to be held in Redmond, Washington on July 13, 2010.
ACCESSION #
51794664

 

Related Articles

  • A BAD RAP. Seda, Catherine // Entrepreneur;Jun2003, Vol. 31 Issue 6, p83 

    Provides tips and information in fighting back a spammer. Protection against the ordeal by not buying a software that harvests electronic-mail addresses; Avoidance of future confusion by informing the subscriber what will be found in the electronic-mail message; Suggestions not to be attracted...

  • Antispam tools multiplying like spam. Fontana, John // Network World;2/17/2003, Vol. 20 Issue 7, p18 

    Reports on the increase in number of antispam technology products. Release of gateway product and upgrades to MailFrontier Inc.'s client software at Demo 2003 conference; Server edition of Sunbelt Software Corp.'s spam filtering software; Announcement of name and product of Q-Spam.

  • BARNEY'S RUBBLE. Barney, Doug // Network World;09/25/2000, Vol. 17 Issue 39, p7 

    Presents computer network-related news items, compiled in the week of September 25, 2000. Alliance of 15 online marketers to control unsolicited electronic mail messages; Electronic commerce shakeout predicted by business consultant Tom Peters.

  • AITP on-line. Oriez, Charlie // Information Executive;Nov/Dec99, Vol. 3 Issue 11/12, p6 

    Presents tips on how to avoid spams or unsolicited e-mail. Includes use of high-level domain; Options for blocking spam at the servers; Places spammers use to harvest e-mail addresses.

  • Academic spam invitations are common and irritating, with 2.1 invitations received daily by each investigator.  // Medical Writing;Jun2017, Vol. 26 Issue 2, p64 

    The article reports that Academic spam invitations are common and are irritating with 2.1 invitations received daily by each investigator.

  • Fighting spam: Theory and practice. Gibbs, Mark // Network World;2/16/2004, Vol. 21 Issue 7, p90 

    Elaborates on the theory and practice of preventing spam. Technical formatting of the required infrastructure; Importance of considering the legal issues associated with spam prevention; Need of charging for e-mail.

  • Verizon's weird antispam science. Gibbs, Mark // Network World;3/19/2007, Vol. 24 Issue 11, p70 

    The author reflects on the antispam technologies of Verizon Communications Inc. in the U.S. He states that the sender call-back verification (SCV) technique used by the company became a liability to the users, instead of being a tool for filtering unsolicited email messages. He states that SCV...

  • Music star outwits hate-mail spammers.  // Computer Weekly;7/4/2002, p56 

    Reports information technology developments in Great Britain as of July 2002. Launch of online dating service; Availability of the online archive service; Strategy in avoiding unsolicited mails.

  • Practical Web Spam Lifelong Machine Learning System with Automatic Adjustment to Current Lifecycle Phase. Luckner, Marcin // Security & Communication Networks;2/20/2019, p1 

    Machine learning techniques are a standard approach in spam detection. Their quality depends on the quality of the learning set, and when the set is out of date, the quality of classification falls rapidly. The most popular public web spam dataset that can be used to train a spam...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics