US A1 (19) United States (12) Patent Application Publication (10) Pub. N0.: US 2011/ A1 Sheer (43) Pub. Date: Aug.

Size: px
Start display at page:

Download "US 20110196934A1 (19) United States (12) Patent Application Publication (10) Pub. N0.: US 2011/0196934 A1 Sheer (43) Pub. Date: Aug."

Transcription

1 US A1 (19) United States (12) Patent Appication Pubication (10) Pub. N0.: US 2011/ A1 Sheer (43) Pub. Date: Aug. 11, 2011 (54) SOCKET SMTP LOAD BALANCING (52) US. C /206; 709/226; 726/9 (57) ABSTRACT (75) Inventor: Pau sheer Amsterdam (NL) A method is provided for oad baancing SMTP, POP, and IMAP traf?c over a puraity of backend SMTP, POP, and (73) ASSigneeI P3111 Sheer, Amsterdam (NL) IMAP s for sites that host a arge number of eectronic mai accounts. The method aows the tota set of hosted mai (21). App' NO" 12/702,584 accounts to be divided into subsets, Where each subset is handed by one or more backend s. The method ensures _ that each SMTP, POP, or IMAP connection is directed to a (22) Fedi Feb- 9, 2010 backend that handes the subset to Which the recipient Pubication Cassi?cation emai address associated With the connection is assigned. This method incudes agorithms to interpret incoming SMTP, POP and IMAP connections in such a Way as to (51) IIt- C- identify the recipient(s) and estabish corresponding connec G06F 15/16 ( ) tions to backend (s) Whie giving the appearance (to the H04L 29/06 ( ) connecting party) of connecting directy to a backend. Exampe SMTP depoyment. An organization hosts mai for the Mai deivery with recipient address adam@0rg. us though- _ zach@0rg. us outside emai R10s Internet k) emai emai emai se rver emai se rver udum@org. us through harry@ org. us henry@org. us through marge@org. us mury@ org. us through rob@org. us roger@org. us through zach@org. us

2 Patent Appication Pubication Aug. 11, 2011 Sheet 1 0f 6 US 2011/ A1 FIG. 1. Exampe SMTP depoyment. An organization hosts mai for the Mai deivery with recipient address adam@org.us though zach@org.us _ outside emai Server Internet I oad baancer 'L S r/ 2\ I emai emai emai emai I g é I adam@org. us henry@org. us mary@ org. us roger@org. us through through through through harry@org. us marge@org. us us zach@org. us

3 Patent Appication Pubication Aug. 11, 2011 Sheet 2 0f 6 US 2011/ A1 FIG. 2. Exampe POP/IMAP depoyment. An organization hosts mai for the recipient address \ adam@org.us though us 07 Internet Organization LAN 103 i 0 oad baancer f 6 L. adam@org. us henry@org. us mary@ org. us roger@org. us through through th rough harry@0rg. us marge@0rg. us us us

4 Patent Appication Pubication Aug. 11, 2011 Sheet 3 0f6 US 2011/ A1 FIG. 3. Steps for deivery using SMTP: EHLO" through "RCPT". Sequence diagram showing a singe end-to-end deivery of an emai. outsde emai oad baancer_,/\106.. emai Server. ema connect in f EHLO Ok MAIL 250 Ok RCPT TO:<adam@org.us> foz connect 220 in MAIL FROM:<seth RCPT TO:<adam or.us> 250 0k 303 RCPT TO:<henry@org.us> / /. connect ( 220 Info EH L0 250 Ok 1 MAIL FROM:<seth@q.com> ( 250 Ok RCPT TO:<henry@org.us> 250 0k 250 ok ( -

5 Patent Appication Pubication Aug. 11, 2011 Sheet 4 0f 6 US 2011/ A1 FIG. 4. Steps for deivery using SMTP: DATA" through "QUIT". Sequence diagram showing a singe end-to-end deivery of an emai. outside emai 106 emai 108 Server oad baancerf f emai W 354 continue emai data chunk 1 emai data chunk 1 emai data chunk 1 emai data chunk 2 $406 emai data chunk 2 emai data chunk 2 As many chunks up to the fu ength of the emai data emai data chunk n emai data chunk n emai data chunk n Command interactions beyond this point do not improve carity of the exampe of the method to those skied in the art

6 Patent Appication Pubication Aug. 11, 2011 Sheet 5 0f 6 US 2011/ A1 FIG. 5. Steps for retrieva using POP/ IMAP. Sequence diagram showing end-to-end retrieve of emai. Steps shown, individua commands omitted for carity. 209 POP/IMAP cient-f- oad baanceuf 106 femai connect and greet authenticate authentication success connect and greet authenticate f5 05 authentication success transparent forwarding transparent forwarding

7 Patent Appication Pubication Aug. 11, 2011 Sheet 6 0f 6 US 2011/ A1 FIG. 6. Steps for sending by reay using SMTP. Sequence diagram showing end-to-end sending of emai. Steps shown, individua commands omitted for carity. 106 outside emai SIVITP cient oad baancerf connect and greet authenticate authentication success connect and greet tronsparentforwording transparent forwarding

8 US 2011/ A1 Aug. 11,2011 SOCKET SMTP LOAD BALANCING BACKGROUND OF THE INVENTION [0001] 1. The Fied of the Invention [0002] The present invention reates to means or steps for apportioning resources to one or more computers on a net Work. More speci?cay, the present invention reates to sys tems and methods used to distribute emai (eectronic mai) deivery and retrieva over a number of emai s in order to reduce the oad of tra?ic to/ from individua emai s, and/or systems and methods to scae emai hosting environ ments to hande arger amounts of emai and arger numbers of mai boxes With ower resource consumption and/or ower atency and/ or higher throughput. [0003] 2. The Prior State oftheart [0004] An organization that depoys an emai soution Wi usuay support at east one or more of the foowing services: a system to receive incoming emai deiveries from an outside emai and store them for retrieva; a system to aow retrieva from storage; and a system to reay outgoing emai on behaf of senders. The storage pertaining to an individua recipient is caed a mai box. [0005] The Internet standard protoco for deivering emai is caed the Simpe Mai Transfer Protoco (SMTP) primariy de?ned in IETF document RFC The Internet standard protoco by Which recipients usuay retrieve emai from stor age is the Post O?ice Protoco (POP) and/ or the Internet Message Access Protoco (IMAP) primariy de?ned in IETF documents RFC 1939 and RFC 3501 respectivey. Both these protocos are usuay impemented by a singe commodity computer such that a emai is received by that emai, stored Within that one emai s storage media, and retrieved from the same emai by the recipient. In many cases, that emai may have redundant repication of the storage and/ or standby emai s to mitigate a faiure of the emai. [0006] A arge organization Wi typicay be required to diverge from the herein described singe commodity com puter system When they reach upwards of 1,000, 10,000, or 100,000 mai boxes due to unfavorabe atency and throughput, and/or poor stabiity. [0007] To introduce improved scaabiity to the depoyment scenario of a singe commodity computer system, a common method is to depoy a puraity of emai s using DNS (Domain Name System) oad baancing to share the oad of incoming emai. This is impemented by advertis ing more than one DNS resource record for the provided mai service. An outside SMTP cient trying to initiate an SMTP deivery to the service Wi thereby pick one emai from among the puraity of emai s. These mutipe emai s Woud then share the same contiguous singe storage device (such as an NFS?e-system,?ber channe SAN, or other shared?e-system). The subsequent operation of using POP/IMAP to retrieve emai, ikewise chooses from one or more emai s that have access to the same shared stor age device. A variation of such a system is US. Pat. No. 9,746,952 (Fodor). This depoyment scenario has the disad vantage that the throughput of the system as a Whoe is greaty dependent on the throughput of the shared storage device, Which may suffer from a many-to-many thrashing effect, network bandwidth imits, or other genera throughput de? ciencies. These probems are exacerbated by adding more emai s. A further probem occurs in the common case of attempting to impement a spam-?tering or virus-?tering method on the emai : mutipe s may be required to share data, incurring further computation overhead. [0008] Another method to achieve scaabiity is to divide the set of emai addresses into sub-domains. For instance, rather than hosting a arge number of emais adam@org.us through Zach@org.us (a With the same domainportion of the emai instead, the organization coud name emais by department, such as adam@ny.org.us, henry@ca.org.us, Zach@nc.org.us, etc. Emai s can thereby be depoyed such that each emai hosts a subset of emais of one department. This method compromises on?exibiity, and requires migration. This method does not Work for an organization such as an ISP (Internet Service Provider) that Wishes to use the same domain for a subscriber emai accounts. [0009] The state of the art aso incudes various combina tions of depoyment scenarios. Some of these depoyment scenarios make use of the method of forwarding emai between emai s. The method of forwarding emai fo ows the steps of accepting deivery of the emai and storing the entirety of the emai Within storage media (voatie or otherwise), and then retrieving the emai from the storage media, and then deivering the emai to another, in a manner such as to apportion Workoad. The intermediate step of storing the entirety of the emai incurs the disadvantage of consuming substantia computing resources. Systems that incude Within their methods such forwarding are US. Pat. No. 7,272,662 (Chesnais) and US. patent appication Ser. No. 10,278,824 (Fenton). These systems do not attempt to address the herein described disadvantage, nor do they sove the probem of interpreting the SMTP session in such a Way as to redirect the session based on the recipient emai address. [0010] In terms of generic oad baancing of cient connec tions, there are a number of popuar methods. These methods are mosty empoyed for Web traf?c, that is, the HTTP pro toco, but can aso be appied to SMTP, POP, and IMAP. Generic oad baancing intercepts the data from the cient and directs it to a machine from among the puraity of machines sharing oad. See for exampe US. Pat. No. 6,473, 802 (Masters), US. Pat. No. 6,182,139 (Brende), US. Pat. No. 6,128,279 (O Nei), oru.s. Pat. No. 6,772,211 (Lu). The oad baancer may interpret and/ or modify the data in passing. In particuar, some oad baancers interpret the initia portion of the data of a new connection and direct the connection to a machine of choice. For exampe, for the HTTP protoco, the oad baancer Woud intercept the cookie header Which may contain information indicating to Which machine the connec tion shoud be directed. HoWever the state of the art does not incude oad baancers that are abe to adequatey interpret emai handing protocos in order to choose the backend machine in a manner that aows subdivision of mai boxes into smaer sets; nor do so such that each oad sharing machine handes ony a smaer set of mai boxes. This sub division in conjunction With session redirection is a principe advantage of the present invention. SUMMARY AND OBJECTS OF THE INVENTION [0011] The probems in the prior state of the art have been successfuy overcome by the present invention Which is directed to systems and methods for oad baancing SMTP, POP and IMAP sessions over a puraity of emai s such that a POP/IMAP retrieva session pertaining to a recipient Wi be directed to the same to Which an SMTP deivery

9 US 2011/ A1 Aug. 11,2011 operation from an outside emai Was previousy directed for the same recipient. [0012] The present invention utiizes methods for deiver ing and retrieving emai de?ned in RFC 5321, RFC 1939 and RFC 3501, incorporated herein by reference. [0013] The present invention utiizes the method that a puraity of emai s are depoyed, and that each emai has a distinguishing designator, and that each emai address has assigned to it at east one of these designators, and that such assignments are stored in a database, and that each emai be ready to accept emai for those emai addresses assigned With its designator. [0014] The emai database may aso store aias emai address information necessary for performing emai address substitutions and ist expansions as may be required by the recipients communication needs. The manner of aias emai addresses is We known to those skied in the art. [0015] The emai database may aso store secret passwords and identifying tokens required for authentication, such that there is a mapping between recipient emai addresses and identifying tokens. It may store a secret password for each identifying token. [0016] An emai deivery operation may begin With an out side emai initiating a connection to the organization s ho sting SMTP. By the methods of the present invention this SMTP may be substituted by the herein described oad baancer. The oad baancer performs the methods of SMTP handshaking as de?ned by RFC 5321 up to the point of receiving the SMTP command RCPT. Before repying to RCPT, the oad baancer may extract the recipient emai address from the RCPT ine of command, and perform a ook-up from the emai database, to determine if the recipient emai address is indeed an emai address for Which the orga nization hosts emai (i.e. a oca emai address), as We as retrieve the designator(s) With Which it has been assigned, as We as perform any ist expansions or address substitutions, as We as ook up their respective designators, in a recursive fashion, etc. [0017] The oad baancer may then resove a designators to their actua emai identi?ers and attempt to make a connection to each reevant emai. The oad baancer may then perform the methods of SMTP handshaking as de?ned by RFC 5321 mimicking the same MAIL ine of command, and issuing a necessary RCPT commands If a RCPT commands to a emai s resut in successfu SMTP repy codes then the oad baancer may repy With a successfu SMTP repy code to the outside emai. If a singe RCPT command to an emai does not resut in a successfu SMTP repy code then the oad baancer may repy With a faied SMTP repy code to the outside emai. [0018] The outside emai Wi possiby send more RCPT commands Which may be handed in the same Way, preferaby reusing connections to emai s. [0019] Those skied in the art Wi be aware that most emai deiveries are to a singe recipient and therefore the oad baancer is ikey to require a connection to ony one emai for an individua emai deivery. [0020] The outside emai may send a DATA com mand, and the oad baancer my mimic a DATA command to each of the emai s to Which it is connected. Once again, if any one emai returns a faiure SMTP repy code, the oad baancer may return a faiure SMTP repy code to the outside emai. [0021] The outside emai may begin to send the emai. The oad baancer may receive the emai in chunks reated to the TCP packetization of the data stream. After receiving a chunk, the oad baancer may Write the chunk in fu to each of the emai s to Which it is connected before proceeding to receive the next chunk. If any singe chunk fais to Write in fu to an emai then that emai transaction may be considered to have faied and an appropriate faiure repy code may be returned to the outside emai. [0022] Each emai may respond With a repy code. If a such repy codes indicate successfu deivery, a success repy code may be returned to the outside emai. The possibiity exists that not a emai s give the same repy, meaning that one or more s have accepted the emai Whereas one or more other s have rejected the emai. In this case the faiure repy code may be of the form indicating that the outside emai shoud not attempt a sub sequent deivery for the same emai. (If the oad baancer imposes a size imit on the emai data, and that imit is smaer than that of any of the emai s, then the herein described scenario of differenty repying emai s is unikey to occur. That this unexpected outcome is empiricay true is one of the reasons that the present invention is non-obvious.) [0023] If required, the outside emai may continue an additiona MAIL command, thus repeating the preceding steps. [0024] In this Way, the outside emai is given the appearance of performing SMTP command interactions directy With the emai. The emai is given the appearance of performing SMTP command interactions With an outside emai. Both are given the appearance of a suf?cienty standards-compiant SMTP session according to the methods of the SMTP standard RFC 5321 (or other ver sions of the standard). [0025] An advantage of the present invention is that the compete emai data are not stored on the oad baancer, the storage of Which Woud impart additiona computationa bur den on the oad baancer. Such resources incude consump tion of persistent or voatie storage media, and/ or consump tion of rate of transfer or bandwidth to or from persistent or voatie storage media. [0026] By the methods of the present invention, deivery faiures due to unavaiabiity of an emai, or faiures due to poicy reasons, or faiures due to the recipient address being invaid, or faiures due to other reasons, are reported to the outside emai eary in the session; the onus being on the outside emai to retry or fai deivery if required by the SMTP protoco. This has the advantage of saving on network bandwidth by preventing the session from reaching the DATA command, and by obviating the need for bounce messages. State of the art emai forwarding techniques queue a incoming emai, Which typicay contains a arge portion (sometimes 90% in practice) of undeiverabe emai mes sages, Which therefore bounces and consumes computing resources. [0027] The connection to the emai is described herein as taking pace at the point in the sequence of com mands directy after the arriva of the RCPT command from the outside emai. HoWever, those skied in the art Wi reaize that some variation in the sequences of operation is viabe and Wi have the same resut. The exampe herein shoud not be construed to imit the scope of the invention. [0028] By the methods of the present invention emai Wi have been deivered to a backend of the organizations

10 US 2011/ A1 Aug. 11,2011 choosing without incurring any intermediate queuing, stor age or processing. The deivery is transparent to both the emai and the outside emai. This has the desir abe property that the emai s can continue to use or icense whichever SMTP software/hardware impementation the organization has previousy depoyed. [0029] Further, spam?tering methods (such as Grey-List ing or Sender Poicy Framework) can be impemented on the oad baancer (at the point of receiving the MAIL and/or RCPT commands), with the advantage of a singe Grey Listing database, and the further advantage of protection of emai s from unwanted connections and denia-of-ser vice attacks. Spam detection methods that require arge amounts of computations (due to their in-depth anaysis of emai content) can take pace on the emai s, with the advantage of apportioning the computationa oad. [0030] For the retrieva of emai by recipients, POP/IMAP cients may connect to the oad baancer. The POP/IMAP cient may try to authenticate itsef to the oad baancer using one of the authentication methods commony used for POP/ IMAP and known to those skied in the art. The process of authentication may necessitate that an identifying token?rst be sent to the oad baancer. The oad baancer may then retrieve from the emai database to obtain the recipient emai address mapped to that identifying token and subsequenty to obtain designator(s) to which the emai address has been assigned. [0031] The oad baancer may then resove a designators to their actua emai identi?ers and attempt to make a connection to each reevant emai as though the oad baancer were a POP/IMAP cient. The next step of the authentication may invove cryptographic operations and/or the exchange of secret passwords. The oad baancer may pass these secret passwords between the POP/IMAP cient and the emai. In the case of authentication methods that invove cryptography such that the secret password cannot be extracted, the oad baancer may retrieve the secret password from the emai database, and make use of that secret password to authenticate the POP/IMAP cient as we as to authenti cate itsef to the emai. [0032] The identifying token may be identica to the recipi ent emai address thus making trivia the mapping between the identifying token and the recipient emai address. [0033] Subsequent to the herein described connection and authentication steps, the oad baancer may transparenty for ward data between the POP/IMAP cient and the emai. According to the methods of the present invention the oad baancer woud have the appearance to the POP/IMAP cient of communicating directy with the emai. [0034] For the reaying (i.e. sending) of emai by senders, SMTP cients may connect to the oad baancer. The SMTP cient may try to authenticate itsef simiar to the authentica tion of POP/ IMAP cients herein described. Subsequent to the connection and authentication steps, the oad baancer may transparenty forward data between the SMTP cient and the emai. According to the methods of the present inven tion the oad baancer woud have the appearance to the SMTP cient of communicating directy with the emai. The emai may then proceed to queue the emai for outgoing deivery. [0035] The advantage of using the oad baancer for send ing emai as herein described is so that white ists or associa tions between senders (reverse path emai addresses) and recipients can be gathered or stored by the oad baancer and assist in spam?tering. Systems and methods for empoying such white ists or associations in spam?ters are we known to those skied in the art. [0036] A further advantage of the present invention is with regard to emai interception and repication. Certain jurisdic tions require that emai systems have the capabiity to inter cept and archive emai so that in the event of a ega court order to perform interception or archiva for particuar recipi ents, those emai systems are abe to do so forthwith. The addition of an address expansion or aias in the emai database woud resut in an additiona emai deivery, potentiay to a dedicated emai, which woud serve this purpose. Fur ther, and in genera, because a emai passes through the oad baancer, interception of emai is simpi?ed. The present invention therefore has the advantage that it simpi?es an organizations methods to compy with oca aw pertaining to emai interception and/or archiva. BRIEF DESCRIPTION OF THE DRAWINGS [0037] In order that the manner in which the above-recited and other advantages and objects of the invention are obtained, a more particuar description of the invention brie?y described above wi be rendered by reference to spe ci?c embodiments thereof which are iustrated in the appending drawings. Understanding that these drawings depict ony typica embodiments of the invention and are not therefore to be considered imiting of its scope, the invention wi be described and expained with additiona speci?city and detai through the use of the accompanying drawings in which: [0038] FIG. 1 is an exampe of a suitabe depoyment of the present invention showing connections between components of the system for an SMTP deivery. [0039] FIG. 2 is an exampe of a suitabe depoyment of the present invention showing connections between components of the system for POP/IMAP retrieva. [0040] FIG. 3 is an exampe of a sequence diagram of seected SMTP commands of the SMTP protoco, by the methods of the present invention, for the deivery of emai from an outside emai to an emai. [0041] FIG. 4 is an exampe ofthe same as FIG. 3 wherein further seected commands are shown. [0042] FIG. 5 is an exampe of a sequence diagram of seected POP/IMAP steps of interaction, by the methods of the present invention, for the retrieva of emai by a POP/ IMAP cient. [0043] FIG. 6 is an exampe of a sequence diagram of seected SMTP steps of interaction, by the methods of the present invention, for the reaying of emai by an SMTP cient. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS [0044] The invention is described beow by using diagrams to iustrate the processing of embodiments used to impe ment the systems and methods of the present invention. Using the diagrams in this manner to present the invention shoud not be construed as imiting its scope. [0045] The present invention contempates both methods and systems for the oad baancing of emai retrieva and deivery. The embodiments of the present invention may com prise a specia purpose or genera purpose computer compris ing various computer hardware as discussed beow.

11 US 2011/ A1 Aug. 11,2011 [0046] Embodiments Within the scope of the present inven tion aso incude computer systems 101 having persistent storage media 1 02, voatie storage media, executabe instruc tions, and network communication inks. By Way of exampe and not imitation, such computing systems may be a genera purpose microprocessor-based computer With a hard-disk or soid-state-disk storage media, a Loca Area Network 104 (LAN) or Wide Area Network (WAN) network communica tion device, and there may be a puraity of these computing systems depoyed to aow network communications between them. [0047] The computer systems may impement the network communication protocos of the Internet Protoco (IP) and of the Transmission Contro Protoco (TCP), and may be abe to operate as a node Within the Internet and/or a LAN. The computer systems may impement communication between one another using connections based on TCP and accept incoming connections or initiate outgoing connections. The computing systems may be instaed With genera-purpose operating systems such as Microsoft WindoWs, or operating systems conforming to the POSIX standard, or Unix-ike operating systems, or other genera purpose operating sys tems, or embedded or specia-purpose operating systems. The computer systems may have genera purpose functions for mapping data items to data keys in the manner of a database and persistenty storing these mappings as We as aowing insertions, updates and deetions of mappings. [0048] The emai s 105 may contain executabe instructions that impement the protocos of SMTP, POP or IMAP. By Way of exampe and not imitation, these execut abe instructions may be in the form of genera-purpose emai handing software. [0049] The emai handing software may have a oca per sistent store of a set of recipient emai addresses for Which the computer system is prepared to accept incoming mai mes sages by Way of the SMTP protoco, as We as a maibox store for each recipient to hod deivered mai messages. The emai handing software may be prepared to aow retrieva of mai messages from the maibox store by outside computer sys tems using the POP or IMAP protocos. The emai handing software may impement an authentication mechanism to vaidate the authenticity of incoming POP or IMAP connec tions. The authentication mechanism may aow ony outside computer systems that are in possession of per-recipient secret information, such as a password or key, to aow retrieva of mai. [0050] Each backend s set of recipient emai addresses may be a subset of the tota of a recipient emai addresses hosted by the embodiment. The backend s set of recipient emai addresses may overap that of another backend. [0051] At east one of the computer systems, the oad ba ancer 1 06, sha impement the method of accepting incoming connections from outside emai s 108 and outside POP/ IMAP cients 209, and making connections 103 to emai s. SMTP, IMAP, and POP commands and repies may be passed aong a session 107 between the outside cients/ s and the oad baancer. SMTP, IMAP and POP com mands may be passed between the oad baancer and the backend s. The oad baancer may hod connections open to the outside cients/s Whie at the same time hoding a connection open to the backend s, and may reay commands and repies between the backend s and the outside cients/s. The reay of commands and repies may invove dupication or ateration. [0052] The oad baancer may have access to an emai data base. In the preferred embodiment of the invention the emai database may be stored Within the oad baancer on a persis tent storage media and/ or in a voatie storage media, the atter possiby for reasons of performance. The database may aso be stored remotey and be accessibe to the oad baancer in such a manner as is famiiar to those skied in the art. By Way of exampe and not imitation, in the preferred embodiment of the invention, the oad baancer may have an in-memory hash-tabe of a hosted emai addresses and identifying tokens, associated to any data that may be required as herein described in terms of database and ook up. [0053] The DNS service pertaining to the domain part of a emai addresses in the herein described database may be con?gured With MX (Mai Exchanger) records pointing to the oad baancer. [0054] By Way of exampe and not imitation, the preferred embodiment herein described may incude a connection-ori ented software impementation Which can accept incoming connections and initiate outgoing connections. The connec tions may, by Way of exampe, be TCP/IP connections, and may be accessibe through an Appication Programming Interface (API), Which may be the Berkeey Socket API, the WindoWs Socket API, or other API. The connections require handing in a concurrent fashion so that a puraity of sessions of emai retrieva and/or deivery are handed concurrenty; such being famiiar to those skied in the art. Such concurrent handing may be impemented using a muti-threaded pro gramming mode, an event-based state-machine program ming mode, a cooperative threading programming mode, or other programming mode, or a programming mode that is a combination of one or more of those herein described. Because some programming modes may be better suited to hande very arge numbers of concurrent connections, the programming mode may be thusy chosen, however the invention is not imited to a speci?c programming mode. [0055] In the preferred embodiment of the invention the oad baancer may send commands, by Way of exampe, according to the sequence shown in FIG. 3 and FIG. 4. [0056] The oad baancer may interact With the outside emai according to part of the interactions 301 of the SMTP protoco. Herein the terms 220, EHLO, 250, MAIL FROM, and RCPT TO are famiiar to those skied in the art. [0057] The oad baancer may ook up 302 from the data base, the emai designator corresponding to the recipi ent emai, and any aias expansions and associated emai addresses as We as their respective emai designators, in a recursive fashion. The oad baancer Wi then connect 303 to the emai corresponding to the designator. [0058] The oad baancer may interact With the emai according to the interactions 304 of the SMTP protoco. Herein the terms 220, EHLO, 250, MAIL FROM, and RCPT TO are famiiar to those skied in the art. If a faiure repy code is returned by the emai, then the same faiure repy code may be returned by the oad baancer to the outside emai. There is one case, however, Where the same repy code may not be sent: if an error repy code is returned by the emai in response to a RCPT TO Where the same emai has previousy returned a suc cess repy code in response to a prior RCPT TO. For this

12 US 2011/ A1 Aug. 11,2011 exception a 5yZ response code may be substituted in order to prevent dupicate deiveries. [0059] The oad baancer may interact With the outside emai according to the remainder of the interactions 405 of the SMTP protoco. Herein the terms DATA and 354 are famiiar to those skied in the art. In order to ensure that a emai s receive the compete emai data, the oad baancer may perform the interactions 406 of fuy transmit ting each chunk to a emai s before proceeding to receive the next chunk. The?rst chunk may be prepended With a Receivedz header for compiance With the SMTP protoco. [0060] The steps herein may be repeated as required by the outside emai. [0061] In the preferred embodiment of the invention the oad baancer may additionay send groups commands, by Way of exampe, according to the sequence shown in FIG. 5. [0062] The POP/IMAP cient may connect 501 and authen ticate 502 itsef to the oad baancer using one of the methods of authentication We known to those skied in the art. This incudes, by Way of exampe, the authentication methods of APOP, LOGIN, NTLM, or CRAM-MDS. [0063] The oad baancer may ook up 503 from the data base, the emai designator corresponding to the iden tifying token of the authentication step, and then connect 504 to the corresponding. In the preferred embodiment of the invention the identifying token is mapped to the recipi ent s emai address or is identica to the recipient s emai address. [0064] The oad baancer may interact 505 With the emai according to the interactions of the POP/IMAP proto co. [0065] In the preferred embodiment of the invention the oad baancer may additionay send groups commands, by Way of exampe, according to the sequence shown in FIG. 6. [0066] The SMTP cient may connect 601 and authenticate 602 itsef to the oad baancer using one of the methods of authentication We known to those skied in the art. This incudes, by Way of exampe, the authentication methods of PLAIN, LOGIN, NTLM, or CRAM-MDS. [0067] The oad baancer may ook up 603 from the data base, the emai designator corresponding to the iden tifying token of the authentication, and then connect 604 to the corresponding. In the preferred embodiment of the invention the identifying token is mapped to the sender s emai address (reverse path emai address) or is identica to the sender s emai address. [0068] The oad baancer may transparenty forward 605 data between the SMTP cient and the emai. [0069] The preferred embodiment herein described, refers to the SMTP cient as authenticating itsef using an authenti cation method that empoys an identifying token. Such authentication may be dispensed With if the IP address of the SMTP cient is Within the ream of IP addresses aowed to reay mai. In this case, instead of an identifying token, the sender emai address (reverse path emai address) may be used to ook up the emai designator from the database. The remainder of the interactions proceed simiary forth With. [0070] The preferred embodiment herein described refers to SMTP but shoud not be construed as imiting the scope of the invention to this protoco ony. Other protocos that enabe the deivery of emai, as We as protocos based on SMTP, or protocos that are re?nements or extensions to SMTP are aso incuded Within the scope of the invention. [0071] The preferred embodiment herein described refers to POP/IMAP but shoud not be construed as imiting the scope of the invention to these two protocos ony. Other protocos that enabe the retrieva of emai, as We as proto cos based on POP or IMAP, or protocos that are re?nements or extensions to POP or IMAP are aso incuded Within the scope of the invention. [0072] The preferred embodiment may incude a puraity of computer systems each a oad baancer. A oad baancers may be isted as DNS MX records for a reevant domains. Outside SMTP connections may then choose a oad baancer from the set of reevant MX records in such a Way as to avoid those that are unavaiabe due to faiure. This embodies a mutipy redundant service, toerant to faiures of individua oad baancer computer systems. Both embodiments empoy ing a singe oad baancer as We as embodiments empoying a puraity of oad baancers, are incuded Within the scope of the present invention. What is caimed is: 1. A system for distributing emai deiveries over a puraity of emai s comprising the steps of: intercepting the emai deivery session; identifying emai recipients Within the emai deivery ses sion; resoving emai recipients to corresponding emai s that are prepared to accept deivery for those recipients; and repicating, possiby With modi?cation, the emai deivery session toward the corresponding emai s; Wherein the emai deivery sessions are processed in an over apping fashion such that ony discrete parts of the emai message data are at any one time stored or known to the intercepting component of the system. 2. The method of caim 1, further comprising the step of expanding identi?ed emai recipients into a puraity of aias emai recipients, Wherein the system then proceeds according to the steps for each. 3. A system for distributing emai retrievas over a puraity of emai s comprising the steps of: intercepting the authentication step of the emai retrieva session; identifying the emai recipient from the authentication tokens; resoving the emai recipient to a corresponding emai that is prepared to accept retrieva by that recipi ent; and repicating, possiby With modi?cation, the emai retrieva session toward the corresponding emai ; Wherein the emai retrieva sessions are processed in an over apping fashion such that ony discrete parts of the emai message data are at any one time stored or known to the intercepting component of the system. 4. The method of caim 3 further comprising the imitation that, for each recipient, the emai retrieva session is repi cated to the same emai as Woud an emai deivery session for the same recipient. 5. A system for distributing emai deiveries for authorized senders over a puraity of emai s comprising the steps of:

13 US 2011/ A1 Aug. 11,2011 intercepting the emai deivery session; identifying the emai sender Within the emai deivery ses sion; resoving the emai sender to a corresponding emai that is prepared to reay the deivery for that sender; and repicating, possiby With modi?cation, the emai deivery session toward the corresponding emai ; Wherein the emai deivery sessions are processed in an over apping fashion such that ony discrete parts of the emai message data are at any one time stored or known to the intercepting component of the system. 6. The method of caim 5 further comprising the imitation that, for an emai sender, the emai deivery session is repi cated to the same emai as Woud the emai deivery session of the same emai recipient. * * * * *

US 20060288075Al (19) United States (12) Patent Application Publication (10) Pub. No.: US 2006/0288075 A1 Wu (57) A sender is selectively input- S301

US 20060288075Al (19) United States (12) Patent Application Publication (10) Pub. No.: US 2006/0288075 A1 Wu (57) A sender is selectively input- S301 US 20060288075A (19) United States (12) Patent Appication Pubication (10) Pub. No.: US 2006/0288075 A1 Wu (43) Pub. Date: Dec. 21, 2006 (54) ELECTRONIC MAILBOX ADDRESS BOOK MANAGEMENT SYSTEM AND METHOD

More information

(12) Patent Application Publication (10) Pub. N0.: US 2006/0105797 A1 Marsan et al. (43) Pub. Date: May 18, 2006

(12) Patent Application Publication (10) Pub. N0.: US 2006/0105797 A1 Marsan et al. (43) Pub. Date: May 18, 2006 (19) United States US 20060105797A (12) Patent Appication Pubication (10) Pub. N0.: US 2006/0105797 A1 Marsan et a. (43) Pub. Date: (54) METHOD AND APPARATUS FOR (52) US. C...... 455/522 ADJUSTING A MOBILE

More information

(12) United States Patent Rune

(12) United States Patent Rune (12) United States Patent Rune US006304913B1 (10) Patent N0.: (45) Date of Patent: US 6,304,913 B1 on. 16, 2001 (54) INTERNET SYSTEM AND METHOD FOR SELECTING A CLOSEST SERVER FROM A PLURALITY OF ALTERNATIVE

More information

Chapter 3: e-business Integration Patterns

Chapter 3: e-business Integration Patterns Chapter 3: e-business Integration Patterns Page 1 of 9 Chapter 3: e-business Integration Patterns "Consistency is the ast refuge of the unimaginative." Oscar Wide In This Chapter What Are Integration Patterns?

More information

Advanced ColdFusion 4.0 Application Development - 3 - Server Clustering Using Bright Tiger

Advanced ColdFusion 4.0 Application Development - 3 - Server Clustering Using Bright Tiger Advanced CodFusion 4.0 Appication Deveopment - CH 3 - Server Custering Using Bri.. Page 1 of 7 [Figures are not incuded in this sampe chapter] Advanced CodFusion 4.0 Appication Deveopment - 3 - Server

More information

SNMP Reference Guide for Avaya Communication Manager

SNMP Reference Guide for Avaya Communication Manager SNMP Reference Guide for Avaya Communication Manager 03-602013 Issue 1.0 Feburary 2007 2006 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this

More information

US 20020059452A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2002/0059452 A1 Yokota et al. (43) Pub. Date: May 16, 2002

US 20020059452A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2002/0059452 A1 Yokota et al. (43) Pub. Date: May 16, 2002 US 20020059452A1 (19) United States (12) Patent Appication Pubication (10) Pub. No.: US 2002/0059452 A1 Yokota et a. (43) Pub. Date: May 16, 2002 (54) METHOD AND SYSTEM FOR (30) Foreign Appication Priority

More information

(12) United States Patent

(12) United States Patent (12) United States Patent US008099768B2 (10) Patent N0.: Cheng et a]. () Date of Patent: Jan. 17, 12 (54) METHOD AND SYSTEM FOR (56) References Cited MULTI-PROTOCOL SINGLE LOGOUT U.S. PATENT DOCUMENTS

More information

TCP/IP Gateways and Firewalls

TCP/IP Gateways and Firewalls Gateways and Firewas 1 Gateways and Firewas Prof. Jean-Yves Le Boudec Prof. Andrzej Duda ICA, EPFL CH-1015 Ecubens http://cawww.epf.ch Gateways and Firewas Firewas 2 o architecture separates hosts and

More information

US 20090193 l46al (19) United States (12) Patent Application Publication (10) Pub. No.: US 2009/0193146 A1 Albert et al.

US 20090193 l46al (19) United States (12) Patent Application Publication (10) Pub. No.: US 2009/0193146 A1 Albert et al. US 20090193 46A (19) United States (12) Patent Appication Pubication (10) Pub. No.: US 2009/0193146 A1 Abert et a. (43) Pub. Date: Ju. 30, 2009 (54) UTLZNG VRTUAL SERVER WEGHT FOR (22) Fied: Jan. 24, 2008

More information

US 20080120174A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2008/0120174 A1 L1 (43) Pub. Date: May 22, 2008

US 20080120174A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2008/0120174 A1 L1 (43) Pub. Date: May 22, 2008 US 20080120174A1 (19) United States (12) Patent Appication Pubication (10) Pub. No.: US 2008/0120174 A1 L1 (43) Pub. Date: May 22, 2008 (54) METHOD AND SYSTEM FOR FLEXIBLE Pubication Cassi?cation PRODUCT

More information

Avaya Remote Feature Activation (RFA) User Guide

Avaya Remote Feature Activation (RFA) User Guide Avaya Remote Feature Activation (RFA) User Guide 03-300149 Issue 5.0 September 2007 2007 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this document

More information

Australian Bureau of Statistics Management of Business Providers

Australian Bureau of Statistics Management of Business Providers Purpose Austraian Bureau of Statistics Management of Business Providers 1 The principa objective of the Austraian Bureau of Statistics (ABS) in respect of business providers is to impose the owest oad

More information

US 20060206935Al (19) United States (12) Patent Application Publication (10) Pub. No.: US 2006/0206935 A1 Choi et al. (43) Pub. Date: Sep.

US 20060206935Al (19) United States (12) Patent Application Publication (10) Pub. No.: US 2006/0206935 A1 Choi et al. (43) Pub. Date: Sep. US 20060206935A (19) United States (12) Patent Appication Pubication (10) Pub. No.: US 20060206935 A1 Choi et a. (43) Pub. Date: Sep. 14, 2006 (54) APPARATUS AND METHOD FOR ADAPTVELY PREVENTNG ATTACKS

More information

The Domain Name System (DNS)

The Domain Name System (DNS) D 1 The Domain Name System (D) Prof. Jean-Yves Le Boudec Prof. ndrzej Duda IC, EPFL CH-1015 Ecubens http://cawww.epf.ch o o Domain Name System: D Objective of D support user friendy naming of resources:

More information

Design Considerations

Design Considerations Chapter 2: Basic Virtua Private Network Depoyment Page 1 of 12 Chapter 2: Basic Virtua Private Network Depoyment Before discussing the features of Windows 2000 tunneing technoogy, it is important to estabish

More information

SABRe B2.1: Design & Development. Supplier Briefing Pack.

SABRe B2.1: Design & Development. Supplier Briefing Pack. SABRe B2.1: Design & Deveopment. Suppier Briefing Pack. 2013 Ros-Royce pc The information in this document is the property of Ros-Royce pc and may not be copied or communicated to a third party, or used

More information

Internal Control. Guidance for Directors on the Combined Code

Internal Control. Guidance for Directors on the Combined Code Interna Contro Guidance for Directors on the Combined Code ISBN 1 84152 010 1 Pubished by The Institute of Chartered Accountants in Engand & Waes Chartered Accountants Ha PO Box 433 Moorgate Pace London

More information

INDUSTRIAL AND COMMERCIAL

INDUSTRIAL AND COMMERCIAL Finance TM NEW YORK CITY DEPARTMENT OF FINANCE TAX & PARKING PROGRAM OPERATIONS DIVISION INDUSTRIAL AND COMMERCIAL ABATEMENT PROGRAM PRELIMINARY APPLICATION AND INSTRUCTIONS Mai to: NYC Department of Finance,

More information

Early access to FAS payments for members in poor health

Early access to FAS payments for members in poor health Financia Assistance Scheme Eary access to FAS payments for members in poor heath Pension Protection Fund Protecting Peope s Futures The Financia Assistance Scheme is administered by the Pension Protection

More information

Fast Robust Hashing. ) [7] will be re-mapped (and therefore discarded), due to the load-balancing property of hashing.

Fast Robust Hashing. ) [7] will be re-mapped (and therefore discarded), due to the load-balancing property of hashing. Fast Robust Hashing Manue Urueña, David Larrabeiti and Pabo Serrano Universidad Caros III de Madrid E-89 Leganés (Madrid), Spain Emai: {muruenya,darra,pabo}@it.uc3m.es Abstract As statefu fow-aware services

More information

NCH Software BroadCam Video Streaming Server

NCH Software BroadCam Video Streaming Server NCH Software BroadCam Video Streaming Server This user guide has been created for use with BroadCam Video Streaming Server Version 2.xx NCH Software Technica Support If you have difficuties using BroadCam

More information

Teamwork. Abstract. 2.1 Overview

Teamwork. Abstract. 2.1 Overview 2 Teamwork Abstract This chapter presents one of the basic eements of software projects teamwork. It addresses how to buid teams in a way that promotes team members accountabiity and responsibiity, and

More information

Setting Up Your Internet Connection

Setting Up Your Internet Connection 4 CONNECTING TO CHANCES ARE, you aready have Internet access and are using the Web or sending emai. If you downoaded your instaation fies or instaed esigna from the web, you can be sure that you re set

More information

AA Fixed Rate ISA Savings

AA Fixed Rate ISA Savings AA Fixed Rate ISA Savings For the road ahead The Financia Services Authority is the independent financia services reguator. It requires us to give you this important information to hep you to decide whether

More information

I DATA PORTS 162 I I T I I

I DATA PORTS 162 I I T I I L L i _ > A W _ i _ A 7 i L L US 20040047286A1 (19) United States (12) Patent Appication Pubication (10) Pub. No.: US 2004/0047286 A1 Larsen et a. (43) Pub. Date: (54) NETWORK SWTCH ASSEMBLY, NETWORK SWTCHNG

More information

Bite-Size Steps to ITIL Success

Bite-Size Steps to ITIL Success 7 Bite-Size Steps to ITIL Success Pus making a Business Case for ITIL! Do you want to impement ITIL but don t know where to start? 7 Bite-Size Steps to ITIL Success can hep you to decide whether ITIL can

More information

Secure Network Coding with a Cost Criterion

Secure Network Coding with a Cost Criterion Secure Network Coding with a Cost Criterion Jianong Tan, Murie Médard Laboratory for Information and Decision Systems Massachusetts Institute of Technoogy Cambridge, MA 0239, USA E-mai: {jianong, medard}@mit.edu

More information

NCH Software MoneyLine

NCH Software MoneyLine NCH Software MoneyLine This user guide has been created for use with MoneyLine Version 2.xx NCH Software Technica Support If you have difficuties using MoneyLine pease read the appicabe topic before requesting

More information

WEBSITE ACCOUNT USER GUIDE SECURITY, PASSWORD & CONTACTS

WEBSITE ACCOUNT USER GUIDE SECURITY, PASSWORD & CONTACTS WEBSITE ACCOUNT USER GUIDE SECURITY, PASSWORD & CONTACTS Password Reset Process Navigate to the og in screen Seect the Forgot Password ink You wi be asked to enter the emai address you registered with

More information

EDS-Unigraphics MIS DataBroker Architecture

EDS-Unigraphics MIS DataBroker Architecture EDS-Unigraphics MIS DataBroker Architecture Jeff Greiner Bob Woodridge October 9,1996 Topics UG/MIS Probem Domain Requirements for New Architecture Seection of Java Deveoping Java Based Intranet Soutions

More information

WINMAG Graphics Management System

WINMAG Graphics Management System SECTION 10: page 1 Section 10: by Honeywe WINMAG Graphics Management System Contents What is WINMAG? WINMAG Text and Graphics WINMAG Text Ony Scenarios Fire/Emergency Management of Fauts & Disabement Historic

More information

Big Data projects and use cases. Claus Samuelsen IBM Analytics, Europe csa@dk.ibm.com

Big Data projects and use cases. Claus Samuelsen IBM Analytics, Europe csa@dk.ibm.com Big projects and use cases Caus Samuesen IBM Anaytics, Europe csa@dk.ibm.com IBM Sofware Overview of BigInsights IBM BigInsights Scientist Free Quick Start (non production): IBM Open Patform BigInsights

More information

WHITE PAPER BEsT PRAcTIcEs: PusHIng ExcEl BEyond ITs limits WITH InfoRmATIon optimization

WHITE PAPER BEsT PRAcTIcEs: PusHIng ExcEl BEyond ITs limits WITH InfoRmATIon optimization Best Practices: Pushing Exce Beyond Its Limits with Information Optimization WHITE Best Practices: Pushing Exce Beyond Its Limits with Information Optimization Executive Overview Microsoft Exce is the

More information

(12) United States Patent (10) Patent No.: US 8,259,911 B1 Trandal et al. (45) Date of Patent: *Sep. 4, 2012

(12) United States Patent (10) Patent No.: US 8,259,911 B1 Trandal et al. (45) Date of Patent: *Sep. 4, 2012 USOO8259911B1 (12) United States Patent (10) Patent No.: Tranda et a. (45) Date of Patent: *Sep. 4, 12 (54) CALL PROCESSING AND SUBSCRIBER 3,956,595 A 5/1976 Sobanski REGISTRATION SYSTEMS AND METHODS 4,009,337

More information

Learning from evaluations Processes and instruments used by GIZ as a learning organisation and their contribution to interorganisational learning

Learning from evaluations Processes and instruments used by GIZ as a learning organisation and their contribution to interorganisational learning Monitoring and Evauation Unit Learning from evauations Processes and instruments used by GIZ as a earning organisation and their contribution to interorganisationa earning Contents 1.3Learning from evauations

More information

S E C U R I T Y A D M I N I S T R A T I O N G U I D E

S E C U R I T Y A D M I N I S T R A T I O N G U I D E H Y P E R I O N R E L E A S E 9. 3. 1 S E C U R I T Y A D M I N I S T R A T I O N G U I D E P / N : D H 0 9 9 9 3 0 1 A Hyperion Shared Services Security Administration Guide, 9.3.1 Copyright 2006, 2009,

More information

Lecture 7 Datalink Ethernet, Home. Datalink Layer Architectures

Lecture 7 Datalink Ethernet, Home. Datalink Layer Architectures Lecture 7 Dataink Ethernet, Home Peter Steenkiste Schoo of Computer Science Department of Eectrica and Computer Engineering Carnegie Meon University 15-441 Networking, Spring 2004 http://www.cs.cmu.edu/~prs/15-441

More information

Technical Writing - A Glossary of English Language Terms

Technical Writing - A Glossary of English Language Terms US008589474B2 (12) United States Patent Parsons et a. (10) Patent N0.: (45) Date of Patent: US 8,589,474 B2 *Nov. 19, 2013 (54) (75) (73) (21) (22) (65) (51) (52) (58) (56) SYSTEMS AND METHODS FOR SOFTWARE

More information

professional indemnity insurance proposal form

professional indemnity insurance proposal form professiona indemnity insurance proposa form Important Facts Reating To This Proposa Form You shoud read the foowing advice before proceeding to compete this proposa form. Duty of Discosure Before you

More information

GREEN: An Active Queue Management Algorithm for a Self Managed Internet

GREEN: An Active Queue Management Algorithm for a Self Managed Internet : An Active Queue Management Agorithm for a Sef Managed Internet Bartek Wydrowski and Moshe Zukerman ARC Specia Research Centre for Utra-Broadband Information Networks, EEE Department, The University of

More information

READING A CREDIT REPORT

READING A CREDIT REPORT Name Date CHAPTER 6 STUDENT ACTIVITY SHEET READING A CREDIT REPORT Review the sampe credit report. Then search for a sampe credit report onine, print it off, and answer the questions beow. This activity

More information

NCH Software Express Accounts Accounting Software

NCH Software Express Accounts Accounting Software NCH Software Express Accounts Accounting Software This user guide has been created for use with Express Accounts Accounting Software Version 5.xx NCH Software Technica Support If you have difficuties using

More information

Art of Java Web Development By Neal Ford 624 pages US$44.95 Manning Publications, 2004 ISBN: 1-932394-06-0

Art of Java Web Development By Neal Ford 624 pages US$44.95 Manning Publications, 2004 ISBN: 1-932394-06-0 IEEE DISTRIBUTED SYSTEMS ONLINE 1541-4922 2005 Pubished by the IEEE Computer Society Vo. 6, No. 5; May 2005 Editor: Marcin Paprzycki, http://www.cs.okstate.edu/%7emarcin/ Book Reviews: Java Toos and Frameworks

More information

ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES. l l

ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES. l l ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES The Eectronic Fund Transfers we are capabe of handing for consumers are indicated beow some of which may not appy your account Some of these may

More information

Fixed income managers: evolution or revolution

Fixed income managers: evolution or revolution Fixed income managers: evoution or revoution Traditiona approaches to managing fixed interest funds rey on benchmarks that may not represent optima risk and return outcomes. New techniques based on separate

More information

Traffic classification-based spam filter

Traffic classification-based spam filter Traffic cassification-based spam fiter Ni Zhang 1,2, Yu Jiang 3, Binxing Fang 1, Xueqi Cheng 1, Li Guo 1 1 Software Division, Institute of Computing Technoogy, Chinese Academy of Sciences, 100080, Beijing,

More information

Human Capital & Human Resources Certificate Programs

Human Capital & Human Resources Certificate Programs MANAGEMENT CONCEPTS Human Capita & Human Resources Certificate Programs Programs to deveop functiona and strategic skis in: Human Capita // Human Resources ENROLL TODAY! Contract Hoder Contract GS-02F-0010J

More information

INTERNATIONAL PAYMENT INSTRUMENTS

INTERNATIONAL PAYMENT INSTRUMENTS INTERNATIONAL PAYMENT INSTRUMENTS Dr Nguyen Minh Duc 2009 1 THE INTERNATIONAL CHAMBER OF COMMERCE THE ICC AT A GLANCE represent the word business community at nationa and internationa eves promotes word

More information

... HSA ... Health Savings Account. Custodial. (includes self-direction)

... HSA ... Health Savings Account. Custodial. (includes self-direction) HSA Heath Savings Account Custodia (incudes sef-direction) ADDITIONAL INFORMATION Purpose This Organizer contains documents necessary to estabish a Heath Savings Account (HSA) It meets the requirements

More information

3.3 SOFTWARE RISK MANAGEMENT (SRM)

3.3 SOFTWARE RISK MANAGEMENT (SRM) 93 3.3 SOFTWARE RISK MANAGEMENT (SRM) Fig. 3.2 SRM is a process buit in five steps. The steps are: Identify Anayse Pan Track Resove The process is continuous in nature and handed dynamicay throughout ifecyce

More information

Frequently Asked Questions

Frequently Asked Questions Community Heathcare Organisations Report & Recommendations of the Integrated Service Area Review Group Frequenty Asked Questions 1. What are Community Heathcare Services? Community Heathcare Services are

More information

LT Codes-based Secure and Reliable Cloud Storage Service

LT Codes-based Secure and Reliable Cloud Storage Service 2012 Proceedings IEEE INFOCOM LT Codes-based Secure and Reiabe Coud Storage Service Ning Cao Shucheng Yu Zhenyu Yang Wenjing Lou Y. Thomas Hou Worcester Poytechnic Institute, Worcester, MA, USA University

More information

APIS Software Training /Consulting

APIS Software Training /Consulting APIS Software Training /Consuting IQ-Software Services APIS Informationstechnoogien GmbH The information contained in this document is subject to change without prior notice. It does not represent any

More information

mi-rm mi-recruitment Manager the recruitment solution for Talent Managers everywhere

mi-rm mi-recruitment Manager the recruitment solution for Talent Managers everywhere mi-rm mi-recruitme Manager the recruitme soution for Tae Managers everywhere mi-rm mi-recruitme Manager Your very own tae manager First Choice Software has been a eading suppier of recruitme software since

More information

The eg Suite Enabing Rea-Time Monitoring and Proactive Infrastructure Triage White Paper Restricted Rights Legend The information contained in this document is confidentia and subject to change without

More information

Chapter 3: JavaScript in Action Page 1 of 10. How to practice reading and writing JavaScript on a Web page

Chapter 3: JavaScript in Action Page 1 of 10. How to practice reading and writing JavaScript on a Web page Chapter 3: JavaScript in Action Page 1 of 10 Chapter 3: JavaScript in Action In this chapter, you get your first opportunity to write JavaScript! This chapter introduces you to JavaScript propery. In addition,

More information

Pay-on-delivery investing

Pay-on-delivery investing Pay-on-deivery investing EVOLVE INVESTment range 1 EVOLVE INVESTMENT RANGE EVOLVE INVESTMENT RANGE 2 Picture a word where you ony pay a company once they have deivered Imagine striking oi first, before

More information

NCH Software FlexiServer

NCH Software FlexiServer NCH Software FexiServer This user guide has been created for use with FexiServer Version 1.xx NCH Software Technica Support If you have difficuties using FexiServer pease read the appicabe topic before

More information

Hedge Fund Capital Accounts and Revaluations: Are They Section 704(b) Compliant?

Hedge Fund Capital Accounts and Revaluations: Are They Section 704(b) Compliant? o EDITED BY ROGER F. PILLOW, LL.M. PARTNERSHIPS, S CORPORATIONS & LLCs Hedge Fund Capita Accounts and Revauations: Are They Section 704(b) Compiant? THOMAS GRAY Hedge funds treated as partnerships for

More information

PREFACE. Comptroller General of the United States. Page i

PREFACE. Comptroller General of the United States. Page i - I PREFACE T he (+nera Accounting Office (GAO) has ong beieved that the federa government urgenty needs to improve the financia information on which it bases many important decisions. To run our compex

More information

The growth of online Internet services during the past decade has increased the

The growth of online Internet services during the past decade has increased the IEEE DS Onine, Voume 2, Number 3 March 2001 Strategies for CORBA Middeware-Based Load Baancing Ossama Othman, Caros O'Ryan, and Dougas C. Schmidt University of Caifornia, Irvine The growth of onine Internet

More information

Vision Helpdesk Client Portal User Guide

Vision Helpdesk Client Portal User Guide Hepdesk Hepdesk Vision Hepdesk Cient Porta User Guide VISION HELPDESK v3 User Guide (for Cient) CLIENT PORTAL DETAILS VISION HELPDESK v3 User Guide (for Cient) Hepdesk Index Cient Porta.....................................................

More information

Business Banking. A guide for franchises

Business Banking. A guide for franchises Business Banking A guide for franchises Hep with your franchise business, right on your doorstep A true understanding of the needs of your business: that s what makes RBS the right choice for financia

More information

NCH Software Warp Speed PC Tune-up Software

NCH Software Warp Speed PC Tune-up Software NCH Software Warp Speed PC Tune-up Software This user guide has been created for use with Warp Speed PC Tune-up Software Version 1.xx NCH Software Technica Support If you have difficuties using Warp Speed

More information

Application and Desktop Virtualization

Application and Desktop Virtualization Appication and Desktop Virtuaization Content 1) Why Appication and Desktop Virtuaization 2) Some terms reated to vapp and vdesktop 3) Appication and Desktop Deivery 4) Appication Virtuaization 5)- Type

More information

NJ (US) (51) Int. Cl. H04L 9/00 (2006.01) Correspondence Address: (52) US. Cl... 380/278; 713/ 150 ALFRED C. ROTH (57) ABSTRACT

NJ (US) (51) Int. Cl. H04L 9/00 (2006.01) Correspondence Address: (52) US. Cl... 380/278; 713/ 150 ALFRED C. ROTH (57) ABSTRACT . I. I. I US 20080187140A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2008/0187140 A1 McGillian et al. (43) Pub. Date: Aug. 7, 2008 (54) METHOD AND SYSTEM OF SECURELY Related

More information

Income Protection Solutions. Policy Wording

Income Protection Solutions. Policy Wording Income Protection Soutions Poicy Wording Wecome to Aviva This booket tes you a you need to know about your poicy, incuding: what to do if you need to caim what s covered, and expanations of some of the

More information

ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES

ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES About ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES The Eectronic Fund Transfers we are capabe of handing for consumers are indicated beow, some of which may not appy your account. Some of

More information

NCH Software Bolt PDF Printer

NCH Software Bolt PDF Printer NCH Software Bot PDF Printer This user guide has been created for use with Bot PDF Printer Version 1.xx NCH Software Technica Support If you have difficuties using Bot PDF Printer pease read the appicabe

More information

(43) Pub. Date: May 1, 2008

(43) Pub. Date: May 1, 2008 US 20080103923A1 (19) United States (12) Patent Appication Pubication (10) Pub. No.: US 2008/0103923 A1 Rieck et a. (43) Pub. Date: (54) (75) (73) (21) (22) (60) CENTRALIZED PAYMENT GATEWAY SYSTEM AND

More information

Order-to-Cash Processes

Order-to-Cash Processes TMI170 ING info pat 2:Info pat.qxt 01/12/2008 09:25 Page 1 Section Two: Order-to-Cash Processes Gregory Cronie, Head Saes, Payments and Cash Management, ING O rder-to-cash and purchase-topay processes

More information

HAVE YOU EMBRACED THE NEW E-DISCOVERY RULES OR ARE YOU JUST HOPING YOU WON T HAVE TO DEAL WITH THEM?

HAVE YOU EMBRACED THE NEW E-DISCOVERY RULES OR ARE YOU JUST HOPING YOU WON T HAVE TO DEAL WITH THEM? J U N E 2 0 0 9 N E V A D A L A W Y E R HAVE YOU EMBRACED THE NEW E-DISCOVERY RULES OR ARE YOU JUST HOPING YOU WON T HAVE TO DEAL WITH THEM? BY JOHN L. KRIEGER, ESQ. The amendments to the Federa Rues of

More information

Normalization of Database Tables. Functional Dependency. Examples of Functional Dependencies: So Now what is Normalization? Transitive Dependencies

Normalization of Database Tables. Functional Dependency. Examples of Functional Dependencies: So Now what is Normalization? Transitive Dependencies ISM 602 Dr. Hamid Nemati Objectives The idea Dependencies Attributes and Design Understand concepts normaization (Higher-Leve Norma Forms) Learn how to normaize tabes Understand normaization and database

More information

Income Protection Options

Income Protection Options Income Protection Options Poicy Conditions Introduction These poicy conditions are written confirmation of your contract with Aviva Life & Pensions UK Limited. It is important that you read them carefuy

More information

Chapter 3: Authentication and Resource Protection in Windows 2000

Chapter 3: Authentication and Resource Protection in Windows 2000 Chapter 3: Authentication and Resource Protection in Windows 2000 Page 1 of 23 Chapter 3: Authentication and Resource Protection in Windows 2000 Because this is a user administration book, not a security

More information

ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES. l l

ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES. l l ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES The Eectronic Fund Transfers we are capabe of handing for consumers are indicated beow some of which may not appy your account Some of these may

More information

DOING BUSINESS WITH THE REGION OF PEEL A GUIDE FOR NEW AND CURRENT VENDORS

DOING BUSINESS WITH THE REGION OF PEEL A GUIDE FOR NEW AND CURRENT VENDORS DOING BUSINESS WITH THE REGION OF PEEL A GUIDE FOR NEW AND CURRENT VENDORS TABLE OF CONTENTS INTRODUCTION... 1 GOVERNANCE... 1 COMMONLY PURCHASED GOODS AND SERVICES... 1 HOW TO REGISTER YOUR COMPANY...

More information

ELECTRONIC FUND TRANSFERS. l l l. l l. l l l. l l l

ELECTRONIC FUND TRANSFERS. l l l. l l. l l l. l l l Program Organization = Number "1060" = Type "123342" = "ETM2LAZCD" For = "502859" "TCCUS" "" Name "WK Number = Name "First "1001" = "1" Eectronic = "1001" = Financia "Jane Funds Doe" Northwest Xfer PG1

More information

Take me to your leader! Online Optimization of Distributed Storage Configurations

Take me to your leader! Online Optimization of Distributed Storage Configurations Take me to your eader! Onine Optimization of Distributed Storage Configurations Artyom Sharov Aexander Shraer Arif Merchant Murray Stokey sharov@cs.technion.ac.i, {shraex, aamerchant, mstokey}@googe.com

More information

Industry guidance document Checkout workstations in retail - safe design and work practices

Industry guidance document Checkout workstations in retail - safe design and work practices Industry guidance document Checkout workstations in retai - safe design and work practices Industry guidance document Checkout workstations in retai - safe design and work practices WorkSafe Contents Foreword...

More information

Sage Accounts Production Range

Sage Accounts Production Range Sage Accounts Production Range The abiity to dri-down from the face of the accounts makes reviewing accounts so easy. Sage Accounts Production Software As individua as you and your cients Jim O Leary,

More information

The definition of insanity is doing the same thing over and over again and expecting different results

The definition of insanity is doing the same thing over and over again and expecting different results insurance services Sma Business Insurance a market opportunity being missed Einstein may not have known much about insurance, but if you appy his definition to the way existing brands are deveoping their

More information

ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES

ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES The Eectronic Fund Transfers we are capabe of handing for consumers are indicated beow, some of which may not appy your account Some of these

More information

Chapter 2 Traditional Software Development

Chapter 2 Traditional Software Development Chapter 2 Traditiona Software Deveopment 2.1 History of Project Management Large projects from the past must aready have had some sort of project management, such the Pyramid of Giza or Pyramid of Cheops,

More information

We are XMA and Viglen.

We are XMA and Viglen. alearn with Microsoft 16pp 21.07_Layout 1 22/12/2014 10:49 Page 1 FRONT COVER alearn with Microsoft We are XMA and Vigen. Ca us now on 0115 846 4900 Visit www.xma.co.uk/aearn Emai alearn@xma.co.uk Foow

More information

Oracle Hyperion Tax Provision. User's Guide Release 11.1.2.2

Oracle Hyperion Tax Provision. User's Guide Release 11.1.2.2 Orace Hyperion Tax Provision User's Guide Reease 11.1.2.2 Tax Provision User's Guide, 11.1.2.2 Copyright 2013, Orace and/or its affiiates. A rights reserved. Authors: EPM Information Deveopment Team Orace

More information

Best Practices for Push & Pull Using Oracle Inventory Stock Locators. Introduction to Master Data and Master Data Management (MDM): Part 1

Best Practices for Push & Pull Using Oracle Inventory Stock Locators. Introduction to Master Data and Master Data Management (MDM): Part 1 SPECIAL CONFERENCE ISSUE THE OFFICIAL PUBLICATION OF THE Orace Appications USERS GROUP spring 2012 Introduction to Master Data and Master Data Management (MDM): Part 1 Utiizing Orace Upgrade Advisor for

More information

Informatica PowerCenter

Informatica PowerCenter Brochure Informatica PowerCenter Benefits Support better business decisions with the right information at the right time Acceerate projects in days vs. months with improved staff productivity and coaboration

More information

Scheduling in Multi-Channel Wireless Networks

Scheduling in Multi-Channel Wireless Networks Scheduing in Muti-Channe Wireess Networks Vartika Bhandari and Nitin H. Vaidya University of Iinois at Urbana-Champaign, USA vartikab@acm.org, nhv@iinois.edu Abstract. The avaiabiity of mutipe orthogona

More information

INDUSTRIAL PROCESSING SITES COMPLIANCE WITH THE NEW REGULATORY REFORM (FIRE SAFETY) ORDER 2005

INDUSTRIAL PROCESSING SITES COMPLIANCE WITH THE NEW REGULATORY REFORM (FIRE SAFETY) ORDER 2005 INDUSTRIAL PROCESSING SITES COMPLIANCE WITH THE NEW REGULATORY REFORM (FIRE SAFETY) ORDER 2005 Steven J Manchester BRE Fire and Security E-mai: manchesters@bre.co.uk The aim of this paper is to inform

More information

US 20140046812A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2014/0046812 A1 FAN et al. (43) Pub. Date: Feb.

US 20140046812A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2014/0046812 A1 FAN et al. (43) Pub. Date: Feb. US 20140046812A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2014/0046812 A1 FAN et al. (43) Pub. Date: (54) EXPENSE REPORTS FOR PAYMENTS MADE (52) US. Cl. WITH A MOBILE DEVICE

More information

eg Enterprise vs. a Big 4 Monitoring Soution: Comparing Tota Cost of Ownership Restricted Rights Legend The information contained in this document is confidentia and subject to change without notice. No

More information

/ \33 40 \ / \\ \ \ M / 32. 28f 1. (19) United States (12) Patent Application Publication Lawser et al. NETWORK \ 36. SERVlCE 'NTERNET SERVICE

/ \33 40 \ / \\ \ \ M / 32. 28f 1. (19) United States (12) Patent Application Publication Lawser et al. NETWORK \ 36. SERVlCE 'NTERNET SERVICE (19) United States (12) Patent Application Publication Lawser et al. US 20130336314A1 (10) Pub. N0.: US 2013/0336314 A1 (43) Pub. Date: Dec. 19, 2013 (54) (71) (72) (73) (21) (22) (63) METHOD FOR COMPLETING

More information

Qualifications, professional development and probation

Qualifications, professional development and probation UCU Continuing Professiona Deveopment Quaifications, professiona deveopment and probation Initia training and further education teaching quaifications Since September 2007 a newy appointed FE ecturers,

More information

NETWORK BOUNDARY PRIVATE NETWORK PUBLIC _1 NETWORK

NETWORK BOUNDARY PRIVATE NETWORK PUBLIC _1 NETWORK US 20050177647A1 (19) United States (12) Patent Application Publication (10) Pub. No.: US 2005/0177647 A1 Anantha et al. (43) Pub. Date: (54) (75) (73) (21) (22) (51) MOBILE IP EXTENSION TO SUPPORT PRIVATE

More information

US 20090157756Al (19) United States (12) Patent Application Publication (10) Pub. No.: US 2009/0157756 A1 Sanvido (43) Pub. Date: Jun.

US 20090157756Al (19) United States (12) Patent Application Publication (10) Pub. No.: US 2009/0157756 A1 Sanvido (43) Pub. Date: Jun. US 20090157756Al (19) United States (12) Patent Application Publication (10) Pub. No.: US 2009/0157756 A1 Sanvido (43) Pub. Date: Jun. 18, 2009 (54) FILE SYSTEM FOR STORING FILES IN Publication Classi?cation

More information

The growth of online Internet services during the past decade has

The growth of online Internet services during the past decade has IEEE DS Onine, Voume 2, Number 4 Designing an Adaptive CORBA Load Baancing Service Using TAO Ossama Othman, Caros O'Ryan, and Dougas C. Schmidt University of Caifornia, Irvine The growth of onine Internet

More information

Introduction the pressure for efficiency the Estates opportunity

Introduction the pressure for efficiency the Estates opportunity Heathy Savings? A study of the proportion of NHS Trusts with an in-house Buidings Repair and Maintenance workforce, and a discussion of eary experiences of Suppies efficiency initiatives Management Summary

More information

ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES. l l. l l. l l. l l

ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES. l l. l l. l l. l l ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES The Eectronic Fund Transfers we are capabe of handing for consumers are indicated beow some of which may not appy your account Some of these may

More information