The Roaring Penguin Training Network

A recent paper presented evidence that Bayesian filtering could be effective using a shared Bayes database, even among hundreds or thousands of different users. This lead to the Roaring Penguin Training Network (RPTN), a mechanism for sharing Bayes votes among different CanIt customers. This white paper describes the Roaring Penguin Training Network (RPTN).
  • Written By:
  • Published On:
  • (Originally Published On:) )
 
comments powered by Disqus


Featured publications:

VoIP Introduction

VoIP uses internet protocol data packets to transfer voice, fax, and other data over the shared network, rather than the traditional public switched telephone network (PSTN), which is based on copper wires carrying analog voice data over the dedicated circuits. VoIP, in contrast to PSTN, uses what is called packet-switched telephony, whereby the voice information travels to its destination in individual network packets across the Internet that are assembled and then converted to voice. Learn the basics of VoIP by reading this white paper, which includes explanations of coding and protocol for VoIP, and a look at quality and myths about VoIP.
  • Written By:
  • Published On:

BYOD Without Tears: The Impact and Challenge for Network Engineers

Bring your own device (BYOD) is as much a sign of cultural change as it is an indicator of prevailing technology trends. But network performance and security concerns can arise when employees want to use their personal devices at work. This white paper looks at the challenges of integrating BYOD with corporate networks in a way that BYOD does not compromise connectivity or performance for established wired and wireless users.
  • Written By:
  • Published On:

Reduce the Risk of Network and Application Performance Issues

More than ever before, the IT network is a strategic asset to a business, and any downtime or degradation in network or application performance can directly impact an organization’s bottom line. This white paper looks at a methodology for solving network and application performance issues and outlines a new approach to getting to their root causes more quickly.
  • Written By:
  • Published On:

You may also be interested in these related documents:

E-mail 101

The first e-mail programs were created in the late 60s/early 70s—simpler times, when everyone on the network was trustworthy. Even knowing what we know today about spammers, we still tend to take e-mail for granted, and trust it far more than it deserves. Learn about the components of the e-mail system, understand how e-mail moves on the Internet, and find out how to interpret e-mail message headers.
  • Written By:
  • Published On:

Demystifying the Anti-spam Buzz

The options available for mitigating e-mail spam in the enterprise are varied—as varied as the variety of actual spam definitions. These factors often lead to some confusion about what a particular anti-spam solution can or can’t do. In order to focus on the basics, you need to cut through the hype in the anti-spam market and its buzzwords.
  • Written By:
  • Published On:

Fighting Spam in an ISP Environment: Challenges, Solutions, and Best Practices

An Internet service provider (ISP) presents one of the most complex environments for managing spam, due to the sheer volume of e-mail, and the high service levels demanded by customers. The main challenge for ISPs seeking anti-spam solutions is thus to find products that provide the flexibility to suit a wide variety of users, and the preferences of those users.
  • Written By:
  • Published On: