The Roaring Penguin Training Network

A recent paper presented evidence that Bayesian filtering could be effective using a shared Bayes database, even among hundreds or thousands of different users. This lead to the Roaring Penguin Training Network (RPTN), a mechanism for sharing Bayes votes among different CanIt customers. This white paper describes the Roaring Penguin Training Network (RPTN).
  • Written By:
  • Published:
  • (Originally Published On:) )

Featured publications:

VoIP Introduction

VoIP uses internet protocol data packets to transfer voice, fax, and other data over the shared network, rather than the traditional public switched telephone network (PSTN), which is based on copper wires carrying analog voice data over the dedicated circuits. VoIP, in contrast to PSTN, uses what is called packet-switched telephony, whereby the voice information travels to its destination in individual network packets across the Internet that are assembled and then converted to voice. Learn the basics of VoIP by reading this white paper, which includes explanations of coding and protocol for VoIP, and a look at quality and myths about VoIP. Read More

BYOD Without Tears: The Impact and Challenge for Network Engineers

Bring your own device (BYOD) is as much a sign of cultural change as it is an indicator of prevailing technology trends. But network performance and security concerns can arise when employees want to use their personal devices at work. This white paper looks at the challenges of integrating BYOD with corporate networks in a way that BYOD does not compromise connectivity or performance for established wired and wireless users.  Read More

Reduce the Risk of Network and Application Performance Issues

More than ever before, the IT network is a strategic asset to a business, and any downtime or degradation in network or application performance can directly impact an organization’s bottom line. This white paper looks at a methodology for solving network and application performance issues and outlines a new approach to getting to their root causes more quickly. Read More

You may also be interested in these related documents:

E-mail 101

The first e-mail programs were created in the late 60s/early 70s—simpler times, when everyone on the network was trustworthy. Even knowing what we know today about spammers, we still tend to take e-mail for granted, and trust it far more than it deserves. Learn about the components of the e-mail system, understand how e-mail moves on the Internet, and find out how to interpret e-mail message headers. Read More

Demystifying the Anti-spam Buzz

The options available for mitigating e-mail spam in the enterprise are varied—as varied as the variety of actual spam definitions. These factors often lead to some confusion about what a particular anti-spam solution can or can’t do. In order to focus on the basics, you need to cut through the hype in the anti-spam market and its buzzwords. Read More

Fighting Spam in an ISP Environment: Challenges, Solutions, and Best Practices

An Internet service provider (ISP) presents one of the most complex environments for managing spam, due to the sheer volume of e-mail, and the high service levels demanded by customers. The main challenge for ISPs seeking anti-spam solutions is thus to find products that provide the flexibility to suit a wide variety of users, and the preferences of those users. Read More
 
comments powered by Disqus