HEC Montréal: Follow-up on the Large-Scale Mail Installation
The new mail infrastructure helped HEC Montréal manage the e-mail worm crisis we all went through at the beginning of 2004. It also continues to efficiently limit the delivery of UBEs. According to the Call Center Team, "We have noticed an important decrease in calls regarding problems with the mail infrastructure, spams or viruses. This is especially true for computer viruses, as we are offering first level support if they get infected. On the other hand, some are actually calling to be sure we haven't blocked legitimate e-mail. Pushing forward the use of Spamity to users likely will help us in reducing the number of calls. Finally, some users also called to praise the speed, the stability and the efficiency of the new infrastructure."
I would like to give special thanks to Dominique Duc for helping me with the various charts in this article and Chris B. Vetter for reviewing the content.
Ludovic Marcotte (firstname.lastname@example.org) holds a Bachelor degree in Computer Science from the University of Montréal. He currently is a software architect for Inverse Inc., an IT consulting company located in downtown Montréal.
- Three EU Industries That Need HPC Now
- William Rothwell and Nick Garner's Certified Ethical Hacker Complete Video Course (Pearson IT Certification)
- Preseeding Full Disk Encryption
- FinTech and SAP HANA
- Chemistry on the Desktop
- Two Factors Are Better Than One
- HOSTING Monitoring Insights
- Five HPC Cost Considerations to Maximize ROI
- Hodge Podge
- GRUB Boot from ISO
Pick up any e-commerce web or mobile app today, and you’ll be holding a mashup of interconnected applications and services from a variety of different providers. For instance, when you connect to Amazon’s e-commerce app, cookies, tags and pixels that are monitored by solutions like Exact Target, BazaarVoice, Bing, Shopzilla, Liveramp and Google Tag Manager track every action you take. You’re presented with special offers and coupons based on your viewing and buying patterns. If you find something you want for your birthday, a third party manages your wish list, which you can share through multiple social- media outlets or email to a friend. When you select something to buy, you find yourself presented with similar items as kind suggestions. And when you finally check out, you’re offered the ability to pay with promo codes, gifts cards, PayPal or a variety of credit cards.Get the Guide