Pizzlet Information System “When Spam just isn’t good enough…” Troy Lamberte Blake Norrish.

Slides:



Advertisements
Similar presentations
The Biosafety Clearing-House of the Cartagena Protocol on Biosafety Tutorial – BCH Resources.
Advertisements

Accel Computerized Maintenance Management System.
Meet Grace! Grace is our newest team member! She is here to make it easier to keep track of all your HR related documents digitally. Grace will always.
Lunker: The Advanced Phishing Framework
Introduction to Your Name Goes Here
Some things to think about. Assignment 1 is at the end, but read the whole thing. Please!
Remote mailbox access gateway Software lab project.
Implementing Application Protocols. Overview An application protocol facilitates communication between applications. For example, an client uses.
NEW PRODUCT INTRODUCTION: SalesLink TOUCH April 2015.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Using Gmail With Selected Process: Mail Fetcher Kevin Mackowick, Tolgahan Kurt, Matthew Wessel, Michael Hincke, and Brian Thackston.
POP Configuration Microsoft Outlook What is POP? Short for Post Office Protocol, a protocol used to retrieve from a mail server. Most.
BY ALEXANDER STEPHENS RYAN PIERCY EmCare Mobile Scheduling Application.
FTP. SMS based FTP Introduction Existing System Proposed Solution Block Diagram Hardware and Software Features Benefits Future Scope Conclusion.
Finding Nearby Wireless Hotspots CSE 403 LCA Presentation Team Members: Chris Scoville Tessa MacDuff Matt Mohebbi Aiman Erbad Khalil El Haitami.
Hosted Exchange The purpose of this Startup Guide is to familiarize you with ExchangeDefender's Exchange and SharePoint Hosting. ExchangeDefender.
UNIT 14 Lecturer: Ghadah Aldehim 1 Websites. Introduction 2.
The aim We had to “build” a laptop from scratch. We needed to install the software and the Operating system needed. We came across all sorts of problems.
GONE PHISHING ECE 4112 Final Lab Project Group #19 Enid Brown & Linda Larmore.
Chapter 7: Using Windows Servers to Share Information.
Communication Through Internet ADE100- Computer Literacy Lecture 25.
IT:Network:Applications.  How messaging servers work  Initial tips for success Exchange management  Server roles  Exchange Server Management  Message.
Lecturer: Ghadah Aldehim
1 Chapter 2 (Continued) Section 2.2 Section 2.2. Internet Service Provider (ISP) ISP - a company that connects you through your communications line to.
WXET1143 Lecture7: , Chat and Messaging. Introduction  Electronic mail is everywhere.  Now many people in business, government, and education use.
Client X CronLab Spam Filter Technical Training Presentation 19/09/2015.
Instant Messaging for the Workplace A pure collaborative communication tool that does not distract users from their normal activities.
INTERNET- A BOON OR A CURSE AYUSHI PRADHAN. WHAT IS IT? Internet or INTERnational NETwork is a network of networks that crisscrosses the globe and even.
Once you have contacted me to set up a new account, your computer needs to be configured to dial into.DevlinEx and use our servers for things like .
Instant Messaging for the Workplace A pure collaborative communication tool that does not distract users from their normal activities.
A beginner’s guide to Webmail. What do you need? A computer, or a smartphone An internet connection An account with an service provider.
Section 4 – Computer Networks Setting up a small network.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
1 Thomas Lippert Senior Product Manager - Mobile What’s new in SMC 5.0.
Prescryption DrugSafe “Imagine a world where technology enables us to live healthier lives” CSE403 – LCO Proposal Team DrugSafe: Brian Ma Jenny Yuen Jon.
Unit 10 Communication Services
Objective Understand concepts used to web-based digital media. Course Weight : 5%
Chapter 9 Publishing and Maintaining Your Site. 2 Principles of Web Design Chapter 9 Objectives Understand the features of Internet Service Providers.
Initial Operational Capability Pizzlet program By: Blake Norrish, Taj Isono, Phong Phan, Benjamin Irwin.
CIS 450 – Network Security Chapter 4 - Spoofing. Definition - To fool. In networking, the term is used to describe a variety of ways in which hardware.
Our goal is to make a web based multi-user organizer that can be accessed via cellular devices. There are three main component for this project: A main.
Introduction to Student Name Student Class.
Apache JMeter By Lamiya Qasim. Apache JMeter Tool for load test functional behavior and measure performance. Questions: Does JMeter offers support for.
1 UNIT 13 The World Wide Web Lecturer: Kholood Baselm.
GPS (Global Positioning System). Allows you to share your location in real time and locate your friends using smartphones and GPS.
XP Browser and Basics COM111 Introduction to Computer Applications.
CONTENTS  Definition And History  Basic services of INTERNET  The World Wide Web (W.W.W.)  WWW browsers  INTERNET search engines  Uses of INTERNET.
CTH Session 6. Search engines What are search engines ? Examples of search engines?
The Registration Alert System LCA Overview. Overview The Registration Alert System (RAS) is web-based software package that allows University of Washington.
PEMBINA TRAILS Portal System User Guide Prepared by: Jo-Anne Gibson Acadia Junior High Teacher-Librarian.
CSE 403 LCO Presentation Chris Scoville. Operational Concepts Create a built in 411-type system in a cell phone Allows the user to find a person’s phone.
Life Cycle Objectives AirlineRequest By Phong Phan Erik Day.
Computer Concepts 2014 Chapter 7 The Web and .
Remote Access Using a Netgear DG834 Router 1http://
Protecting your search privacy A lesson plan created & presented by Maria Bernhey (MLS) Adjunct Information Literacy Instructor
 Project Team: Suzana Vaserman David Fleish Moran Zafir Tzvika Stein  Academic adviser: Dr. Mayer Goldberg  Technical adviser: Mr. Guy Wiener.
Outlook / Exchange Training. Outlook / Exchange: Agenda What Can Microsoft Exchange Do / How works at UST? and Inbox Mailbox Quota Archiving.
– Protocols 21 – Protocols 21. – Protocols 21 Now we’ll move on to more technical aspects of This means protocols Remember.
Yahoo is the one of the topmost “internal portal” on the web that is used for  Homepage customization  Search s  Search as a World Wide Web 
Introduction to Your Name Goes Here
 Rocketmail is the fast and clean .  Rocketmail is a kind of free webmail services  Rocketmail is a product of Four11 corporation  It is most.
Yahoo Support Ireland Toll-Free Number:
How to fix yahoo mail pop sending and receiving issues?
Dial Yahoo Support Number USA
Remote User Tracking Life Cycle Objectives
The Internet An Overview.
Introduction to Your Name Goes Here
Unit# 5: Internet and Worldwide Web
The Internet and Electronic mail
Presentation transcript:

Pizzlet Information System “When Spam just isn’t good enough…” Troy Lamberte Blake Norrish

Operational Concepts (Overview) The Pizzlet Information System (PIS) facilitates the gathering and distribution of “Free Stuff” information. A server application receives and parses s from an address, and sends relevant “free stuff” information to a list users running the Pizzlet Midlet on their cell phones. This is aimed at University of Washington students and the free food that is regularly distributed around campus.

System Requirements What DOES it do for us? User Scenario 1 (setup) 1) Bob hears about Pizzlet from a CS friend 2) Bob logs onto the World Wide Web 3) Bob navigates to the URL homepage of the Pizzlet Server. 4) Bob enters his username, cell phone number, and preferences about what kind of information he would like to receive. 5) Bob downloads the Midlet portion of Pizzlet to his cell phone. Bob leaves User Scenario 2 (use) 1) Bob is sitting on campus like he always does 2) Bob is hungry like he always is 3) Bob uses his cell phone to check the latest information from Pizzlet. 4) Bob sees that there is some sort of Engineering kickoff meeting tonight in the HUB, and they have free pizza 5) Bob goes, and eats free pizza

System Requirements (2) What it looks like: (Web part)

System and Software Architecture The Components 1. Component; Responsible for connection and retrieval 2.Parsing Object; Responsible for looking at and determining if its “free stuff” 3.Database Connection Object; Needed to get list of user’s cell phone numbers for info distribution 4.Client Communication Object; Responsible for ending data to client’s cell phone 5.Pizzlet Midlet; On Cell phone, responsible for displaying info received from Pizzlet Server

Components (visual)

The Hard Parts: retrieval and Parsing Use JavaMail API and JavaBeans Activation Framework to get mail. Use forwarding to internet POP server to bypass need for SSL or TLS (JavaMail does not support) It works… we already did it. Parsing: Search on predefined keywords/phrases in subject/body Assign “confidence” depending on number/type of keywords found High “Confidence” means free stuff, send info to cell phones Also use “filter” word to weed out junk, porn, etc.

Lifecycle Plan Who wants it? I do, you do, we do, Bob does. And who will support it? Little support needed. configuration needed (about) quarterly to keep Pizzlet’s address on lots of distribution lists. Tech Support: BYOTS (and RTFM?)

Conclusions: No known technical impossibilities – retreival solved –Parsing reasonable Good Product /Work ratio –Isn’t a huge project (small work), but could be an interesting solution (Nice Product) Known user base –Me –You –Bob But….

… Some things that could go wrong Our system is dependent on a web-based free server. –Policy change (no free POP acocunts) –Out of business JackA**’s –People who know about system could easily compromise it, send false s, etc

FINAL Conclusion Build it.