E-mail Survey Results Aaron Brown Billy Kakes Calvin Ling Professor David Patterson.

Slides:



Advertisements
Similar presentations
The Ultimate Troubleshooter TUT July 26, 2005 Lorain County Computer Computer Users Group Users Group.
Advertisements

Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
1 Effective, secure and reliable hosted security and continuity solution.
Networking Essentials Lab 3 & 4 Review. If you have configured an event log retention setting to Do Not Overwrite Events (Clear Log Manually), what happens.
P3, M2,M3,M4.
A new standard in Enterprise File Backup. Contents 1.Comparison with current backup methods 2.Introducing Snapshot EFB 3.Snapshot EFB features 4.Organization.
Managing Incoming Chapter 3 Bit Literacy. Terminology client – program which retrieves s from a mail server, lets you read the mails,
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
SUPERCOMPUTER TO THE RESCUE Justin Curry EKU, Dept. of Technology, CEN/CET)
Security for Internet Every Day Use Standard Security Practices and New Threats.
Defense System (a.k.a. Junk mail & Virus Filtering at the Server level)
Managing Your Mailbox Facilities IS Presents:. Is your mailbox getting too big? Managing Your Mailbox An overstuffed mailbox can cause problems. You won’t.
Andrew Schroeder Networking Aspects of Cloud Computing.
Cambodia-India Entrepreneurship Development Centre - : :.... :-:-
23 October 2002Emmanuel Ormancey1 Spam Filtering at CERN Emmanuel Ormancey - 23 October 2002.
How to Get The Most Out of Outlook 2003 Michele Schwartzman Division of Customer Support Summer 2006.
The complete resource tool online for the conference, meeting and event industry.
Chapter 2: Installing and Upgrading to Windows Server 2008 R2 BAI617.
Fundamentals of Networking Discovery 1, Chapter 2 Operating Systems.
Web Based Applications
Love V4.0 a GREAT freeware program available as app Love V4.0 a GREAT freeware program available as app.
Business Continuity and Disaster Recovery Chapter 8 Part 2 Pages 914 to 945.
David Overton Head of Small Business Technology – Head of Small Business Technology – Microsoft solutions for.
T. Rowe Price, Invest With Confidence and the Bighorn Sheep logo is a registered trademark of T. Rowe Price Group, Inc. Please dial from.
DECS Community IT DIVISION OF ENGINEERING COMPUTING SERVICES Michigan State University College of Engineering.
Problem Determination Your mind is your most important tool!
A SIR web based leave/absence management system. By Dave Doulton University of Southampton.
The Shastalink Barracuda Spam Filter How to properly use the Barracuda Spam Filter to control your Inbox.
V 1.0 May 16,2011 Audience: Staff Outlook Agent For the latest version of this document please go to:
-II Outlook How To Topics CS-3505 Outlook 2000 Wb_ -II.ppt.
Security at NCAR David Mitchell February 20th, 2007.
By Hina Patel TCM 471 Introduction SPAM? Solicited Unsolicited How spammer gets the address Prevention from spam Conclusion.
This PowerPoint presentation will show you how to use your productively and successfully.
1 Improving Security Through Automated Policy Compliance Christopher Stevens Director of Network and Technical Services Lewis & Clark College Educause.
SPAM Settings. The ExchangeDefender Admin Site is a powerful tool that gives you access to all of the benefits ExchangeDefender has to offer, from the.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
1 Adding Secure and Collaboration to Your Business with SCOoffice Server 4.1.
EEPOS – Complete Enterprise Archive Solution Trillian Infosüsteemid Ltd Kahro Raie June
Business Data Communications, Fourth Edition Chapter 11: Network Management.
Win32 Programming Lesson 2: The Tools of the Trade.
Evaluating Undo: Human-Aware Recovery Benchmarks Aaron Brown with Leonard Chung, Calvin Ling, and William Kakes January 2004 ROC Retreat.
INTERNET SAFETY FOR KIDS
Mission Critical Application Architecture and Flash August MDCFUG Chafic Kazoun, Founder and CTO Atellis: | Weblog:
Brief Overview: Options for Licence & Support Open Source Job Scheduler Software- und Organisations-Service GmbH 
NIB Networking & Security Issues Data Networks Recent Activities Additional RAS & Router cards procured and installed at “A” and “B” type.
C ONSULTING T EAM P ROJECT Tips on organizing electronic files! Witness Fitness Presented & made by Carly Thomas.
1 Andrea Sciabà CERN Critical Services and Monitoring - CMS Andrea Sciabà WLCG Service Reliability Workshop 26 – 30 November, 2007.
By Liam Wright Manga comic group Japan SAFETY on your computer.
1 Adding Secure and Collaboration to Your Business with SCOoffice Server 4.1 Marc Modersitzki.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
National Diploma Unit 4 Introduction to Software Development Program specification & development.
A. CiocioITSD/CSAC Retreat March 3, Physics Division Collaboration.
2: Operating Systems Networking for Home & Small Business.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
What do System Administrators Do? William Kakes Calvin Ling Leonard Chung Aaron Brown EECS Computer Science Division University of California, Berkeley.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
How to Choose the Best Website Monitoring Service.
C Copyright © 2006, Oracle. All rights reserved. Oracle Secure Backup Additional Installation Topics.
Real Testing Scenario Strategy: A Real-life TestOps Environment
Essentials of UrbanCode Deploy v6.1 QQ147
Software modifications and reliability
How to Fix Outlook Error 0x800cce05? For Assistance
Gmail Customer care Number Call us at Gmail Customer Care Number to determine every one of your issues at a go. We are available 24*7 hours daily to help.
Yahoo Mail Is Not Working Support number
Steps to Recover Outlook After Crash
Integration services: Analysis Services:
Real Testing Scenario Strategy: Bringing this all together – Success!
Administering Your Network
Queries raised regarding use of SOLAR
6. Application Software Security
Presentation transcript:

Survey Results Aaron Brown Billy Kakes Calvin Ling Professor David Patterson

Selected Questions What is your supported environment? How many users?  Daily volume?  Amount of downtime they’ll accept?  Number of complaints? What tasks?  Diagnosis vs. repair?  Number of problems?

Interface Sample

First Trial: Response Sent to known admins and contacts 68 responses received  …mostly complete with useful answers  Only 21 “unsures” total Many responses from educational admins  Yet still lots from within industry

Results: Number of Users

Results: Volume

Results: Tasks Common TasksChallenging Tasks Configuration (56%) Upgrades/ Patches (12%) Tool Dev. (1%) Repairs (15%) Backup & Restore (3%) Monitor/ Test (10%) User Ed. (<1%) Other (3%) Filter Installation (37%) Platform Change/ Upgrade (26%) Tool Dev. (6%) Config. (13%) Other (6%) User Ed. (4%) Architecture Changes (7%) (151 total) (68 total)

Results: Acceptable Downtime

Results: Acceptable Downtime (2)

Results: Critical Affected User %

Results: Unique Problems

Results: User Requests

Results: Diagnosis vs. Repair

Results: Confidence Time

Results: Selected Comments High user expectations  “Users do not understand ; they expect it to be instantaneous, reliable, and single-hop.”  “Users have an intimate relationship with their …when is involved users get quite excitable.”  “Many of our users would be far less affected by losing their phone for a week than by losing access for a day (or even hours).”

Results: Selected Comments (2) Spam is a tremendous headache  “Spam…is our largest problem. Our machines are well spec'd and very stable, until they are hit with too much all at once!”  “I want to find the spammers and toss them off a 12 story building, then drive over them with a truck a few times.”  “Spammers should be charged for every piece of junk mail we have to accommodate in load planning, users assistance, and bounce tracing. I’d be able to buy Bill Gates at only $0.01 per junk message.” Viruses and worms, too

Results: Selected Comments (3) New technologies are useful  “Automation of all sorts has been improving performance and increasing reliability of our servers.”  “If you choose the right software, you don’t generally have any problems.”  “ is old hat, actually.” …more are needed  “Testing correctness of configurations is one of the hardest things to do.”  “No matter how much work you do with it, you are never sure that it is secure and stable.”  “sendmail.cf is a bitch”

Conclusions Most sites had relatively few problems  is one of the most critical services Confidence time varies widely  Pretty similar curve to “number of users”, but correlation mostly absent  Hard to test configurations Better tools and practices are useful, more are needed  Worries over configuration, silent errors