Having been of the feeling that may be losing the war, at least we have won a few battles with incoming spam in our business. There are two main problem areas that we have been looking into. Firstly, there is the scenario of When spam is not spamÂ which we have finally managed to bring under some level of control and reduce the nearly ten thousand daily spam email down to a handier thousand or so. Secondly, and trickier to deal with is When spam should not be spam. Key words seem to be one of the few options available for dealing with information and these have played an important in a recent experiment we did Exploring search using keywords.
Following on from my previous post on virtualisation (The technology week in view: 7th April 2008) we have recently been fortunate to find some side benefits of virtualisationÂ which more than anything has given us the opportunity to give several of our servers a well needed spring clean as well as deal with their appropriate power usage; we have been experiencing several power problems recently. I did like the infra-red feature on the Â WattStopper’s Isole IDP-3050 Smart Surge Protector but I can just imagine the kids at home hop and skipping over the sensor just to confuse it!?Â The simplest and most useful solution I have seen so far is the Concealed Multi-Way Adaptor with Surge ProtectionÂ which has a lid to hide away the adaptors (and protect them against under desk feet).
The tip of the week related to Exchange 2007 and Resolving the issue: 5.3.4 Message size exceeds fixed maximum message sizeÂ which caused us a few sleepless nights. I have often talked about the array of options in modern software platforms and how essential settings are seemingly buried deep within option screens – why do software developers not simply have one section called “Setttings” in their software where all of the available settings for the software can lie?