Machine Learning Authors: Zakia Bouachraoui, Pat Romanski, Yeshim Deniz, Elizabeth White, Liz McMillan

Related Topics: Machine Learning , Open Source Cloud

Machine Learning : Article

AJAX Company Laszlo Systems and Goodmail Partner to Provide Trusted Web Mail Solution

Laszlo Systems, developer of OpenLaszlo and Goodmail Systems will support CertifiedEmail messages

Laszlo Systems, developer of OpenLaszlo, advanced open source platform for building and deploying Ajax applications, and Goodmail Systems, creator of the CertifiedEmail system for trusted email, announced that Laszlo Mail will support the recognition and presentation of CertifiedEmail messages. Offered for license to businesses and communications service providers, Laszlo Mail delivers the functionality and responsiveness of desktop email without requiring any client software installation. Now with CertifiedEmail, Laszlo Mail will have the added benefit of protecting users from phishing and other forms of email-based fraud.

"In order to remain competitive, service providers need to offer communications experiences that are engaging and guarantee the best online interaction possible," said Kent Libbey, chief marketing officer, Laszlo Systems.  "We're pleased about today's announcement as we're able to combine one of the industry's most robust Web mail offerings with the trusted security of CertifiedEmail, resulting in a complete, end-to-end product that any business or ISP can easily deploy and feel confident about."

CertifiedEmail is Goodmail's service for restoring trust to email communications among volume email senders and their consumer recipients.  Accredited senders with the best email practices can choose to send their marketing and transactional messages via CertifiedEmail, which imprints a cryptographically-secure token on outgoing email messages and lets participating ISPs and mailbox providers like AOL and Yahoo! assure delivery of those messages to the server-level inbox with all links and images intact.  Many ISPs today routinely disable links and images as a security precaution against phishing and other forms of email-based fraud.

"The Laszlo Mail application module will recognize incoming CertifiedEmail messages and display them with the unique trust icon that tells consumers messages are safe to read and act upon while allowing mail providers to safely enable links and images automatically for accredited senders," said Ken Hirschman, vice president of business development for Goodmail Systems.  "By deploying Laszlo Mail with CertifiedEmail capability, mail providers will be able to give their customers all the rich client email functionality they expect in a system that also provides a measure of security against fraud and phishing."

Laszlo Mail is built on the open source platform, OpenLaszlo, and is the first in the company's suite of breakthrough Digital Life applications.  With a high-polish interface, Laszlo Mail incorporates rich Internet functionality, allowing users to easily sort, drag-and-drop, and keep track of contacts all on one easy-to-use screen. Laszlo Mail is also customizable to support service provider feature and brand requirements, including carrier-grade scalability and reliability.  In addition, businesses and ISPs can reach all popular Web browsers across Windows, Mac, Linux and Unix desktops without requiring any client software installation.

By matching CertifiedEmail-enabled Laszlo Mail with CertifiedEmail-capable messaging engine and anti-spam products, such as Bizanga Intelligent Message Processor, Cloudmark Authority and OmniTI Ecelerity, mail service providers can implement a complete trusted email system with minimal integration effort.

For more information, or to download a 30-day trial of Laszlo Mail, please visit www.laszlosystems.com/products/laszloMail.

More Stories By RIA News Desk

Ever since Google popularized a smarter, more responsive and interactive Web experience by using AJAX (Asynchronous JavaScript + XML) for its Google Maps & Gmail applications, SYS-CON's RIA News Desk has been covering every aspect of Rich Internet Applications and those creating and deploying them. If you have breaking RIA news, please send it to [email protected] to share your product and company news coverage with AJAXWorld readers.

Comments (2)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.

CloudEXPO Stories
Jim leads Wasabi's product management, sales engineering, and customer support efforts. As a veteran of multiple startups and large enterprise organizations, Jim has deep experience in developing, delivering, and supporting products and services that provide security, scalability, and reliability to customers and partners. Prior to Wasabi, Jim served in product management and sales/support engineering roles at Oracle (via Acme Packet and Covergence), Ciena (via WaveSmith Networks), Lucent Technologies (via Ascend Communications and Cascade Communications) and GTE. Jim holds a BSEE from Northeastern University and a MBA from Babson College.
When building large, cloud-based applications that operate at a high scale, it’s important to maintain a high availability and resilience to failures. In order to do that, you must be tolerant of failures, even in light of failures in other areas of your application. “Fly two mistakes high” is an old adage in the radio control airplane hobby. It means, fly high enough so that if you make a mistake, you can continue flying with room to still make mistakes. In his session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, will discuss how this same philosophy can be applied to highly scaled applications, and can dramatically increase your resilience to failure.
Despite being the market leader, we recognized the need to transform and reinvent our business at Dynatrace, before someone else disrupted the market. Over the course of three years, we changed everything - our technology, our culture and our brand image. In this session we'll discuss how we navigated through our own innovator's dilemma, and share takeaways from our experience that you can apply to your own organization.
Founded in 2002 and headquartered in Chicago, Nexum® takes a comprehensive approach to security. Nexum approaches business with one simple statement: “Do what’s right for the customer and success will follow.” Nexum helps you mitigate risks, protect your data, increase business continuity and meet your unique business objectives by: Detecting and preventing network threats, intrusions and disruptions Equipping you with the information, tools, training and resources you need to effectively manage IT risk Nexum, Latin for an arrangement by which one pledged one’s very liberty as security, Nexum is committed to ensuring your security. At Nexum, We Mean Security®.
The Transparent Cloud-computing Consortium (T-Cloud) is a neutral organization for researching new computing models and business opportunities in IoT era. In his session, Ikuo Nakagawa, Co-Founder and Board Member at Transparent Cloud Computing Consortium, will introduce the big change toward the "connected-economy" in the digital age. He'll introduce and describe some leading-edge business cases from his original points of view, and discuss models & strategies in the connected-economy. Nowadays, "digital innovation" is a big wave of business transformation based on digital technologies. IoT, Big Data, AI, FinTech and various leading-edge technologies are key components of such business drivers.