Barry Leiba
Encyclopedia
Barry Leiba is a computer scientist
Computer science
Computer science or computing science is the study of the theoretical foundations of information and computation and of practical techniques for their implementation and application in computer systems...

 and software researcher. He retired from IBM
IBM
International Business Machines Corporation or IBM is an American multinational technology and consulting corporation headquartered in Armonk, New York, United States. IBM manufactures and sells computer hardware and software, and it offers infrastructure, hosting and consulting services in areas...

's Thomas J. Watson Research Center
Thomas J. Watson Research Center
The Thomas J. Watson Research Center is the headquarters for the IBM Research Division.The center is on three sites, with the main laboratory in Yorktown Heights, New York, 38 miles north of New York City, a building in Hawthorne, New York, and offices in Cambridge, Massachusetts.- Overview :The...

 in Hawthorne, New York
Hawthorne, New York
Hawthorne is an unincorporated hamlet and census-designated place located in the town of Mount Pleasant in Westchester County, New York. The population was 4,586 at the 2010 census.-History:...

 at the end of February, 2009, and now works for Huawei Technologies
Huawei
Huawei is a Chinese multinational networking and telecommunications equipment and services company headquartered in Shenzhen, Guangdong, China...

 as a Standards Manager. His work has focused for many years on electronic mail
E-mail
Electronic mail, commonly known as email or e-mail, is a method of exchanging digital messages from an author to one or more recipients. Modern email operates across the Internet or other computer networks. Some early email systems required that the author and the recipient both be online at the...

 and anti-spam technology, on mobile computing
Mobile computing
Mobile computing is a form of human–computer interaction by which a computer is expected to be transported during normal usage. Mobile computing has three aspects: mobile communication, mobile hardware, and mobile software...

, and on Internet standard
Internet standard
In computer network engineering, an Internet Standard is a normative specification of a technology or methodology applicable to the Internet. Internet Standards are created and published by the Internet Engineering Task Force .-Overview:...

s.

Work on e-mail and anti-spam technology

Leiba's interest in e-mail began in the early 1980s, with IBM's PROFS system, and with a proprietary e-mail system developed for an IBM customer. In the early 1990s he and his team at IBM Research developed an early implementation of an integrated multimedia e-mail system, called Ultimail, which became part of IBM's TCP/IP product for OS/2
OS/2
OS/2 is a computer operating system, initially created by Microsoft and IBM, then later developed by IBM exclusively. The name stands for "Operating System/2," because it was introduced as part of the same generation change release as IBM's "Personal System/2 " line of second-generation personal...

. The work on Ultimail led to development of the Internet Messaging Framework, a toolkit for developing Internet-standards-compliant clients and servers. He was part of the team that developed the SpamGuru anti-spam engine at IBM Research.

He has published a number of papers at the Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, and was a program chair for the conference in 2008 and 2010.

Work on Internet standards

Leiba has been involved with the Internet Engineering Task Force
Internet Engineering Task Force
The Internet Engineering Task Force develops and promotes Internet standards, cooperating closely with the W3C and ISO/IEC standards bodies and dealing in particular with standards of the TCP/IP and Internet protocol suite...

 since the mid-1990s, working on e-mail-related standards, including IMAP
Internet Message Access Protocol
Internet message access protocol is one of the two most prevalent Internet standard protocols for e-mail retrieval, the other being the Post Office Protocol...

, ACAP
Application Configuration Access Protocol
The Application Configuration Access Protocol is a protocol for storing and synchronizing general configuration and preference data. It was originally developed so that IMAP clients can easily access address books, user options, and other data on a central server and be kept in synch across all...

, updates to SMTP
Simple Mail Transfer Protocol
Simple Mail Transfer Protocol is an Internet standard for electronic mail transmission across Internet Protocol networks. SMTP was first defined by RFC 821 , and last updated by RFC 5321 which includes the extended SMTP additions, and is the protocol in widespread use today...

 and the Internet message format
MIME
Multipurpose Internet Mail Extensions is an Internet standard that extends the format of email to support:* Text in character sets other than ASCII* Non-text attachments* Message bodies with multiple parts...

, lemonade
Lemonade Profile
The Lemonade Profile is a set of protocols and mandatory extensions which provides email access to diverse environments, including mobile handsets and other resource constrained devices. It is the product of an IETF Working Group, and is largely based on pre-existing specifications, including IMAP...

, the Sieve
Sieve (mail filtering language)
Sieve is a programming language that can be used to create filters for email. It owes its creation to the CMU Cyrus Project, creators of Cyrus IMAP server....

 e-mail filtering language, internationalization
Internationalization
In economics, internationalization has been viewed as a process of increasing involvement of enterprises in international markets, although there is no agreed definition of internationalization or international entrepreneurship...

 in general and e-mail address internationalization in particular, and DKIM
DomainKeys Identified Mail
DomainKeys Identified Mail is a method for associating a domain name to an email message, thereby allowing a person, role, or organization to claim some responsibility for the message. The association is set up by means of a digital signature which can be validated by recipients...

. He is a chair of the DKIM, OAUTH, MARF, and APPSAWG working groups, and served on the Internet Architecture Board
Internet Architecture Board
The Internet Architecture Board is the committee charged with oversight of the technical and engineering development of the Internet by the Internet Society ....

 from 2007 to 2009. He is currently the IETF liaison to the Messaging Anti-Abuse Working Group
MAAWG
The Messaging Anti-Abuse Working Group started as a group of internet service providers, mobile network operators, telecommunications companies and infrastructure vendors and anti-spam technology vendors in early 2004. It has since expanded to include e-mail service providers and other forms of...

 (MAAWG).

Other work

Leiba has also worked on IBM Research projects involving context awareness
Context awareness
Context awareness is defined complementary to location awareness. Whereas location may serve as a determinant for resident processes, context may be applied more flexibly with mobile computing with any moving entities, especially with bearers of smart communicators...

, mobile and distributed computing
Mobile computing
Mobile computing is a form of human–computer interaction by which a computer is expected to be transported during normal usage. Mobile computing has three aspects: mobile communication, mobile hardware, and mobile software...

, and computer security
Computer security
Computer security is a branch of computer technology known as information security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to...

 and access controls
Access control list
An access control list , with respect to a computer file system, is a list of permissions attached to an object. An ACL specifies which users or system processes are granted access to objects, as well as what operations are allowed on given objects. Each entry in a typical ACL specifies a subject...

. He has edited the "Standards" department for the IEEE Computer Society
IEEE Computer Society
The IEEE Computer Society is a professional society of IEEE. Its purpose and scope is “to advance the theory, practice, and application of computer and information processing science and technology” and the “professional standing of its members.” The CS is the largest of 38 technical societies...

's Internet Computing magazine since January 2008, and was appointed to the magazine's editorial board in March 2008.

Authored Requests For Comments (RFCs)

  • RFC 2177 – IMAP4 Idle Command
  • RFC 2683 – IMAP4 Implementation Recommendations
  • RFC 5231 – Sieve Extension: Relational Tests
  • RFC 5258 – IMAP4 LIST Command Extensions
  • RFC 5435 - Sieve Extension: Notifications
  • RFC 5436 - Sieve Notification Mechanism: mailto
  • RFC 5825 - Displaying Downgraded Messages for Email Address Internationalization
  • RFC 6131 - Sieve Vacation Extension: Seconds parameter
  • RFC 6132 - Sieve Notification Using Presence Information
  • RFC 6133 - Sieve Email Filtering: Use of Presence Information with Auto Responder functionality
  • RFC 6134 - Sieve Extension: Externally Stored Lists
  • RFC 6154 - IMAP LIST extension for special-use mailboxes
  • RFC 6237 - IMAP4 Multimailbox SEARCH Extension

External links

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK