SlideShare a Scribd company logo
Leveraging Open
Standards for Electronic
Communication
September 14, 2005
Introduction
• Dave Shafer
– Unix Systems Group,
ITS Systems and Platform
Administration
Gartner Analysis
Legacy Assumptions Modern Characteristics
E-Mail Access Server-based: mail
accessed via Unix shell
account (for example, pine
or elm
PC-based: POP, IMAP,
Web browser
Mailbox Size Small (typically under
10MB), delete after
reading
Large (users expect
100MB or more, thanks to
free e-mail services such
as Yahoo and Google),
long-term persistent
storage on the server
Message Size Small, almost always pure
text
Can be large, and multi-
megabyte attachments are
common
Spam Volume Low, can be handled by an
individual
High, affects system
performance and user
productivity
Directory Used only for Unix-based
services
Used by a diverse array of
services on multiple
operating-system
platforms
Cain, M. W., & Leong, L. August 15, 2005. Universities Face
Challenges in Modernizing E-mail Systems. Gartner, Inc.
E-mail System
Components
Incoming e-mail Outgoing e-mail
Anti-Spam/
Antivirus
Mail storage
POP/IMAP server
Directory
services
List management
Web interface
Gartner
Recommendation
• “For many universities, the best
solution will be to gradually
replace components”
• “If performance is still inadequate,
migrate to a commercial,
standards-based solution
designed for ISP environments.”
Current Service
• Mix of open source and
commercial components
• AIX and Linux servers
• Web client based on Horde/IMP
– Supports all major browsers
• Other POP/IMAP clients
– Windows, Linux, Mac, etc.
• Highly available: last unplanned
outage was in 1/2004; less than
5% of users impacted
Current Service
(continued)
• Webmail
– 28,000 active users
– 60,000 logins/day avg.
• Other POP, IMAP clients
– 2,900 active users
• Data confirm that most students
use web-based e-mail
Benefits of Open
Standards
• Freedom to choose best of
breed components
– Not restricted to one vendor
– Not restricted to either open
source or commercial
– Selection criteria may vary for
each component
Benefits (continued)
• Ease of integration
– Abundant configuration options driven by
diverse, real-world requirements
– Integration between different vendors is a
necessity; plan for it at the beginning
– Use of open standards allows better
integration
• More secure
– Far less vulnerable to virus/network attacks
(server, client, and web browser)
– Majority of time spent on security today
involves proprietary systems
Benefits (continued)
• Faster response to new
standards, changing
requirements
– Development is driven by real-
world scenarios in
heterogeneous environments
– A vendor will only implement a
new feature if it’s consistent
with their corporate strategy
Benefits (continued)
• Access to the source code allows minor
changes and improvements without
major investment
– Added support for local quota system
– Added support for alias addresses
– Added support for MS Outlook export/import
formats
– Added support for University White Pages
directory
• Similar enhancements to vendor-
provided software may be impossible or
very costly
Costs
• Two sources of system costs:
– External Costs
• Hardware, software licensing,
software support contracts, etc.
– Internal Costs
• Staff time, lost productivity,
opportunity cost, etc.
Costs (continued)
• Open Source decreases total costs
– Significantly reduces external costs
(licensing, support contracts, etc.)
– Internal costs (staff time) comparable to
commercial software
Commercial Open Source
Cost
External
Internal
Costs (continued)
• Proprietary systems “tend to
be expensive to operate when
compared with standards-
based solutions; they have
higher maintenance costs and
lower users-per-server
scalability.” (Gartner)
What is Webmail?
• A collection of open source, community
maintained applications
• Built on a flexible application framework
(Horde)
• Components:
– Web-based e-mail (IMP)
– Calendar
– Task list
– Mail filter
– Address book
– Web-based file manager
– Mobile e-mail
Other Universities
Using Horde/IMP
• Harvard University
• Indiana University
• MIT
• Purdue University
• University of Colorado at Boulder
• University of Colorado at Denver
• University of Michigan
• University of Pennsylvania
• University of Texas at Austin
• Yale University
• Many others…
Unique Features
• Extensible architecture
• Fully configurable
• Integrated portal
• Integrated quota support
• Improved support for shared
calendars
• Extensive mail filtering options
• Robust support for large accounts
(> 2 GB)
Webmail Interface
• All features supported in all
browsers
• Options configurable per-user
and system-wide
• Customizable look and feel
• Optional integrated portal
Quota Management
• Integrated quota display in
mailbox view
• Displays both current and
maximum disk usage
• Support for custom quota
systems via driver framework
Backup/Recovery
• Existing backup system allows
recovery of:
– Entire accounts
– Collections of mail folders
– Individual mail folders
(~5 requests per week; 5
minute restore time)
– Webmail address books,
calendars, task lists
Spam/Virus Protection
• Continue using existing
PureMessage service
• Potential to expand protection
• Improved message filter
capability
Standards vs.
Proprietary
• Open standards allow us to
choose the best mix of open
source and commercial
software:
– Open source in some cases
(Horde/IMP, Apache, sendmail)
– Commercial in others (IBM
Directory Server, PureMessage)
Standards vs. Proprietary
(continued)
• Open standards allow us to
choose most secure, reliable,
best of breed components
• Proprietary solutions create
vendor lock-in
– decreases flexibility
– decreases leverage in future
negotiations
Interoperability
• Supports Exchange meeting
requests
• Multi-domain Active Directory
authentication supported
• No conversion of users
required
• Accounts may be provisioned
through existing mechanisms
Interoperability
(continued)
• Webmail portal can incorporate
views of other web-based
applications
• Mobile interface available
• Can be modified to meet current
and future needs
• All POP/IMAP clients supported on
all platforms
• All modern browsers supported on
all platforms
Demonstration

More Related Content

What's hot

Client Server models in JAVA
Client Server models in JAVAClient Server models in JAVA
Client Server models in JAVATech_MX
 
Client Server Network By Usman Ihsan
Client Server Network By Usman IhsanClient Server Network By Usman Ihsan
Client Server Network By Usman Ihsan
Subhan_Virk_UAF
 
Database Management System - 2a
Database Management System - 2aDatabase Management System - 2a
Database Management System - 2a
SSN College of Engineering, Kalavakkam
 
Client Server Architecture in Software engineering
Client Server Architecture in Software engineeringClient Server Architecture in Software engineering
Client Server Architecture in Software engineering
pruthvi2898
 
Client server model
Client server modelClient server model
Client server model
Gd Goenka University
 

What's hot (7)

Basic Server PPT (THDC)
Basic Server PPT (THDC)Basic Server PPT (THDC)
Basic Server PPT (THDC)
 
Client Server models in JAVA
Client Server models in JAVAClient Server models in JAVA
Client Server models in JAVA
 
Client Server Network By Usman Ihsan
Client Server Network By Usman IhsanClient Server Network By Usman Ihsan
Client Server Network By Usman Ihsan
 
Chapter 8
Chapter 8Chapter 8
Chapter 8
 
Database Management System - 2a
Database Management System - 2aDatabase Management System - 2a
Database Management System - 2a
 
Client Server Architecture in Software engineering
Client Server Architecture in Software engineeringClient Server Architecture in Software engineering
Client Server Architecture in Software engineering
 
Client server model
Client server modelClient server model
Client server model
 

Similar to Leveraging Open Standards for Electronic Communication

Eleven Essential Attributes For Email Archiving
Eleven Essential Attributes For Email ArchivingEleven Essential Attributes For Email Archiving
Eleven Essential Attributes For Email ArchivingStephen Foskett
 
Exchange 2007 Overview Son Vu
Exchange 2007 Overview Son VuExchange 2007 Overview Son Vu
Exchange 2007 Overview Son Vu
vncson
 
Email Archiving Solutions Whats The Difference
Email Archiving Solutions Whats The DifferenceEmail Archiving Solutions Whats The Difference
Email Archiving Solutions Whats The DifferenceStephen Foskett
 
BP302: Future Proofing Enterprise IT
BP302: Future Proofing Enterprise IT BP302: Future Proofing Enterprise IT
BP302: Future Proofing Enterprise IT
panagenda
 
ConnectED 2015 BP302: Future-Proofing Enterprise IT
ConnectED 2015 BP302: Future-Proofing Enterprise ITConnectED 2015 BP302: Future-Proofing Enterprise IT
ConnectED 2015 BP302: Future-Proofing Enterprise IT
Daniel Reimann
 
Eniac – Lotus Consolidation 2009
Eniac – Lotus Consolidation   2009Eniac – Lotus Consolidation   2009
Eniac – Lotus Consolidation 2009
Edwin Kanis
 
Distributed Systems Introduction and Importance
Distributed Systems Introduction and Importance Distributed Systems Introduction and Importance
Distributed Systems Introduction and Importance
SHIKHA GAUTAM
 
University of Iowa Webmail
University of Iowa WebmailUniversity of Iowa Webmail
University of Iowa Webmail
David Shafer
 
Deliver Best-in-Class HPC Cloud Solutions Without Losing Your Mind
Deliver Best-in-Class HPC Cloud Solutions Without Losing Your MindDeliver Best-in-Class HPC Cloud Solutions Without Losing Your Mind
Deliver Best-in-Class HPC Cloud Solutions Without Losing Your Mind
Avere Systems
 
2006 bio it web services
2006 bio it web services2006 bio it web services
2006 bio it web services
Chris Dwan
 
Microservices-101
Microservices-101Microservices-101
Microservices-101
Subhashish Bhattacharjee
 
Dogfood conference 2010 - Exchange Server 2010
Dogfood conference 2010 - Exchange Server 2010Dogfood conference 2010 - Exchange Server 2010
Dogfood conference 2010 - Exchange Server 2010Jason Powless
 
CNIT 123 Ch 8: OS Vulnerabilities
CNIT 123 Ch 8: OS VulnerabilitiesCNIT 123 Ch 8: OS Vulnerabilities
CNIT 123 Ch 8: OS Vulnerabilities
Sam Bowne
 
CNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS VulnerabilitiesCNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS Vulnerabilities
Sam Bowne
 
Collaboration solutions for every enterprise
Collaboration solutions for every enterpriseCollaboration solutions for every enterprise
Collaboration solutions for every enterprise
Mithi SkyConnect
 
Email Management & E-forms
Email Management & E-formsEmail Management & E-forms
Email Management & E-forms
Carol Hagen
 
access-control-week-3
access-control-week-3access-control-week-3
access-control-week-3jemtallon
 
WSO2 Intro Webinar - Simplifying Enterprise Integration with Configurable WS...
WSO2 Intro Webinar -  Simplifying Enterprise Integration with Configurable WS...WSO2 Intro Webinar -  Simplifying Enterprise Integration with Configurable WS...
WSO2 Intro Webinar - Simplifying Enterprise Integration with Configurable WS...WSO2
 
CNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS VulnerabilitesCNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS Vulnerabilites
Sam Bowne
 

Similar to Leveraging Open Standards for Electronic Communication (20)

Eleven Essential Attributes For Email Archiving
Eleven Essential Attributes For Email ArchivingEleven Essential Attributes For Email Archiving
Eleven Essential Attributes For Email Archiving
 
Exchange 2007 Overview Son Vu
Exchange 2007 Overview Son VuExchange 2007 Overview Son Vu
Exchange 2007 Overview Son Vu
 
Email Archiving Solutions Whats The Difference
Email Archiving Solutions Whats The DifferenceEmail Archiving Solutions Whats The Difference
Email Archiving Solutions Whats The Difference
 
BP302: Future Proofing Enterprise IT
BP302: Future Proofing Enterprise IT BP302: Future Proofing Enterprise IT
BP302: Future Proofing Enterprise IT
 
ConnectED 2015 BP302: Future-Proofing Enterprise IT
ConnectED 2015 BP302: Future-Proofing Enterprise ITConnectED 2015 BP302: Future-Proofing Enterprise IT
ConnectED 2015 BP302: Future-Proofing Enterprise IT
 
Eniac – Lotus Consolidation 2009
Eniac – Lotus Consolidation   2009Eniac – Lotus Consolidation   2009
Eniac – Lotus Consolidation 2009
 
Distributed Systems Introduction and Importance
Distributed Systems Introduction and Importance Distributed Systems Introduction and Importance
Distributed Systems Introduction and Importance
 
University of Iowa Webmail
University of Iowa WebmailUniversity of Iowa Webmail
University of Iowa Webmail
 
Deliver Best-in-Class HPC Cloud Solutions Without Losing Your Mind
Deliver Best-in-Class HPC Cloud Solutions Without Losing Your MindDeliver Best-in-Class HPC Cloud Solutions Without Losing Your Mind
Deliver Best-in-Class HPC Cloud Solutions Without Losing Your Mind
 
2006 bio it web services
2006 bio it web services2006 bio it web services
2006 bio it web services
 
Microservices-101
Microservices-101Microservices-101
Microservices-101
 
Dogfood conference 2010 - Exchange Server 2010
Dogfood conference 2010 - Exchange Server 2010Dogfood conference 2010 - Exchange Server 2010
Dogfood conference 2010 - Exchange Server 2010
 
CNIT 123 Ch 8: OS Vulnerabilities
CNIT 123 Ch 8: OS VulnerabilitiesCNIT 123 Ch 8: OS Vulnerabilities
CNIT 123 Ch 8: OS Vulnerabilities
 
CNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS VulnerabilitiesCNIT 123 8: Desktop and Server OS Vulnerabilities
CNIT 123 8: Desktop and Server OS Vulnerabilities
 
Collaboration solutions for every enterprise
Collaboration solutions for every enterpriseCollaboration solutions for every enterprise
Collaboration solutions for every enterprise
 
Email Management & E-forms
Email Management & E-formsEmail Management & E-forms
Email Management & E-forms
 
access-control-week-3
access-control-week-3access-control-week-3
access-control-week-3
 
WSO2 Intro Webinar - Simplifying Enterprise Integration with Configurable WS...
WSO2 Intro Webinar -  Simplifying Enterprise Integration with Configurable WS...WSO2 Intro Webinar -  Simplifying Enterprise Integration with Configurable WS...
WSO2 Intro Webinar - Simplifying Enterprise Integration with Configurable WS...
 
CNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS VulnerabilitesCNIT 123: 8: Desktop and Server OS Vulnerabilites
CNIT 123: 8: Desktop and Server OS Vulnerabilites
 
142 wendy shank
142 wendy shank142 wendy shank
142 wendy shank
 

Recently uploaded

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 

Leveraging Open Standards for Electronic Communication

  • 1. Leveraging Open Standards for Electronic Communication September 14, 2005
  • 2. Introduction • Dave Shafer – Unix Systems Group, ITS Systems and Platform Administration
  • 3. Gartner Analysis Legacy Assumptions Modern Characteristics E-Mail Access Server-based: mail accessed via Unix shell account (for example, pine or elm PC-based: POP, IMAP, Web browser Mailbox Size Small (typically under 10MB), delete after reading Large (users expect 100MB or more, thanks to free e-mail services such as Yahoo and Google), long-term persistent storage on the server Message Size Small, almost always pure text Can be large, and multi- megabyte attachments are common Spam Volume Low, can be handled by an individual High, affects system performance and user productivity Directory Used only for Unix-based services Used by a diverse array of services on multiple operating-system platforms Cain, M. W., & Leong, L. August 15, 2005. Universities Face Challenges in Modernizing E-mail Systems. Gartner, Inc.
  • 4. E-mail System Components Incoming e-mail Outgoing e-mail Anti-Spam/ Antivirus Mail storage POP/IMAP server Directory services List management Web interface
  • 5. Gartner Recommendation • “For many universities, the best solution will be to gradually replace components” • “If performance is still inadequate, migrate to a commercial, standards-based solution designed for ISP environments.”
  • 6. Current Service • Mix of open source and commercial components • AIX and Linux servers • Web client based on Horde/IMP – Supports all major browsers • Other POP/IMAP clients – Windows, Linux, Mac, etc. • Highly available: last unplanned outage was in 1/2004; less than 5% of users impacted
  • 7. Current Service (continued) • Webmail – 28,000 active users – 60,000 logins/day avg. • Other POP, IMAP clients – 2,900 active users • Data confirm that most students use web-based e-mail
  • 8. Benefits of Open Standards • Freedom to choose best of breed components – Not restricted to one vendor – Not restricted to either open source or commercial – Selection criteria may vary for each component
  • 9. Benefits (continued) • Ease of integration – Abundant configuration options driven by diverse, real-world requirements – Integration between different vendors is a necessity; plan for it at the beginning – Use of open standards allows better integration • More secure – Far less vulnerable to virus/network attacks (server, client, and web browser) – Majority of time spent on security today involves proprietary systems
  • 10. Benefits (continued) • Faster response to new standards, changing requirements – Development is driven by real- world scenarios in heterogeneous environments – A vendor will only implement a new feature if it’s consistent with their corporate strategy
  • 11. Benefits (continued) • Access to the source code allows minor changes and improvements without major investment – Added support for local quota system – Added support for alias addresses – Added support for MS Outlook export/import formats – Added support for University White Pages directory • Similar enhancements to vendor- provided software may be impossible or very costly
  • 12. Costs • Two sources of system costs: – External Costs • Hardware, software licensing, software support contracts, etc. – Internal Costs • Staff time, lost productivity, opportunity cost, etc.
  • 13. Costs (continued) • Open Source decreases total costs – Significantly reduces external costs (licensing, support contracts, etc.) – Internal costs (staff time) comparable to commercial software Commercial Open Source Cost External Internal
  • 14. Costs (continued) • Proprietary systems “tend to be expensive to operate when compared with standards- based solutions; they have higher maintenance costs and lower users-per-server scalability.” (Gartner)
  • 15. What is Webmail? • A collection of open source, community maintained applications • Built on a flexible application framework (Horde) • Components: – Web-based e-mail (IMP) – Calendar – Task list – Mail filter – Address book – Web-based file manager – Mobile e-mail
  • 16. Other Universities Using Horde/IMP • Harvard University • Indiana University • MIT • Purdue University • University of Colorado at Boulder • University of Colorado at Denver • University of Michigan • University of Pennsylvania • University of Texas at Austin • Yale University • Many others…
  • 17. Unique Features • Extensible architecture • Fully configurable • Integrated portal • Integrated quota support • Improved support for shared calendars • Extensive mail filtering options • Robust support for large accounts (> 2 GB)
  • 18. Webmail Interface • All features supported in all browsers • Options configurable per-user and system-wide • Customizable look and feel • Optional integrated portal
  • 19. Quota Management • Integrated quota display in mailbox view • Displays both current and maximum disk usage • Support for custom quota systems via driver framework
  • 20. Backup/Recovery • Existing backup system allows recovery of: – Entire accounts – Collections of mail folders – Individual mail folders (~5 requests per week; 5 minute restore time) – Webmail address books, calendars, task lists
  • 21. Spam/Virus Protection • Continue using existing PureMessage service • Potential to expand protection • Improved message filter capability
  • 22. Standards vs. Proprietary • Open standards allow us to choose the best mix of open source and commercial software: – Open source in some cases (Horde/IMP, Apache, sendmail) – Commercial in others (IBM Directory Server, PureMessage)
  • 23. Standards vs. Proprietary (continued) • Open standards allow us to choose most secure, reliable, best of breed components • Proprietary solutions create vendor lock-in – decreases flexibility – decreases leverage in future negotiations
  • 24. Interoperability • Supports Exchange meeting requests • Multi-domain Active Directory authentication supported • No conversion of users required • Accounts may be provisioned through existing mechanisms
  • 25. Interoperability (continued) • Webmail portal can incorporate views of other web-based applications • Mobile interface available • Can be modified to meet current and future needs • All POP/IMAP clients supported on all platforms • All modern browsers supported on all platforms