SlideShare a Scribd company logo
University of Iowa Webmail:
Planning for enterprise services based on
open source software
December 6, 2004
Overview
 Background
 Implementation
 Evaluation
 Conclusions
 Q&A
Background
 Captaris WebMail discontinued
 Follow-on product more expensive,
unnecessary features
 Primary usage:
 Traveling faculty/staff
 Home users
 Students in campus buildings
 Requirements:
 IMAP mailbox access
 Comparable features
Selection Process
 Selection team identified alternatives
 Hands-on evaluation where possible
 Other schools
 Products in use
 Evaluation reports
 Selected IMP from the Horde Project
http://www.horde.org/
Horde IMP
 Web application suite
 E-mail, contact manager, calendar,
portal, task list, notepad, etc.
 University of Pennsylvania report
http://www.upenn.edu/computing/eval/2002/webmail/
 Other schools using IMP:
 MIT
 Purdue University
 Tulane University
 University of Michigan
Implementation Plan
 Mix of open and closed source
 Use closed source mainly to leverage
existing infrastructure
 Minimal changes to IMP source
 Use extended testing/pilot phases
 Gradual deployment
 Batch migrate personal address books
from Captaris WebMail to IMP
Open Source Components
 Red Hat Enterprise Linux 3 AS
 Apache HTTP Server 1.3.x
 PHP 4.x
 Horde IMP, Turba
 up-imapproxy
 Sendmail
Closed Source Components
 IBM LDAP Directory Server
 Oracle Database Server
 User preferences
 Personal address books
 AIX IMAP Servers
 Microsoft Active Directory
 IBM Network Dispatcher
 Load balancing, fail-over
Local IMP Modifications
 LDAP directory integration
 Default display name
 Default reply-to address
 Login screen design
 After initial deployment:
 Quota display
 Outlook address book export
Oracle Database
Server LDAP Server
http(s)
oci8
`
POP/IMAP
Servers
(Blue)
imap
Web Servers
smtp
User
Outbound SMTP
Servers
krb5
Active Directory
Servers
Network File
Servers
nfs
Network
Dispatcher
Servers
ldap
Open Source
Closed Source
Hardware
 3 IBM xSeries 335 servers
 Early hardware problems
 Minimized hardware vendors (IBM
RS/6000 and pSeries AIX servers)
 Little value from vendor’s cross-
platform hardware management tools
 Greater value from existing
relationship and knowledge
Administration
 Highly-skilled team
 Proactively monitor critical services
using open source, vendor-neutral
tools (Spong, Cricket)
 Centralized, vendor-neutral
configuration management (depot)
 Immediately test and apply security
patches
 Review and apply other patches as
needed
Implementation Challenges
 Mixing open and closed source (e.g.,
PHP and Oracle)
 Sizing/scaling, impact on other
systems
 up-imapproxy in early development
 Captaris refused to release WebMail
address book structure
 Early hardware problems
 Difficulty proving hardware vs. software
problem
Evaluation — Current State
 3M requests/day
 24K active users
 No further hardware issues
 Some performance issues (mainly
impact on other systems, esp. NFS)
Success Factors
 Management support
 Preview installation
 Formal project management
 Hardware vendor relationship
 Vendor-neutral management
infrastructure already in place
 Minimal changes to source
 Gradual deployment
 In-house technical expertise
The Bottom Line
 Support costs:
 External costs
(licensing,
contracts, etc.)
 Internal costs (staff
time, lost
productivity)
 Commercial
software promises
to lower internal
costs in exchange
for higher external
costs Closed Source
External
Costs
Internal
Costs
The Bottom Line
 Reality:
Commercial
software doesn’t
always deliver
 Switch to open
source:
 Internal costs may
decrease, or
increase only
slightly
 External costs may
decrease
significantly Closed
Source
Open
Source
External
Costs
Internal
Costs
Benefits
 Decreased operating costs (licensing,
software support)
 Able to meet unique integration
requirements
 Easy to add, modify features
 Display Blue quotas
 Outlook address book export
Ongoing Challenges
 Mixing open and closed source
 Simplest when based on common
libraries and standard protocols (e.g.,
imap and ldap)
 More difficult when using closed source
libraries and proprietary protocols (e.g.,
Oracle)
 Sizing/scaling
 Planning for performance
 Predicting impact of changes to current
environment
Conclusions
 Significant savings possible by cutting
external licensing/support costs
 Mitigate effects on internal costs:
 Local technical support expertise
 Use proven technology (applications,
libraries, protocols)
 Minimize changes to source
 Allow learning and discovery time
 Anticipate potential risks

More Related Content

What's hot

Regression Test Automation Framework
Regression Test Automation Framework Regression Test Automation Framework
Regression Test Automation Framework
Infosys
 
Test Team Responsibilities
Test Team ResponsibilitiesTest Team Responsibilities
Test Team Responsibilities
ANKUR-BA
 
ONLINE EXAMINATION SYSTEM
ONLINE EXAMINATION SYSTEM ONLINE EXAMINATION SYSTEM
ONLINE EXAMINATION SYSTEM
Aakanksha .
 
Online examination system
Online examination systemOnline examination system
Online examination system
Tamoghna Hazra
 
Software techniques
Software techniquesSoftware techniques
Software techniques
safiantaseer
 
Sakai Tests
Sakai TestsSakai Tests
Sakai Tests
odepasqua
 

What's hot (6)

Regression Test Automation Framework
Regression Test Automation Framework Regression Test Automation Framework
Regression Test Automation Framework
 
Test Team Responsibilities
Test Team ResponsibilitiesTest Team Responsibilities
Test Team Responsibilities
 
ONLINE EXAMINATION SYSTEM
ONLINE EXAMINATION SYSTEM ONLINE EXAMINATION SYSTEM
ONLINE EXAMINATION SYSTEM
 
Online examination system
Online examination systemOnline examination system
Online examination system
 
Software techniques
Software techniquesSoftware techniques
Software techniques
 
Sakai Tests
Sakai TestsSakai Tests
Sakai Tests
 

Similar to University of Iowa Webmail

Heuristics of performance testing
Heuristics of performance testingHeuristics of performance testing
Heuristics of performance testing
Pradeep Soundararajan
 
Systems Analysis Midterm Lesson
Systems Analysis Midterm LessonSystems Analysis Midterm Lesson
Systems Analysis Midterm Lesson
Maulen Bale
 
Chap05
Chap05Chap05
Chap05
Anne Badong
 
Leveraging Open Standards for Electronic Communication
Leveraging Open Standards for Electronic CommunicationLeveraging Open Standards for Electronic Communication
Leveraging Open Standards for Electronic Communication
David Shafer
 
Software Estimation Techniques
Software Estimation TechniquesSoftware Estimation Techniques
Software Estimation Techniques
kamal
 
Sanjeevi's SDLC Guest Lecture in Anna University campus at AU-PERS Centre (Ye...
Sanjeevi's SDLC Guest Lecture in Anna University campus at AU-PERS Centre (Ye...Sanjeevi's SDLC Guest Lecture in Anna University campus at AU-PERS Centre (Ye...
Sanjeevi's SDLC Guest Lecture in Anna University campus at AU-PERS Centre (Ye...
Sanjeevi Prasad
 
Automation testing
Automation testingAutomation testing
Automation testing
Transpose Solutions Inc
 
Software Rollout
Software RolloutSoftware Rollout
Software Rolloutcolmbennett
 
Open source: Making connections by Sunny Pai
Open source: Making connections by Sunny PaiOpen source: Making connections by Sunny Pai
Open source: Making connections by Sunny Pai
Hawaii Library Association
 
Acquisition the great migration
Acquisition  the great migrationAcquisition  the great migration
Acquisition the great migration
incunabula
 
Best Practices In Load And Stress Testing Cmg Seminar[1]
Best Practices In Load And Stress Testing Cmg Seminar[1]Best Practices In Load And Stress Testing Cmg Seminar[1]
Best Practices In Load And Stress Testing Cmg Seminar[1]Munirathnam Naidu
 
Phase Two: What’s Next for Life Sciences and Enterprise Content Management
Phase Two: What’s Next for Life Sciences and Enterprise Content ManagementPhase Two: What’s Next for Life Sciences and Enterprise Content Management
Phase Two: What’s Next for Life Sciences and Enterprise Content Management
Scott Abel
 
Evo conf - SharePoint for the first time
Evo conf - SharePoint for the first timeEvo conf - SharePoint for the first time
Evo conf - SharePoint for the first time
Mark Stokes
 
T3 Consortium's Performance Center of Excellence
T3 Consortium's Performance Center of ExcellenceT3 Consortium's Performance Center of Excellence
T3 Consortium's Performance Center of Excellence
veehikle
 
15 si(systems analysis and design )
15 si(systems analysis and design )15 si(systems analysis and design )
15 si(systems analysis and design )
Nurdin Al-Azies
 
Systems Analysis And Design 2
Systems Analysis And Design 2Systems Analysis And Design 2
Systems Analysis And Design 2MISY
 
SA Chapter 7
SA Chapter 7SA Chapter 7
SA Chapter 7
Nuth Otanasap
 
Plab system owners meeting v2
Plab   system owners meeting v2Plab   system owners meeting v2
Plab system owners meeting v2
Chris Wang
 

Similar to University of Iowa Webmail (20)

Heuristics of performance testing
Heuristics of performance testingHeuristics of performance testing
Heuristics of performance testing
 
Systems Analysis Midterm Lesson
Systems Analysis Midterm LessonSystems Analysis Midterm Lesson
Systems Analysis Midterm Lesson
 
Chap05
Chap05Chap05
Chap05
 
Leveraging Open Standards for Electronic Communication
Leveraging Open Standards for Electronic CommunicationLeveraging Open Standards for Electronic Communication
Leveraging Open Standards for Electronic Communication
 
Software Estimation Techniques
Software Estimation TechniquesSoftware Estimation Techniques
Software Estimation Techniques
 
Sanjeevi's SDLC Guest Lecture in Anna University campus at AU-PERS Centre (Ye...
Sanjeevi's SDLC Guest Lecture in Anna University campus at AU-PERS Centre (Ye...Sanjeevi's SDLC Guest Lecture in Anna University campus at AU-PERS Centre (Ye...
Sanjeevi's SDLC Guest Lecture in Anna University campus at AU-PERS Centre (Ye...
 
Automation testing
Automation testingAutomation testing
Automation testing
 
Software Rollout
Software RolloutSoftware Rollout
Software Rollout
 
Open source: Making connections by Sunny Pai
Open source: Making connections by Sunny PaiOpen source: Making connections by Sunny Pai
Open source: Making connections by Sunny Pai
 
Acquisition the great migration
Acquisition  the great migrationAcquisition  the great migration
Acquisition the great migration
 
Best Practices In Load And Stress Testing Cmg Seminar[1]
Best Practices In Load And Stress Testing Cmg Seminar[1]Best Practices In Load And Stress Testing Cmg Seminar[1]
Best Practices In Load And Stress Testing Cmg Seminar[1]
 
Phase Two: What’s Next for Life Sciences and Enterprise Content Management
Phase Two: What’s Next for Life Sciences and Enterprise Content ManagementPhase Two: What’s Next for Life Sciences and Enterprise Content Management
Phase Two: What’s Next for Life Sciences and Enterprise Content Management
 
Evo conf - SharePoint for the first time
Evo conf - SharePoint for the first timeEvo conf - SharePoint for the first time
Evo conf - SharePoint for the first time
 
T3 Consortium's Performance Center of Excellence
T3 Consortium's Performance Center of ExcellenceT3 Consortium's Performance Center of Excellence
T3 Consortium's Performance Center of Excellence
 
15 si(systems analysis and design )
15 si(systems analysis and design )15 si(systems analysis and design )
15 si(systems analysis and design )
 
Systems Analysis And Design 2
Systems Analysis And Design 2Systems Analysis And Design 2
Systems Analysis And Design 2
 
SA Chapter 7
SA Chapter 7SA Chapter 7
SA Chapter 7
 
Sam k2
Sam k2Sam k2
Sam k2
 
Plab system owners meeting v2
Plab   system owners meeting v2Plab   system owners meeting v2
Plab system owners meeting v2
 
Sameer_Resume
Sameer_ResumeSameer_Resume
Sameer_Resume
 

Recently uploaded

Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 

Recently uploaded (20)

Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 

University of Iowa Webmail

  • 1. University of Iowa Webmail: Planning for enterprise services based on open source software December 6, 2004
  • 2. Overview  Background  Implementation  Evaluation  Conclusions  Q&A
  • 3. Background  Captaris WebMail discontinued  Follow-on product more expensive, unnecessary features  Primary usage:  Traveling faculty/staff  Home users  Students in campus buildings  Requirements:  IMAP mailbox access  Comparable features
  • 4. Selection Process  Selection team identified alternatives  Hands-on evaluation where possible  Other schools  Products in use  Evaluation reports  Selected IMP from the Horde Project http://www.horde.org/
  • 5. Horde IMP  Web application suite  E-mail, contact manager, calendar, portal, task list, notepad, etc.  University of Pennsylvania report http://www.upenn.edu/computing/eval/2002/webmail/  Other schools using IMP:  MIT  Purdue University  Tulane University  University of Michigan
  • 6. Implementation Plan  Mix of open and closed source  Use closed source mainly to leverage existing infrastructure  Minimal changes to IMP source  Use extended testing/pilot phases  Gradual deployment  Batch migrate personal address books from Captaris WebMail to IMP
  • 7. Open Source Components  Red Hat Enterprise Linux 3 AS  Apache HTTP Server 1.3.x  PHP 4.x  Horde IMP, Turba  up-imapproxy  Sendmail
  • 8. Closed Source Components  IBM LDAP Directory Server  Oracle Database Server  User preferences  Personal address books  AIX IMAP Servers  Microsoft Active Directory  IBM Network Dispatcher  Load balancing, fail-over
  • 9. Local IMP Modifications  LDAP directory integration  Default display name  Default reply-to address  Login screen design  After initial deployment:  Quota display  Outlook address book export
  • 10. Oracle Database Server LDAP Server http(s) oci8 ` POP/IMAP Servers (Blue) imap Web Servers smtp User Outbound SMTP Servers krb5 Active Directory Servers Network File Servers nfs Network Dispatcher Servers ldap Open Source Closed Source
  • 11. Hardware  3 IBM xSeries 335 servers  Early hardware problems  Minimized hardware vendors (IBM RS/6000 and pSeries AIX servers)  Little value from vendor’s cross- platform hardware management tools  Greater value from existing relationship and knowledge
  • 12. Administration  Highly-skilled team  Proactively monitor critical services using open source, vendor-neutral tools (Spong, Cricket)  Centralized, vendor-neutral configuration management (depot)  Immediately test and apply security patches  Review and apply other patches as needed
  • 13. Implementation Challenges  Mixing open and closed source (e.g., PHP and Oracle)  Sizing/scaling, impact on other systems  up-imapproxy in early development  Captaris refused to release WebMail address book structure  Early hardware problems  Difficulty proving hardware vs. software problem
  • 14. Evaluation — Current State  3M requests/day  24K active users  No further hardware issues  Some performance issues (mainly impact on other systems, esp. NFS)
  • 15. Success Factors  Management support  Preview installation  Formal project management  Hardware vendor relationship  Vendor-neutral management infrastructure already in place  Minimal changes to source  Gradual deployment  In-house technical expertise
  • 16. The Bottom Line  Support costs:  External costs (licensing, contracts, etc.)  Internal costs (staff time, lost productivity)  Commercial software promises to lower internal costs in exchange for higher external costs Closed Source External Costs Internal Costs
  • 17. The Bottom Line  Reality: Commercial software doesn’t always deliver  Switch to open source:  Internal costs may decrease, or increase only slightly  External costs may decrease significantly Closed Source Open Source External Costs Internal Costs
  • 18. Benefits  Decreased operating costs (licensing, software support)  Able to meet unique integration requirements  Easy to add, modify features  Display Blue quotas  Outlook address book export
  • 19. Ongoing Challenges  Mixing open and closed source  Simplest when based on common libraries and standard protocols (e.g., imap and ldap)  More difficult when using closed source libraries and proprietary protocols (e.g., Oracle)  Sizing/scaling  Planning for performance  Predicting impact of changes to current environment
  • 20. Conclusions  Significant savings possible by cutting external licensing/support costs  Mitigate effects on internal costs:  Local technical support expertise  Use proven technology (applications, libraries, protocols)  Minimize changes to source  Allow learning and discovery time  Anticipate potential risks