SlideShare uma empresa Scribd logo
1 de 20
University of Iowa Webmail:
Planning for enterprise services based on
open source software
December 6, 2004
Overview
 Background
 Implementation
 Evaluation
 Conclusions
 Q&A
Background
 Captaris WebMail discontinued
 Follow-on product more expensive,
unnecessary features
 Primary usage:
 Traveling faculty/staff
 Home users
 Students in campus buildings
 Requirements:
 IMAP mailbox access
 Comparable features
Selection Process
 Selection team identified alternatives
 Hands-on evaluation where possible
 Other schools
 Products in use
 Evaluation reports
 Selected IMP from the Horde Project
http://www.horde.org/
Horde IMP
 Web application suite
 E-mail, contact manager, calendar,
portal, task list, notepad, etc.
 University of Pennsylvania report
http://www.upenn.edu/computing/eval/2002/webmail/
 Other schools using IMP:
 MIT
 Purdue University
 Tulane University
 University of Michigan
Implementation Plan
 Mix of open and closed source
 Use closed source mainly to leverage
existing infrastructure
 Minimal changes to IMP source
 Use extended testing/pilot phases
 Gradual deployment
 Batch migrate personal address books
from Captaris WebMail to IMP
Open Source Components
 Red Hat Enterprise Linux 3 AS
 Apache HTTP Server 1.3.x
 PHP 4.x
 Horde IMP, Turba
 up-imapproxy
 Sendmail
Closed Source Components
 IBM LDAP Directory Server
 Oracle Database Server
 User preferences
 Personal address books
 AIX IMAP Servers
 Microsoft Active Directory
 IBM Network Dispatcher
 Load balancing, fail-over
Local IMP Modifications
 LDAP directory integration
 Default display name
 Default reply-to address
 Login screen design
 After initial deployment:
 Quota display
 Outlook address book export
Oracle Database
Server LDAP Server
http(s)
oci8
`
POP/IMAP
Servers
(Blue)
imap
Web Servers
smtp
User
Outbound SMTP
Servers
krb5
Active Directory
Servers
Network File
Servers
nfs
Network
Dispatcher
Servers
ldap
Open Source
Closed Source
Hardware
 3 IBM xSeries 335 servers
 Early hardware problems
 Minimized hardware vendors (IBM
RS/6000 and pSeries AIX servers)
 Little value from vendor’s cross-
platform hardware management tools
 Greater value from existing
relationship and knowledge
Administration
 Highly-skilled team
 Proactively monitor critical services
using open source, vendor-neutral
tools (Spong, Cricket)
 Centralized, vendor-neutral
configuration management (depot)
 Immediately test and apply security
patches
 Review and apply other patches as
needed
Implementation Challenges
 Mixing open and closed source (e.g.,
PHP and Oracle)
 Sizing/scaling, impact on other
systems
 up-imapproxy in early development
 Captaris refused to release WebMail
address book structure
 Early hardware problems
 Difficulty proving hardware vs. software
problem
Evaluation — Current State
 3M requests/day
 24K active users
 No further hardware issues
 Some performance issues (mainly
impact on other systems, esp. NFS)
Success Factors
 Management support
 Preview installation
 Formal project management
 Hardware vendor relationship
 Vendor-neutral management
infrastructure already in place
 Minimal changes to source
 Gradual deployment
 In-house technical expertise
The Bottom Line
 Support costs:
 External costs
(licensing,
contracts, etc.)
 Internal costs (staff
time, lost
productivity)
 Commercial
software promises
to lower internal
costs in exchange
for higher external
costs Closed Source
External
Costs
Internal
Costs
The Bottom Line
 Reality:
Commercial
software doesn’t
always deliver
 Switch to open
source:
 Internal costs may
decrease, or
increase only
slightly
 External costs may
decrease
significantly Closed
Source
Open
Source
External
Costs
Internal
Costs
Benefits
 Decreased operating costs (licensing,
software support)
 Able to meet unique integration
requirements
 Easy to add, modify features
 Display Blue quotas
 Outlook address book export
Ongoing Challenges
 Mixing open and closed source
 Simplest when based on common
libraries and standard protocols (e.g.,
imap and ldap)
 More difficult when using closed source
libraries and proprietary protocols (e.g.,
Oracle)
 Sizing/scaling
 Planning for performance
 Predicting impact of changes to current
environment
Conclusions
 Significant savings possible by cutting
external licensing/support costs
 Mitigate effects on internal costs:
 Local technical support expertise
 Use proven technology (applications,
libraries, protocols)
 Minimize changes to source
 Allow learning and discovery time
 Anticipate potential risks

Mais conteúdo relacionado

Mais procurados (6)

Regression Test Automation Framework
Regression Test Automation Framework Regression Test Automation Framework
Regression Test Automation Framework
 
Test Team Responsibilities
Test Team ResponsibilitiesTest Team Responsibilities
Test Team Responsibilities
 
ONLINE EXAMINATION SYSTEM
ONLINE EXAMINATION SYSTEM ONLINE EXAMINATION SYSTEM
ONLINE EXAMINATION SYSTEM
 
Online examination system
Online examination systemOnline examination system
Online examination system
 
Software techniques
Software techniquesSoftware techniques
Software techniques
 
Sakai Tests
Sakai TestsSakai Tests
Sakai Tests
 

Semelhante a University of Iowa Webmail

Software Rollout
Software RolloutSoftware Rollout
Software Rollout
colmbennett
 
Best Practices In Load And Stress Testing Cmg Seminar[1]
Best Practices In Load And Stress Testing Cmg Seminar[1]Best Practices In Load And Stress Testing Cmg Seminar[1]
Best Practices In Load And Stress Testing Cmg Seminar[1]
Munirathnam Naidu
 
Systems Analysis And Design 2
Systems Analysis And Design 2Systems Analysis And Design 2
Systems Analysis And Design 2
MISY
 

Semelhante a University of Iowa Webmail (20)

Heuristics of performance testing
Heuristics of performance testingHeuristics of performance testing
Heuristics of performance testing
 
Systems Analysis Midterm Lesson
Systems Analysis Midterm LessonSystems Analysis Midterm Lesson
Systems Analysis Midterm Lesson
 
Chap05
Chap05Chap05
Chap05
 
Leveraging Open Standards for Electronic Communication
Leveraging Open Standards for Electronic CommunicationLeveraging Open Standards for Electronic Communication
Leveraging Open Standards for Electronic Communication
 
Software Estimation Techniques
Software Estimation TechniquesSoftware Estimation Techniques
Software Estimation Techniques
 
Sanjeevi's SDLC Guest Lecture in Anna University campus at AU-PERS Centre (Ye...
Sanjeevi's SDLC Guest Lecture in Anna University campus at AU-PERS Centre (Ye...Sanjeevi's SDLC Guest Lecture in Anna University campus at AU-PERS Centre (Ye...
Sanjeevi's SDLC Guest Lecture in Anna University campus at AU-PERS Centre (Ye...
 
Automation testing
Automation testingAutomation testing
Automation testing
 
Software Rollout
Software RolloutSoftware Rollout
Software Rollout
 
Open source: Making connections by Sunny Pai
Open source: Making connections by Sunny PaiOpen source: Making connections by Sunny Pai
Open source: Making connections by Sunny Pai
 
Acquisition the great migration
Acquisition  the great migrationAcquisition  the great migration
Acquisition the great migration
 
Best Practices In Load And Stress Testing Cmg Seminar[1]
Best Practices In Load And Stress Testing Cmg Seminar[1]Best Practices In Load And Stress Testing Cmg Seminar[1]
Best Practices In Load And Stress Testing Cmg Seminar[1]
 
Phase Two: What’s Next for Life Sciences and Enterprise Content Management
Phase Two: What’s Next for Life Sciences and Enterprise Content ManagementPhase Two: What’s Next for Life Sciences and Enterprise Content Management
Phase Two: What’s Next for Life Sciences and Enterprise Content Management
 
Evo conf - SharePoint for the first time
Evo conf - SharePoint for the first timeEvo conf - SharePoint for the first time
Evo conf - SharePoint for the first time
 
T3 Consortium's Performance Center of Excellence
T3 Consortium's Performance Center of ExcellenceT3 Consortium's Performance Center of Excellence
T3 Consortium's Performance Center of Excellence
 
15 si(systems analysis and design )
15 si(systems analysis and design )15 si(systems analysis and design )
15 si(systems analysis and design )
 
Systems Analysis And Design 2
Systems Analysis And Design 2Systems Analysis And Design 2
Systems Analysis And Design 2
 
SA Chapter 7
SA Chapter 7SA Chapter 7
SA Chapter 7
 
Sam k2
Sam k2Sam k2
Sam k2
 
Plab system owners meeting v2
Plab   system owners meeting v2Plab   system owners meeting v2
Plab system owners meeting v2
 
Sameer_Resume
Sameer_ResumeSameer_Resume
Sameer_Resume
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

University of Iowa Webmail

  • 1. University of Iowa Webmail: Planning for enterprise services based on open source software December 6, 2004
  • 2. Overview  Background  Implementation  Evaluation  Conclusions  Q&A
  • 3. Background  Captaris WebMail discontinued  Follow-on product more expensive, unnecessary features  Primary usage:  Traveling faculty/staff  Home users  Students in campus buildings  Requirements:  IMAP mailbox access  Comparable features
  • 4. Selection Process  Selection team identified alternatives  Hands-on evaluation where possible  Other schools  Products in use  Evaluation reports  Selected IMP from the Horde Project http://www.horde.org/
  • 5. Horde IMP  Web application suite  E-mail, contact manager, calendar, portal, task list, notepad, etc.  University of Pennsylvania report http://www.upenn.edu/computing/eval/2002/webmail/  Other schools using IMP:  MIT  Purdue University  Tulane University  University of Michigan
  • 6. Implementation Plan  Mix of open and closed source  Use closed source mainly to leverage existing infrastructure  Minimal changes to IMP source  Use extended testing/pilot phases  Gradual deployment  Batch migrate personal address books from Captaris WebMail to IMP
  • 7. Open Source Components  Red Hat Enterprise Linux 3 AS  Apache HTTP Server 1.3.x  PHP 4.x  Horde IMP, Turba  up-imapproxy  Sendmail
  • 8. Closed Source Components  IBM LDAP Directory Server  Oracle Database Server  User preferences  Personal address books  AIX IMAP Servers  Microsoft Active Directory  IBM Network Dispatcher  Load balancing, fail-over
  • 9. Local IMP Modifications  LDAP directory integration  Default display name  Default reply-to address  Login screen design  After initial deployment:  Quota display  Outlook address book export
  • 10. Oracle Database Server LDAP Server http(s) oci8 ` POP/IMAP Servers (Blue) imap Web Servers smtp User Outbound SMTP Servers krb5 Active Directory Servers Network File Servers nfs Network Dispatcher Servers ldap Open Source Closed Source
  • 11. Hardware  3 IBM xSeries 335 servers  Early hardware problems  Minimized hardware vendors (IBM RS/6000 and pSeries AIX servers)  Little value from vendor’s cross- platform hardware management tools  Greater value from existing relationship and knowledge
  • 12. Administration  Highly-skilled team  Proactively monitor critical services using open source, vendor-neutral tools (Spong, Cricket)  Centralized, vendor-neutral configuration management (depot)  Immediately test and apply security patches  Review and apply other patches as needed
  • 13. Implementation Challenges  Mixing open and closed source (e.g., PHP and Oracle)  Sizing/scaling, impact on other systems  up-imapproxy in early development  Captaris refused to release WebMail address book structure  Early hardware problems  Difficulty proving hardware vs. software problem
  • 14. Evaluation — Current State  3M requests/day  24K active users  No further hardware issues  Some performance issues (mainly impact on other systems, esp. NFS)
  • 15. Success Factors  Management support  Preview installation  Formal project management  Hardware vendor relationship  Vendor-neutral management infrastructure already in place  Minimal changes to source  Gradual deployment  In-house technical expertise
  • 16. The Bottom Line  Support costs:  External costs (licensing, contracts, etc.)  Internal costs (staff time, lost productivity)  Commercial software promises to lower internal costs in exchange for higher external costs Closed Source External Costs Internal Costs
  • 17. The Bottom Line  Reality: Commercial software doesn’t always deliver  Switch to open source:  Internal costs may decrease, or increase only slightly  External costs may decrease significantly Closed Source Open Source External Costs Internal Costs
  • 18. Benefits  Decreased operating costs (licensing, software support)  Able to meet unique integration requirements  Easy to add, modify features  Display Blue quotas  Outlook address book export
  • 19. Ongoing Challenges  Mixing open and closed source  Simplest when based on common libraries and standard protocols (e.g., imap and ldap)  More difficult when using closed source libraries and proprietary protocols (e.g., Oracle)  Sizing/scaling  Planning for performance  Predicting impact of changes to current environment
  • 20. Conclusions  Significant savings possible by cutting external licensing/support costs  Mitigate effects on internal costs:  Local technical support expertise  Use proven technology (applications, libraries, protocols)  Minimize changes to source  Allow learning and discovery time  Anticipate potential risks