you will obtain the event with a summary “foo” in the foo.EML file. The EML file is actually an RFC 2821 message with a text/calendar part. That part can be extracted and imported into SOGo easily. WebDAV is de-emphasized in Microsoft Exchange 2007, so hurry and migrate from it.
A similar approach can be used with Oracle Calendar. A demo program bundled with Oracle's SDK provides an excellent starting point for becoming familiar with the shared library named capi. With this library, you can retrieve a user's events formatted with the iCalendar standard. As with Microsoft Exchange, the migration process is simply to push all events in SOGo through WebDAV. The Oracle Calendar's only limitation is related to recurring events; even though a series of events can be identified clearly, there is no easy way to retrieve the original recurrence rule definition. This frustration surely will be attenuated by the advantages of SOGo, such as endless recurring events and a much more modern Web interface.
Standards, such as CalDAV and SyncML, finally have emerged that improve interoperability between native groupware clients and various servers. Open-source developers have proven their commitment in supporting those standards and created competitive alternatives to commercial solutions.
The Scalable OpenGroupware.org Project always has followed the same motivation—to offer an open-source, scalable groupware solution that integrates nicely with the Mozilla PIM suite, while not neglecting mobile users. This article should help you get started with SOGo, so you can test its functionalities for yourself. Join the mailing list to discuss your experience with the developers.
Scalable OpenGroupware.org (SOGo): www.scalableogo.org
SOGo Connector for Thunderbird: www.inverse.ca/english/contributions/sogo_connector.html
Funambol SOGo Connector: www.inverse.ca/contributions/funambol.html
Nexthaus SyncJe for BlackBerry: www.nexthaus.com
Synthesis SyncML Standard for PalmOS: www.synthesis.ch
Francis Lachapelle (firstname.lastname@example.org) holds a Bachelor's degree in Computer Engineering from McGill University. He is currently a senior systems architect for Inverse, Inc., an IT consulting company located in downtown Montréal that specializes in the deployment of infrastructures based on free and open-source components like PacketFence and SOGo.
Ludovic Marcotte (email@example.com) holds a Bachelor's degree in Computer Science from the University of Montréal. He currently is the practice leader for Inverse, Inc., an IT consulting company located in downtown Montréal that specializes in the deployment of infrastructures based on free and open-source components like PacketFence and SOGo.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- May 2016 Issue of Linux Journal
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The Humble Hacker?
- The US Government and Open-Source Software
- BitTorrent Inc.'s Sync
- The Death of RoboVM
- Open-Source Project Secretly Funded by CIA
- New Container Image Standard Promises More Portable Apps
- ACI Worldwide's UP Retail Payments
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide