SlideShare a Scribd company logo
1 of 22
Download to read offline
Charlie Huynh
Mathias Lacaud
Thomas Marchal
Pierre-Alexis Nardin
Maxime Peterlin
Mylène Tahar
Gabriel Vermeulen
Amina Waddiz
Daniel Negru Nicolas Herbaut
Group 5
1. Context
2. Our solution
3. Technical aspect
4. Demonstration
5. Management & Organisation
SUMMARY
Why Snapmail?
→ Attachment size in emails
→ Download attachment required
→ Data privacy
?
Other solutions & their issues
→ Copying link manually
→ Data property not guaranteed
POSITIONING THE ISSUE
Central
Server
Box
Media@Home
Snapmail
OUR SOLUTION
Central Server
Database
User ↔ Box
Box
Social Network
Box
Social Network
Video Processing
File sharing
Picture
Processing
Metadata
MEDIA@HOME
Mail
Server
Cloud
Sender Recipient
Access to the data
SNAPMAIL: AN ADD-ON TO MEDIA@HOME
Database
MongoDB
Worker
Python→ffmpeg
Box
AngularJS
Java
Snapmail
SubethaSMTP
Java
Antivirus
ClamAV
TECHNOLOGIES USED
SSL / TLS
Between sender and SMTP gateway
Secrecy and integrity of the content of email sent.
OAuth
Link Snapmail account with an existing email account
(eg: Google or Microsoft)
ClamAV antivirus
Mail attachment scanned
SECURITY
Operating system
User-added files
(programs, conf files…)
Metadata
(license, architecture…)
Docker container
Ubuntu 14.04
Snapmail, Java 8
Architecture=amd64
Snapmail container
DOCKER CONTAINERS
DOCKER CONTAINERS
Database
MongoDB
Worker
Python→ffmpeg
Box
AngularJS
Java
Snapmail
SubethaSMTP
Java
Antivirus
ClamAV
USING SNAPMAIL WITH DOCKER
Docker Hub
USING SNAPMAIL WITH DOCKER
ThomasGabriel
Gabriel’s Box
DEMONSTRATION
MTA
Media@Home
Authentication and
authorisation on
Google webpage
Central Server
Code
✓ ReadySave code and
get access
Gabriel
Gabriel’s Box
Thomas
DEMONSTRATION: LINK AN ACCOUNT WITH GOOGLE
Gabriel
Gabriel’s Box
MTA
Media@Home
Video Link
Video
processing
Email with
video
Email with link
Link
Yes : Adaptive streaming
No : Higher quality
Processing done ?
Thomas
DEMONSTRATION: SEND AN EMAIL WITH A VIDEO
Thomas
MTA
Media@Home
✓ Manual parameters ready
Thomas’ Box
Image
processing
Link Picture
Gabriel
Link
Scan reportEmail with link
and without virus
DEMONSTRATION: PICTURES AND ANTIVIRUS
Agile Software Development
Collaboration with the clients
Client Feedbacks
Development according to the current needs
Short terms
1 term = 1 iteration
ORGANISATION
2 weeks
Meeting with the clients
Demonstration New user stories
New tasks
Development &
intern meetings
Tests &
integration
ITERATION CYCLE
PROJECT STATISTICS
I1
4 u.s.
10 tasks
2 u.s.
13 tasks
● 111 commits
● +10,000 lines added
I2 I3
4 u.s.
13 tasks
I4
3 u.s.
8 tasks
I5
4 u.s.
8 tasks
I6
3 u.s.
22 tasks
• Source code management
• Wiki
• Bug Tracking
• Task management
MANAGEMENT TOOLS
✓ Email with large attachments
✓ Video and picture processing
✓ Privacy & right on medias using a decentralized architecture
✓ Easy to install with Docker
CONCLUSION
Thank you for your attention
Group 5

More Related Content

Viewers also liked

Prezi com funciona
Prezi com funcionaPrezi com funciona
Prezi com funcionacarrus
 
Sintesis 8JUN14, casa Patricia.docx
Sintesis 8JUN14, casa Patricia.docxSintesis 8JUN14, casa Patricia.docx
Sintesis 8JUN14, casa Patricia.docxSylvia Hidalgo
 
Attestaty dra ch_uk
Attestaty dra ch_ukAttestaty dra ch_uk
Attestaty dra ch_ukFinlabb
 
Peus, Neus Terradas
Peus, Neus TerradasPeus, Neus Terradas
Peus, Neus Terradasbertagarriga
 
Workflow Management mit SharePoint und Nintex (Vorgehen)
Workflow Management mit SharePoint und Nintex (Vorgehen)Workflow Management mit SharePoint und Nintex (Vorgehen)
Workflow Management mit SharePoint und Nintex (Vorgehen)IOZ AG
 
Diari del 18 de març de 2013
Diari del 18 de març de 2013Diari del 18 de març de 2013
Diari del 18 de març de 2013diarimes
 
Günther Uecker: Dialoge zwischen Licht und Werkraum
Günther Uecker: Dialoge zwischen Licht und WerkraumGünther Uecker: Dialoge zwischen Licht und Werkraum
Günther Uecker: Dialoge zwischen Licht und WerkraumThomas Dreher
 

Viewers also liked (14)

Prezi com funciona
Prezi com funcionaPrezi com funciona
Prezi com funciona
 
Sintesis 8JUN14, casa Patricia.docx
Sintesis 8JUN14, casa Patricia.docxSintesis 8JUN14, casa Patricia.docx
Sintesis 8JUN14, casa Patricia.docx
 
Social Business y Enterprise 2.0 (feb 2011)
Social Business y Enterprise 2.0 (feb 2011)Social Business y Enterprise 2.0 (feb 2011)
Social Business y Enterprise 2.0 (feb 2011)
 
Attestaty dra ch_uk
Attestaty dra ch_ukAttestaty dra ch_uk
Attestaty dra ch_uk
 
Peus, Neus Terradas
Peus, Neus TerradasPeus, Neus Terradas
Peus, Neus Terradas
 
Workflow Management mit SharePoint und Nintex (Vorgehen)
Workflow Management mit SharePoint und Nintex (Vorgehen)Workflow Management mit SharePoint und Nintex (Vorgehen)
Workflow Management mit SharePoint und Nintex (Vorgehen)
 
Dinâmica climática
Dinâmica climáticaDinâmica climática
Dinâmica climática
 
LSA Services
LSA ServicesLSA Services
LSA Services
 
Diari del 18 de març de 2013
Diari del 18 de març de 2013Diari del 18 de març de 2013
Diari del 18 de març de 2013
 
Lista
ListaLista
Lista
 
country club
country clubcountry club
country club
 
Günther Uecker: Dialoge zwischen Licht und Werkraum
Günther Uecker: Dialoge zwischen Licht und WerkraumGünther Uecker: Dialoge zwischen Licht und Werkraum
Günther Uecker: Dialoge zwischen Licht und Werkraum
 
Invest Europe the voice of private capital annual report 2015-16
Invest Europe the voice of private capital annual report 2015-16Invest Europe the voice of private capital annual report 2015-16
Invest Europe the voice of private capital annual report 2015-16
 
Susunan atom kristal
Susunan atom kristalSusunan atom kristal
Susunan atom kristal
 

Similar to Snapmail: The private cloud gateway for email sharing

Teams Nation December 2020 - Teams Compliance
Teams Nation December 2020 - Teams ComplianceTeams Nation December 2020 - Teams Compliance
Teams Nation December 2020 - Teams ComplianceAlbert Hoitingh
 
Implementing a Data Mesh with Apache Kafka with Adam Bellemare | Kafka Summit...
Implementing a Data Mesh with Apache Kafka with Adam Bellemare | Kafka Summit...Implementing a Data Mesh with Apache Kafka with Adam Bellemare | Kafka Summit...
Implementing a Data Mesh with Apache Kafka with Adam Bellemare | Kafka Summit...HostedbyConfluent
 
Storage Made Easy - File Fabric Use Cases
Storage Made Easy - File Fabric Use CasesStorage Made Easy - File Fabric Use Cases
Storage Made Easy - File Fabric Use CasesHybrid Cloud
 
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...Ravikumar Sathyamurthy
 
Encrypting E-mail Messages
Encrypting E-mail MessagesEncrypting E-mail Messages
Encrypting E-mail MessagesD's Surti
 
Secure data sharing for dynamic groups in multi-owner using cloud
Secure data sharing for dynamic groups in multi-owner using cloudSecure data sharing for dynamic groups in multi-owner using cloud
Secure data sharing for dynamic groups in multi-owner using cloudSagar Dhanake
 
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET-  	  Key Exchange Privacy Preserving Technique in Cloud ComputingIRJET-  	  Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET- Key Exchange Privacy Preserving Technique in Cloud ComputingIRJET Journal
 
How One to One Sharing Enforces Secure Collaboration - xonom
How One to One Sharing Enforces Secure Collaboration - xonomHow One to One Sharing Enforces Secure Collaboration - xonom
How One to One Sharing Enforces Secure Collaboration - xonomLaurent Henocque
 
Securing Your Data for Your Journey to the Cloud
Securing Your Data for Your Journey to the CloudSecuring Your Data for Your Journey to the Cloud
Securing Your Data for Your Journey to the CloudLiwei Ren任力偉
 
Talk Benjamin NGUYEN
Talk  Benjamin NGUYENTalk  Benjamin NGUYEN
Talk Benjamin NGUYENINRIA-OAK
 
Making the Most of Moodle
Making the Most of MoodleMaking the Most of Moodle
Making the Most of MoodleBrianJamison
 
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on CloudIRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on CloudIRJET Journal
 
Managed File Transfer and Content Collaboration: Digital Business Meets the D...
Managed File Transfer and Content Collaboration: Digital Business Meets the D...Managed File Transfer and Content Collaboration: Digital Business Meets the D...
Managed File Transfer and Content Collaboration: Digital Business Meets the D...Axway
 
Moving file shares to ibm file net p8 summary
Moving file shares to ibm file net p8 summaryMoving file shares to ibm file net p8 summary
Moving file shares to ibm file net p8 summaryDavid Champeau
 
High security mechanism: Fragmentation and replication in the cloud with auto...
High security mechanism: Fragmentation and replication in the cloud with auto...High security mechanism: Fragmentation and replication in the cloud with auto...
High security mechanism: Fragmentation and replication in the cloud with auto...CSITiaesprime
 
Nemesis - SAINTCON.pdf
Nemesis - SAINTCON.pdfNemesis - SAINTCON.pdf
Nemesis - SAINTCON.pdfWill Schroeder
 
IT Breakafst for FIN 28 sierpnia 2014, Warszawa, Pałac Sobańskich
IT Breakafst for FIN 28 sierpnia 2014, Warszawa, Pałac SobańskichIT Breakafst for FIN 28 sierpnia 2014, Warszawa, Pałac Sobańskich
IT Breakafst for FIN 28 sierpnia 2014, Warszawa, Pałac SobańskichFoundation IT Leader Club Poland
 

Similar to Snapmail: The private cloud gateway for email sharing (20)

Teams Nation December 2020 - Teams Compliance
Teams Nation December 2020 - Teams ComplianceTeams Nation December 2020 - Teams Compliance
Teams Nation December 2020 - Teams Compliance
 
Oruta ppt
Oruta pptOruta ppt
Oruta ppt
 
Implementing a Data Mesh with Apache Kafka with Adam Bellemare | Kafka Summit...
Implementing a Data Mesh with Apache Kafka with Adam Bellemare | Kafka Summit...Implementing a Data Mesh with Apache Kafka with Adam Bellemare | Kafka Summit...
Implementing a Data Mesh with Apache Kafka with Adam Bellemare | Kafka Summit...
 
Storage Made Easy - File Fabric Use Cases
Storage Made Easy - File Fabric Use CasesStorage Made Easy - File Fabric Use Cases
Storage Made Easy - File Fabric Use Cases
 
Transform your Practice's Document Management and Collaboration with Dropbox ...
Transform your Practice's Document Management and Collaboration with Dropbox ...Transform your Practice's Document Management and Collaboration with Dropbox ...
Transform your Practice's Document Management and Collaboration with Dropbox ...
 
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...Understanding Microsoft Teams Security & Compliance features and plan for Gov...
Understanding Microsoft Teams Security & Compliance features and plan for Gov...
 
Encrypting E-mail Messages
Encrypting E-mail MessagesEncrypting E-mail Messages
Encrypting E-mail Messages
 
Secure data sharing for dynamic groups in multi-owner using cloud
Secure data sharing for dynamic groups in multi-owner using cloudSecure data sharing for dynamic groups in multi-owner using cloud
Secure data sharing for dynamic groups in multi-owner using cloud
 
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET-  	  Key Exchange Privacy Preserving Technique in Cloud ComputingIRJET-  	  Key Exchange Privacy Preserving Technique in Cloud Computing
IRJET- Key Exchange Privacy Preserving Technique in Cloud Computing
 
How One to One Sharing Enforces Secure Collaboration - xonom
How One to One Sharing Enforces Secure Collaboration - xonomHow One to One Sharing Enforces Secure Collaboration - xonom
How One to One Sharing Enforces Secure Collaboration - xonom
 
Securing Your Data for Your Journey to the Cloud
Securing Your Data for Your Journey to the CloudSecuring Your Data for Your Journey to the Cloud
Securing Your Data for Your Journey to the Cloud
 
Encryption in the Cloud
Encryption in the CloudEncryption in the Cloud
Encryption in the Cloud
 
Talk Benjamin NGUYEN
Talk  Benjamin NGUYENTalk  Benjamin NGUYEN
Talk Benjamin NGUYEN
 
Making the Most of Moodle
Making the Most of MoodleMaking the Most of Moodle
Making the Most of Moodle
 
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on CloudIRJET-Using Downtoken Secure Group Data Sharing on Cloud
IRJET-Using Downtoken Secure Group Data Sharing on Cloud
 
Managed File Transfer and Content Collaboration: Digital Business Meets the D...
Managed File Transfer and Content Collaboration: Digital Business Meets the D...Managed File Transfer and Content Collaboration: Digital Business Meets the D...
Managed File Transfer and Content Collaboration: Digital Business Meets the D...
 
Moving file shares to ibm file net p8 summary
Moving file shares to ibm file net p8 summaryMoving file shares to ibm file net p8 summary
Moving file shares to ibm file net p8 summary
 
High security mechanism: Fragmentation and replication in the cloud with auto...
High security mechanism: Fragmentation and replication in the cloud with auto...High security mechanism: Fragmentation and replication in the cloud with auto...
High security mechanism: Fragmentation and replication in the cloud with auto...
 
Nemesis - SAINTCON.pdf
Nemesis - SAINTCON.pdfNemesis - SAINTCON.pdf
Nemesis - SAINTCON.pdf
 
IT Breakafst for FIN 28 sierpnia 2014, Warszawa, Pałac Sobańskich
IT Breakafst for FIN 28 sierpnia 2014, Warszawa, Pałac SobańskichIT Breakafst for FIN 28 sierpnia 2014, Warszawa, Pałac Sobańskich
IT Breakafst for FIN 28 sierpnia 2014, Warszawa, Pałac Sobańskich
 

Snapmail: The private cloud gateway for email sharing