The Future of Email Archives

Total Page:16

File Type:pdf, Size:1020Kb

The Future of Email Archives The Future of Email Archives A Report from the Task Force on Technical Approaches for Email Archives August 2018 COUNCIL ON LIBRARY AND INFORMATION RESOURCES The Future of Email Archives A Report from the Task Force on Technical Approaches for Email Archives August 2018 Sponsored by COUNCIL ON LIBRARY AND INFORMATION RESOURCES ISBN 978-1-932326-59-8 CLIR Publication No. 175 Published by: Council on Library and Information Resources 1707 L Street NW, Suite 650 Washington, DC 20036 Website at https://www.clir.org Print copies are available for $20 each. Orders may be placed through CLIR’s website at https://www.clir.org/pubs/reports/pub175/ Copyright © 2018 by Council on Library and Information Resources. This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. Library of Congress Cataloging in Publication Data: Names: Task Force on Technical Approaches for Email Archives, author. | Andrew W. Mellon Foundation, sponsoring body. | Digital Preservation Coalition, sponsoring body. Title: The future of email archives : a report from the Task Force on Technical Approaches for Email Archives, August 2018 / sponsored by The Andrew W. Mellon Foundation and Digital Preservation Coalition. Description: Washington, DC : Council on Library and Information Resources, [2018] | Series: CLIR publication ; no. 175 | “August 2018.” | Includes bibliographical references and index. Identifiers: LCCN 2018027625 | ISBN 9781932326598 (pbk. : alk. paper) Subjects: LCSH: Electronic mail messages. | Electronic records. | Digital preservation. Classification: LCC CD974.4 .T37 2018 | DDC 004.692--dc23 LC record available at https://lccn.loc.gov/2018027625 Cover illustration: faithie/Shuttertock.com iii Contents Acknowledgments ........................................................................................................vi The Task Force on Technical Approaches for Email Archives ............................... vii Executive Summary ........................................................................................................1 1. The Untapped Potential of Email Archives ..........................................................4 1.1 Email as the Story Keeper ..............................................................................5 1.2 How Email Archives Are Different ...............................................................7 1.3 Harnessing Technology ..................................................................................8 1.4 Adapting Archival Practices ..........................................................................9 2. The Email Stewardship Lifecycle .........................................................................11 2.1 Email as Organizational Records ................................................................11 2.2 Email from Personal Records and Donated Materials .............................12 2.3 Email Lifecycle Stages ...................................................................................13 2.3.1 Creation and Use ............................................................................14 2.3.2 Appraisal and Selection .................................................................16 2.3.3 Acquisition .......................................................................................18 2.3.4 Archival Processing ........................................................................19 2.3.5 Preservation .....................................................................................20 2.3.6 Discovery and Access for Research..............................................20 3. Email as a Documentary Technology ...................................................................22 3.1 Defining Email ...............................................................................................22 3.2 System Architecture ......................................................................................23 3.2.1 Architectural Characteristics .........................................................24 3.2.2 User Features ...................................................................................25 3.2.3 Operational and Administrative Features ..................................25 3.2.4 Email Message Data Model...........................................................26 3.2.5 Message Components ....................................................................28 3.3 Accounts .........................................................................................................29 3.4 Data Transmission Model ............................................................................30 3.5 Vulnerabilities of Email ................................................................................31 3.6 Beyond the ASCII Message: Additional Components .............................31 3.6.1 Attachments .....................................................................................32 3.6.2 Links and Resources Outside the Message .................................33 3.6.3 Signature Blocks .............................................................................33 4. Current Services and Trends .................................................................................34 4.1 The Evolving Email Ecosystem ...................................................................34 4.1.1 Abuse, Abuse Prevention, Security, and Deliverability ............34 4.1.2 Marketing and eCommerce Services ...........................................36 4.1.3 Consumer Email Services ..............................................................37 4.1.4 Enterprise Email Services and Operations .................................38 4.1.5 Email Storage, Compliance, and Records Management ...........39 4.1.6 Compliance and Legal Tools ........................................................41 iv 4.2 Challenges for Repositories .........................................................................42 4.2.1 Capturing Email .............................................................................42 4.2.2 Ensuring Authenticity ....................................................................46 4.2.3 Tracking Processing and Preservation Actions ..........................47 4.2.4 Preserving Attachments and Linked Content ............................49 4.2.5 Ensuring Security and Privacy .....................................................53 4.2.6 Processing High-Volume or Numerous Collections .................54 5. Potential Solutions and Sample Workflows .......................................................57 5.1 Preservation Strategies .................................................................................57 5.1.1 Bit-Level Preservation ....................................................................58 5.1.2 Migration .........................................................................................58 5.1.3 Emulation ........................................................................................60 5.2 Interoperability to Support Flexible Workflow Design ...........................61 5.2.1 Processing Functionality Across Multiple Tools .......................62 5.2.2 Developing a Community Data Model .......................................63 5.2.3 Defining Format Requirements ....................................................64 5.2.4 APIs and Interoperability ..............................................................65 5.3 Workflows and Implementation Scenarios ...............................................68 5.3.1 Bit-Level Preservation Workflow Scenario .................................68 5.3.2 Migration Workflow Scenarios.....................................................69 5.3.3 Emulation Workflow Scenario .....................................................74 6. The Path Forward: Recommendations and Next Steps .....................................76 6.1 Community Development and Advocacy .................................................77 6.1.1 Low-Barrier/Short-Term Actions ..................................................77 6.1.2 High-Impact/Long-Term Activities .............................................80 6.2 Tool Support, Testing, and Development ..................................................83 6.2.1 Low-Barrier/Short-Term Actions ..................................................83 6.2.2 High-Impact/Long-Term Activities .............................................84 Appendix A: Automating System Processes ...........................................................90 Appendix B: Email Tools for Libraries, Archives, and Museums ......................91 Archivematica ......................................................................................................91 DArcMail (Digital Archive Mail System) .........................................................93 EAS (Electronic Archiving System) ..................................................................94 ePADD (Email: Process, Appraise, Discover, Deliver) ..................................96 Preservica Standard Edition ..............................................................................99 TOMES Tool (Transforming Online Mail with Embedded Semantics).....100 Appendix C: Email Preservation Research Projects ............................................102 Archiving Email Symposium ..........................................................................102 Carcanet Press Email Preservation Project ....................................................102 CERP (Collaborative Electronic Records
Recommended publications
  • Module 8 Wiki Guide
    Best Practices for Biomedical Research Data Management Harvard Medical School, The Francis A. Countway Library of Medicine Module 8 Wiki Guide Learning Objectives and Outcomes: 1. Emphasize characteristics of long-term data curation and preservation that build on and extend active data management ● It is the purview of permanent archiving and preservation to take over stewardship and ensure that the data do not become technologically obsolete and no longer permanently accessible. ○ The selection of a repository to ensure that certain technical processes are performed routinely and reliably to maintain data integrity ○ Determining the costs and steps necessary to address preservation issues such as technological obsolescence inhibiting data access ○ Consistent, citable access to data and associated contextual records ○ Ensuring that protected data stays protected through repository-governed access control ● Data Management ○ Refers to the handling, manipulation, and retention of data generated within the context of the scientific process ○ Use of this term has become more common as funding agencies require researchers to develop and implement structured plans as part of grant-funded project activities ● Digital Stewardship ○ Contributions to the longevity and usefulness of digital content by its caretakers that may occur within, but often outside of, a formal digital preservation program ○ Encompasses all activities related to the care and management of digital objects over time, and addresses all phases of the digital object lifecycle 2. Distinguish between preservation and curation ● Digital Curation ○ The combination of data curation and digital preservation ○ There tends to be a relatively strong orientation toward authenticity, trustworthiness, and long-term preservation ○ Maintaining and adding value to a trusted body of digital information for future and current use.
    [Show full text]
  • Oldschool E-Mail Setup Eine Freakshow
    Oldschool E-mail Setup Eine Freakshow [email protected] Chemnitzer Linuxtage, 2016 (Screenshot GMX vor >15 Jahren: Waybackmachine zu www.gmx.net) (Screenshot GMX heute) (Screenshot Gmail heute) Lösungen? ● Claws ● Mutt ● Eudora ● Netscape Navigator ● Evolution ● Opera M2 ● GMX ● Outlook ● Gnus ● SquirrelMail ● Hotmail ● The Bat! ● Hushmail ● Thunderbird ● KMail ● … Flußgrafik Email Netz MTA MRA MDA MUA MSA MTA Netz Hipster! ● KISS ● YAGNI ● DRY ● NIH ● Divide And Conquer ● Everything is a file ● No vendor lock-in ● Mißtraue Autoritäten – fördere Dezentralisierung Netz Netz Emails Client, den ich Remote verwenden kann Leicht erweiterbar Emails lokal Filter Offenes Format Adressen Netz Netz Abholen Transportformat? Pull Subject 1 Email = 1 File Keine Spuren X-List-ID Mit Hierarchien am Server Beliebige Einfaches Suchen Header Verlässliches Suchen Verarbeitung mit Unix Tools Client, den ich Remote verwenden kann Leicht erweiterbar Emails lokal Filter Offenes Format Adressen Netz Netz Abholen Transportformat? Pull Subject 1 Email = 1 File Keine Spuren X-List-ID Mit Hierarchien am Server Beliebige Einfaches Suchen Header Verlässliches Suchen Verarbeitung mit Unix Tools mbox Maildir mh Client, den ich Remote verwenden kann Leicht erweiterbar Emails lokal Filter Offenes Format Adressen Netz Netz Abholen Transportformat? Pull Subject 1 Email = 1 File Keine Spuren X-List-ID Mit Hierarchien am Server Beliebige Einfaches Suchen Header Verlässliches Suchen Verarbeitung mit Unix Tools mbox Maildir mh tmp 1439306571.1269_0.elvis ~/Post/Technik/Wikitech new 1448267819.5940_0.spencer ... 1457079728.2000_0.spencer:2, cur 1456839383.9873_0.nepomuk:2,SR 1457166567.23654_0.spencer:2,S ... Client, den ich Remote verwenden kann Leicht erweiterbar Filter Adressen Netz Netz Abholen Pull Subject Maildir Keine Spuren X-List-ID am Server Beliebige Header Client, den ich Remote verwenden kann Leicht erweiterbar Filter Adressen Netz Netz Abholen Pull Subject Maildir Keine Spuren X-List-ID am Server Beliebige Header fetchmail getmail mpop ..
    [Show full text]
  • View Presentation
    a centre of expertise in data curation and preservation The Digital Curation Centre Hugh Corley DCC Services and Outreach Liaison Officer Funders: 1 University College London Information Day :: 16th January 2007 a centre of expertise in data curation and preservation What is an Information Day • Learn • Discuss • Action Funders: 2 University College London Information Day :: 16th January 2007 a centre of expertise in data curation and preservation Overview • Digital Curation • Aims of the DCC • Work of the DCC Funders: 3 University College London Information Day :: 16th January 2007 a centre of expertise in data curation and preservation Digital Curation • Active management of data over life- cycle of scholarly and scientific interest – reproducibility – reuse • Appreciation of differences between disciplines • Ubiquitous relationship with digital information Funders: 4 University College London Information Day :: 16th January 2007 a centre of expertise in data curation and preservation UK Digital Curation Centre • CCLRC • University of Edinburgh • HATII • UKOLN Funders: 5 University College London Information Day :: 16th January 2007 a centre of expertise in data curation and preservation UK Digital Curation Centre Support and promote continuing improvement in the quality of data curation and digital preservation activity Drivers – increasing awareness that digital assets are reusable – continuing access vital to ensure contemporary scholarship is reproducible and verifiable – digital assets are fragile Funders: 6 University College
    [Show full text]
  • Front Page Title of Paper in Full: Centered
    Preservation Is Not a Place 1 4th International Digital Curation Conference December 2008 Preservation Is Not a Place Stephen Abrams, Patricia Cruse, John Kunze California Digital Library, University of California December 2008 Abstract The Digital Preservation Program of the California Digital Library (CDL) is engaged in a process of reinvention involving significant transformations of its outlook, effort, and infrastructure. This includes a re-articulation of its mission in terms of digital curation, rather than preservation; encouraging a programmatic, rather than a project-oriented approach to curation activities; and a renewed emphasis on services, rather than systems. This last shift was motivated by a desire to deprecate the centrality of the repository as place. Having the repository as the locus for curation activity has resulted in the deployment of a somewhat cumbersome monolithic system that falls short of desired goals for responsiveness to rapidly changing user needs and operational and administrative sustainability. The Program is pursuing a path towards a new curation environment based on the principle of devolving curation function to a set of small, simple, loosely-coupled services. In considering this new infrastructure the Program is relying upon a highly deliberative process starting from first principles drawn from library and archival science. This is followed by a stagewise progressesion of identifying core preservable values, devising strategies promoting those values, defining abstract services embodying those strategies, and, finally, developing systems that instantiate those services. This paper presents a snapshot of the Program’s transformative efforts in its early phase. The 4th International Digital Curation Conference taking place in Edinburgh, Scotland over 1-3 December 2008 will address the theme Radical Sharing: Transforming Science?.
    [Show full text]
  • Sysinfotools Maildir Converter
    SysInfoTools MailDir Converter SysInfoTools MailDir Converter Table of Contents 1. SysInfotools MailDir Converter .................................................................................. 2 2. Overview ................................................................................................................... 2 3. Getting Started .......................................................................................................... 3 Installation procedure ............................................................................................... 4 4. Order and Activation .................................................................................................. 4 How to Order ............................................................................................................ 4 How to Activate ......................................................................................................... 4 5. Using SysInfoTools MailDir Converter ....................................................................... 5 Understanding the User Interface .............................................................................. 6 Button Used .............................................................................................................. 6 How to use MailDir Converter Tool ............................................................................ 7 6. Uninstall the Software .............................................................................................. 13 7. Legal Notice ...........................................................................................................
    [Show full text]
  • Dynamic Allocation of Mail Server Resources Among Users
    INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 9, ISSUE 03, MARCH 2020 ISSN 2277-8616 Dynamic Allocation Of Mail Server Resources Among Users Basti M.Aliyeva Index:The article was dedicated to the solution of the problem on the dynamic allocation of mail server resources among users. It was noted that recently the electronic mail system had undergone serious changes and new features have been added to this system. The article examines the working principles of email and defines possible operating modes for subscribers. It was noted that mail server memory should be dynamically allocated among users so that the email can successfully perform its functions. In the article,the linear programming is applied to the problem of dynamic allocation of mail server memory. Known methods at every operation can resolve this issue.Proximity measure has been defined based on the Levenstein Distance (LD) for the determination of the renewal of documents on the server to improve the use of the server resources. This tool can be used to determine whether the documents have changed on the server.In the result, similar documents can be identified, and their number can be reduced up to one. Key Words: email server, dynamic allocation of the memory, operating modes of subscribes, Levenstein Distance (LD), Measures of document proximity. ———————————————————— 1. INTRODUCTİON information networks. In this case, it is essential to pay It is known that e-mail is one of the most important special attention to data transmission issues.Numerous information resources of the Internet, as well as it is the ways to transmit data and many software tools have been most massive communication tool.
    [Show full text]
  • Functional HCL Notes Email Archiving Solution
    AM ™ ArchiveMail DATASHEET Functional HCL Notes™ email archiving solution Key In Detail on Introducti Characteristics Benefits For the Users: Continuous growth in data volumes related to messaging and the practical limits imposed by Notes database architecture make email archiving systems essential. M Improved productivity due to automatic management of archive. COOPERTEAM’s Archive Mail™ is a functional archiving solution which responds to the M needs of administrators by allowing them to manage archiving policies efficiently and Access to archived documents from automatically, whilst still guaranteeing their users access to their documents and the Notes client, iNotes and mobile attached files. devices. Archive Mail™ automates the archiving of messages, calendar entries, tasks and contacts M Multi-criteria searching available for to one archive per year, hosted on either dedicated or shared function servers. Archiving both server & workstation. policies can be based on document ageing criteria. In addition, the archive process can be triggered when the mail database exceeds its For the Administrators: threshold (quota), or manually by users after selecting documents to be archived. M Optimization of the Domino Archive Mail™ allows administrators to manage multiple archive databases and easily infrastructure. implement ILM (Information Lifecycle Management) policies, and to correctly align the M Align messaging storage costs, value storage costs of the archived documents with their value to the business. for the business and quota policies. M Once Archive Mail™ is implemented, documents that meet the configured ageing Automated and centralised parameters for archiving are transferred to an archive database at a frequency predeter- management of archiving mined by their profile administrator.
    [Show full text]
  • Zimbra Tips & Tricks
    TOP ZIMBRA 15 TIPS & TRICKS This guide brings you the top 15 Zimbra Tips & Tricks to help you save time while working in Zimbra. If you find these Tips & Tricks helpful, you may also like our tutorial demos: The top 15 Zimbra Tips & Tricks (based on clicks on Zimbra’s “Did You Know?” blog) are: Throughout this guide, look for pop-up boxes highlighting quick tips Email Tips and Tricks and facts. 1 Searching in Zimbra TIP: Skip ahead to any 2 Importing Into and Exporting From Zimbra section of the 15 Tips & 3 Changing Your Zimbra Preferences Tricks by clicking on the 4 Changing Your Zimbra Theme titles to the right. 5 Setting Zimbra Email and SMS (text) Reminders 6 Enabling Zimbra’s Mandatory Spellcheck 7 Sorting Email 8 Creating an Appointment with the Mini Calendar 9 Creating an Email Distribution List or Contact Group 10 Opening an Email in a Separate Window 11 Turning on Zimbra’s Activity Stream 12 Switching from Conversation View to Message View 13 Sharing Your Zimbra Calendar Outside Your Organization 14 Sharing in Zimbra 15 Enabling Zimbra Two-Factor Authentication 1 Searching in Zimbra There are many great and easy ways to search in Zimbra: • Quick keyword search • Complex search • Right-click search Quick Keyword Search You can do a quick search using keywords like from, to, in, etc. Click here to see all search keywords. How much time do you spend searching To search by keyword: for a specific email? keyword: search word(s) Searches are easy and fast in Zimbra. Search Examples: your entire Zimbra • Find all email received from Mark (all email with “Mark” in the From account, including attachments, in seconds.
    [Show full text]
  • The History of Spam Timeline of Events and Notable Occurrences in the Advance of Spam
    The History of Spam Timeline of events and notable occurrences in the advance of spam July 2014 The History of Spam The growth of unsolicited e-mail imposes increasing costs on networks and causes considerable aggravation on the part of e-mail recipients. The history of spam is one that is closely tied to the history and evolution of the Internet itself. 1971 RFC 733: Mail Specifications 1978 First email spam was sent out to users of ARPANET – it was an ad for a presentation by Digital Equipment Corporation (DEC) 1984 Domain Name System (DNS) introduced 1986 Eric Thomas develops first commercial mailing list program called LISTSERV 1988 First know email Chain letter sent 1988 “Spamming” starts as prank by participants in multi-user dungeon games by MUDers (Multi User Dungeon) to fill rivals accounts with unwanted electronic junk mail. 1990 ARPANET terminates 1993 First use of the term spam was for a post from USENET by Richard Depew to news.admin.policy, which was the result of a bug in a software program that caused 200 messages to go out to the news group. The term “spam” itself was thought to have come from the spam skit by Monty Python's Flying Circus. In the sketch, a restaurant serves all its food with lots of spam, and the waitress repeats the word several times in describing how much spam is in the items. When she does this, a group of Vikings in the corner start a song: "Spam, spam, spam, spam, spam, spam, spam, spam, lovely spam! Wonderful spam!" Until told to shut up.
    [Show full text]
  • Guest Artist Agreement
    Artists Agreement Unitarian Universalist Congregation of Phoenix 4027 E. Lincoln Drive, Paradise Valley, AZ 85253 Phone: 602-840-8400 Email: [email protected] The Sanctuary Art Team of the Unitarian Universalist Congregation of Phoenix (UUCP) welcomes you. We are pleased that you are participating in our art exhibit. The following guidelines and liability agreement should be helpful to you in preparing for installation of your artwork. 1) All works selected for exhibit will be displayed in the Sanctuary or Hall in spaces reserved for that purpose. 2) An art inventory should be completed before arrival and sent to the email above or as directed. It MUST be completed when the art is delivered to UUCP. Artists must provide the following information: Artist's Name, Title of Work, Medium, Dimensions, and Sale Price or NFS (See inventory form). 3) All work must be ready for hanging. Any work over 600 square inches requiring protective covering must be covered in Plexiglas (NOT glass). 4) All works must remain on display until the termination of the show unless previously arranged with the Sanctuary Art Team. At the close of the show, the lender/artist agrees to remove the pieces on exhibit or arrange for their removal. Any object remaining in the Sanctuary for 30 days following the scheduled close of the show will be handled at the discretion of the Sanctuary Art Team. 5) Each object displayed will be exhibited in such manner as the Sanctuary Art Team decides. 6) The Sanctuary Art Team reserves the right to select and/or reject works, bearing in mind that the Sanctuary is not a conventional gallery and the selected works must be appropriate for all congregational activities.
    [Show full text]
  • SCONUL Focus Number 38 Summer/Autumn 2006
    SCONUL Focus Number 38 Summer/Autumn 2006 Contents ISSN 1745-5782 (print) ISSN 1745-5790 (online) 3 The 3Ss 4 The Learning Grid at the University of Warwick: a library innovation to support learning in higher education Rachel Edwards 8 The Learning Gateway: opening the doors to a new generation of learners at St Martin’s College, Carlisle campus Margaret Weaver 11 Middlesex University: the impressive rejuvenation of Hendon campus Paul Beaty-Pownall 14 Poor design equals poor health questionnaire: the final results Jim Jackson 20 Human resourcing in academic libraries: the ‘lady librarian’, the call for flexible staff and the need to be counted A. D. B. MacLean, N. C. Joint 26 Taking steps that make you feel dizzy: personal reflections on module 1 of the Future Leaders programme John Cox, Annie Kilner, Dilys Young 30 Evolution: the Oxford trainee scheme Gill Powell, Katie Robertson 34 A week in the life Kim McGowan 36 Got the knowledge? Focusing on the student: Manchester Metropolitan University’s (MMU) library welcome campaign David Matthews, Emily Shields, Rosie Jones, Karen Peters 41 Ask the audience: e-voting at the University of Leeds Lisa Foggo, Susan Mottram, Sarah Taylor 44 Information literacy, the link between second and tertiary education: project origins and current developments Christine Irving 47 Review of how libraries are currently supporting the research process Ruth Stubbings, Joyce Bartlett, Sharon Reid 51 Researchers, information and libraries: the CONUL national research support survey John Cox 55 Creating a new Social Science Library at Oxford University based on reader consultation Louise Clarke 58 The use of personal scanners and digital cameras within OULS reading rooms Steve Rose, Gillian Evison 60 Copyright, digital resources and IPR at Brunel University Monique Ritchie 64 Secure electronic delivery: ‘get the world’s knowledge with less waiting’ Alison E.
    [Show full text]
  • PERANCANGAN MAIL SERVER INTRANET BERBASIS WEB BASE DENGAN OPTIMALISASI OPERASI SISTEM CLIENT Aziz Setyawan
    JURNAL TEKNIK KOMPUTER VOL.I NO.1 FEBRUARI 2015 AMIK BSI PERANCANGAN MAIL SERVER INTRANET BERBASIS WEB BASE DENGAN OPTIMALISASI OPERASI SISTEM CLIENT Aziz Setyawan. H Abstract — Windows 7 operating system is a client-based operating Dengan mail berbasis web base pengguna dapat menggunakan system, or as a home edition. Which is used by the pengguna and sebuah aplikasi web browser tanpa meyimpan histori mail yang telah not as a server. With the use of the operating system is used as a digunakan oleh pengguna lain. Dengan system operasi berbasis client server or coorperate agencies no longer need to use a server-based yaitu windows 7 dapat dimaksimalkan untuk menjadi server. operating system that has had to spend to purchase a server license. E-mail server is a server system that can serve as a collective Kata kunci : Windows 7, Mail server, Web Base. storage mail to mail-mail client. Mail function to communicate information to each pengguna without the need for a print and . nature will always be saved unless the pengguna do the removal, with this system the pengguna can perform information together. I. PENDAHULUAN Development mail server rather different from the mail server at the time of development ever before, this is seen from the windows server computer operating system being used. This is because when Spesifikasi pada sistem operasi pada produk microsoft the windows issuing windows server 2008 in the development of Windows mempunyai perbedaan pada fungsinya. Dikarenakan this version of the mail server does not provide POP3 protocol spesifikasi pada fungsi inilah akan bergantung pada harga (Post Office Protocol version 3) is no longer available in the yang dikeluarkan oleh sebuah instansi maupun perorangan Windows server operating systems ranging from Windows Server dalam memiliki produk sistem operasi yang dikeluarkan oleh 2008.
    [Show full text]