PRO+ Premium Content/Storage

Thank you for joining!
Access your Pro+ Content below.
Vol. 5 No. 8 October 2006

Case Study: Moving from Lotus Notes to Microsoft Exchange

Hyperion Solutions found that having coexisting e-mail apps wasn't manageable. Here's how the firm standardized on Microsoft Exchange and adjusted its environment to accommodate the changes. Hyperion Solutions Corp. began as a Lotus Notes shop, but acquired companies that used Microsoft Exchange 5.5 and Exchange 2000. Initially, the Santa Clara, CA–based business intelligence software company--with major offices in North America, Europe and Asia--pursued a coexistence strategy that allowed the various units to use their preferred e-mail platform while working behind the scenes to deliver what usually appeared to be seamless communications. But by the fall of 2003, coexistence had grown to be more trouble than it was worth. "The coexistence approach was costly in terms of operational expenses and was subject to frequent failures," says Lou Tiseo, Hyperion's director of network architecture and engineering. Hyperion had to dedicate one full-time person to monitoring the e-mail environment to keep it running smoothly. Although it ...

Access this PRO+ Content for Free!

Features in this issue

  • Survey Says: Users name their 10GbE price

  • The right way to provision storage

    Provisioning storage is still mostly a manual job, but solid planning, including the right interested parties and some improved tools, can help ease the chore. Follow these provisioning best practices to gain greater performance and higher disk utilization.

  • Long-term archiving

    With some legislative requirements mandating data be kept for as long as 70 years, your organization needs an archiving plan that defines what data needs to be kept and why. But don't overlook how you'll restore old data when it needs to be accessed.

  • How to manage encryption keys

    Encryption is an effective way to secure data. But managing encryption keys can be a major undertaking. While there are no encompassing key management tools available yet, some apps can help you keep track of proliferating encryption keys.

Columns in this issue