Feeds

The Royal Mail moves to the cloud

And tells us how they did it

  • alert
  • submit to reddit

HP ProLiant Gen8: Integrated lifecycle automation

Broadcast When you're an organisation the size of the Royal Mail, there comes a point when you really have to stop and take stock of the IT operations. Reg reader Adrian Steel, from the Royal Mail, did this in 2008 and noted the state of their infrastructure.

More than 30,000 users with multiple email systems, not enough bandwidth or storage, obsolete PCs, thousands of Lotus Notes applications, multiple operating systems, and a giant headache for both Royal Mails IT department and its system integrator CSC.

To sort out the problem, Royal Mail devised a plan that would either be brilliant or career-ending: it was going to move all its users to the cloud in a matter of weeks.

Adrian Steel, Reg reader and the Royal Mail’s man in charge of the mother of all migrations, joins us in the studio on April 18th at 11:00 BST to talk about how he convinced his bosses, trained his users, managed the migration and still managed to get some sleep.

He gives us the inside track on the project from start to finish. He’ll tell us the lessons he learned, tells you how to do it without causing a revolution, and why a cloud migration, in this case at least, is career-enhancing, not career suicide.

The Reg's Tim Phillips is the host for this discussion and, alongside Adrian from Royal Mail, he’s joined by Glyn Knaresborough from CSC and Dale Vile from Freeform Dynamics.

If you’re an organisation toying with the idea of cloud, you might just learn a thing or two from Adrian’s experiences. You can join us right here. ®

Eight steps to building an HP BladeSystem

More from The Register

next story
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
THUD! WD plonks down SIX TERABYTE 'consumer NAS' fatboy
Now that's a LOT of porn or pirated movies. Or, you know, other consumer stuff
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.