Enterprise Vault, ALL-IN-1, and all that


My recent post about the origins of Symantec’s Enterprise Vault product provoked a flurry of email conversations with many people, including the redoubtable Nigel Dutt, ex-CTO of KVS, the creators of Enterprise Vault.

Nigel and I have butted heads over the year, mostly because he believes that English rugby is a superior life force. He is wrong on that point, of course, but he’s been right on a fair number of other points, many related to technology, over the years. One of his best decisions was to convince a collection of ex-ALL-IN-1 engineers based in DEC Park in Reading (truly a building that offended the eye no matter what the viewing angle) who had been made redundant by Compaq to join him on the journey to take the Digital Enterprise Vault product and launch it as the first archiving product for Exchange.

Many of the Microsoft folks who sell the benefits of Exchange 2010 archiving are just plain rude about “stubbing”, the practice of leaving stub items in user mailboxes behind after they are removed to a separate archive. Microsoft says that it’s so much better to move complete items into an archive mailbox that can be managed as part of an overall data storage strategy, including the ability to satisfy compliance requirements. This is a fair argument and certainly Microsoft has achieved a nicely integrated feeling across all of their compliance features in Exchange 2010. However, it completely ignores the salient fact that “stubs” were really the only practical approach that third party software developers could take when they integrated their products with Exchange in the early 2000s.

Stubbing was an effective mechanism then because it allowed administrators to offload data from stressed mailbox databases running on expensive storage to cheaper storage running in a HSM model. Remember, the ESE database engine that underpins Exchange has really only become super-efficient through the extensive tweaking that Microsoft did in Exchange 2007 and the complete schema overall and further tuning in Exchange 2010. Looking back, Exchange 2000 was a bit of a dog when it came to storage performance and Exchange 2003 isn’t too much better, so stubbing was a very good approach to archiving then. It’s less attractive now but that’s the way of the world – everything improves and changes over time.

Speaking of ALL-IN-1, I was delighted when Nigel pointed me to Skip Walters’s blog, where I found some interesting information about how the ALL-IN-1 product was created through direct customer demand for Office Automation software in the early 1980s. It all seems so long ago now and the thought of creating a $500,000 system running on a VAX11/780 computer that could support up to 24 time-sharing users (8MB system) using a mixture of email and word processing seems really antiquated, which of course it is. The genius of those who created ALL-IN-1 was to see how they could meet customer needs in a very elegant and easy-to-use fashion.

Microsoft took ALL-IN-1 seriously enough to regard it as both a direct competitor and as a target for customer migration when they launched Exchange 4.0 in 1996. I can recall the almost surreal experience of reading the briefing documents for Microsoft management that explained market conditions, competitors, the advantages of Exchange, and how migration could be done. As I had very fond memories of ALL-IN-1 and had written two books about the technology, it was both enlightening and depressing to read the black and white assessment of its strengths and weaknesses from the perspective of Exchange.

Oh well, time marches on… We’ll probably be having similar conversations about Exchange in 20 years time when we’ll probably be communicating through mental waves facilitated by implants just behind our ears and a constant wireless connection to whatever the Internet evolves to be at that time.

– Tony

Posted in Email, Exchange, Exchange 2010, Technology | Tagged , , | 2 Comments

Climbing the rock: Rocher de Roquebrune


I have passed by the Rocher de Roquebrune frequently ever since my first trip to the South of France in 1981. The Rocher (literally “large rock”) is located close to the village of Roquebrune-sur-Argens in the department of the Var. The A8 autoroute passes by the hulking bulk of the rock as it wends its way towards the Riviera hotspots of Cannes, Nice, Antibes, and Monte-Carlo, so it’s a pretty familiar landmark for those who travel along this route. At least, if you haven’t noticed the Rocher, you’ve had your eyes closed and are a danger to other road users!

France is full of country walkways and it came as no surprise that a number of paths exist up the Rocher. Some of the information available on the web is a little outdated but the indicated car parks do exist and can be found. One is currently blocked by a pipe-laying exercise but should be available again in the summer. The car parks are not paved and have quite a bumpy surface – cars with low suspensions will definitely have a problem.

Preparing to move off from the car park towards the Rocher-de-Roquebrune

We took the opportunity of a warm spring day to walk up the rock. The ascent doesn’t take long (most people will scramble up in under 90 minutes), but even so it’s not a good idea to move off without some water and maybe something to snack on. Good walking boots are definitely required and it’s best to wear long trousers rather than shorts.

Rock formations on the Rocher-de-Roquebrune

Setting off from the car park brings you to some gently sloping rock formations that lead up to a ridge. There’s nothing particularly strenuous at this point and the walk is not dangerous unless you wander off the pathway and are unfortunate enough to fall over a cliff. The path is marked by small yellow dashes on rocks (sometimes on trees) and it’s not always easy to follow exactly where the path leads unless you keep focused on the task.

Once on the ridge the path begins to rise towards an oak forest. This is scrub oak of the type that grows profusely in the area rather than the huge spreading oaks seen in Northern Europe. The path now starts to get steeper and steeper as you meet the bottom of the bulk of the rock. Some scrambling is required to keep moving up along the path and eventually you reach some points where fixed lines have been placed to help cross particularly steep or difficult sections.

Using fixed lines to descend from the Rocher-de-Roquebrune

Most people who are fit and moderately agile will be able to handle the fixed ropes and scramble across the areas of rock where the ropes have been erected. However, I wouldn’t ask young (under 10 years) children to attempt to use the ropes as there’s just too high a chance than an accident might occur and the prospect of having to get an injured child off the rock is more risk than I’m willing to consider.

Once past the steep bits, the path flattens off as it heads for a col between two rock outcrops at the top of the Rocher. The eastern outcrop has three crosses on its top and some fifteen minutes extra is necessary to get on top, including crossing some more fixed ropes across another steep section.

View north-east from the top of the Rocher-de-Roquebrune

After the inevitable rest to take in the view, you have an option to return via the same path or take another route down. Choosing another route will lead to a much longer return to a parked car, so that’s obviously not the option we took.

Descending from the Rocher-de-Roquebrune

Descending usually goes faster than the upward journey. Expect to be back in the car park in about 50 minutes, depending on whether any delays are encountered at the fixed ropes.

A walk up the Rocher-de-Roquebrune is a great way to spend an afternoon. I imagine that more effort is required in the summer months when it’s much hotter from the sun baking all those exposed rocks. In addition, walkers have to pay more attention to the scorpions and snakes that apparently reside in the area (we saw no trace in February). Even so, if you’re in the area and tired of getting sand in your swimsuit, take the time to do something different and climb the rock to see some great views over the Var countryside. You can then reward yourself for all the effort by having a nice meal at a good restaurant and tell stories of the horrible climb you’ve had and the challenges faced on the route. And then, during the second bottle of wine, you’ll probably resolve to go up again – after another twenty years or so…

– Tony

Posted in Travel, Writing | Tagged , , | 2 Comments

February 2012 articles posted on WindowsITPro.com


Understanding the bug fix for OAB downloads in Exchange 2010 SP2 RU1 (February 28): This is a fun article that pokes a gentle amount of fun at the wonderful turn of phrase exhibited by Greg Taylor when he explained a bug fix to improve OAB downloads in an article posted to the EHLO blog. All done in the best possible taste – Greg even enjoyed the article, but I await his retaliation.

Good linkup might help Microsoft penetrate corporate sector with Windows Phone (February 27): This post covers the agreement made between Microsoft and Good Technology to bring 192-bit AES encryption technology to Windows Phone devices. I think this is a good step towards making Windows Phone a more acceptable platform to those who run RIM BlackBerry today.

Your chance to improve the Exchange Server documentation (February 24): A new version of Exchange Server is in the works and Microsoft is considering the form that TechNet documentation should take to support the new software. Head over to David Strome’s blog to make your voice heard.

Prioritizing Exchange 2010 mailbox move requests (February 22): Along with the bug fixes that are included in Exchange 2010 SP2 RU1, Microsoft slipped a new piece of functionality in that you can now assign a “high” priority to important mailbox move requests. Microsoft has had this ability in their Office 365 datacenters for the last year so the code is solid.

OCAT: Microsoft’s Outlook Configuration Analysis tool (February 21): Discussing the new OCAT utility that helps administrators figure out what might be going wrong with Outlook. Generally I am very positive about OCAT. Read this post to find out why.

Exchange 2010 SP2 RU1: A CAS glitch? (February 17): The Exchange development group was embarrassed when another roll-up update introduced a bug that should have been caught during testing. The bug is easy enough to work around but a cookie format change that stopped CAS servers communicating should not have been shipped.

PST Capture: Congratulations and some caveats from Transvault’s CTO (February 16): Lots of comments flowed after Microsoft released their much-heralded PST Capture tool. Transvault is a software vendor that has its own PST ingestion technology and the comments from their CTO are useful pointers to take into account when you plan any PST capture project.

Exchange Web Services Editor–a new gem to consider (February 14): February appears to have been my “tool month” as I wrote three articles about different tools that make the lives of Exchange administrators a little easier. EWSEditor is the newest.

New version of MFCMAPI available (February 9): MFCMAPI has been around for a long time but it continues to get better and better and is a definite “must-have” addition for any Exchange administration toolkit.

Top Six things to know about Exchange 2010 archive mailboxes (February 7): I’m not sure if many Exchange 2010 archive mailboxes have been deployed yet as many people appear to be still in the planning process. Certainly, there have been many questions asked about how archive mailboxes differ from their primary cousins. Hopefully this article answers some of those questions.

Learn about Microsoft Certified Master accreditation (February 2): You’re too late to attend the live session to learn about MCM training and the accreditation that can be gained if you pass the incredibly demanding exams – but a recording is available.

– Tony

Posted in Exchange, Exchange 2010, Office 365, Writing | Tagged , , , | Leave a comment

Twitter Spam: Or why having lots of followers isn’t much good after all


One of the interesting (but banal) things that I have picked up as I have attended technical conferences over the last year or so is the fascination that some people have with the number of “followers” that they’ve attracted through Twitter. Some delight in sites such as TwitterCounter.com, where they can discover all sorts of details about the number of followers that they have, their rate of progress towards some notional figure that will bring further happiness, and so on.

Of course, it’s nice to be communicating with someone and certainly I can see that there is value in not sharing your 140 characters of insightful and useful thoughts with zero people, but the sad fact is that Twitter is infected with so many spammers today that follower counts are not really all that important.

Example Twitter spammers

Take a look at the two examples of followers that I extracted from my Twitter account (both were subsequently blocked and reported as spammers). The top is a random individual whom I know nothing of and probably don’t want to communicate with on an ongoing basis. There’s no evidence that we share any common interests nor that their tweets contain anything interesting and their Twitter name is suspiciously like one that is created on a temporary basis because the author knows that their activity is likely to be blocked soon. Hence, my interest in this “follower” is precisely zero.

The second example exhibits more of the hallmarks of a classic spammer and is similar to the email spams sent out to lure the unsuspecting into clicking on an embedded link to bring them to a web site that promises much but only delivers pain in the end. The come-on invites “guys” to “cam” and promises “naughty fun”. I’m sure that the poster has more in mind than some harmless activity such as sharing the finer points of gluing model boats but can’t prove it. In any case, I don’t care.

While they publish advice about how to stop spam and have made some comments on how prevalent spam is on the site, Twitter doesn’t appear to have any good method to block these kind of spammers, the same kind of which also pop up on Skype. There have been some articles written about the problem but none that offer fantastic solutions.

My solution is to review the list of followers on a regular basis so that I can block and report those that I deem to be suspicious. It’s a manual task and only manageable because I don’t have so many followers but I figure that it’s better to do this than to let spammers have free rein.

– Tony

Posted in Technology | Tagged , | Leave a comment

Microsoft Exchange 2010 Inside Out heads for another printing


O’Reilly Media, who look after printing activities for Microsoft Press, contacted me yesterday to give the good news that Microsoft Exchange Server 2010 Inside Out is now almost out of print. They plan to print a new run of the book early next month.

Because most things associated with the publishing process (writing and editing are the obvious exceptions) are now digital, an opportunity exists to correct any errors that crept into the book past the eagle eye of Paul Robichaux, my esteemed technical editor, or myself. O’Reilly offers readers the ability to submit errata by going to the book’s catalog page on their site. Any errata that are entered are then made available to the author (me!), who can then decide whether they are indeed mistakes or just “nice to haves”. A workflow process is available to transmit fixes made by the author to the publishing team so that updates can be made to new books.

I went through the errata last night and found the following:

Type: Language change or typo

Page: 33. Location: 4th paragraph, line 9

Description:

It can take significant time and error to recover….

should be:

It can take significant time and effort to recover…

Comment: Easy to fix, but should have been caught by the author or copy editor!

Type: Minor technical mistake

Page: 777. Location: Third point in the list

Description:

On page 777, there is a minor mistake:

“The Address Lists  tab specifies the address lists that are included in the OAB. By default, the default OAB is the only address list that is included.”

It’s not the default OAB to be the only address list but instead it is the Global Address List.

Comment: This falls into the category of “brain warp” when you are writing about something and transpose terms. Oh well, fixed now.

Type: Important language/formatting problem

Page: 152. Location: The last EMS example

Description:

In the following cmdlet, there should be a pace between -CmdletParameters and MobilePhone

Get-ManagementRole -Cmdlet Set-User -CmdletParameters MobilePhone| Get-ManagementRoleAssignment -GetEffectiveUsers -Delegating $False | Where-Object {$_. Effectiveusername -ne “All Group Members”} | Format-Table Role, RoleAssigneeName, EffectiveUserName

Comment: For whatever reason, the software that Microsoft Press used to transfer content from the Word documents that I supplied into other Word documents in the template that they use to eventually generate the PDF for publishing can make a real mess of PowerShell commands. I suspect that the same thing happens with other example commands. We had to fix a lot of problems like this where words run together during editing but this example made it all the way through.

Type: Minor technical mistake

Page: 12. Location: 5th paragraph

Description:

If you intend to use the new Database Availability Group high availability feature, you need to run the enterprise edition of either Windows Server 2008 SP2 or R2; bear in mind that you can’t upgrade an existing Windows installation from the standard to the enterprise edition without a reinstall.

According to http://blogs.technet.com/b/core/archive/2010/05/07/upgrade-einer-windows-r2-version-ohne-installationsmedium.aspx it is possible to upgrade from standard to enterprise edition and if I’m not completely mistaken, I’ve even done it once.

Comment: A lack of clarity on the author’s part here. I should have said that “… you can’t upgrade an existing Windows installation from the standard to the enterprise edition without running an update installation that might affect other applications.”

Another comment was made about the third bullet on page 256 where I discuss CALs and made the point that you don’t want to pay Microsoft for any more CALs than you have to. I then said that CALs are calculated on the basis of mailboxes. In fact, the word “often” should have been inserted into this sentence as people usually think of the mailboxes used by individuals as one and the same count. In other words, if you have 100 mailboxes, you probably have 100 users and therefore should have 100 CALs. In any case, I’ve updated the text.

In any case, if you have noticed something that should be fixed, please let me know by flagging the error on the book’s page on O’Reilly’s site as this will make sure that I see the problem and have a chance to inject a fix into O’Reilly’s publishing workflow. All errors have to be registered and processed by EOD on Tuesday, 28 February to be guaranteed to make it into the next print run. Sorry for the short notice… it’s what was given to me.

I did ask if it would be possible to update the book with some information about Exchange 2010 SP2 and was told “no”. Essentially it’s a case of page count and formatting. O’Reilly naturally doesn’t want to change the page count as this will impact the publishing process. And any change that forces the flow of words to move across pages can have knock-on effects on the index, table of contents, references, and so on.

Thanks for reading the book!

– Tony

Posted in Exchange 2010, Writing | Tagged , , , | 1 Comment

Snow in the Var


The French Riviera is usually associated with pictures such as the gentle swaying of palm trees framing the glittering Mediterranean in 30 degrees warmth, with of course those who are deemed to be movers and shakers busily quaffing champagne and telling each other just how wonderful they look. Fortunately, outside Cannes Film Week, it’s usually more normal than that.

Indeed, you never think that the Riviera has snow. But it does, especially in the arrière-pays (hinterland) that lies between the concrete strip that the coast has become and the mountains (Alpes-Maritimes) that give the department that includes Cannes, Nice, and Menton its name. Indeed, as in 1987 and 1988, snow sometimes falls on the coast, leading to reports such as skiing on the Croisette in Cannes.

Looking through olive groves to the village of Ampus, Var

Last week, we took a drive through the back country in the Var (the next department to the Alpes-Maritimes) and found that the snow that had fallen on February 4 was still lying in many places. The photo above shows the small village of Ampus, which is usually pictured in the baking heat of the summer, when the olive trees look “just right” in the provençal countryside.

Snowy fields near Comps-sur-Artuby, Var, France

A little higher, the snow was deeper. I took the photo above just off the road outside the small village of Comps-sur-Artuby, somewhere that tourists usually don’t stop as they pass through to reach the famous Gorges-du-Verdon.

In comparison to other years, this winter has been hard in the South of France. A rugby match was postponed in Toulon due to torrential rain in November (unheard of!), there have been many sub-zero nights that caused accumulations of 20cm-deep ice on swimming pools, and lots of weather damage on houses. Some of the roads in the region are deeply potholed and many plants have died. But even so, it still remains a great place to visit.

Enjoy!

– Tony

Posted in Travel | Tagged , , | Leave a comment

Best of Show award for Microsoft Exchange Server 2010 Inside Out


Following along from January’s “Distinguished Award” for Microsoft Exchange Server 2010 Inside Out, I received news today that the book won the “Best of Show” award for “Informational Materials” at the 2011 Puget Sound Society for Technical Communications competition.

It’s obviously pleasing to hear about such an award. I think it probably pleases the production team at Microsoft Press more than it does me because this is an award from their professional association and therefore represents recognition from their peer group. It’s good that people such as Karen Szall, who did an excellent job of editing the book, are recognized in this manner.

In any case, it now sets a baseline that will be hard to better for an “Exchange V. next” book. That is, if I take on the challenge of writing such a book and find someone willing to publish it! Exchange is now so big that it’s kind of hard to fit everything into one book and keep it under 1 kilo in weight, so maybe a series of more easily-digestible short volumes might be preferable. We’ll see in the fullness of time.

– Tony

Posted in Exchange, Writing | Tagged , , , | 1 Comment

Analyzing what’s in the Exchange 2010 SP2 RU1 update


Microsoft released Exchange 2010 SP2 RU1 (roll-up update 1 for Exchange 2010 Service Pack 2, or version 14.2.283.3) on Monday, February 13, 2012. As you probably know, a roll-up update provides a complete set of fixes for a software product and once applied, brings a product as up-to-date in terms of software as Exchange’s Customer Experience (CXP) organization can deliver. As such, a roll-up update is a very good thing that should be welcomed by Exchange administrators.

A chat with Matt Gervais, site editor of SearchExchange.com, got me thinking about the contents of a roll-up update and how Microsoft decides to include the various fixes in the update. I decided to look through the set of fixes that Microsoft included in SP2 RU1 to gain a better understanding of the kind of background maintenance engineering that has to be performed for a major software product.

Before beginning to look at the fixes, the first thing to consider is that Exchange 2010 is now in the category of battle-hardened software. First released in October 2009 and then “completed” in terms of functionality with Exchange 2010 SP1 in August 2010, the product has been used since on a daily basis by millions of people, a fact that enables Microsoft to receive an enormous amount of customer feedback plus observations from professionals working in the field. Microsoft gain further benefit from the feedback received from internal deployments, both to serve its own requirements as Microsoft’s internal email system and as the basis for Exchange Online in its Office 365 cloud offering. Much of the feedback received since 2010 is reflected in Exchange 2010 SP2 (December 2011). A lot of work occurred to add some new functionality and improve quality in the fifteen months between the SP1 and SP2 releases…

The second thing we need to understand is the sheer size of the Exchange code base. Microsoft has been developing Exchange since 1993 or thereabouts and some twenty-five million lines of code form the current base. Code is rewritten all the time to take advantage of new development languages and frameworks (C# and the .NET Framework are obvious examples), to add new features and functionality, and to remove old code that is no longer required. The first version of Exchange was very influenced by the X.400 and X.500 ITU standards for email interchange and directory services; that code has long since disappeared. More recent code eliminations includes the replacement of WebDAV by Exchange Web Services in Exchange 2010. The point is that Microsoft manages a huge code base that evolves all the time. All code bases are fallible to some degree in that they contain bugs. The question is whether these bugs are important because they affect many different customers or, at the other end of the scale, are minor irritations such as a badly translated string that surfaces in a label in the Thai version of Outlook Web App. Bugs are expected and they are there. Most large software products have to manage a bug database that document thousands of bugs. The question is how the developers address the bugs.

The Exchange team triages bugs on a regular basis to make a call as to how important individual bugs are, how quickly they can be fixed, and when the fixes might appear. Once the decision is made to fix a bug, the responsibility for the work is assigned to individual developers. Eventually, updated code is provided for testing and if everything checks out, for integration into the nightly build of Exchange. Microsoft uses a huge battery of automated tests to validate code and make sure that new code doesn’t introduce new problems.

Sometimes, as in the case in April 2011 when Microsoft was forced to withdraw and then re-release Exchange 2010 SP1 RU4 after a fix exposed a problem that actually made its way through the complete testing and validation cycle to end up on customer systems, the testing suite can’t catch everything. Microsoft took their beating over the quality issue and have since improved their testing processes. So far no one has protested that SP2 RU1 contains a new problem. There’s always a chance that this might happen, so it’s a good idea to scan places like the Exchange 2010 TechNet Forum to see if reports have come in about something that you should be aware of before you rush to test the software yourself.

The overall context that we face with Exchange 2010 SP2 RU1 can therefore be characterized as an update for a mature software product based on the feedback from thousands of deployments and millions of users that has gone through substantial testing before the new code was released. Certainly that’s one way to look at RU1. Another way is to examine the list of the 58 individual fixes included in RU1 that Microsoft lists in KB2645995. When I looked at the list, my eye was taken by the following entries:

I don’t want to say that any of these bugs are unimportant. They clearly are to the folks that originally met the underlying problems when they deployed Exchange 2010 into production. Meeting a bug is always frustrating, especially when you’re unsure whether it’s you or the software that’s going wrong. However, my point is that the set of fixes incorporated into SP2 RU1 provide a reasonable indication of the kind of updates that you can expect in any roll-up release. My review of the set of fixes included in Exchange 2010 SP2 RU1 indicates that this is very much a “clean-up and keep maintained release” that doesn’t contain any earth-shattering improvements, unless of course you consider the implementation of prioritization for mailbox move requests as such an improvement. For some, this will be important, but others will simply leave MRS to do its stuff and process move requests as it has always done.

Should you deploy Exchange 2010 SP2 RU1 now? I believe that you should, with the caveat that you should first test the new software by running it within an environment that replicates the essential characteristics of your production systems. That way you’ll find out whether the software works for you and make sure that you don’t encounter one of the edge cases that cause problems for just your users.

Despite its need to compile many various assemblies and images, unless your server is old and slow (like me), the SP2 RU1 installation doesn’t take too long and it is a worthwhile activity to schedule for a weekend or other convenient time slot. Things will be a tad slower if you haven’t yet moved to Exchange 2010 SP2 as that process will require both an Active Directory schema update and a build to build update to SP2, plus a backup or two just to make sure that everything’s secured. Remember to run the installation using an account that has elevated permissions (in other words, run as administrator) to ensure that you don’t run into any problems. Overall, the whole exercise is still very manageable, doesn’t take long, and is worth doing.

– Tony

Update 17 February: After I posted this article, I received news about a glitch that affects Exchange 2010 SP2 RU1 where OWA connections can’t be proxied by CAS servers. The full write-up is on WindowsITPro.com. Microsoft’s version of the situation is posted on the EHLO blog

Follow me on Twitter to receive updates about new posts and other info!

Posted in Exchange, Exchange 2010 | Tagged , , | 10 Comments