Solved

Easiest move 2000Pro to XPPro AND Pentium4 machine to Core 2 Duo machine

Posted on 2006-11-29
2
158 Views
Last Modified: 2016-10-27
Currently run a P2P network with a Pentium 4/Win 2000 Pro machine (IDE HD)  as the pseudo "server".  I picked up a XP Pro upgrade disk and a Core 2 Duo machine (SATA HD).  I want to use the new core 2 duo machine/XP as the new server.  However I want to make this transition as easy as possible.  

I was thinking that the easiest way to do this would be to use Acronis to do a bare metal image of the current server and restore the image to the new machine (supposedly possible to new hardware, see http://www.acronis.com/enterprise/products/ATICW/).  Then do the XP upgrade, install any necessary drivers and be good to go.  I wouldn't have to configure the network/networked software, install software, updates ,etc.  That would be great if this resulted in a stable machine.  

This seems like the easiest and quickest way to go.  Any negatives to doing this?  Any other ideas?  Easy, quick, and a stable end computer is what I'm looking for.  Thanks in advance.  
0
Comment
Question by:hiloguy
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 63

Accepted Solution

by:
SysExpert earned 500 total points
ID: 18037397
Well it is supposed to work according to Acronis, and they do have a good reputation in general.
You really have nothing to loose since you will still have the original machine available if it does not work.

Just remember that you probably will not be able to have both running at the same time due to name/ IP conflicts.

I hope this helps !
0
 

Author Comment

by:hiloguy
ID: 18052335
Thanks SysExpert.  No other responses I guess.  I'm pretty lazy and this seems like the easiest way to go.  Appreciate the input.  
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Adoption of Microsoft’s Enterprise Mobility and Security solution and Office 365 will re-order the File Sync and Share market Microsoft has stated that its Enterprise Mobility + Security (EMS) is the fastest growing product in the history of the …
This article outlines why you need to choose a backup solution that protects your entire environment – including your VMware ESXi and Microsoft Hyper-V virtualization hosts – not just your virtual machines.
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question