Professional Documents
Culture Documents
com
AMD CEO Hector
Ruiz takes on Intel
and discusses how
Barcelonachanges
the playing field 62
SEPTEMBER 10, 2007 VOL. 24, NO. 28 $6
CHIPS
ON THE
TABLE
High-def VOIP
smooths path to
communication
advances 36
28p1.indd 1 9/7/07 1:01:12 PM
Call 1.877.go1and1
Creating a website
has never been easier.
Our website builder runs from a browser window and lets
you build a professional-looking site in minutes, without the
need for an expert programmer or web designer. Let the
wizard guide you through the process. Choose from a selec-
tion of templates and edit fonts and colors for added per-
sonalization. Using the simple point-and-click prompts and
a built-in text editor, your website can be online in minutes!
Choose your layout 1
1&
1 H
o
m
e
P
a
cka
g
e
3
m
o
n
t
h
s
f
r
e
e
!
*
Our complete web hosting
solution gives you everything
you need to quickly and easily
create an attractive website.
Order before October 31st
and get 3 months free!
Arrange your pages
Home
Pictures
Directions
Contact
2
Looking for a total website
2007 1&1 Internet, Inc. All rights reserved. Visit 1and1.com for full promotional offer details. *Offer valid for Home Package only, 12 month minimum
contract term required. **50% discount valid for 3 months and applies to Business I and II server packages only, two year minimum contract term
required. Prices based on comparable Linux web hosting package prices, effective 7/30/2007. Product and program specifications, availability, and
pricing subject to change without notice. All other trademarks are the property of their respective owners.
We offer a variety of hosting packages to t your needs and budget.
Yahoo! Go Daddy
Home STARTER DELUXE
Included Domains
2
/through contract duration
1
$1.99
/year with purchase
Web Space 120 GB 5 GB 100 GB
Monthly Transfer Volume 1,200 GB 200 GB 1,000 GB
E-mail Accounts 1,200 IMAP or POP3 200 POP3 1,000 POP3
Mailbox Size 2 GB Unlimited 10 MB
Search Engine Submission Extra charge applies
Website Builder 12 Pages Freeware
Photo Gallery
RSS Feed Creator $4.99/month
Ad-free Blog Freeware
90-Day Money Back Guarantee
Support
24/7 Toll-free Phone,
E-mail
24/7 Toll-free Phone,
E-mail
24/7 Phone, E-mail
Price Per Month
$
4
99 $
11
95 $
6
99
SPECIAL OFFER 3 months free!* $8.96 rst 2 months
Save 10% with 1 year contract
TOTAL/YEAR
$
44
91 $
137
42 $
75
48
Visit us now 1and1.com
Add text and pictures 3 Publish your website 4
solution?
SERVERS
Need a business server?
Sign up now and well waive
the $99 setup fee. Save 50%
on the first 3 months
when you sign up for a
2 year server contract.
waive
50%
Save
50%
**
L
a
b
o
r D
a
y
S
p
e
cia
ls:
September 3rd through
October 31, 2007
.us
DOMAINS
Act now and save!
Create your own .us domain.
For a limited time, Americas
internet address is on sale.
All domain packages
include free private
registration.
VERS
main.
cas
le.
$
2
99
first year
Editorial Director Eric Lundquist
Editor Debra Donston
Executive Editor, News Michael Hickins
Executive Editor, eWEEK Labs Jason Brooks
Chief Technology Analyst Jim Rapoza
NEWS
Senior News Editor Jeffrey Burt
News Editors John Hazard, John Pallatto
Senior Editors Jessica Davis, Peter Galli,
Paula Musich, Darryl K. Taft, Lisa Vaas
Senior Writers Clint Boulton, Renee Boucher
Ferguson, Roy Mark, Chris
Preimesberger
Staff Writers Scott Ferguson, Deborah Perelman,
Brian Prince
Microsoft Watch Editor Joe Wilcox
eWEEK LABS
Technical Director Cameron Sturdevant
Senior Analysts Andrew Garcia, Wayne Rash
Technical Analyst Tiffany Maleshefski
EDI TORI AL PRODUCTI ON
Managing Editor Rick Dagley
Deputy Managing Editor Debra Perry
Copy Chief Jim Williams
Senior Copy Editors Kelsey Adams, Patrick Burke
Copy Editors Vikki Lipset, Heather ONeill,
Shane ONeill, Robby Trail
Newsletter Editors Sharon Linsenbach, Alethea Yip
ART/MULTI MEDI A
Group Editorial Art Director Stephen Anderson
Associate Art Director Paul Connolly
Senior Production Designer Tara-Ann Fasulo
Senior Designer Chip Buchanan
Designer Brian Moore
eWEEK
Group Publisher
Karl Elken
Marketing
Tia Lambert, Marketing Specialist
Research
Guy Currier, Research Director
Senior Production Manager
Michael DiCarlis
Group Ad Coordinator
Chris DeNiscia
ZI FF DAVI S MEDI A
Chairman & CEO
Robert F. Callahan
Chief Financial Officer
Eric Berk
Executive Vice President, Licensing & Legal Affairs,
General Counsel
Gregory Barton
PRESI DENTS
Scott McCarthy (Game Group)
Sloan Seymour (Enterprise Group)
Jason Young (Consumer Tech/Small Business Group)
SENI OR VI CE PRESI DENTS
Ira Becker (Game Group)
JimLouderback (Editorial Director, Consumer/Small Business Group)
Angelo Mandarano (Internet)
Martha Schwartz (Custom Solutions Group)
Michael Vizard (Editorial Director, Enterprise Group)
VI CE PRESI DENTS
Eric Danetz (Enterprise Alignment Marketing WW)
John Davison (Game Group)
Karl Elken (Group Publisher, eWEEK/CIOI/Baseline)
Aaron Goldberg (Market Experts)
Barry Harrigan (Web Buyers Guide)
Phil Kramer (Internet)
Michael Krieger (Market Experts)
Ray Ledda (Game Group)
Rick Lehrbaum (Internet)
Eric Lundquist (Editorial Director, eWEEK)
Chris Maginn (Internet)
Jim McCabe (PC Magazine)
Scott McDaniel (Game Group)
Paul OReilly (Event Marketing Group)
Beth Repeta (Human Resources)
Dave Rock (Circulation)
Tom Rousseau (Enterprise Alignment Marketing WW)
StephenSutton(AudienceDevelopment, Consumer/Small-BusinessGroup)
Monica Vila (Event Marketing Group)
Neil Glass (Consumer/Small-Business Group)
eWEEK editorial staff members can be
reached at (781) 938-2600 or (800)
451-1032, or via e-mail using the fol-
lowing convention: name.surname@
ziffdavisenterprise.com. For example: eric.lundquist@ziffdavisenterprise.
com. (Dont use middle initials in address.)
Cover: Chris Covatta
6 eWEEK n SEPTEMBER 10, 2007
www. eweek. com
ITS A VIRTUAL WORLD
If theres a hotter technol-
ogy than virtualization in
the industry, itd be difficult
to figure out what it is.
Fresh off its successful IPO,
VMware is hosting its user
conference Sept. 11-13 in
San Francisco. Also at the
event will be Staff Writer
Scott Ferguson and Senior
Writer Chris Preimesberger.
Look for their reports from
the show at eweek.com.
eweek.com
Upfront
8 Marc Benioff gives Microsoft a little credit.
ANALYSIS
12 Lawmakers are debating patent reform.
15 The Office Open XML file format falls
short of ISO approval.
17 Small vendors are targeting virtualization.
20 Microsoft sanctions Silverlight for Linux.
24 Sun uses its storage products to grow.
INSIGHT
36 High-definition VOIP creates clearer
and higher-quality communication.
44 Municipal wireless is popping up all over,
but success stories are few and far between.
COMMENTARY
56 Eric Lundquist: Stan Shihs smile curve
charted the path to IT success.
57 Jim Rapoza: Web radio faces extinction
pending the outcome of a bill in Congress.
58 Jason Brooks: San Franciscans look to a
startup for free Wi-Fi service.
60 Wayne Rash: Would RFID have helped
the search in the Utah mine tragedy?
74 Spencer F. Katt: Malware writers phish
for Monster rewards with attacks.
INTERVIEW
62 AMDs CEO says Barcelona will improve
his companys position in the chip market.
62
Hector Ruiz,
CEO of AMD
C
O
N
T
E
N
T
S
Last weeks cover photo
by Kristy Hardy
28p6.indd 6 9/7/07 4:20:23 PM
General Information Production Specs PrePress Info Name OK FIX Date
File Name: 062_ISS_7_eWeek.indd Bleed: 8.125 in x 10.75 in Application: InDesign CS2 4.0 D.A.: Travis
Client: HP Trim: 7.875 in x 10.5 in Colors: Cyan,
Magenta,
Yellow, Black,
PMS 158 C
Q.C.: Ricky
Job #: ISS 7062 Live: 7.375 in x 10 in Proofreader: Scott/Jessica
Media Type: Mag Scale: 1 in = 1 in Project Mgr: Janna
Release Date: 5/14/2007 Output %: 100% Fonts: Futura, Helvetica
Neue
A.D.: None
Date/Time: 5/2/07 12:06 PM Actual Size: 47p3 x 63p0 Copywriter: None
Comments: eWeek
Run Date: 28-May
C.D.: None
Images: 11289_
MonsterWave_
ol.eps, HP_
MAG_KO.EPS,
xeonDC_4c_125_
FOR PRINT.eps,
storageworks_
600_FPO.pdf
Print Pro: Sheena
Acct. Exec: None
Acct. Super.: None
Client OK:
WOULD NOW BE A GOOD TIME TO TALK
ABOUT A BETTER STORAGE SOLUTION?
With data doubling every 18 months, nding the right storage is crucial. The HP StorageWorks 600 All-in-One
Storage System, powered by the Dual- Core
1
Intel
Xeon
Celerra
NS20
Automatically migrates infrequently accessed
data to more cost-effective storage
disk, tape or optical
Significantly shortens backup and
recovery windows
Recognizes data value, retention and
compliance requirements
Reduces storage costs while optimizing IT
resources
Provides seamless data access regardless
of file location
EMC
DiskXtender
for Windows
Exchange, Lotus
Notes
/Domino
storage platforms
EMC
EmailXtender
2
0
0
7
C
A
.
A
l
l
r
i
g
h
t
s
r
e
s
e
r
v
e
d
.
(Security Helps Us Rake In More Dollars, Yen And Euros)
SHURIMDYAE
Were secure. Were compliant.
Now were busting out the
Congratulations. Your IT security is working hard. But theres something more it should do (besides the protection, compliance,
access, etc.). IT security should actually make your business more efcient. More exible. More competitive. CA can help. Our
Security Management centralizes your identity and access management to turn IT security into a proactive, business-building
tool. So your security strengthens customer relationships, grows partnerships and helps your enterprise address changing
markets with ninja-like agility. All with CAs best-in-class modularity, scalability and integration. But dont just take our acronym
for it. Download the white paper, Security Management: Aligning Security with Business Opportunities, at ca.com/secure.
M2724S_D_US.indd 1 6/22/07 1:00:54 PM
son Kristi Rawlinson.
Sun also rejected some
points, including NetApps
claims that Sun made the
first move in the dispute.
[I]t was NetApp who
first approached Sun seek-
ing to acquire the Sun
patents NetApp is now
attempting to invalidate,
the statement said. It is
unfortunate that NetApp
has now resorted to resolv-
ing its business issues in
a legal jurisdiction [East
Texas] long favored by pat-
ent trolls.
Despi te the vari ous
accusations in the case,
some analysts say that the
two companies will settle
this quickly since neither
side will want to engage in
a lengthy and costly legal
battle.
Any resolution depends
upon a number of fac-
tors including how each
side really feels about the
strength of its case as well
as its judgment as to how
that case might actually
fare in front of a judge
and a jury, David Hill, an
analyst with the Mesabi
Group, said in a written
report. Winning is not
certain even if you think
that you have a strong
case.
NetApp, for all its blus-
ter, appears to want only
for Sun to give up its pat-
ent infringement claims
and to not have to pay any
licensing fees, Hill said.
Sun likely wants what
is has from the beginning:
the money to which it feels
that it is entitled via its
acquisition of StorageT ek,
Hi l l sai d. However,
NetApps lawsuit places
an additional strain on
Suns position, meaning
that getting that money
could well be in jeopardy.
Even if Sun feels internally
that it has a strong case it
will likely have to fight very
hard to get it. The question
for Sun, then, is whether
the hoped-for outcome is
worth pursuing when it
demands greater effort and
generates higher risk.
The best outcome for
both sides is a settlement
that avoids the expense
and publicity that can sur-
round a high-profile legal
battle, Hill said.
Sun also needs to focus
on how to push its storage
business forward, rather
than having it get bogged
down in litigation.
James Staten, an analyst
with Forrester Research,
said the company has good
products among its stor-
age offerings, and that
more than anything else,
what Sun needs is to find
a way to get that message
out.
Sun needs to put out
a consistent marketing
message, like IBM and
[Hewlett-Packard] do, by
beating their drums all
the time, if it expects to
catch up to them in the
server and storage sec-
tors, Staten said following
Schwartzs remarks. Sun
certainly has the products.
They need to demonstrate
that better in the market-
place. IBMs servers and
storage arent that much
better in quality, but the
difference is that they say
theyre better. Sun needs to
fight back on that level.
Schwartz said that Sun
will continue to tout its
storage offerings.
Thumper utilizes the
ZFS, he said, and well
be taking the message out
to the open-source com-
munity more and more as
time goes on. In fact, weve
seen the open-source com-
munity grow and acceler-
ate its activity. Thats where
the future of development
lies.
In an announcement
separate from Schwartzs
talk, enterprise dedupli-
cation software provider
Diligent Technologies, of
Framingham, Mass., said
it has entered into a global
reseller agreement with
Sun to resell the ProcTIER
software suite through
both its direct sales teams
and the channel.
26 eWEEK n SEPTEMBER 10, 2007
www. eweek. com
ANALYSIS
SUN FROM PAGE 24
Were saying that there
are clear patterns of
techniques that we use
in our file system that
are in ZFS.
DAN WARMENHOVEN
CEO, NETAPP
NetApp is suing Sun over alleged patent infringements.
Among NetApps claims are the following:
NetApp is not infringing on three Sun patents, as claimed
by Sun
Sun is infringing on seven NetApp patents regarding data
processing systems and related hardwarein particular,
Suns ZFS technology
Sun is unfairly distributing ZFS technology to third-party
vendors
Sun has not been responsive to NetApps efforts to
resolve the issues
Sun should be ordered to pay damages
Sources: NetApp, Sun
Storage wars
Suns response in a statement from spokesperson Kristi
Rawlinson:
NetApps legal attack against Suns open source ZFS solu-
tion, which is freely available in the marketplace, is a clear
indication that NetApp considers Sun technology a threat,
and is a direct attack on the open source community.
28p24.indd 26 9/7/07 1:47:43 PM
FREEServers,
FREEApplications,
FREEFloor space,
FREEMan-hours,
FREEPower,
FREEStorage...
2007 American Power Conversion Corporation and MGE UPS Systems, Inc. All rights reserved. All APC trademarks are property of APC-MGE.
e-mail: esupport@apc.com 132 Fairgrounds Road, West Kingston, RI 02892 USA EE2A7EF-US
Introducing the revolutionary enterprise architecture
that nally pays you back.
Visit www.apc.com/promo Key Code x454x Call 888.289.APCC x9171 Fax 401.788.2797
How efficient is your enterprise system? See exactly where you stand
take our online Enterprise Efciency Audit today!
Legacy systems work ne for brute-force cooling the entire room, but skyrocket-
ing energy costs make them scally irresponsible and their fundamentally over-
sized design makes them incapable of meeting todays high-density challenges.
Even worse, power and cooling waste may actually prevent you from purchas-
ing much-needed new IT equipment. Simple problem, simple solution. Cut your
power and cooling costs and use the savings to buy the IT equipment you need.
According to Gartner Research, 50% of all data centers built before 2002 will
be obsolete by 2008 because of insufcient power and cooling capabilities.
Power and/or cooling issues are now the single largest problem facing data
center managers.
Theres only so much power and money to go around
Your service panel limits the amount of power available. Your budget limits the
amount of money. You have to stretch every bit of both as far as you can.
What you need is the APC Efcient Enterprise
.
The APC solution offers modular scalability so that you pay only for what you
use; capacity management so that you know where to put your next server; and
dedicated in-row and heat-containment systems that improve cooling and thermal
predictability. An Efcient Enterprise earns you money through the pre-planned
elimination of waste. For example, simply by switching from room- to row-ori-
ented cooling, you will save, on average, 35% of your electrical costs.
Our system reimburses you
Whether youre building a new data center or analyzing the efciency of existing
systems, your rst step is knowing where you stand. Take the online Enterprise
Efciency Audit to see how you can reap the benets of a smart, integrated,
efcient system: more power, more control, more prots.
The Efcient Enterprise
2
0
0
7
W
e
b
s
e
n
s
e
,
I
n
c
.
A
l
l
r
i
g
h
t
s
r
e
s
e
r
v
e
d
.
Make no mistake, theyre out there
doing everything they can to breach
your security.
But while theyre inventing new ways
to break in, Websense
ThreatSeeker
u-law codec
(top) and G.722 wideband codec (bottom). In my sample,
the G.722 call experienced much more jitter, causing a lower
estimated MOS score and triggering threshold warnings
from Observer (right).
www. eweek. com
SEPTEMBER 10, 2007 n eWEEK 39
28p36.indd Sec2:39 9/6/07 10:27:55 AM
ways off, however. Processing capa-
bilities need to continue to improve
to a point where the translations can
do phrases, rather than individual
words, to maintain contextual mean-
ing but without taking so long as to
introduce too much delay into the
call stream.
Of more immediate inter-
est to corporations may be the
potential improvements high-
definition voice could bring
to fixed-mobile convergence
solutions that bridge the use
of cell phones to the corporate
Wi-Fi network. High-definition
voice could use a number of
wideband codecs other than
G.722, including one known as
G.722.2, or AMR-WB (Adaptive
Multi-Rate Wideband).
Wideband AMR has already
been approved for use with
UMTS (Universal Mobile Tele-
communications System)-based
third-generation cellular trans-
missions. This codec supports
wideband audio samples but
has the flexibility to scale back
with limited connectivity. With
support for this codec on the
internal corporate PBX and desk
phones, the potential exists for
rich, high-definition voice calls
between mobile workers and
those back in the office.
Labs tests
i brought polycoms hd voice
into the lab to see exactly what
it would take to get HD Voice
working with our Asterisk IP
PBX implementation.
Starting with Version 1.4, Aster-
isk supported the G.722 codec in
passthrough mode only. This means
that Asterisk can set up a G.722-
enabled call between two endpoints
that support the codec and then get out
of the way, but the server cannot trans-
code the streams between different
codecs for devices with mismatched
support. And while Polycom officials
are investigating adding support for
other wideband codecs, G.722 is the
only one supported at this time.
To enable G.722 in Asterisk (our
server is based on Version 1.4.9), I
simply needed to add a single line
to the sip.conf configuration file
(allow=g722). I then had to con-
figure each Polycom phone with
G.722 as the codec with first pri-
ority. With these changes in place,
I could make calls between my
SoundPoint IP 550 and 650 devices
and experience all the audio quality
I expected from HD Voice.
However, interoperability with
legacy devices was another story.
While I could place calls from a non-
HD Polycom SoundStation confer-
ence phone to an HD Voice-enabled
phone using G.711, I could not com-
plete a call in the reverse direction.
The Asterisk server would show an
error indicating congestion on
the server, and the caller par-
ticipating in the testing would
experience a fast-busy signal.
It turns out that Asterisk
1.4 cannot handle the codec
negotiation necessary to com-
plete the call between an ini-
tiating caller with priority for
G.722 and a receiving caller
with priority for another codec.
Asterisks codec negotiations
currently treat the call legs
independently, and thus never
renegotiate the initial call leg
based on the requirements of
the secondary call legs, said
Digiums Fleming.
Asterisk users can look to
the bleeding edge for a reso-
lution. In the Asterisk SVN
trunk, we have a G.722 codec
module, so this problem would
not occur, and well be putting
that module into ABE [Aster-
isk Business Edition] as well,
said Fleming. We may also put
it into future s800i [Asterisk
Appliance] builds.
In my communications with
Polycom officials about this
issue, I learned that the com-
pany has achieved expected
codec negotiations when using
an SVN trunk of Asterisk.
While this feature will likely not
be part of the forthcoming Asterisk
Version 1.4, users should be able to
look forward to full support in Ver-
sion 1.6 down the road.
eWEEK Labs Senior Analyst Andrew
Garcia can be reached at andrew.garcia
@ziffdavisenterprise.com.
INSIGHT
HD VOIP FROM PAGE 37
Of more immediate
interest to corporations
may be the improvements
high-definition voice
could bring to
fixed-mobile
convergence.
40 eWEEK n SEPTEMBER 10, 2007
www. eweek. com
28p36.indd Sec1:40 9/6/07 10:28:04 AM
>> Hackers love company. Your company. Today, criminals methodically target corpora-
tions, orchestrating attacks to steal confdential information: Hacking for proft.
In addition to stopping worms, viruses and phishers, you need to crush these new,
systematic assaults from botnets to trojans. Juniper Networks comprehensive,
cost-effective threat management solutions provide uncompromising defense for your
network. Only Juniper takes a uniquely holistic approach, dispatching dedicated protec-
tion to every network and application layer vulnerability and making any network more
secure: www.juniper.net/threatmanagement
2
0
0
7
J
u
n
i
p
e
r
N
e
t
w
o
r
k
s
,
I
n
c
.
1 . 8 8 8 . J U N I P E R
42 eWEEK n JULY 9, 2007
www. eweek. com
By Andrew Garcia
In the time-division multiplexing world, as well as in the
early voice-over-IP days, customers generally had a limited
number of options for desk phones once they had settled on
a PBX solution. But with Session Initiation Protocol driving
interoperability among companies and products, customers
dont have to settle for the selections put forth by the PBX
vendor. While this interoperability will undoubtedly have more
impact on the burgeoning voice-over Wi-Fi market, desktop
phones can be freed as well. The following is a set of sample
questions to ask and requests to make when beginning an
evaluation of SIP desktop phones:
SIP DESKTOP PHONES
INSIGHT
PHYSICAL DEVICE
What is the size of the device?
What is the weight of the device?
What is the LCD screens resolution?
How many lines and characters does the screen support?
Is the screen backlit?
Does the device support video?
Is the screen tiltable?
The screen has more responsibilities for todays phones,
as they can be used for information transport, intranet Web
browsing for easing directory searches and so on.
Is a speakerphone included?
Is the device full duplex?
Provide a list of preprogrammed buttons.
How many programmable buttons does the phone have?
Are soft keys available?
Hold, mute and transfer buttons should be expected.
Look for other hard-coded buttons for functions such
as conferencing and directories.
Is a dedicated headset jack included?
Describe the connector type.
Are 10/100 Ethernet ports provided? How many?
Is there support for 802.3af POE (power over Ethernet)?
Are USB ports included? How many?
PHONE FEATURES
Many features should be expected, including call
forwarding, call transfer, call waiting, caller ID, redial,
hold and voice mail indicator.
What is the total number of lines supported?
Are intercom capabilities included?
Is an address book function available?
Is a microbrowser included?
PROVISIONING AND NETWORKING
Check all that apply:
TFTP file transfer HTTP
HTTPS (HTTP Secure) Telnet
SSH (Secure Shell) FTP
Bluetooth support NAT (Network Address Translation)
IP Security Other (Please specify.)
HIGH-DEFINITION VOICE
What codecs are supported?:
G.711 -law, A-law G.729AB
G.723 G.726
GSM G.722
G.722.2. iLBC Other (Please specify.)
What is the frequency response range for handset,
speakerphone and headset?
Is echo cancellation supported?
Is noise suppression supported?
PARTNERSHIPS
Despite todays relative ease of interoperability of core feature
sets, interoperability is a slippery slope. The closer you are to
the bleeding edge with your telephone systems features, the
more likely you will need to go with the PBX vendors partners.
Which SIP PBXes are the phones certified or tested to
work with?
Please describe the features particular to these specific
PBXes.
PRICING
Please provide detailed pricing.
42 eWEEK n SEPTEMBER 10, 2007
www. eweek. com
28p42.indd 42 9/6/07 10:11:35 AM
Coverage not available in all areas. Limited-time offer. Other conditions and restrictions apply. See contract and rate plan brochure for details. Subscriber must live and have a mailing address
within AT&Ts owned network coverage area. Up to $36 activation fee applies. Equipment price and availability may vary by market and may not be available from independent retailers. Early
Termination Fee: None if cancelled in the first 30 days; thereafter $175. Some agents impose additional fees. Sales tax calculated based on price of unactivated equipment. Certain email
systems may require additional hardware and/or software to access. Service provided by AT&T Mobility. 2007 AT&T Knowledge Ventures. All rights reserved. AT&T and the AT&T logo are trademarks
of AT&T Knowledge Ventures and/or AT&T affiliated companies.
For more information, visit www.wireless.att.com/laptopconnect or go to your nearest AT&T store.
Get AT&Ts Global 3G
LaptopConnect Card for only
$
49
99
with 2-year service agreement
on DataConnect plans $59.99
or higher.
The Internet cant hide from
the AT&T LaptopConnect Card.
Tired of playing hide and seek with the Internet? Get
the AT&T LaptopConnect Card and easily access the
Internet at mobile broadband speeds when youre out
of the office, on the road, away from hotspots.
> Delivers mobile broadband speeds in more than
165 major U.S. markets and more cities worldwide
than any other U.S. carrier.
> Send and receive email, download large
attachments, and access corporate systems
at mobile broadband speeds.
> Enables secure laptop connections to AT&T
BroadbandConnect and EDGE networks.
> Fast and easy set up.
INSIGHT
I
N SOME WAYS, the mind-set around
municipal wireless technology is much
like that around net neutrality: Most peo-
ple think its a good thing, but almost no
one can agree on what it actually means. Thats
not stopping muni wireless from wending its
way into cities across the United States, each
of which is tweaking the technology to suit the
needs of its many constituencies, as well as its
budgetary concerns.
Depending on whom you ask, muni wireless
can mean a high-speed data solution for emer-
gency workers, automated meter reading, citywide
wireless Internet access or a way to help close the
digital divide. It may even mean some combination
of those things.
Its very early, so you cant reach any final judg-
ments based on what we see so far, said analyst
Craig Mathias, principal at Farpoint Group, in Ash-
land, Mass.
Mathias added that, currently, muni wireless can
be whatever a city decides to make it but that, in
nearly every case, it involves public access to Wi-Fi.
There are probably in excess of 400 deployments on a
global basis, Mathias said. Wi-Fi is going to become
as common as cellular over the next decade. Its free
when you buy a computer. More than half of phone
handsets will have Wi-Fi.
Mathias said he thinks the availability of devices
capable of operating on more than one service, such
as cellular and Wi-Fi, will have a major impact on
muni wireless.
Convergence is a major driver for metro Wi-Fi,
he said. The cellular carriers will become dependent
on Wi-Fi. The voice bands will saturate, and they dont
have the bandwidth for multimegabit services. If [car-
riers] augment their capabilities with Wi-Fi, they have
hundreds of megabits they can make available because
its free spectrum. The technology is available, it is
being deployed, and the cellular carriers have a very
strong incentive. How can it fail?
Good question.
Muni Wi-Fiand, more broadly, muni wirelessis
showing success in only a few places.
The reasons are as varied as the locations. In some
cases, its because the municipality doesnt realize the
cost or difficulty; some cities find that they dont have
the means to manage such large
BY WAYNE RASH
eWEEK LABS
Municipal wireless, Wi-Fi
implementations are popping up
all over, but successes have been
few and far between
44 eWEEK n SEPTEMBER 10, 2007
www. eweek. com
[CONTINUED ON PAGE 49]
28p44.indd 44 9/6/07 10:14:53 AM
Powerful Ideas and Manufacturing Integrity
The Key Ingredients of a Better UPS
Dont trust your network to an inferior UPS system!
Tripp Lites heritage of innovation and quality ensures that youre getting premium
UPS performance and optimum network protection.
SmartOnline
UPS Systems
ReliableQuality manufacturing, true on-line operation, pure sine wave
power output and innovative bypass features eliminate network downtime
CompatibleTested and certied to meet stringent regulatory and network
vendor standards
ManageableFree UPS management software; SNMP, Web and telnet
monitoring and control options
ScalableCapacities up to 30kVA; external battery packs allow unlimited
runtime potential
AffordableBenets of manufacturing efciency are passed to customers;
most installation and maintenance tasks can be performed by existing IT staff
ProvenTripp Lite has an 85-year service history and manufactured the rst
UPS designed for personal computers
During every step of the design and
manufacturing process, our primary
goal is to eliminate downtime. From
the drawing board to the assembly
line, we engineer our UPS systems to
make your network more reliable.
Salim Ling
Head of Engineering
Tripp Lite
Tripp Lite UPS Systems eliminated
signicant hardware and service costs
by keeping our equipment constantly
protected and powered.
Steve Kim
Director of Network Services
Houston Independent School District
Tripp Lite offers a wide range of solutions to protect, control and secure your network.
Tripp Lites PowerAlert Software, version 12.5, has tested compatible with Cisco CallManager, versions 4.0 and 4.1, Cisco 7600 Series Routers, 7500 Series Routers and Catalyst 65XX Layer 3 Switch. Tripp Lite PowerAlert Software, version 12, has tested compatible with Cisco
CallManager, versions 3.3(4)-MCS and 4.0(2)-MCS. Go to www.tripplite.com/logodisclaimer for details. Tripp Lite is a Cisco Technology Developer Partner in the Cisco Technology Developer Program. Cisco, Cisco Systems, the Cisco Systems logo, and the Cisco Square Bridge
logo are registered trademarks or trademarks of Cisco Systems, Inc. and/or its afliates in the U.S. and certain other countries. SmartOnline is a trademark of Tripp Lite.
Secure Your Network for Less.
Instant Rebates on
UPS Systems, KVMs and
Rack Enclosures.
www.tripplite.com/eWeek
8
5
YEARS
3-Phase UPS Systems Hot-Swappable UPS Systems Power Distribution Units KVM Switches Rack Enclosures
Whats the best approach to information
security compliance?
The business side says they have to
have USB drives, iPhones
How can you securely exchange sensitive
information with partners?
Do security protocols handicap your remote workers?
How do you keep encryption simple for non-IT employees?
How do you protect data at rest?
To learn more or to register visit: http://go.ziffdavisvts.com/securitysolutions
September 26, 2007
Security Solutions:
Data, Devices and the Extended Enterprise
KEYNOTE:
Compliance Metrics: Strategies to Maximize
Compliance and Security Dr. Peter Tippett, Vice
President, Verizon Business; Security Pioneer. Formerly
Vice Chairman & Chief Technology Ofcer, Cybertrust;
creator of the rst commercial anti-virus product,
which later became Symantecs Norton Anti-Virus
FEATURED SPEAKERS:
Aurobindo (Robin) Sundaram, Vice President of
Information Security, ChoicePoint, Inc.
Joe Bernick, Chief Information Security Ofcer,
LaSalle Bank
Trent Henry, Senior Analyst, Burton Group
Jonathan Squire, Information Security Architect,
Dow Jones & Co.
Earl Porter, Director, Information Security,
Transamerica Reinsurance
HOT BUTTON PANELS:
Keeping Shared Data Out of the Wrong Hands:
Security in the Overextended Enterprise
Managing Internal Threats: Removable Devices
and Remote Access
Protecting Data at Rest Wherever it is Stored
How do you piece together the information security puzzle? With remote
and mobile employees, customers, suppliers and business partners
increasingly accessing core information systems, enterprises need
comprehensive protection that isnt unduly burdensome.
Information security can be costly, complex, and intrusive. How do you
keep trusted employees and third parties linked into your enterprise
without giving away the keys to the kingdom? How do you keep your
data secure no matter where it is?
Join Ziff Davis Enterprise for this online event as we explore effective
strategies, tactics and the latest tools to get the job done right.
TOPICS COVERED INCLUDE:
What are the best technology
strategies for compliance?
Limiting network access to service
providers, offshore developers and
other partners
Rogue, removable and remote
tips on device control management
Providing secure remote access
whats the best approach?
Keeping data at rest protected
yet accessible
Ziff Davis Named Winner
of the FAME Award
for Best Online Event by
Folio magazine!
Platinum Sponsors:
SECURITY SOLUTIONS
and complex projects; and
governments sometimes
want something for noth-
ingthat is, they want
a vendor to pick up the
costs, but they cant agree
on how vendors can make
any money.
The recent collapse of
San Franciscos much-
hyped municipal wireless
plans is only the latest dem-
onstration that theres no
such thing as a free wireless
lunch. The same thing hap-
pened in Chicago, although
at a much earlier stage of
planning. (For more on
San Fran ciscos muni wire-
less saga, see Jason Brooks
column on Page 58.)
San Francisco and Chi-
cago wanted a free network
for everyone, but neither
city was willing to com-
mit to using the network
for city services. And, in
the case of San Francisco,
at least, the forces that
run the city let the whole
thing become a political
football.
The problem is that
municipal wireless net-
works are expensive to
install, and theyre expen-
sive to run.
Without some assurance
that theyll have a stream
of revenue, companies
that might be convinced
to operate such a network
wont do it.
eWeek Labs examined
three implementations
to see where municipal
wireless is working, why,
and how enterprises may
benefit. Because, while
enterprises arent cities,
many of the factors that
affect municipal wireless
implementationsinclud-
ing complexity and cov-
erage issuesalso affect
enterprises.
In Providence, R. I. ,
Greenville, N.C., and River-
side, Calif., the powers that
be figured out that they
needed to make municipal
wireless a viable proposi-
tion for the company thats
doing the wireless work.
In the case of Providence,
it was easy because the
municipal wireless net-
work was built for the
city to support city ser-
vices. In both Greenville
and Riverside, the cities
agreed to play a role
in usingand paying to
usethe network.
Providence, R.I.
one of the most suc-
cessful muni wireless
implementations is in
Providence, R.I. In this
midsize New England
city, there was really only
one goal for the citywide
[CONTINUED ON PAGE 51]
INSIGHT
Getting muni wireless right
Have a clear idea of what you want to accomplish: Is the
wireless network only for city services? Is it intended to pro-
vide public access to the Internet? Why do you want the public
access, and will it be free or will it cost money?
Heading off into the unknown of municipal
wireless can be fraught with risk, but it
doesnt need to be. According to Motorolas
Chip Yager, city administrators need to take
the right steps to greatly improve the chances
of success for their wireless networks
whether they are intended for the cities
own use or for public Wi-Fi access. Here are
Yagers planning recommendations:
Plan for physical deployment: Do you have public structures
that you can use for mounting radio equipment or antennas?
Do you have buy-in from the public utilities that will provide the
poles and power for access points?
Partner with organizations that have the skills to plan and
implement the network and provide ongoing support: Do
you have a plan in mind for the partner to see this as financially
viable?
Know how you or your partners will install the network, get
it running, test it and fix it when it doesnt work: Do you have
a plan for how your partner will handle day-to-day operations?
Perhaps most important, gain the support and active coop-
eration of managers in your city who will have some role in
funding, operating or using the wireless network: Without the
political support you need, no amount of technical prowess will
make the network a success.
Motorolas
IAP6300 wire-
less access
point (far left)
provides the
infrastructure
for Providences
wireless mesh
network. Motor-
olas VMM6300
(left) provides
the wireless link
for Providences
vehiclesin this
case, a police
car.
www. eweek. com
SEPTEMBER 10, 2007 n eWEEK 49
MUNI WIRELESS FROM PAGE 44
28p44.indd 49 9/6/07 10:15:10 AM
Peatured Speakers:
Jim AIves, Executive Vice President, MarketinQ, Kaseya
Ayman Antoun, Vice President, Business Partners,
Americas, !BM
Gary BixIer, Director, MarketinQ, North America, AMD
Marvin BIough, Vice President, Americas SaIes, SonicWALL
Gregory Davis, Vice President, Americas ChanneI
Business, DeII
Jeffrey KapIan, Founder, TH!NKstrateQies
Edison Peres, Vice President, Advanced and Core
TechnoIoQies, WorIdwide ChanneIs, Cisco Systems
Benjamin Smith, Vice President, GIobaI ChanneI,
APC-MGE
ShirIey Turner, Director, North America, ChanneI
MarketinQ, !nteI
Dan WensIey, Vice President, Partner DeveIopment,
LeveI PIatforms
September 19, 2007
7:30 a.m. - 5:00 p.m.
ccvec L, ar eVerir receicr
Hyatt Regency O'Hare
Chicago, lL
100 quaIihed, mid-market
channeI executives
Registrants: c a, cr
ccrererce reisraicr,
ease ccrac os a
conferencesziffdavisenterprise.com.
Sponsors: cr ncre ircrnaicr
cr cor excosiVe scrscrshi
ccroriies, ease ccrac
Learice CiVas a -oo-8-b cr
Beatrice.OIivasziffdavisenterprise.com.
2007
Channel
Summit
oWFFK 3tratogic Partnor
& Channol /nsioor
The 2007 Ziff Davis ChanneI Summit, hosto by th oitors o oWFFK 3tratogic Partnor ano Channol /nsioor, is
a on-o-a-kino conrnc at which solution proviors will har inoustry luminaris shar thir xprincs ano
insights on th tchnology trnos shaping purchasing ocisions tooay. Unlik inoustry conrncs that ar limito
to inoustry-insior issus, our branoo conrnc will provio attnos with aovic on how to crat solutions
that bttr anticipat th nos o thir customrs, thrby giving thos companis a comptitiv og.
CCLL CC /C/C CC L/L CC
and Beyond
2007 Diskeeper Corporation. All Rights Reserved. Diskeeper, I-FAAST, InvisiTasking, Maximizing Performance and ReliabilityAutomatically!, Terabyte Volume Engine,
and the Diskeeper Corporation logo are registered trademarks or trademarks of Diskeeper Corporation in the United States and/or other countries. All other trademarks are
the property of their respective owners. Diskeeper Corporation 7590 N. Glenoaks Blvd., Burbank, CA 91504 800-829-6468 www.diskeeper.com
A SPECIAL REPORT
W
indows Vista has finally
arrived, and reviewers are
hailing it as the best OS
Microsoft
-
central enterprises will want to make
the move to Windows Vista.
Defragmentation
Technology
Time for a Change
Its well known that a high number
of system slows, crashes, and even
file corruption and errors can be
traced to file fragmentation.
1
File
fragmentation puts your system per-
formance and reliability in serious
jeopardy. Its no surprise, then, that
substantial performance gains from
defragmenting, in the range of 90%,
have been documented.
2
But its not only the decision to
defragment your systems that makes
the difference. The choice of defrag-
mentation technology, both before
and after your move to Windows
Vista, is crucial.
The sheer scope and activity of com-
puter systems today has made even
scheduled defragmentation, once
state of the art, obsolete. Disks
and files once measured in kilobytes
and megabytes are now measured in
gigabytes and terabytes, and the
sheer number of files has increased
tremendously. Testing has shown
that scheduled defragmentation can-
not keep pace; between defrag-
menter runs, fragmentation simply
builds up and continues to negative-
ly impact performance.
3
The True Solution to
Maximum Performance
and Reliability
Only a completely automatic defrag-
mentation solution such as Diskeeper
2007released just in time for
Windows Vistawill truly keep pace
with the ever-expanding capacity and
intense activity on todays disks.
Instead of providing partial benefit
when defragmentation runs occur, all
less headache for an already-over-
worked system administrator.
With Windows Vista, disk activity on
servers also reaches new demanding
heightsand Diskeeper Server and
Diskeeper EnterpriseServer ver-
sions are right there with advanced
technologies such as Terabyte
Volume Engine
2.0, especially
designed for fast defragmentation
on the highest capacity servers.
Diskeepers automatic defragmenta-
tion is vital during the move to
Windows Vista as well. Deployment
of a new OS is no mean featit
means hardware upgrades, changes
and revisions in policy, verification
of legacy support, carefully con-
trolled software deployment, and a
long list of other vital tasks per-
formed while continually extinguish-
ing fires and maintaining current
networks. The last things you need
during such an evolution are reliabil-
ity and performance problems from
your current systems such as slowed
disk access and response times.
And since Diskeeper 2007 already
runs on Windows Vista, the licenses
you buy now will be with you every
step of the way, all the way into and
beyond the move to Windows Vista.
Automatically maximize your sys-
tem performance and reliability now
and put disk performance problems
behind youfor Windows Vista and
beyond.
Maximizing Performance and Reliability
Automatically!
technology, Diskeeper
2007 defragments and enhances file
systems in real-time, with no schedul-
ing needed. Defragmentation is now
performed on-the-fly, with no per-
formance hit on system resources.
Your systemis consistently faster and
more reliable with Diskeeper 2007
period. In testing against scheduled
defragmentation, which leaves frag-
mented files behind after running,
Diskeeper 2007 consistently elimi-
nates fragmentation to continuously
provide maximum performance and
reliability.
3
Take advantage of our free
45-day trial and see for yourself.
Plus, Diskeeper 2007 includes
Intelligent File Access Acceleration
Sequencing Technology (I-FAAST
)
2.0, specifically designed to deliver
increased performance, speed and
reliability above and beyond defrag-
mentation benefits.
Be Completely Ready
for Windows Vista
With its stunning GUIs, Windows
Vista brings a whole new level of
operation to computer interaction.
Because of its graphical nature, and
its support of an ever-widening vari-
ety of graphical and video-based
programs, enormous files and high-
capacity disks are the norm.
Smooth, fast access to these files is
vital, especially with applications
Special Offer
Try Diskeeper 2007 FREE for 45 days!
Download: www.diskeeper.com/ew7
(Note: Special 45-day trialware is only available at the above link)
Volume licensing and Government / Education discounts are available
from your favorite reseller or by calling 800-829-6468 code 4415
For test results, white papers and case studies,
visit www.diskeeper.com/EWpaper
1
File Fragmentation White Paper
2
Article: The Impact of Disk Fragmentation, WindowsITPro
3
White Paper: Is Real-Time Defrag Needed?
DKC 2007 Advertorials 0607 8/15/07 3:44 PM Page 1
INSIGHT
other cities. In Green-
ville, muni Wi-Fi serves
the downtown area and
the adjacent East Carolina
University. Installation
began in March 2007, and
the Phase 1 installation
was completed in May.
Greenville chose Nortel
Networks to take on the
muni Wi-Fi project, a natu-
ral outgrowth of existing
city operations, according
to Greenville IT Director
Rex Wilder. We went with
Nortel because we had a
Nortel PBX and decided
to keep that system and
add Nortel VOIP, Wilder
said. It was easy to con-
tinue with a Nortel wire-
less product.
Angela Singhal White-
ford, director of munici-
pal wireless solutions for
Nortel, said Greenville was
very focused in terms of
the goals for its implemen-
tation.
Theyre focusing on
the downtown using a
wireless mesh technology,
said Whiteford in Boston.
The reason theyre doing
this is economic devel-
opment. Theres also a
tie-in with the university.
East Carolina University
thought that one way to
attract students to the
university was to adver-
tise that it has Wi-Fi in the
downtown area.
Greenville has solved the
funding problem by getting
private industry to pay for the
municipal Wi-Fi system.
In general, it s the
operator thats providing
and paying for the net-
work, Whiteford said.
We brought a service pro-
vider to the table, and that
provider is WindChannel
Communications. Thats a
big deal because a lot of the
cities say they dont want to
own and operate the net-
work. They say theyll be
an anchor tenant and give
right of way.
Another good reason
for going with a provider
is support. Smaller cit-
ies probably have an IT
staff of two to five people,
Whiteford said. For them
to own and operate these
networks, thats the last
thing they want. Thats not
their core competency.
Riverside, Calif.
riverside, calif. , is
implementing muni Wi-
Fi to ensure that all citi-
zens are being served. The
muni Wi-Fi network, still
under construction, is an
extension of Riversides
community-oriented com-
puting initiative.
MUNI WIRELESS FROM PAGE 51
INSIGHT
THE COST OF FREE WIRELESS
A
T&T is providing the city of
River side, Calif., with free wire-
less access, supported by advertis-
ing. But there are still costs involved,
said Michael Beck, assistant city
manager.
It doesnt come free, but it can
be very cost-effective, Beck said.
That is where a community can get
caught with a surprise. You have to
make sure you know what the costs
are on the city side, not just the
wireless community.
Many cities, however, are get-
ting caught up in the free wireless
hype.
In general, weve gone through
a period of early hype and expecta-
tions, said Phil Belanger, managing
director of San Francisco-based
Novarum. Its not peace, love and
free Wi-Fi. Its a valuable service.
There needs to be value for the city
and things you can charge for.
Belanger said that part of the
problem is that cities have drasti-
cally underestimated the hard-
ware requirements for installing
citywide Wi-Fi.
It takes more infrastructure
than everyone was saying, he
said. He also said that the mere
existence of muni Wi-Fi will create
demand that in turn will require
more infrastructure.
The number now is probably
40 access points per square mile,
Belanger said. In dense urban
areas, it could be 100 per square
mile.
There is no such thing as free,
said Craig Mathias, a former chair-
man of the Board of Selectmen for
Ashland, Mass. It is not the func-
tion of government to be an ISP.
What we recommend is a premium
service that costs more than the
bottom tier. Id never recommend
free Internet service, except maybe
for things like the chamber of com-
merce with a portal.
But, Mathias added, the fact that
it will not be free will not delay its
progress. Wayne Rash
Riverside makes the availability of its
network obvious in public places.
[CONTINUED ON PAGE 55]
www. eweek. com
SEPTEMBER 10, 2007 n eWEEK 53
28p44.indd 53 9/6/07 10:16:13 AM
OGRES ARE EVERYWHERE. BUT IF YOUR APP IS
AHEAD OF SCHEDULE, THEY LEAVE YOU ALONE.
OGRES ARE EVERYWHERE. BUT IF YOUR APP IS
AHEAD OF SCHEDULE, THEY LEAVE YOU ALONE.
Your challenge: build rich apps, faster.
Defy it: get a jump start with Visual Studio
Tools for the 2007 Microsoft
Ofce system.
More tips and tools at defyallchallenges.com
In the late 90s, we
started with a proj ect
called Riverside Commu-
nity Online, said Michael
Beck, assistant city man-
ager. It created a consoli-
dated portal for the city
and related entities, and
one of its initiatives was
computer training and
providing computers for
low-income households.
Beck said the next step
was providing free Wi-Fi
to the community. We
focused on the down-
town, he said. We cre-
ated the downtown wire-
less mall, which was free
Wi-Fi in the downtown
corridor, and that eventu-
ally was expanded to 27
blocks. Then we expanded
to citywide Wi-Fi.
Creating a citywide Wi-
Fi network is beyond the
means of most local gov-
ernments, so Beck called
in the experts. AT&T is
providing access to the
entire city for freeup
to 512K bpssupported
by advertising, he said.
People can pay for faster
accessup to 3M bps.
Beck said that in addition
to the public Wi-Fi network,
AT&T is installing a public
service network that operates
on 4.9GHz. The city will be
paying for this network. We
pay for each connection or
radio we install, Beck said.
Its entirely data. It includes
police, fire,
public utili-
ties, public
works and
code enforce-
ment. The
4 . 9 G H z
[band] will
be used for
w i r e l e s s
cameras.
The ci t y
of Riverside
s e r v e s a s
a model deployment for
AT&T.
Riverside is our first
deployment, said Ebra-
him Keshavarz, AT&Ts
assistant vice president of
product marketing for busi-
ness development, in Bed-
minster, N.J. We design,
build, own and operate our
networks. Riverside is the
current model of metro Wi-
Fi. The citys responsibil-
ity is to provide power and
poles, to give us permitting,
and to give us applications
and revenues as an anchor
tenant.
W h a t
we bring to
the table is
design work
about where
w e w i l l
bring assets,
access points
and access
to the net-
work already
in the city,
Keshavarz
added. We
provide access to a 2.4GHz
network for citizens and a
4.9GHz network for pub-
lic services. These access
points use a mesh model to
reach larger access points
that have wired access.
The Riverside network
is still being built, but so
far the results are prom-
ising, Beck said. AT&T
is actively installing the
radi os now, he sai d.
Were at about 50 percent
on the equipment instal-
lation2 square miles
have been live since May.
The entire system will be
installed by the end of the
year, fully operational.
Beck said the city has
some advantages over
other similar communi-
ties. One of the advantages
that Riverside has is that we
own our own electric util-
ity, he said. We have our
own fiber, and were able to
do our own backhaul using
the fiber. A wireless system
eventually has to get back
on to glass, or the wireless
system will slow to a crawl.
Most people dont under-
stand that.
eWEEK Labs Senior Analyst
Wayne Rash is at wayne.rash
@ziffdavisenterprise.com.
Riversides Wi-Fi network can
handle streaming video in police
cars and other vehicles (left). The
city has mounted wireless access
points on street lights (below).
AT&Ts Keshavarz: Riverside is
a model deployment.
INSIGHT
MUNI WIRELESS FROM PAGE 53
www. eweek. com
SEPTEMBER 10, 2007 n eWEEK 55
28p44.indd 55 9/6/07 10:16:31 AM
COMMENTARY
Shihs curve can bring smiles
Former Acer executive charted road map for IT success
ERIC LUNDQUIST
Y
ou should know three
things about Stan Shih.
He figured out the PC
industry faster and bet-
ter than any other major
executive; he came up
with one of the easiest-to-
understand descriptions of
where to make money in
computers; and he knew
when to get out.
Shih was co-founder of
what became Acer Group in
1976. In 2004, he surprised
many in the computer in -
dustry by retiring at 60 to
go into venture capital.
If it hadnt been for
Shih, the Taiwan computer
industry might still be
slogging away, consisting
solely of contract manufac-
turers always wondering
why they worked so hard
but never got to enjoy
the profits from the years
when the PC business was
riding high.
I thought of Shih and his
smiling curve description of
the computer industry follow-
ing Acers $710 million offer
for Gateway. If the deal goes
through, Acer will acquire not
only the Gateway brand but
also the eMachines brand
which it
may decide
to leave dor-
mantand,
in a some-
what com-
plicated deal,
the Packard
Bell brand, which remains
strong in Europe.
In this Internet era,
when companies figure it is
cheaper to buy keywords on
Google than do the intellec-
tual heavy lifting of building
a brand, why would Acer
be interested in buying a
universe of brands? For that,
you need to go back to Shihs
smile chart (below).
I dont know exactly when
Shih came up with the curve,
but it would seem
an appropriate
revelation to have
late one night
over a few beers,
after you had just
spent the whole
day wondering
why, as a contract
manufacturer, you
worked so hard
and earned so lit-
tle. It is also a lesson for Dell,
where the ability to be the
best manufacturer can mean
you are the best at adding the
least value. Concept, brand-
ing, marketing and sales,
and service after the sale are
where Shih identified the
greatest value add when he
was in charge of Acer and are
still the areas, in my opinion,
where PC makers can find
financial and market success.
In the past, the upper ends
of both sides of the curve have
been the province of some of
the most successful compa-
nies. Steve Jobs focus on the
curves left-hand attributes of
concept, branding and design
allows him to charge a pre-
mium price and still create
an incredibly loyal Apple cus-
tomer base. Newer computer
concepts such as the recently
introduced Pano Logic virtual
desktop box hold promise by
keeping manufacturing costs
down and sales and service-
after-sale revenues up.
Acer has now become the
third-largest PC maker in the
world, based largely on fol-
lowing Shihs smiling curve,
and that should bring a
frown to any vendor not fol-
lowing that curve today.
Editorial Director Eric Lund-
quist is at eric.lundquist@
ziffdavisenterprise.com.
COMMENTARY
Under this
model, manufacturing
is the lowest value input
V
a
l
u
e
a
d
d
e
d
Concept/R&D
Design
Manufacturing
Service after sale
Marketing
Distribution
The Stan Shih smile curve
Higher
Lower
Acrobat
8 Professional
22020403
The essential PDF solution
Create, combine, and control
Adobe PDF documents
Easy, more secure distribution,
collaboration, and data collection
Sony DRX S50U - DVD burner
DRX-550U
DVD multi-burner for Windows
Vista/ XP/2000
Equipped with the Nero
7 Essentials
software suite and USB 2.0 interface
Read 24x (CD) / 8x (DVD); Write 24x
(CD) / 8x (DVD R) / 4x (DVD R DL)
Any estimates to where its
going to scale by the end of
the year?
No. We are not ready to
talk about that.
How has the market changed
in the last year, and how is
AMD preparing to respond
now that Intel is on better
footing than when the dual-
core Opteron came out?
In some masochistic way, I
like to take credit for Intel
being a better company. I
believe that is what competi-
tion does. We do recognize
and we do acknowledge that
we are going into a period of
time quite different than the
one we went into when we
launched [the first] Opteron,
and we are now in a much
more competitive space.
[Intel has] good prod-
ucts. Before, they did not
have products as good, and
now this is going to make
us stronger in a certain
sense. Now we have to fig-
ure out how to do things
even faster and better.
How do you intend to move
the products out to market
faster to improve your man-
ufacturing capabilities?
I think we are doing some
things that are going to put
us in a strong position, but
I would put [them] in the
category of highly propri-
etary. I think that you can
measure the results when
you put [Barcelona] under
the microscope.
I think you are going to
see some highly innova-
tive things, and that is only
beginning. I think that our
approach to multicore tech-
nology is different from our
competitors. I think that it
is going to make us a better
developer of technology,
and despite the size differ-
ential, by any measure our
manufacturing is pretty
strong. The fact that we are
only one-tenth the size [of
Intel] is a disadvantage to
some people, but I believe
that we are fairly strong.
Earlier this year, you lost
some market share. How did
your relationship with Dell
affect the supply chain in the
first half of this year?
You know that had a psy-
chological effect on us, but
it was unfortunately one of
those things like the stock
market, like the behavior
of subprime lending. There
were customers around the
world that were concerned
that the energy that would
be required to serve such a
large customer would take
away from our attention to
others. There were some
people who were nervous
and held back from buying
stuff from us. But the reality
is, when you look at Dells
ability to ramp, in addition
to addressing their own set
of issues, that was more of
a psychological reaction and
an emotional reaction and
not a real reaction.
We always knew what it
would take to serve a com-
plex and challenging cus-
tomer like Dell, and, while
we were prepared for it, the
outside world did not antici-
pate it. Therefore, I think we
suffered some unintended
consequences for a couple
of quarters. People thought
that we were going to have
to divert our attention, but I
think that has settled down.
Now, I think everyone
knows that our relationship
with Dell was orderly, and I
believe that is behind us.
How does the new relation-
ship between Sun Microsys-
tems, which had been an
exclusive partner of yours
for several years, and Intel
affect AMD?
Sun is a true partner, and
we have done a lot of things
in a joint fashion.
The relationship between
our engineering teams is
very strong, and, at the risk
of sounding flippant, we
really welcome the com-
petition with Intel. I really
believe that anyone that
deals with both of us even-
tually knows that we have
the better products, and if
you dont deal with both of
us, you will never know.
I can tell you in some way
that this is good for us, and
all the products that Sun
is launching or developing
continue to be AMD-based
products. And Barcelona is
going to be a very key part
of their offerings.
Sun recently announced its
eight-core Niagara 2 proces-
sor, which seemed to leapfrog
ahead of the four-core offer-
ings from Intel and AMD.
Can you explain your views
on what Sun has done for
microprocessors?
Sun has had a very respect-
able computer architecture
team that continues to
enhance SPARC. It is very
similar to IBM, which has
a very competent architec-
ture team that continues
to enhance Power. Both
of these companies have
a strategy that continues to
nurture their proprietary
architecture, but I think
both companies know how
important a standard prod-
66 eWEEK n SEPTEMBER 10, 2007
www. eweek. com
RUIZ FROM PAGE 64
AMDs new Austin campus is being designed as a
model of green building and sustainable development.
[CONTINUED ON PAGE 70]
INTERVIEW
28talkRuiz.indd Sec1:66 9/4/07 3:26:16 PM
kellsystems
contact kell systems
tel +703.818.0033
info@kellsystems.com
www.kellsystems.com
------Original Message------
From: Info, Kell Systems [info@kellsystems.com]
Sent: JUNE 28, 2007 09:30
To: David Prendergast, IT
Subject: KELL PORTABLE SERVER ENVIRONMENTS
Dear David,
Thank you for your interest, and for your time on the phone. Please nd attached the technical specication of the cabinets as
requested, and yes, we have a wide range of nishes to match your different ofces. Please let us know when it is you have in
mind to visit us for a demonstration.
Looking forward to speaking again soon.
Kind regards,
Kell Systems
CABLE MANAGEMENT FULL EIA-SPEC 4-POST 19 RACK 170 DOOR OPENING
O
REMOVABLE
FAN MODULES
BUILT-IN
POWER
DISTRIBUTION
SOUNDPROOF
CABLE PORT
DETACHABLE
SHELL FOR
FULL SIDE &
REAR ACCESS
FULLY MOBILE ON
LOCKABLE CASTORS
LOCKING
DOORS
FRONT-TO-BACK COOLING
WIDE RANGE OF STYLES & FINISHES
Bob,
This looks like a far better answer for the branch ofces upgrade program. Instead of robbing ofce space and spending
half the budget on building rack rooms everywhere, we can deploy the hardware in these, right in the ofce areas. They
look just like the furniture, but they have a full spec server environment built-in, and the soundproong gets rid of the
noise issue. The noise reduction is >96% with the doors closed.
I spoke to their tech guys and this 24U version has cooling to support 5 or 6 of our servers (plus switches, UPS, tape
drive etc.), so we would have the required room for expansion later. They are portable as well, so if a lease runs out or
something, and they have to move ofce, we can just pick up and go.
It looks like a no-brainer to me. What do you think?
Dave
David Prendergast, IT
Bob Murray, Head of IT
Roger Wills, Facilities
FW: KELL PORTABLE SERVER ENVIRONMENTS
From:
To:
Cc:
Subject:
FW: KELL PORTABLE SERVER ENVIRONMENTS
NEW!
TAKE THE VIDEO TOUR AT
WWW.KELLSYSTEMS.COM
uct is for them. I think our
role is not to challenge that
strategy but to serve them
when they need x86 proces-
sors, and thats our plan.
AMD has reported losses in
the last few financial quarters.
What are you trying to do to
rectify the companys finan-
cial picture? Also, in the years
between the release of the first
Opteron and now, AMD grew
very fast. Did you grow too fast
for your own good?
We do recognize that we
have a financial challenge.
In addition to all the prod-
uct and technological chal-
lenges in front of us that we
have to address, you have to
start at the strategy of what
we want to accomplish and
the things that we want
to do. We want our server
architecture to continue after
Barcelona and Bulldozer
[a new set of x86 processor
cores that AMD is design-
ing and will debut in 2009].
We have ideas, through the
acquisition of ATI, on the
future of computing, and we
have those plans in place.
You saw us improve from
first to second quarter [of
2007] financially. It is our
expectation that we will tele-
graph this to the industry and
that we will again improve in
the third quarter, and we will
continuously improve. All of
that is being done prudently
and judiciously. We are not
out slashing costs just to get
a quarter with a right num-
ber because we truly believe
in our vision. We believe in
our products and our road
maps.
The ot her quest i on
that you have is interest-
ingdid we grow too fast?
Quite the contrary. I think
in any industry and in any
environment, whether its
automotive or airplanes or
computers, when you have
the technology advantage
that we had from 2003 to
2006, we should have grown
faster. It was only due to
the abusive, monopolistic
behavior of our competitor
that we didnt.
Five years from now, what
does computing look like?
Is it going to be desktops
and laptops, or is there
going to be a whole new
model out there?
We think visualization, not
virtualization, is going to
be the key to everything.
The other part that I think
is going to be big is the
segmentation of the mar-
ket, to make it easier not
to have a general-purpose
machine that does every-
thing for everybody but to
be able to adjust. This is
where our multicore tech-
nology is pretty strong,
and we will be able to
do things that are great
for supercomputers and,
with minor changes, for
servers and workstations.
With further changes,
[the multicore technol-
ogy] could be even better
for desktops.
I also think that desk-
tops are going to become
an appliance. Today, it is
pretty easy to say that if
you have a four-bedroom
house, a three-bedroom
house, you have a phone
in each bedroom. I think
the desktop will become an
appliance of that type.
I think that mobile com-
puting will continue to evolve
pretty rapidly, and there are
going to be some accelerated
conversions as to whether
you want a laptop that does
a lot of things or a phone that
does a lot of things. I think
there is going to be a mixture
of products in there, but I
think definitely mobility is
going to be key.
What can you tell us about
the upcoming quad-core Phe-
nom processor for desktops,
especially in light of AMDs
recent success in selling desk-
top chips this year?
As far as desktops go, in
the foreseeable future,
[this part of the market has
got] two big buckets.
We play, and our compe-
tition plays, in the perfor-
mance-driven bucket. That
is, if you are a gamer, and
you want great technol-
ogy, that is where Phenom
comes in. It is a deriva-
tive of the server proces-
sorBarcelona. Thats
what people saw at our
analyst meeting. Its pretty
amazing that it was able to
demonstrate some gam-
ing capability that is not
available yet in the market
because of the technology.
So we believe that we are
going to have a very strong
position in that space.
The ot her space i s
the very price-sensitive,
appl iance l ike space. I
think that is more about
features and platforms.
There is closer interac-
tion with the OEMs to
figure out what kind of
platform you would like
to put into it.
Mobile is going to be
much more platform-driven
than anything else. If you
think of the phone as an
example, when was the last
time you bought a phone
because it has a 1GHz proc-
essor in it? I would guaran-
tee that you wouldnt know
what the speed of the chip
in your phone is. You care
about what you want [the
phone] to do.
What we see more than
anything else is technol-
ogy moving fast to stores to
provide the experience the
user needs. There are some
people who want to play
games on mobile [devices],
and that means that they are
going to want to have certain
capabilities on that device.
This is quite different from
the homemaker who might
want to use the product as a
Web surfing technology, for
e-mail, etc. So we need to be
able to address these issues
and answer them.
This is something my
competitor hates to hear,
but I think, frankly, that the
CPU is going to be less and
less relevant. What I think
is going to be relevant is the
platform.
I think, frankly, that the CPU
is going to be less and less
relevant. What I think is going
to be relevant is the platform.
RUIZ FROM PAGE 66
70 eWEEK n SEPTEMBER 10, 2007
www. eweek. com
INTERVIEW
28talkRuiz.indd Sec2:70 9/4/07 3:26:22 PM
e n t e r p r i s e
' | \ \ | | | | 1
For full details, Visit www.apc.com/promo Key Code w723x
Call 888.289.APCC x9147 Fax 401.788.2797
2007 American Power Conversion Corporation. All rights reserved. NetBotz, NetShelter and InfraStruXure are registered trademarks of American Power Conversion Corporation. Other trademarks are property of their respective owners.
132 Fairgrounds Road, West Kingston, RI 02892 USA AX4A6BF_NAMf
Download Free Rack White Papers
Start with the right rack,
and you cant go wrong.
Get the seamlessly integrated, fully compatible
NetShelter
.
Rack PDU starts at $89.99
Power distribution that remotely controls power
to individual outlets and monitors the aggregate
power consumption.
Switched, metered, and basic models available.
Includes horizontal, vertical, and toolless mount.
Puts power in the racks near the equipment where
it is needed most.
Wide range of input and output connections from
single-phase to 3-phase.
Rack-mount Keyboard Monitor starts at $1550
1U rack-mountable integrated keyboard, monitor and mouse.
15 or 17 ultra-thin, LCD monitor with
integrated keyboard.
Ease of installation minimizes support and
maintenance costs ensuring lower cost of ownership.
Can be used in a variety of IT environments from
computer rooms to large data centers.
Cable Management starts at $29.99
Comprehensive selection of accessories designed
to organize power or data cables within a
rack environment.
Eliminates clutter and cable stress.
Zero U of rack space with the vertical cable organizer.
Quick-release tabs, toolless mounting.
APC, the name you trust for power protection, also
offers a comprehensive line of non-proprietary racks,
rack accessories and management tools that ensure
the highest availability in a multi-vendor environment.
With APC racks, accessories, and management tools,
you can design a comprehensive rack solution that
meets your availability needs for today and that
easily scales up for tomorrow.
Need assistance? Our expert Congure-to-Order
Team can custom tailor a complete rack-mount
solution that suits your specic requirements.
Contact APC today and protect your rack application
with Legendary Reliability
.
NetShelter
SX starts at $1150
Rack enclosures with advanced cooling, power distribution,
and cable management for server and networking
applications in IT environments.
Integrated rear cable management channels allow easy
routing, management and access to large numbers of
data cables.
3000 lbs. weight capacity.
Vendor neutral mounting for guaranteed compatibility.
Toolless mounting increases speed of deployment.
NetBotz
SX is
vendor neutral and carries
the Fits Like a Glove
compatibility guarantee.
Rack Air Removal Unit SX starts at $2600
Rear-door fan system for performance heat removal up to 23kW
Temperature controlled, variable speed fans allow reduced
energy consumption during off-peak cooling periods.
Ducted exhaust system increases air conditioning efciency
and prevents hot spots by eliminating recirculation.
Manageable via Web, SNMP, Telnet and local LCD display.
Site Selection for
Mission Critical
Facilities
White Paper #81
Re-examining the
Suitability of the Raised
Floor for Data Center
Applications
White Paper #19
Essential Rack
System Requirements
for Next Generation
Data Centers
White Paper #7
e n t e r p r i s e
' | \ \ | | | | 1
' | \ \ | | | | 1 1 J 1 1
P|a:e ]cu| ad || ||e
Z|ff 0av|s Ned|a Fnterpr|se 0|ass|f|ed 0roup:
ewEE|, C|0 ||||| a|d Bae|||e.
*Keep ]our campaign highl] visiole and increase reader
impressions o] running ]our ad four times per month in ewEEK
|c| rc|e |||c|ra||c| :a|| 1-800-/b8-8/89
UNINTERRUPTIBLE
POWER SUPPLIES
BUY SELL NEW REFURBISHED
SmartUPS
750..................$229.00
SmartUPS
1500.................$399.00
SmartUPS
1500 RM2U.......$549.00
SmartUPS
2200 RM2U.......$799.00
SmartUPS
3000 RM2U.......$999.00
www. upsf or l ess. com
( 866) 577- 3628
UPSFOR LESS
experts in uninterruptible power supplies
For your free white paper, ARIA - The
Next Evolution in Data Collection Technology,
call 1-800-664-4593, email info@lxe.com,
or visit www.lxe.com/ew.
Ruggad loba Comutars
and Vraass hatworks or
mrovad Suy Chan
Farormanca.
kwardVnnng Suort.
Network with Spider
(from $800)
Web with Spider
(from $999)
Publish for CD/DVDs
(from $2,500)
Engine for W
in & .NET
Desktop with Spider
($199)
Network with Spider
(from $800)
Web with Spider
(from $999)
Publish for CD/DVDs
(from $2,500)
Engine for W
in & .NET
Engine for Linux
Engine for Linux
Desktop with Spider
($199)
1-800-IT-FINDS www.dtsearch.com
Instantly Search Terabytes of Text
Bottom line: dtSearch manages a terabyte of text in a single index and
returns results in less than a second InfoWorld
For combing through large amounts of data, dtSearch leads the market
Network Computing
Blindingly fast Computer Forensics: Incident Response Essentials
Covers all data sources ... powerful Web-based engines eWEEK
Searches at blazing speeds Computer Reseller News Test Center
The most powerful document search tool on the market Wired Magazine
For hundreds more reviews and developer case studies see www.dtsearch.com
over two dozen indexed, unindexed, fielded data and full-text search options
highlights hits in HTML, XML and PDF, while displaying links, formatting and images
converts other file types (word processor, database, spreadsheet, email and
attachments, ZIP, Unicode, etc.) to HTML for display with highlighted hits
Spider supports static and dynamic Web content, with WYSWYG hit-highlighting
API supports .NET/.NET 2.0, C++, Java, SQL databases. New.NET/.NET 2.0 Spider API
dtSearch
Reviews
The Smart Choice for Text Retrieval
since 1991
New
64-bit beta
Contact dtSearch for fully-functional evaluations
e n t e r p r i s e
C l a s s i f i e d
Systems Management. Done.
NOTHING TO HIDE HERE.
KBOX
TM
provides equal or advanced capabilities
and performancewithout excessive hidden costs.
KACE
TM
helps medium
enterprises achieve
IT efficiency, productivity and reduce costs. Consider
KBOXthe leading systems management appliance
and get all the functionality at a price you can afford.
See for yourself in the FREE Analyst ReportBest Practices
in Lifecycle Management: Comparing KACE, Altiris,
LANDesk and Microsoft SMS. Get your copy today at
www.kace.com/eweek. Or call 888-522-3638 for details.
KBOX appliances from KACE provide substantially
equivalentand in some cases superiorcapabilities
to Altiris, LANDesk and Microsoft SMS.
Andi Mann, Senior Analyst, Enterprise Management Assoc.
Whats really lurking beneath the surface of solutions from
Microsoft
SMS, Altiris
and LANDesk
?
SYSTEMS MANAGEMENT
KACE and KBOX are trademarks of Kace Networks, Inc.
All other registered trademarks are owned by their
respective companies.
$
$ $ $ $
$ $ $ $
$ $ $ $ $
COMPETITIVE COST COMPARISON
KBOX
Altiris
LANDesk
Microsoft SMS
A KBOX solution can cost as little as
one-quarter of its software-only rivals.
Andi Mann, Senior Analyst,
Enterprise Management Associates
See Analyst Report for cost assumptions and
detailsincluding a real-world cost comparison.
Winner MMS 2007
Most Innovative Product
k-10 kace eWeek BergAd 2pr 8/2/07 12:32 PM Page 1
eWEEK (ISSN 1530-6283) is published weekly except for July 16 and 30, Aug. 6 and 20, Sept. 3, Oct. 1 and 29, Nov. 19, Dec. 10, 24, 31 and combined issues (Feb.
12/19, April 2/9 and June 25/July 2) and by Ziff Davis Enterprise Inc., 28 East 28th St., New York, NY 10016-7930. Periodicals postage paid at New York, NY, and
additional mailing offices. Single-copy price including first-class postage: $6. One-year subscription rates: U.S. $195, Canada/Mexico $295, foreign airmail $395.
All orders must be prepaid. Subscription inquiries should be directed to Customer Service Department, eWEEK, P.O. Box 3402, Northbrook, IL 60065-3402, or call
(888) 663-8438, fax (847) 564-9453; Customer Service Web site: http://service.eweek.com. Please note that changes of address require that a new application be
filled out completely, and please include both the new and the old addresses. Please allow a minimum of 4 to 6 weeks for processing. POSTMASTER: Send address
changes to eWEEK, P.O. Box 3402, Northbrook, IL 60065-3402. We periodically make lists of our customers available to carefully screened mailers of quality goods
and services. If you do not want to receive such mailings, please let us know by writing us at Customer Service Department, eWEEK, P.O. Box 3402, Northbrook, IL
60065-3402. GST registration number 865286033. Publications Mail Agreement No. 40009221. Return undeliverable Canadian addresses to P.O. Box 503, RPO West
Beaver Creek, Richmond Hill, Ontario L4B 4R6. Printed in the U.S.A.
COMPANY PAGE TELEPHONE URL
1 & 1 Internet 4-5 (877) go1and1 www.1and1.com
American Power 27 (888) 289-APCC www.apc.com/promo
Conversion Corp.
AT&T Wireless 43 www.wireless.att.com/laptopconnect
CA 25 www.ca.com
CDW Corp. 13 (800) 399-4CDW www.cdw.com
Diskeeper Corp. 52 (800) 829-6468 www.diskeeper.com/ew7
Fujitsu Computer 23 www.us.fujitsu.com/computers/reliability3
Systems Corp.
Hewlett-Packard 7 (800) 888-0574 www.hp.com/go/tameyourdata6
IBM 2-3, 19, 21, www.ibm.com
61, 68-69, 76
Insight Direct USA 65 (800) 927-3209 www.insight.com
Intel Corp. 9, 11 www.intel.com
Juniper Networks 41 (888) JUNIPER www.jupiter.net/threatmanagement
Kell Systems 67 (703) 818-0033 www.kellsystems.com
Microsoft 30, 38, 46-47, 54 www.microsoft.com
Toshiba America Inc. 63 www.toshibabusiness.com
Tripp Lite 45 www.tripplite.com/eWeek
VeriSign Inc. 75 (866) 893-6565 www.verisign.com/dm/evssl
Websense Inc. 33 www.websense.com/challenge
ISSUE FEATURES DEMOGRAPHICS
Sept. 17 New licensing landscape Developer Solutions
Storage
Sept. 24 Security Storage Solutions
Search
Oct. 8 IT budget 2008 Channel Solutions
Enterprise apps Government Solutions
Oct. 15 Green IT Developer Solutions
E DI T ORI AL CAL E NDAR
Marketing
resources
For information about advertising
in the No. 1 enterprise newsweekly,
go to www.eweekmedia.com.
Youll find the resources you need,
including our events calendar, research
and circulation summaries, as well
as background info on eWEEKs
award-winning print and online brands.
A D V E R T I S I N G C L O S I N G D A T E S
ISSUE CLOSING DATE ISSUE CLOSING DATE ISSUE CLOSING DATE ISSUE CLOSING DATE
Sept. 17 Sept. 3 Sept. 24 Sept. 10 Oct. 8 Sept. 24 Oct. 15 Oct.1
ADV E RT I S I NG S AL E S OF F I C E S
Karl H. Elken
Group Publisher & Vice President
(212) 503-5631
Jason Ratner
Group National Associate Publisher
(415) 547-8813
NATIONAL REGION
Chris May
National Sales Director, Channel
(415) 547-8241
EASTERN REGION
Matthew Merkin
Group East Coast Ad Director
(212) 503-5641
Darrell Gottlieb
Midwest District Sales Manager
(212) 503-5650
Kate McLaughlin
Northeast/Southeast District Sales Manager
(212) 503-5685
Gena Grossberg
Sales Assistant/Classified Ad Sales
(212) 503-5647
WESTERN REGION
Christina Card
Regional Sales Manager
(415) 547-8474
Kelsey Chao
District Sales Manager
(415) 547-8485
Jessica Cooper
Sales Assistant
(415) 547-8866
Tia Lambert
Marketing Specialist
(415) 547-8486
CUSTOM SOLUTIONS GROUP
Martha Schwartz
Senior Vice President
(212) 503-5643
Scott Miller
Senior Executive Sales Director
(212) 503-3835
Beatrice Olivas
Executive Sales Director
Face to Face Events
(415) 547-8476
CIRCULATION
Kelsey Voss
Circulation Director
(212) 503-5320
Dorrett McDonald
Circulation Manager
(212) 503-5340
SUBSCRIPTION INQUIRIES
(888) 663-8438; Fax: (847) 291-4816
http://service.eweek.com
eWEEKS sales and marketing staffs can be reached at
(212) 503-5600 or (800) 758-3789, or via e-mail by using the
following convention: name.surname@ziffdavisenterprise.com.
eWEEK, PC Week, PC Week Netweek, PC Week Shoot-Out,
Spencer F. Katt and Spencer F. Katt: Rumor
Central are registered trademarks of Ziff Davis
Publishing Holdings Inc. Copyright (c) 2002 Ziff
Davis Media Inc. All rights reserved. Reproduction
in whole or in part without permission is prohibited.
For permission to reuse material in this publication
or to use our logo, send e-mail to permissions@
ziffdavis.com. For reprints, contact Hiedi Brooks via
e-mail, hbrooks@fostereprints.com; phone, (866)
879-9144.
AD INDEX
www. eweek. com
SEPTEMBER 10, 2007 n eWEEK 73
28p73.indd 73 9/7/07 2:44:37 PM
74 eWEEK n SEPTEMBER 10, 2007
www. eweek. com
Spill your guts at spencer.katt@ziffdavisenterprise.com, or give the Katt a howl at 781-938-2627.
SPENCER F. KATT
Malware mashup is monstrous
Attackers phish for Monster users; Ellison aces real estate deal
T
hey did the mash, they did the monster mash, droned
the dulcet-toned Drudge as a pal told him about the
ongoing attacks against Monster.com and its users.
The employment Web site itself claims the attack is called
Infostealer.Monstres, but security experts say it isnt just
a vanilla hack, but rather a malware mashup that includes
data theft, phishing and Trojan horse attacks. Armed with
the contact information from
Monsters employer accounts, the
rsum robbers have launched
phishing attacks on Monster
users. The pal said that USAJobs.
com, a rsum posting site for
federal jobs that uses Monsters
technology, has also been
breached. Me-ouchfolks usu-
ally arent exposed to that kind of corruption until after they
get a government job, guffawed the Grimalkin.
Spence and his pal cursed the annual September inva-
sion of college students to Beantown as they dodged an
overloaded U-Haul truck that swerved onto the curb in front
of them. The duo soon ducked into Crossroads Irish Pub
in Bostons Back Bay, more to escape the collegiate chaos
than to simply imbibe. After ordering a round, the pal told
Spence that Oracle boss Larry Ellison reportedly bought the
Malibu Racquet Club recently.
Big deal. When he isnt
buying tech companies, Larrys
been buying chunks of Malibu,
no? queried the Kitty. The
pal acknowledged that Larry
had indeed been buying res-
taurants and real estate in
Malibu, but this time rumor has
it that Larry wants to team up
with former tennis star John
McEnroe to turn the club into
a world-class tennis academy.
If true, dya think both their
egos could fit on the court?
laughed the Lynx. The pal also
asked Spence if hed checked
out FakeLarryEllison.blogspot.
com, a faux blog in the style of
the popular FakeSteveJobs blog. Yeah. My favorite entry
had Fake Larry detailing how he grows bonsai marijuana
plants, said Spence.
The pal quickly changed the subject to Microsoft and said
the Redmondians were expected to launch their commu-
nications suite, featuring Microsoft Office Communications
Server 2007, Oct. 16. As he signaled the bartender for a sec-
ond round, the Furballs friend noted
that Apple founder Steve Wozniak
was nabbed earlier this year by the
California Highway Patrol for driving
104 mph in a Toyota Prius. Maybe
he was just preparing for the pos-
sible G-forces hell feel when his
co-pilot Buzz Aldrin takes the wheel
for their planned expedition to the
South Pole in a hydrogen-powered Hummer this December,
cackled the Kitty.
The pal also mentioned something else involving
Wozniak that moved fast: The Young Woz and Jobs custom
Lego-style play set. According to the Podbrix.com Web site,
makers of the toy, the play set went on sale Aug. 29 and
sold out two days later. Thats OK. Im holding out until
they come up with a Young Gil Amelio and Ellen Hancock
play set, mused the Mouser.
@
LITTERBOXLYNX
cheat-sheets.org
mantoadmire.blogspot.com
mynumo.com
And dont forget me at go.eweek.com/kattoon
RUMOR CENTRAL
28p74.indd 10 9/6/07 4:14:00 PM
Gt your r EV whit papr at www.vorisign.comomovssl or call -866-893-6565.
EV_STWC_eWeek2.indd 1 7/31/07 1:33:49 PM
WHI TE PAPER
The Latest Advancements
in SSL Technology
WHI TE PAPER
+ Introduction 3
+ SSL Overview 3
+ Server Gated Cryptography: 4
Enabling Strong Encryption
for the Most Site Visitors
+ Extended Validation SSL 5
(EV SSL): The Gold Standard
for Authentication
+ Browser Support for EV SSL 6
+ Third Party Trust Marks: 6
Inspiring Consumer Confidence
+ Summary 7
CONTENTS
WHI TE PAPER
3
The Latest Advancements
in SSL Technology
+ Introduction
Secure Sockets Layer (SSL) is the World Standard for Web Security. SSL technology
confronts the potential problems of unauthorized viewing of condential information,
data manipulation, data hijacking, phishing, and other insidious Web site scams by
encrypting sensitive data so that only authorized recipients can read it. In addition to
preventing tampering with sensitive information, SSL helps provide your Web sites users
with the assurance of having accessed a valid Web site. Support for SSL is built into all
major operating systems, Web applications, and server hardwaremeaning that SSLs
powerful encryption technology helps provide your business with a system-wide, liability
limiting security blanket for fortifying consumer condence, boosting the percentage of
completed transactions, and enriching the bottom line. Due to recent advances in SSL
technology, there is a variety of different kinds of SSL. In this paper, we will discuss some
of these advances to help you decide which would be best for your organization.
+ SSL Overview
SSL became the standard over a decade ago to ensure the privacy of online
communications. A special data le called an SSL Certicate is created for a specic server
in a specic domain for a specic entity. Similar to a passport or drivers license, SSL
Certicates are issued by trusted authorities such as VeriSign. Every entity that receives an
SSL Certicate must pass some form of authentication that veries it is who it says it is.
With the explosion of phishing and other fraudulent Web activity aimed at stealing
peoples personal information, identity authentication is more important now than ever
before. The level of identity authentication veried by an SSL Certicate differs from one
SSL Certicate to another, and from one Certication Authority (CA) to another.
With SSL, a private and public key system encrypts the connection between two parties,
such as a consumer and a Web site bearing an SSL Certicate. When the consumers
browser points to a Web site secured with SSL, a secure handshake between the two
systems authenticates both parties. Each session uses a unique session key for encryption
(the longer the key, the stronger the encryption). Once this connection is established the
two parties can begin a secure session guaranteeing the privacy and integrity of their
communications. This security is particularly important when people are sharing sensitive,
condential information over the Internet, an extranet, or even within an intranet. In the
case of e-commerce, a secure SSL connection is critical to doing business, as most Internet
users are afraid to share information with a Web site that doesnt offer SSL protection.
A small purchase here, a smaller purchase there, and a reluctance to change age-old buying
habits or reveal personally identifying information characterizes an enormous segment of
the worlds viable online consumer population. The question remains: Will potential
customers feel secure enough in their Internet dealings with your Web site to take a
meaningful plunge into the world of transacting online?
WHI TE PAPER
4
+ Server Gated Cryptography: Enabling Strong Encryption
for the Most Site Visitors
If your reputation in the online community depends upon the stringent safeguarding
of information processed through your Web site, then your Internet security solution
should include the strongest encryption available to each Web site visitor. Encryption,
as mentioned above, is the process whereby data is transformed into a code that will
be indecipherable to an unauthorized viewer. The stronger the encryption, the more
difcult it is for someone to eavesdrop on your online communications. This is especially
important if you accept any kind of online payments, connect to a bank or brokerage
account, transmit health records, must meet a governmental or other regulatory
organizations privacy and security standards, or process any kind of potentially
sensitive information.
Industry experts recommend a minimum of 128-bit encryption be used for all secure
online sessions. Some Web server-client browser congurations enable sessions with
up to 256-bit encryption protection, the strongest level of encryption commercially
available today. The strength of encryption enabled for any session depends on what your
customers browser and operating system support, as well as what your host server
systems will support. If your consumers browser or operating system doesnt support
higher levels of encryption, the session will default down to the highest level that
it can support.
For years the U.S. imposed export restrictions prohibiting browser manufacturers from
distributing products that supported higher levels of encryption. Although most export
restrictions were lifted in January 2000, there are many consumers, especially outside the
U.S., who are still using older browsers (such as those before Microsoft Internet Explorer
5.5 (export)) and operating systems (such as certain early Windows 2000 systems),
which may default to weak, lower encryption levels. The Yankee Group, in 2005,
estimated that tens of millions of Internet users connect to the Web using substandard
encryption levels.
1
SGC is an SSL extension originally created for nancial institutions exempted from the
U.S. encryption export restrictions. With SGC, encryption levels are controlled by the
server and not dependent on the client system. Once these original export restrictions
were lifted, SGC-enabled SSL Certicates are now issued to all types of Web sites, not
just authorized nancial institutions as in the late 1990's.
VeriSign offers market-leading SGC-enabled SSL Certicates so virtually every visitor to
your Web site will be protected by the industry recommended minimum of 128-bit
encryption.
1 2005, Yankee Group, Building Blocks of Transparent Web Security: Severs-Gated Cryptography
WHI TE PAPER
5
+ Extended Validation SSL (EV SSL): The Gold Standard
for Authentication
While more and more people are comfortable searching the Internet, there remains a
signicant disconnect between the numbers of surfers and those psychologically disposed
to transact business online. As a Gartner 2006 survey revealed, security concerns led
almost half of online customers to alter the way they use the Internet, at a cost of almost
$2 billion to the online business community.
2
Clearly, too many potential e-commerce
clients remain distrustful or fearful of revealing personal or nancial information to an
unseen and personally unknown entity. They need assurance and are increasingly
demanding it before they proceed through a personal revelation or nancial transaction.
These and similar observations led a group of CAs, browser providers, and WebTrust
auditors to establish the CA/Browser Forum for developing a new SSL standardone
that the online consumer world could easily comprehend and embrace. This consortium,
which includes representatives from both Microsoft and VeriSign as well as others,
created Extended Validation (EV) SSL. This new standard aims to combat the growth of
Internet threats such as phishing attacks. EV SSL requires a rigorous process of Web site
authentication and is considered the gold standard in the e-commerce industry for
authenticating the legitimate identity of a Web site. In order to issue EV SSL
Certicates, a CA must pass a rigorous WebTrust audit. VeriSign remains at the forefront
in the development and implementation of this new standard.
An EV SSL Certicate offers the online business and consumer a highly endorsed and
widely recognized level of protection from increasingly sophisticated Internet spoong
scams. EV SSL contains a number of user interface enhancements aimed at making the
identication of an authenticated site immediately more noticeable to the end user.
New high-security browsers display EV SSL Certicates differently than traditional
SSL Certicates. Rather than the subtle padlock symbol displayed by traditional
SSL Certicates, EV SSL Certicates trigger the browser address bar in high-security
browsers to change to an eye-catching green color. This change is immediately evident
to an end user and delivers a condence building effect. Overstock.com noticed that after
implementing EV SSL Certicates from VeriSign, its Microsoft
IE7-using visitors on
average completed transactions 8.6% more often than those using legacy non-EV-enabled
browsers. And, after deploying VeriSign EV SSL, DebtHelp.com realized an 11%
increase in completed transactions by IE7 users to their Web site.
2 2006, Gartner, Trends in Consumer Society
WHI TE PAPER
6
In addition to the noticeable green color, a security status bar prominently displays the
name of the owner of that Web site and the CA who has issued that EV SSL Certicate.
This eld reveals both names in turn when a visitor rst arrives on the Web site.
Like its traditional SSL predecessors, an EV SSL Certicate facilitates secure encrypted
communication between a Web site and a consumers browser. It also authenticates the
genuine nature of the Web site so all visitors know they have indeed reached the site they
intended to visit and not a counterfeit site.
You gain the benet of this gold standard for authentication as well as the powerful
protection of SGC encryption with VeriSign SSL Certicates. VeriSign offers a certicate
with both of these SSL advancements.
+ Browser Support for EV SSL
Microsoft, the rst browser manufacturer to support this new standard, integrated
the EV SSL interface enhancement with Microsoft IE7. Although relatively new to the
market, IE7 has already garnered 31% of the browser market. Additionally, Firefox 2.0
users can download an extension that enables them to see the green address bar when
they encounter a VeriSign EV SSL Certicate. Within a month of this extensions release
over 55,000 Firefox users had downloaded it. As of August 2007, no other CA offers
this benet.
+ Third Party Trust Marks: Inspiring Consumer Confidence
Virtually all shoppers acknowledge their concerns about identity theft, credit card fraud,
and other Internet scams. They have a reason to be concerned. During the one-year
period ending July 2006, the monetary loss from identity theft scams totaled $56.6
billion with an average cost per episode of $6,383.
4
The good news is that consumer awareness of solutions to security issues is likely to
increase as both the Internet security industry and certain governmental agencies get
the word out. To be sure, online consumers are already becoming increasingly savvy
about Internet security. Many now expect to see a familiar third party trust mark
identifying an online retailers Web site as a secure and viable shopping avenue. Inclusion
of an established third party trust mark on ones Web site is now essential for guiding
shoppers from the surng stage through the completion of a transaction.
Research has shown that the majority of online shoppers recognize the VeriSign
Secured Seal and indicate they would make an online purchase because of that seals
presence.
5
If you purchase a VeriSign SSL Certicate for your Web site you are entitled
to display the exclusive VeriSign Secured Seal. Displaying the seal should increase
your customers condence in your Web site and increase the number of completed
transactions you experience. Also, visitors can click on the seal to verify your site.
One week after posting a VeriSign Secured Seal on their Web site, Opodo, a leading
pan-European travel service saw a 10% jump in completed sales.
6
3 May 2007, www.marketshare.com
4 2006, Javelin Strategy/Better Business Bureau, Identify Fraud Survey Report
5 2006, Tech-Ed study
6 Warren Jonas, Head of Services Management, Opodo
WHI TE PAPER
7
Once you secure your Web site with a VeriSign SSL Certicate, all you need to do
to benet from the VeriSign Secured Seal trust mark is download and install it.
+ Summary
Credibility means a lot in the world of Internet security. With instant recognition by
88% of Web users
7
, VeriSign is by far the most recognizable Secure Sockets Layer (SSL)
security brand in the world today. VeriSign gained its leadership position by helping
the Internet security industry develop standards, update protocols, and apply the latest
technologies for the Web community. Savvy online consumers trust the VeriSign name
and feel condent about doing business with Web sites secured by a VeriSign SSL
Certicate. Naturally, this reputation wasnt created overnight. It was built upon a
platform of trust that has been cultivated for years and enhanced by the companys long-
time involvement and support of the development of the Internet security infrastructure.
Organizations that rely on Internet transactions have learned that a reliable and secure
Internet is necessary for company protability. The more secure the online consumer
feels, the more successful the online company will be in recruiting and retaining a
worthy client base. The creation of a successful online business requires the development
and cultivation of a trustworthy relationship with each potential client. VeriSigns
products enhance the building of such relationships. If you want to ensure that
potentially sensitive information is kept condential and secure, and especially if you
want your potential customers to trust that your company will value, respect and
safeguard their private information, a VeriSign SSL Certicate is right for you.
Displaying VeriSigns name emphasizes your Web sites genuineness, credibility and
trustworthiness to your customers. Your customers can then feel secure about completing
the transaction that led them to your site in the rst place.
+ About VeriSign
VeriSign operates digital infrastructure that enables and protects billions of interactions
every day across the worlds voice, video, and data networks.
Visit us at www.VeriSign.com for more information.
2007 VeriSign, the VeriSign logo, the checkmark circle, and other trademarks, service marks, and designs are registered or unregistered trademarks
of VeriSign, Inc. and its subsidiaries in the United States and in foreign countries. All other trademarks are property of their respective owners.
00024924 08-06-07
7 2006, Tec-Ed study