You are on page 1of 84

www. eweek.

com
AMD CEO Hector
Ruiz takes on Intel
and discusses how
Barcelonachanges
the playing field 62
SEPTEMBER 10, 2007 VOL. 24, NO. 28 $6
CHIPS
ON THE
TABLE
High-def VOIP
smooths path to
communication
advances 36
28p1.indd 1 9/7/07 1:01:12 PM
Call 1.877.go1and1
Creating a website
has never been easier.
Our website builder runs from a browser window and lets
you build a professional-looking site in minutes, without the
need for an expert programmer or web designer. Let the
wizard guide you through the process. Choose from a selec-
tion of templates and edit fonts and colors for added per-
sonalization. Using the simple point-and-click prompts and
a built-in text editor, your website can be online in minutes!
Choose your layout 1
1&
1 H
o
m
e
P
a
cka
g
e
3

m
o
n
t
h
s
f
r
e
e
!
*
Our complete web hosting
solution gives you everything
you need to quickly and easily
create an attractive website.
Order before October 31st
and get 3 months free!
Arrange your pages
Home
Pictures
Directions
Contact
2
Looking for a total website
2007 1&1 Internet, Inc. All rights reserved. Visit 1and1.com for full promotional offer details. *Offer valid for Home Package only, 12 month minimum
contract term required. **50% discount valid for 3 months and applies to Business I and II server packages only, two year minimum contract term
required. Prices based on comparable Linux web hosting package prices, effective 7/30/2007. Product and program specifications, availability, and
pricing subject to change without notice. All other trademarks are the property of their respective owners.
We offer a variety of hosting packages to t your needs and budget.
Yahoo! Go Daddy
Home STARTER DELUXE
Included Domains
2
/through contract duration
1
$1.99
/year with purchase
Web Space 120 GB 5 GB 100 GB
Monthly Transfer Volume 1,200 GB 200 GB 1,000 GB
E-mail Accounts 1,200 IMAP or POP3 200 POP3 1,000 POP3
Mailbox Size 2 GB Unlimited 10 MB
Search Engine Submission Extra charge applies
Website Builder 12 Pages Freeware
Photo Gallery
RSS Feed Creator $4.99/month
Ad-free Blog Freeware
90-Day Money Back Guarantee
Support
24/7 Toll-free Phone,
E-mail
24/7 Toll-free Phone,
E-mail
24/7 Phone, E-mail
Price Per Month
$
4
99 $
11
95 $
6
99
SPECIAL OFFER 3 months free!* $8.96 rst 2 months
Save 10% with 1 year contract
TOTAL/YEAR
$
44
91 $
137
42 $
75
48
Visit us now 1and1.com
Add text and pictures 3 Publish your website 4
solution?
SERVERS
Need a business server?
Sign up now and well waive
the $99 setup fee. Save 50%
on the first 3 months
when you sign up for a
2 year server contract.
waive
50%
Save
50%
**
L
a
b
o
r D
a
y

S
p
e
cia
ls:
September 3rd through
October 31, 2007
.us
DOMAINS
Act now and save!
Create your own .us domain.
For a limited time, Americas
internet address is on sale.
All domain packages
include free private
registration.
VERS
main.
cas
le.
$
2
99
first year
Editorial Director Eric Lundquist
Editor Debra Donston
Executive Editor, News Michael Hickins
Executive Editor, eWEEK Labs Jason Brooks
Chief Technology Analyst Jim Rapoza

NEWS
Senior News Editor Jeffrey Burt
News Editors John Hazard, John Pallatto
Senior Editors Jessica Davis, Peter Galli,
Paula Musich, Darryl K. Taft, Lisa Vaas
Senior Writers Clint Boulton, Renee Boucher
Ferguson, Roy Mark, Chris
Preimesberger
Staff Writers Scott Ferguson, Deborah Perelman,
Brian Prince
Microsoft Watch Editor Joe Wilcox
eWEEK LABS
Technical Director Cameron Sturdevant
Senior Analysts Andrew Garcia, Wayne Rash
Technical Analyst Tiffany Maleshefski

EDI TORI AL PRODUCTI ON
Managing Editor Rick Dagley
Deputy Managing Editor Debra Perry
Copy Chief Jim Williams
Senior Copy Editors Kelsey Adams, Patrick Burke
Copy Editors Vikki Lipset, Heather ONeill,
Shane ONeill, Robby Trail
Newsletter Editors Sharon Linsenbach, Alethea Yip
ART/MULTI MEDI A
Group Editorial Art Director Stephen Anderson
Associate Art Director Paul Connolly
Senior Production Designer Tara-Ann Fasulo
Senior Designer Chip Buchanan
Designer Brian Moore

eWEEK
Group Publisher
Karl Elken
Marketing
Tia Lambert, Marketing Specialist
Research
Guy Currier, Research Director
Senior Production Manager
Michael DiCarlis
Group Ad Coordinator
Chris DeNiscia
ZI FF DAVI S MEDI A
Chairman & CEO
Robert F. Callahan
Chief Financial Officer
Eric Berk
Executive Vice President, Licensing & Legal Affairs,
General Counsel
Gregory Barton
PRESI DENTS
Scott McCarthy (Game Group)
Sloan Seymour (Enterprise Group)
Jason Young (Consumer Tech/Small Business Group)
SENI OR VI CE PRESI DENTS
Ira Becker (Game Group)
JimLouderback (Editorial Director, Consumer/Small Business Group)
Angelo Mandarano (Internet)
Martha Schwartz (Custom Solutions Group)
Michael Vizard (Editorial Director, Enterprise Group)
VI CE PRESI DENTS
Eric Danetz (Enterprise Alignment Marketing WW)
John Davison (Game Group)
Karl Elken (Group Publisher, eWEEK/CIOI/Baseline)
Aaron Goldberg (Market Experts)
Barry Harrigan (Web Buyers Guide)
Phil Kramer (Internet)
Michael Krieger (Market Experts)
Ray Ledda (Game Group)
Rick Lehrbaum (Internet)
Eric Lundquist (Editorial Director, eWEEK)
Chris Maginn (Internet)
Jim McCabe (PC Magazine)
Scott McDaniel (Game Group)
Paul OReilly (Event Marketing Group)
Beth Repeta (Human Resources)
Dave Rock (Circulation)
Tom Rousseau (Enterprise Alignment Marketing WW)
StephenSutton(AudienceDevelopment, Consumer/Small-BusinessGroup)
Monica Vila (Event Marketing Group)
Neil Glass (Consumer/Small-Business Group)
eWEEK editorial staff members can be
reached at (781) 938-2600 or (800)
451-1032, or via e-mail using the fol-
lowing convention: name.surname@
ziffdavisenterprise.com. For example: eric.lundquist@ziffdavisenterprise.
com. (Dont use middle initials in address.)
Cover: Chris Covatta
6 eWEEK n SEPTEMBER 10, 2007
www. eweek. com
ITS A VIRTUAL WORLD
If theres a hotter technol-
ogy than virtualization in
the industry, itd be difficult
to figure out what it is.
Fresh off its successful IPO,
VMware is hosting its user
conference Sept. 11-13 in
San Francisco. Also at the
event will be Staff Writer
Scott Ferguson and Senior
Writer Chris Preimesberger.
Look for their reports from
the show at eweek.com.
eweek.com
Upfront
8 Marc Benioff gives Microsoft a little credit.
ANALYSIS
12 Lawmakers are debating patent reform.
15 The Office Open XML file format falls
short of ISO approval.
17 Small vendors are targeting virtualization.
20 Microsoft sanctions Silverlight for Linux.
24 Sun uses its storage products to grow.
INSIGHT
36 High-definition VOIP creates clearer
and higher-quality communication.
44 Municipal wireless is popping up all over,
but success stories are few and far between.
COMMENTARY
56 Eric Lundquist: Stan Shihs smile curve
charted the path to IT success.
57 Jim Rapoza: Web radio faces extinction
pending the outcome of a bill in Congress.
58 Jason Brooks: San Franciscans look to a
startup for free Wi-Fi service.
60 Wayne Rash: Would RFID have helped
the search in the Utah mine tragedy?
74 Spencer F. Katt: Malware writers phish
for Monster rewards with attacks.
INTERVIEW
62 AMDs CEO says Barcelona will improve
his companys position in the chip market.
62
Hector Ruiz,
CEO of AMD
C
O
N
T
E
N
T
S
Last weeks cover photo
by Kristy Hardy
28p6.indd 6 9/7/07 4:20:23 PM
General Information Production Specs PrePress Info Name OK FIX Date
File Name: 062_ISS_7_eWeek.indd Bleed: 8.125 in x 10.75 in Application: InDesign CS2 4.0 D.A.: Travis
Client: HP Trim: 7.875 in x 10.5 in Colors: Cyan,
Magenta,
Yellow, Black,
PMS 158 C
Q.C.: Ricky
Job #: ISS 7062 Live: 7.375 in x 10 in Proofreader: Scott/Jessica
Media Type: Mag Scale: 1 in = 1 in Project Mgr: Janna
Release Date: 5/14/2007 Output %: 100% Fonts: Futura, Helvetica
Neue
A.D.: None
Date/Time: 5/2/07 12:06 PM Actual Size: 47p3 x 63p0 Copywriter: None
Comments: eWeek
Run Date: 28-May
C.D.: None
Images: 11289_
MonsterWave_
ol.eps, HP_
MAG_KO.EPS,
xeonDC_4c_125_
FOR PRINT.eps,
storageworks_
600_FPO.pdf
Print Pro: Sheena
Acct. Exec: None
Acct. Super.: None
Client OK:
WOULD NOW BE A GOOD TIME TO TALK
ABOUT A BETTER STORAGE SOLUTION?
With data doubling every 18 months, nding the right storage is crucial. The HP StorageWorks 600 All-in-One
Storage System, powered by the Dual- Core
1
Intel

Xeon

Processor, provides data protection features to


minimize risk, as well as integrated le serving and application data storage to reduce cost. And its all
contained in a single, affordable system. Now you can tame your data, simplify storage and set I.T. free.
The HP StorageWorks 600
All-in-One Storage System
See it now at hp.com/go/tameyourdata6
Call 1-800-888-0574
1. Dual-Core is a new technology designed to improve performance of multithreaded software products and hardware-aware multitasking operating systems and may require appropriate operating system software for full benet; check
with software provider to determine suitability; not all customers or software applications will necessarily benet from use of this technology. Intels numbering is not a measurement of higher performance. Intel, Intel logo, Intel Inside,
Intel Inside logo and Intel Xeon are trademarks of Intel Corporation in the U.S. and other countries. L.P. Microsoft and Windows are registered trademarks of Microsoft Corporation in the United States and/or other countries. 2007
Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
11712 Pub West splsh
M11712_eWeek 05.02.07 kh
CYAN MAGENTA YELLOW BLACK
S:7.375 in
S
:
1
0

i
n
T:7.875 in
T
:
1
0
.
5

i
n
B:8.125 in
B
:
1
0
.
7
5

i
n
Upfront
[CONTINUED ON PAGE 10] P
a
u
l

C
o
n
n
o
l
l
y
8 eWEEK n SEPTEMBER 10, 2007
www. eweek. com
Benioff backs off
S
alesforce.com CEO
Marc Benioff isnt spit-
ting fire like he used to.
That may not be a bad
thing.
There was a time when
Benioff wouldnt spare
Microsoft a bit of criticism
nor Google a bit of praise.
Microsoft, after all, rep-
resents the antithesis
of the business and
software delivery
model Salesforce.
com champi ons .
Salesforce.coms
No More Soft-
wa r e c r e do
could have just
as easi l y been
taken for No More
Microsoft, if not for
t he e x i s t e nc e of
another on-premises
archenemy, SAP.
On the other hand,
because it is more con-
sumer-oriented, Google
had been the more visible
avatar of what Salesforce.
com stands for in the
enterprise space: Hosted
everything, all the time.
Benioff, in New York
the evening of Sept. 4 to
address Citibanks technol-
ogy conference the follow-
ing day, circulated among
some 40 members of the
media, analyst, partner
and customer community
whom he hosted for din-
ner at Tao.
No, Benioff didnt blow
kisses at Microsoft. But he
did give credit to the ven-
dor for some of what its
doing. And while he said,
I love Google, he also
offered a critical assess-
ment of Googles enter-
prise applications.
No doubt this has noth-
ing to do with Googles
more forceful moves
into the enterprise
space of late.
I n N e w
York, Benioff
was so mel -
l o w t ha t i t
seemed appro-
priate to ask him
about r umor s
he i s t hi nki ng
of stepping away
from the helm
of the company
he founded. He
rebutted this, not-
ing that he doesnt even
have a succession plan in
place, and cited Bill Gates
and Larry Ellison as role
models. Gates has been at
the helm of Microsoft for
more than 30 years, while
Ellison has led Oracle for
almost as long.
But Bill Gates as a role
model for Marc Benioff?
Who woulda thunk it?
And whi l e Beni of f
seemed as excited as ever
about his own companys
i nnovat i onshe sai d
Salesforce will announce
something really big
during its Dreamforce
customer conference Sept.
17he seemed more like
a grown-up discussing his
peers than a tempestuous
adolescent railing at his
elders.
Microsofts alternative
SAAS (software as a ser-
vice) vision, dubbed soft-
ware plus service, can
work i n some cases,
Benioff allowed, a startling
admission for a man who
has spent countless hours
deriding Microsoft as a
dinosaur.
Benioff also reserved
some criticism for Google,
saying that the companys
hosted word processing
application still doesnt
have enough functionality
for the enterprise. They
need to work harder, he
said.
This change in per-
spective, however, doesnt
reflect any lack of ambition
for his company. Rather, it
shows how far SAAS has
come since the days people
suspiciously viewed it as
unreliable or unsafe.
For instance, CIT, a
financial services com-
pany with more than $70
billion in assets under
management and that
does 30 percent of its busi-
ness outside the United
States, runs 3,000 seats of
Salesforce.coms flagship
applications across its 17
business units.
Avi Kalderon, senior
vice president of enter-
prise technologies at CIT,
in New York, said cost
was not an issue in choos-
ing Salesforce. In fact,
Kalderon said, the total
cost of ownership evens
out when compared with
on-premises software with
a perpetual license after
five years. Kalderon said
that even when planned
service interruptions go
on for more than 24 hours
during the weekend, it
doesnt affect his compa-
nys business because he
has a back door to legacy
systems available when
Salesforce is down.
Even two days on week-
ends is not a problem,
Kalderon said. I sleep well
on the weekend.
Kalderons comfort level
reflects the maturation of
this delivery model, and
that in turn may explain
why Beni off can turn
down the volume on his
vitriol and simply vaunt
the prowess of his prod-
ucts.
Michael Hickins
Apples mobile
aspirations
T
he iPod Touch mod-
els ($299 for an 8GB
device or $399 for 16GB)
look almost identical to
28p8.indd 8 9/7/07 3:56:27 PM
UPFRONT FROM PAGE 8
10 eWEEK n SEPTEMBER 10, 2007
www. eweek. com
Upfront
the iPhone, just slightly
ski nni er. The devi ce
appears to have the same
layout, and the screen has
the same features and
some of the same icons.
To reduce costs, Apple
will undoubtedly be using
many of the same parts
in the Touch as in the
iPhonethe touch-screen,
processors, storage com-
ponents and so forth. Its
been reported that the same
applies to the operating sys-
tem, which makes sense, as
Apple would benefit from
having a single OS (Mac OS
X) and development plat-
form to work on for both the
iPhone and the Touch.
Like the iPhone, the
Touch has 802.11b/g Wi-
Fi, which could prove an
excellent way to get around
the unfortunate AT&T
exclusivity contract with
which the iPhone is sad-
dled. The Touch also has
Apples Safari browser and
the same virtual keyboard,
so users can expand their
connectivity to networks
protected by a captive por-
tal or log-in page.
So if the Touch is run-
ning OS X, it stands to
reason that the various
Jai l break appl i cati ons
can be easily adapted to
hack into the new device,
leading to a host of unau-
thorized applications that
could then be run on it.
One appl i cati on I am
particularly interested in
would be a SIP (Session
Initiation Protocol) cli-
ent application that uses
Wi - Fi connect i vi t y. It
would be the next logical
step in Apples evolution
toward mobile commu-
nications.
However, Im not so
sure Appl e wi l l want
to cross AT&T for this
parti cul ar featureat
least not until there is
a viable business model
that could be attached to
the capability. So, while
I would much prefer to
see Apple actually include
a widget for a SIP VOIP
(voice over IP) platform,
it seems more likely that
the community at large
will lead the way with a
SIP client application
possibly something that
woul d work wi t h t he
Gizmo network.
All this hinges on one
detail I have yet to be clear
on. Will the iPod Touch
have a microphone? If
Apple is indeed using
many of the same parts
on the Touch as on the
iPhone, then it is possible
that a microphone is in
there and that it can be
unlocked in software.
If its not in there, this
whole argument is moot
for the Touchalthough
I would still love to see it
for the iPhone. In truth, it
may be the only applica-
tion that would make me
want to hack into mine.
Andrew Garcia
Kissing up to IT
A
mong the range of
projects, hacks, tricks
and life tips on Wired.coms
new collaborative site, IT
support makes the list of
critical co-workers worth
sucking up to. Having
these people on your side
will make your life easier,
the post reads; creating an
enemy of them can make
your life miserable.
Of course, t he rea-
soning isnt exactly
about being friends
with IT support as
much as manipulat-
ing their egos, lack
of social skills and
intelligence to an
employees advan-
tage. In other words:
same stereotype, dif-
ferent day.
Wo r k e r s a r e
encouraged to make
friends with IT support
staff and stroke thei r
egos.
Lets face it, the multi-
author entry reads, he is
a techie type and may not
have the greatest of social
skills (may not), but he is
smart and likes it when
you tell him so. The key
here is be his buddy and
flatter him. What would I
do without you? You saved
my documents.
Doing so, the posters
contend, will ensure that
youll go to the line ahead
of even the boss.
The list of donts for
dealing with IT support
staff reads a little closer
to the reality of the daily
grind of a technology pro.
Employees are discour-
aged from calling the help
desk multiple times with
the same problem and
trying to cover it up with
chit-chat.
[The support person]
knows why youre calling
when youve got a tech
problem, and its not to dis-
cuss your date last night. In
fact, he likely resents your
calls and drop bys that are
merely fake-friend visits
meant to mask what you
really want. He may even
get annoyed and push you
further down the list.
So, according to the
posters: Lavishing the IT
support desk with exag-
gerated praise to better
response time, good. Pre-
tending to be friends with
IT support staff to get a
probl em sol ved more
quickly, bad.
To me, it sounds as
if the average employee
still doesnt know how to
respectfully ask the IT
department for help.
Deborah Perelman
28p8.indd 10 9/7/07 3:57:13 PM
MULTIPLY PROCESSING PERFORMANCE
AND MAXIMIZE RESPONSIVENESS.
THE COMPLETE LINE OF QUAD-CORE
INTEL XEON PROCESSORS FOR MAINSTREAM SERVERS.
Available in up to 32 processor congurations starting September 5th. Learn how Intel Xeon
Processor 7300 series delivers over 2x more performance.* Visit intel.com/xeon
By Roy Mark
A
s the new congress
recon vened the week
oof Sept. 3, there was
guarded opt i mi sm i n
Washington technology pol-
icy shops that the 8-month-
old Democratic-led body
will continue to champion
a pro-tech agenda. For the
first time in six years, the
tech wish list actually finds
itself on offense instead of
defense.
Fresh from authoriz-
ing a 10-year investment
of $33.6 billion in critical
competitiveness areas, with
patent reform on the fast
track and little opposition
to extending an expiring
ban on Internet connection
taxes, law makers seem to be
thinking of technology this
year as a priorityrather
than an afterthoughton a
crowded federal agenda.
The lingering question,
though, is whether its
just feel-good legislation
or a more serious com-
mitment by Democrats
aided by a healthy dose of
Tech seeks congressional relief
Lawmakers eye issues such as patent reform, but campaign could sidetrack efforts
Republicansto change
the direction of national
technology policy.
Looming over it all is next
years presidential election,
narrowing even more the
window of opportunity for
constructive legislative gains
before the political cam-
paign saps the momentum
of the 110th Congress.
For example, authoriz-
ing investments is easy,
an abstract nod to the deep
pockets of Silicon Val-
ley. Appropriating those
funds for next year and the
next nine years is a much
trickier enterprise. That
bruising battle is still to
come when the budget
committees begin to ham-
mer out just how much
of the authorizations in
the America Competes Act
will actually be spent.
If they dont follow up
with the money, its just
talk, said Tom Galvin, a
partner at Washingtons
463 Communications,
which counts among its
clients Sun Microsystems,
Cisco Systems and Tech-
Net, the politically savvy
CEO network. Theres
going to be a push for
Congress to put its money
where its mouth is.
Patent reform faces a
similarly shaky future.
Although the judiciary com-
mittees of both the House
and Senate have approved
bills strongly favored by the
tech industry, there are still
questions about how the
legislation will play with the
broader membership, par-
ticularly those with strong
ties and constituencies in
the pharmaceutical and
manufacturing industries.
Even in those channels,
there is an admission that
the system needs reform-
ing. But, they argue, Sen.
Patrick Leahy, D-Vt., and
Rep. Howard Berman, D-
Calif., the shepherds of the
Democrats patent reform
push, are going too far.
We are very concerned
that the bill in its present
form picks winners and los-
ers among industries with
different business models
in a way that has never
before been attempted in
patent law or practice,
House Republican Leader
John Boehner and his whip,
Rep. Roy Blunt, wrote in
a letter to House Speaker
Nancy Pelosi Aug. 30.
The Patent Reform Act of
2007 seeks the first signifi-
cant changes in U.S. patent
law in several decades. The
bills provisions include
narrowing the definition
of willful infringement,
which brings treble dam-
ages, and limiting infringe-
ment damages to the actual
value of the technology
involved. Currently, juries
calculate damages based on
the overall value of the fin-
ANALYSIS
We are ... concerned
that the bill in its
present form picks
winners and losers
among industries.
U.S. REP. ROY BLUNT
[CONTINUED ON PAGE 14]
House Speaker Pelosi scheduled a hearing on patent reform.
12 eWEEK n SEPTEMBER 10, 2007
www. eweek. com
28p12.indd 12 9/7/07 3:39:39 PM
Offer subject to CDW's standard terms and conditions of sale, available at CDW.com. 2007 CDW Corporation
We're there with the storage solutions you need.
Today, with more data being stored, more assets are at stake. And there is a big difference between storage
and secure storage. At CDW, were there with storage and backup specialists that will work with you to find
the right solution for your setup. Then, well draw from a full line of top-name storage technology so you can
increase capacity and reduce risk. So call today and make sure your data and your company are secure.
CDW.com 800.399.4CDW
Having data storage problems?
Let CDW turn them into data storage solutions.
Call your CDW account manager for pricing.
Supports NAS, iSCSI and Fibre Channel
SAN connectivity
Simultaneously connects to multiple types
of storage networks
Delivers scalable performance and a high
level of reliability
Celerra Startup Assistant software allows
system to go from power up to production
in as little as 15 minutes
Allocates storage capacity quickly via
automated volume management with thin
provisioning capabilities
EMC

Celerra

NS20
Automatically migrates infrequently accessed
data to more cost-effective storage
disk, tape or optical
Significantly shortens backup and
recovery windows
Recognizes data value, retention and
compliance requirements
Reduces storage costs while optimizing IT
resources
Provides seamless data access regardless
of file location
EMC

DiskXtender

for Windows

Archiving solution that helps retain and


manage e-mail as a record in order to
achieve regulatory compliance, adhere to
organization retention policies and support
legal discovery activities
Supports Microsoft

Exchange, Lotus
Notes

/Domino

, Bloomberg Mail and


SMTP-based e-mail
Also supports environments with mixed e-mail
applications and all EMC

storage platforms
EMC

EmailXtender

CDW 1276366 CDW 1053039 CDW 987362


ished product.
The bill also seeks to
limit bad and questionable
patents at the source, creat-
ing a second window to
challenge or squash patents
newly issued by the U.S. Pat-
ent and Trademark Office.
Further, the legislation
would create a first-inventor-
to-file system to replace the
current first-to-invent stan-
dard, moving the United
States closer to international
patent standards.
Rather than scheduling
this bill for quick consider-
ation by the House, we are
asking you to work with the
sponsors in urging them to
continue to find consensus
so that all U.S. companies
benefit from reforming
the patent system rather
than advancing one busi-
ness model over another,
Boehner and Blunt wrote in
their letter to Pelosi. If that
course is pursued, we stand
ready to work with you in a
bipartisan manner.
Pelosi promptly sched-
uled a floor vote on the bill
for Sept. 7. Results of the
vote were unavailable at
press time.
The common view is
not what will happen in the
House, but what will happen
in the Senate, said Roger
Cochetti, group director of
U.S. public policy at the
Computing Technology
Industry Association, one of
the numerous Washington-
based trade groups repre-
senting IT interests. The
showdown will be in the
Senate.
Cochetti said there is a
lot of momentum for pat-
ent reform in Congress,
though 463s Galvin was
more circumspect. There
are still a lot of divisions
within various industries,
Galvin said. I dont see it
happening without a major
breakthrough compromise.
Otherwise, theyre just play-
ing kick the can.
If the House approves a
tech-driven patent reform
bill and the Senate takes a
pass, it wouldnt be the first
time the upper chamber
ignored the Houses tech
policy ideas. Four years ago,
the House voted to make a
temporary ban on Internet
connection taxes permanent
and to strip away a grand-
father clause that exempted
nine states from the ban.
The Senate dismissed the
notion, agreeing only to
extend the bangrand-
father clause intactfor
another three years.
14 eWEEK n SEPTEMBER 10, 2007
www. eweek. com
ANALYSIS
Whither net neutrality?
A
YEAR AGO, NETWORK NEUTRALITY
was roiling Capitol
Hill. From Congress to
the Federal Communications
Commission to the Federal
Trade Commission, there
wasnt a hotteror more con-
troversialtech issue. Today,
net neutrality barely raises a
yawn among lawmakers.
Then, as now, the issue cen-
ters on the potential ability of
traditional telecommunications
carriers to charge content, ser-
vice and application providers
based on bandwidth consump-
tion, a practice Yahoo, Google
and others claim amounts to
price discrimination.
Proponents of net neutral-
itymostly Democrats backed
by a massive Web-based
grass-roots campaignwanted
legislation prohibiting broadband
carriers such as AT&T and
Comcast from discriminatory
practices in handling commer-
cial Internet traffic. The then-
Republican majorities in the
U.S. House and Senate in 2006
envisioned approving a massive
telecom reform bill featuring a
national video franchising provi-
sion for telecom providers. The
idea was to fire up competition
for cable television rates by pro-
viding a single, national license
for telecom carriers rolling out
video offerings.
Neither the Republicans nor
the Democrats got what they
wanted. While the telecom
reform billsans net neutrality
provisionspassed the House,
the legislative package unrav-
eled in the Senate, sunk by the
controversy over net neutrality.
When Democrats took over
Congress this year, Sens.
Byron Dorgan, D-N.D., and
Olympia Snowe, R-Maine,
promptly reintroduced net
neutrality legislation, and
Rep. Ed Markey, D-Mass.,
the new chairman of the
House Subcommittee on
Telecommunications and
the Internet, began hold-
ing hearings. Since then,
though, there has been little
momentum for net neutrality.
I dont see signs of it com-
ing back. Theres no political
will, said Tom Galvin, a
partner at Washingtons 463
Communications.
Still, there are rumblings
about it in Washington. In
response to an FCC request
for responses to the issue, the
Department of Justice Sept. 6
cautioned against regulations
in the name of net neutrality
that would end up hobbling
development of the Internet
and limit customer choice.
For lawmakers, net neu-
trality has been a confusing
issue, a solution in search of a
problem, critics contend. After
all, the FCC in 2005 approved
a set of net neutrality prin-
ciples for consumers. Further
dampening congressional
enthusiasm is a June report
by the FTC urging lawmakers
to proceed cautiously, if at all,
on the issue.
As a discrete issue, it
has seen its day, said Art
Brodsky, communications
director of Washingtons
Public Knowledge, the Internet
advocacy group that has long
championed net neutrality.
Roy Mark
CONGRESS FROM PAGE 12
We are asking you
to work with the
sponsors in urging
them to continue to
find consensus.
U.S. REP. JOHN
BOEHNER
28p12.indd Sec1:14 9/7/07 3:39:56 PM
By Peter Galli
M
icrosoft may
have lost the
battle to have
its Office Open XML file
formats approved as an
ISO standard, but the war
is far from over.
The Redmond, Wash.,
Office Open
XML is down
but not out
Format fails ISO approval, but Microsoft
could still revive its standards push
companys OOXML (Office
Open XML) file formats
failed to achieve the two-
thirds vote needed for
approval as an international
standard by the Interna-
tional Organization for
Standardization, the stan-
dards body said Sept. 4.
The vote was also not
as close as some had pre-
dicted, with 53 percent of
the national bodies par-
ticipating in the process
voti ng to approve the
move and 26 percent vot-
ing against it, with the rest
abstaining. But, because
t he vot es t o appr ove
were 13.6 percent below
t he t wo- t hi rds maj or-
ity required, the draft
OOXML file format stan-
dard was not approved as
an ISO standard.
That brings to an end
a five-month ballot proc-
ess, which closed Sept. 2
and which was open to
the International Electro-
technical Commission
and ISO national mem-
ber bodies from 104 coun-
tries, including 41 that are
participating members of
a joint ISO-IEC techni-
cal committee, the JTC 1,
Information Technology.
But all is not lost for
Microsoft, since the com-
ments that were made with
the votes will be discussed
at a ballot resolution meet-
ing in Geneva in February.
The goal of those at the
meeting will be to try to
find consensus on modifi-
cations to the document in
light of those comments.
If the proposed modifi-
cations persuade enough
of the national bodies to
withdraw their negative
votesand at least two-
thirds of the votes cast
are then positive, with
no more than 25 percent
of the total number of
the national body voting
against the movethe
draft OOXML file format
standard can still be pub-
lished. Otherwise, the
proposal will have failed
and this fast-track proce-
dure will be terminated,
the ISO said, noting that
this would not preclude the
draft standard from being
submitted again under the
normal ISO-IEC standards
development rules.
Microsoft officials are
upbeat about their pros-
pects. This preliminary
vote is a milestone for the
widespread adoption of
the Open XML formats
around the world for the
benefit of millions of cus-
ANALYSIS
www. eweek. com
SEPTEMBER 10, 2007 n eWEEK 15
The file on file formats
Source: eWEEK reporting
The Open Document Format is the key alternative to
Microsofts OOXML format, which is still seeking
ISO standard approval:
Developed by Microsoft
Based on XML
Approved as a standard by Ecma International in December
Turned down as an ISO standard in September
Format spec is available for free from Ecma
OOXML
Developed by a technical committee of OASIS
Based on XML
Approved in 2006 as a standard by the ISO and IEC
Is freely available as an open standard
Members of the ODF Alliance include Google, IBM, Novell,
Oracle, Red Hat, Sun Microsystems and Unisys
ODF
Linux Foundations
Zemlin: OOXMLs
plight is a boost to ODF.
[CONTINUED ON PAGE 16]
28p15.indd 15 9/7/07 4:15:38 PM
tomers, Tom Robertson,
Microsofts general man-
ager of interoperability and
standards, told eWeek.
Given how encouraging
the results were, we believe
that the final tally in early
2008 will result in the rati-
fication of Open XML as an
ISO standard.
But Marino Marcich,
executive director of the
ODF Alliance, which is
pushing the Open Docu-
ment Format alternative,
disagreed, saying that no
matter what the final out-
come, the comments sub-
mitted from countries that
voted indicate misgivings
about OOXMLs interoper-
ability and openness.
These concerns included
the insufficiency of Micro-
softs patent pledge, the
undocumented features of
OOXML preventing its use
by other vendors, depen-
dencies on other Microsoft
proprietary products and
technical defects which will
have to be resolved at the
ballot resolution meeting
in February 2008 if OOXML
is to ultimately achieve ISO
approval, Marcich said.
Long term, governments
would think twice before
using a format so closely
linked to a single vendors
products, he said.
Part of the reason for the
negative vote was Micro-
softs hardball lobbying
tactics, which included
c ommi t t ee- s t uf f i ng
activity and attempts to
upgrade more countries
to voting membership,
Marcich said. This would
only serve to delegitimize
the process. Eleven coun-
tries were upgraded to
voting status during the
five-month ballot period,
and nine of them voted for
approval despite having no
history of involvement in
fast-track IT standards.
Jason Matusow, Micro-
softs director of corporate
standards, said he wants to
see matters move toward
a more constructive dia-
logue. I think we could all
wish for this entire process
to have been less messy,
Matusow said. OOXML
was being widely adopted,
had significant indepen-
dent implementations and
now stood to benefit from
the hard work put into
the comments submitted
through the JTC 1 process,
he said.
So why i s ha v i ng
OOXML approved as an
ISO standard so important
to Microsoft? Revenue,
said Jim Zemlin, execu-
tive director of The Linux
Foundation, in San Fran-
cisco. The Office division
[at Microsoft] racked up
some $15 billion in reve-
nues last year, and anyone
would want to hang on to a
franchise like that as hard
as they could, Zemlin
said. ODF represents the
first credible threat to that
franchise since it coalesced
more than 15 years ago.
Microsoft also clearly sees
Linux on the desktop as its
next big challenge. Desk-
top users will need com-
patible applications to run
on those desktops, and the
more successful ODF is,
the more credible those
Linux desktops will be.
Microsoft also seems to
have misjudged the impact
of the fallout from the rejec-
tion of the vote to make
OOXML an ISO standard,
the most significant of
which is the credibility boost
the vote gave ODF, which is
already an ISO standard.
That has ripple effects,
such as providing greater
incentives for other devel-
opers to implement it,
and for customers to take
ODF-compliant products
more seriously, Zemlin
said. It will also have the
reverse impact on Micro-
softs partners: How much
work would you want to
put into complying with
OOXML right now if it
might change radically
tomorrow?
Even more si gni f i -
cant is the fact that, for
customers, as ODF gets
some meaningful wins,
the momentum behind
the perception that there
really is a viable alterna-
tive to Office will buildas
will the realization that this
alternative is cheaper, has
more options and is more
open, Zemlin said.
The ODF Alliances Mar-
cich agreed, saying that
governments worldwide
are demanding products
based on open standards
in their procurement,
with nine national gov-
ernments, four regional
or state governments, and
more than 50 government
agencies having already
adopted policies calling for
the use of ODF for docu-
ment exchange.
What will happen dur-
ing the next six months
is open to debate, but to
Zemlin, Microsoft offi-
cials face two choices: to
make a good-faith effort to
meet the objections in the
middle and truly satisfy
those who voted no, or see
if they can bulldoze the
industry a second time.
They need to decide
whether they can meet in
the middle, as well as how
much proprietary advantage
theyre willing to give up,
Zemlin said. If they take
this alternative seriously,
I expect that they will turn
enough votes to eventually
achieve approval. If they
take the second, bulldozer
approach, I expect that
there will be an even big-
ger backlash, as there are
many eyes watching.
Marcich does not have
high expectations and
thinks that Microsoft will
keep moving the goalposts
to find the configuration of
voting countries necessary
to satisfy the two-thirds
requirement.
16 eWEEK n SEPTEMBER 10, 2007
www. eweek. com
ANALYSIS
I think we could
all wish for this
entire process to
have been less
messy.
JASON MATUSOW
OFFICE OPEN FROM PAGE 15
28p15.indd 16 9/7/07 4:16:37 PM
By Paula Musich
T
he attention in
t he hi gh- profi l e
worl d of system
virtualization during the
past month has been on
the big-name players, in
particular VMware, Micro-
soft and XenSource.
However, while indus-
try observers are seeing
a steady increase in the
use of the technology in
the enterprisethanks
to such benefits as cost
savings through server
consol i dat i on and an
alternative to physical
systems for backup and
disaster recoverythe
relative ease of creating
virtual machines is cre-
ating demand for better
management tools.
At VMWorld, VMwares
user conference Sept.
11-13 in San Francisco,
a host of smaller com-
panies will be looking
to address that demand
by rolling out products
designed to help IT users
get a handle on manag-
ing the complexity of the
virtual world.
To analysts, it makes
sense for smaller compa-
nies that want to muscle
into the highly competi-
tive virtualization space
to use management tools
as their way in. While a
Smaller companies eye slice of
data center virtualization space
Lesser-known vendors look to offer tools that reduce complexity of virtualization
number of small compa-
nies are addressing the
differing needs of manag-
ing virtual environments,
little money is being spent
today on those manage-
ment tools, according to
Gartner analyst Cameron
Haight.
There are over 70 com-
panies offering over 100
different products across
things like performance
management, configura-
tion management, data
protection [and so on],
Hai ght sai d. Toss i n
another 10 to 12 on the
se curity side and there
is a great deal of activ-
ity, although there isnt a
huge amount of money
bei ng spent on t hese
tools. They address the
needs to come as virtual-
ization moves from niche
to [mainstream].
And although many
point tools companies are
addressing the manage-
ment challenges posed
by virtualization, none
of the large enterprise
management companies
have stepped in with a
comprehensive approach
to managing virtual envi-
ronments, according to
another Gartner analyst,
David Williams.
Everybodys jumping
on that bandwagon, and
most of the companies in
it are very small, Williams
said. From a manage-
ment perspective, this is
highly, highly fragmented.
There are lots of small
guys doing very specific
niche things. There isnt a
big vendor thats stepped
up with a comprehensive
approach.
Independent run book
automation vendor Opa-
lis on Sept. 4 announced
its new Opalis Process
Catalog for Virtualization,
aimed in part at helping IT
rein in VM sprawl.
Its so easy to provision
a new virtual machine,
they tend to mul ti pl y
like bunny rabbits, said
Charles Crouchman, chief
technology officer of the
Toronto-based company.
As a result, storage uti-
lization goes through the
roof.
The Opal i s Process
Catalog for Virtualiza-
tion represents a chapter
in the companys overall
ANALYSIS
www. eweek. com
SEPTEMBER 10, 2007 n eWEEK 17
Tools of the trade
Process Catalog for Virtualization
Company Product
Source: eWEEK reporting
Opalis Software
eG Monitor for VMware Infrastructures
virtualSuite r6
VM Insight 1.0
IT management vendors are turning their attention to virtualized environments, with new products
that include:
eG Innovations
Virtugo Software
Onaro
Features
Offers automation capabilities based
on ITIL best practices
Tracks app performance within VMs
Manages virtualization in both
servers and desktops
Provides real-time information in
virtualized environments
[CONTINUED ON PAGE 18]
28p17.indd 17 9/6/07 4:10:28 PM
electronic IT process cata-
log book for solving spe-
cific problems. It includes
automation policies based
on ITIL (Informat i on
Technology Infrastructure
Library) best practices for
managing virtual environ-
ments. Functions range
f rom st rai ght f orward
automation of mainte-
nance tasks such as patch
management to high-
value processes such as
virtual machine life-cycle
management, Crouch-
man said.
The virtual ization
proc ess catalog includes
proc ess flows for both
provisioning a new VM
and deprovisioning it.
We can watch the
help desk system for a
ticket requesting a new
VM, sense the ticket
has been opened, and
we can check that it
is in compliance with
[ rul es such as] who
can ask for a VM, what
kind of VM [is accept-
able] and which software
you can run on a VM,
Crouchman said. If it
passes compliance, we
can immediately provi-
sion that VM.
The catalog also allows
IT operators to automate
the enforcement of poli-
cies on deprovisioning
VMs to help address vir-
tual machine sprawl.
Ot her IT f unct i ons
i t can hel p aut omat e
include diagnostic pro-
cedures and corrective
actions in incident man-
agement, patching and
server audit remediation
of virtual servers as a part
of configuration manage-
ment, virtual server and
file cleanup for expired
virtual server images as
part of maintenance, and
backup and recovery pro-
cedures.
Opalis is addressing
a real need among early
adopters of virtualiza-
tion technology, Gartners
Haight said.
People want tools to
address virtual ization
sprawl, which leads to inef-
ficient use of resources,
he said. Because its so
darn easy to create a vir-
tual machine, you can
have those that people are
no longer using. You have
no mechanism to reclaim
those virtual machines no
longer being used.
Opalis product is due
in the fourth quarter,
although officials will dem-
onstrate it at the VMWorld
show.
Meanwhile, eG Inno-
vations Sept. 10 will take
the wraps off new perfor-
mance monitoring soft-
ware that can provide the
inside view of how appli-
cations are performing
within a VM guest.
As the conference gets
under way, the Iselin, N.J.,
company will introduce
its new eG Monitor for
VMware Infrastructures,
which shows in real time
the internal and external
performance vi ews of
what the VMware host
sees about guests and
what the guests them-
selves see.
VMwares ESX Server
knows how many virtual
machines there are and
how much resources they
are using, but it doesnt
know what s going on
inside those guests, said
eG Monitor CEO Srini-
vas Ramanathan. [The
eG VM Monitor] does
the outside view from
the ESX kernel and col-
lects information about
how applications inside
the guest are doingthe
inside view.
That patent-pending
technology, dubbed In-N-
Out Monitoring, gives IT
operators visibility into the
performance of the VM
kernel, the console operat-
ing system and each guest
inside a VM.
It addresses the chal-
lenges of pinpointing the
source of performance
problems caused by indi-
vidual applications within
one VM that affect the per-
formance of other VMs on
the same physical server.
It also helps to track the
migration of VMs as they
move from one physi-
cal server t o anot her,
Ramanathan said.
Although other perfor-
mance monitoring tools
are available for VMwares
ESX Servers, the eG VM
Monitor is unique in its
ability to provide business
service views that reveal
the applications and net-
work devices that support
each business service and
their interdependencies.
At the same time, it maps
applications to the VMs
they run on.
The bigger problem
is how to tie this in to
an end-to-end business
service management
framework, Ramana-
than said. Other tools
dont tie in to what the
impact [of performance
probl ems i s] on the
business service.
The eG VM Moni-
tor is available now and
is priced per ESX Server
monitored. A 25-node
VMware environment is
about $50,000.
In other VM manage-
ment news, Virtugo Soft-
ware Sept. 4 released its
virtualSuite r6 software
f or managi ng vi rt ual
servers and desktops,
which is also designed
to address virtual server
sprawl.
In addition, Onaro the
same day introduced its
VM Insight 1.0 tool for
managing VM infrastruc-
tures. The company will
demonstrate its product at
VMWorld. VM Insight 1.0
is due in December.
18 eWEEK n SEPTEMBER 10, 2007
www. eweek. com
ANALYSIS
Its so easy to
provision a new
[VM], they tend
to multiply like
bunny rabbits.
CHARLES CROUCHMAN
VIRTUAL FROM PAGE 17
28p17.indd 18 9/6/07 4:10:35 PM
Jef f r ey Hammond,
an analyst at Forrester
Research, said that ex plicit
support for Moonlight
shows that Microsoft is seri-
ous about challenging the
conventional perceptions
about how it competes in
the market and that they
are willing to do whatever
it takes to establish an RIA
[rich Internet application]
platform with the broadest
reach possible.
Microsofts competi-
tors just cant credibly
say, Silverlights a great
piece of technology, but
only works on Windows
and IE [Internet Explorer].
It puts pressure on other
Silverlight in the Moonlight
As Microsoft rolls out Version 1.0, it also sanctions Linux support for the technology
RIA platform providers
to deliver a platform with
equally broad reach to
developersand to do so
quickly, Hammond said.
Chris Swenson, an ana-
lyst with The NPD Group,
said the plug-ins being
developed in the Mono
project will give develop-
ers greater flexibility.
With the Linux ver-
sion, developers will be
able to target the .Net
run-time on Windows,
Mac and Linux platforms,
something that gets a lot
of .Net developers very
excited, Swenson said.
Officials with Microsoft
and Novell said extending
the reach of Silverlight
via Linux makes sense for
both the companies and
their customers. The two
vendors caused an uproar
within the open-source
community last year when
they announced a wide-
reaching partnership.
This is a big day from
where Im sitting, said
Miguel de Icaza, vice presi-
dent of developer plat-
forms and leader of the
Mono project at Novell,
in Waltham, Mass. This
is a big effort on the part
of Microsoft to work with
Linux.
Brian Goldfarb, group
product manager of Micro-
softs Developer Division
Platform & Tools Strategy,
said key takeaway mes-
sages of the companys
announcements include
Microsoft s continued
focus on its customers and
the companys partnering
with Novell as a great
extension to what weve
been doing.
Goldfarb said that when
Microsoft announced Sil-
verlight, a critical piece
of feedback the company
heard was about t he
reach of the technology.
So we decided to do a
partnership with Novell
to deliver an implemen-
ANALYSIS
A shining Silverlight
Source: eWEEK reporting
JavaFX A scripting language from
Sun Microsystems that was introduced
days after Microsoft rolled out Silverlight
MFlash Adobes well-established content creation technology,
which includes the Adobe Flash Professional integrated develop-
ment environment
Microsofts run-time for browser-
based RIAs will compete with a num-
ber of other products on the market,
including:
AJAX Or Asynchronous JavaScript and XML, which includes
presentation components
By Darryl K. Taft
M
i cros oft s s i lverli ght proj ect,
which represents the software makers push
into the design and creative professionals
market, is getting a Linux glow.
The Redmond, Wash., company on Sept. 5 released
Web Silverlight 1.0, a cross-browser, cross-platform
plug-in for delivering richer user experiences on
the Internet. At the same time, Microsoft officials
announced they are working with Linux distributor
Novell to deliver Silverlight support for Linux, an
effort called Moonlight that is based on the project
started on mono-project.com.
The results will provide a greater number of options
for developers and an enhanced reach for Microsofts
technology, according to industry observers.
20 eWEEK n SEPTEMBER 10, 2007
www. eweek. com
[CONTINUED ON PAGE 22]
28p20.indd 20 9/6/07 3:54:09 PM
tation of Silverlight on
Linux, he said.
Knowing that Silver-
l i ght woul d see wi de-
spread adoption, Novell
engineers built a proto-
type of Moonlight with
the help of Microsoft offi-
cials, and later showed
a demo of the technol-
ogy, de Icaza said. Moon-
light will support all the
maj or Li nux di stri bu-
tions, including Ubuntu
from Canonical, Red Hat
and Novells own SUSE
Linux, he said.
We expect to have
Moonl i ght avai l abl e
within six months, de
Icaza said, noting that
Novell is waiting for a
test suite to help with
the creation of the tech-
nology. He also said
Novell is working on
a version of Moonlight
to support Silverlight
1.1, which itself is still
under devel opment.
Were aiming to be as
close as possible to the
release of Silverlight 1.1
with a supporting Linux
version, he said.
Novell is running the
Moonlight project as an
open-source effort, and it
is open to outside develop-
ers who wish to contribute.
The effort is open source,
and all of our code is avail-
able in our repository, de
Icaza said.
Microsoft officials said
Silverlight significantly
reduces development and
depl oyment costs and
provides enhanced Web
audio and video stream-
ing and playback using
Windows Media Tech-
nologies. The company
also launched the Silver-
light Partner Initiative, a
program designed to fos-
ter collaboration among
solution providers, con-
tent delivery networks,
tools vendors and design
agencies.
Users applauded the
combination of Silverlight
and Linux. Tom Spengler,
CEO of Granicus, a San
Francisco company that
specializes in providing
streaming media solu-
tions for government with
a strong emphasis on
broadcasting public meet-
ings live and on-demand,
said he welcomes Silver-
light 1.0.
With Silverlight, Grani-
cus is taking down the
barriers in technology
between Macs and PCs
enabling our customers to
more efficiently and effec-
tively reach their constitu-
ents 24/7, Spengler said.
Granicus will make Sil-
verlight available to its cli-
ent base of more than 300
governments, spanning 30
states. If a Linux-based
Silverlight browser plug-
in would enable our cli-
ents to reach their citizens
more efficiently and cost-
effectively, we support it,
Spengler said.
Addi ng i nt eract i ve
functionality to the video
player and support for
cross-platform develop-
ment with the .Net Frame-
work will also be major
innovation drivers among
our client base, said Javier
Muniz, chief technol ogy
officer for Granicus.
We are always look-
ing for ways to increase
our potential audience by
targeting additional plat-
forms, so a Linux ver-
sion of Silverlight would
be very positive for us,
Muniz said.
Trish Connolly, presi-
dent and CEO of Advanced
Publishing, in St. John,
New Brunswick, said her
organization is definitely
using Silverlight for our
new digital edition solu-
tion. We are planning to
launch our new product
based on this format this
week.
We spent a number of
months reviewing differ-
ent technologies before
selecting Silverlight as our
chosen viewer format,
Connolly said. We wanted
to ensure that we would
be able to provide the best
viewing experience pos-
sible with strong security
and data capabilities that
would appeal to our pub-
lishing customers.
Connolly said Silverlight
has significant benefits
over other cross-browser
formatsnamely Flash
and JPEG/HTML solu-
tionsincluding data-
driven capabilities, which
enable better reader inter-
action with live data to
cust omi ze t he reader
experience and provide
user-generated content
features.
Having Silverlight avail-
able on Linux would cer-
tainly be a positive for us
as we want to have our
publications viewable
by the largest popula-
tion possible, Connolly
said. We do understand
that Moonlight is in
development and looks
promising already.
Major League Base-
ball Advanced Media,
a subsidiary of Major
League Basebal l , i n
New York, has been using
Silverlight on its portal for
about a month for high-
lights and other video pro-
gramming, said Matthew
Gould, vice president of
corporate communica-
tions.
In addi t i on, we ve
also begun to integrate it
into our news content,
Gould said. We are cur-
rently working to make
Silverlight available for
live baseball games on
MLB.TV. We believe all of
these efforts, along with
the Silverlight applica-
tion, will bring our fans
a more interactive and
enticing media experi-
ence on MLB.com.
22 eWEEK n SEPTEMBER 10, 2007
www. eweek. com
ANALYSIS
SILVERLIGHT FROM PAGE 20
With Silverlight,
Granicus is taking
down the barriers
... between Macs
and PCs.
TOM SPENGLER
28p20.indd Sec1:22 9/6/07 3:54:23 PM
2007 Fujitsu Computer Systems Corporation. All rights reserved. Fujitsu, the Fujitsu logo and ETERNUS are registered trademarks of Fujitsu Limited. All other trademarks mentioned herein are the property of their respective owners.
To help enterprises manage the flood of mission-critical data, Fujitsu ETERNUS Storage Systems deliver the
reliability and availability data centers require. For continuous data access and easier maintenance, major
components are highly redundant and hot-swappable. The controller modules software can also be upgraded
without shutting down or rebooting. A built-in statistical failover mechanism ensures stable operation by disabling
components exhibiting intermittent failures. Furthermore, disk data encryption using 128-bit AES provides security
against data theft. Go to us.fujitsu.com/computers/reliability3 for more information.
The more you have to store,
the more reliability matters.
Fujitsu ETERNUS

Storage Systems: Uncompromising


reliability for your most demanding applications.
DISASTER RECOVERYCost-effective, secure
remote data replication over iSCSI
with IPsec data encryption
DATA PROTECTIONOnline, efficient disk-to-disk
backup using tiered storage
CYAN MAG YEL BLK
9
8
M
Y
C
Y
C
M
7
5
5
0
2
5
2
C
9
8
7
5
5
0
2
5
2
M
9
8
7
5
5
0
2
5
2
Y
9
8
7
5
5
0
2
5
2
K
T
C0 Job#: 0113
rim = 7.875 x 10.5
Bleed
Date: 01/05/07
Customer: Catapult
Job Name: Eternis Dam Ad
Pub: eWeek
CO File Name: P0113_eWeek
Live = 7.0 x 10.0
= 8.125 x 10.75
ColorOne
By Chris Preimesberger
S
un microsystems
resurgence during
the past few years
was fueled by a change in
strategy that saw execu-
tives breaking away from
the companys traditional
offerings and pushing into
new markets, from embrac-
ing x86 technology and
open-sourcing much of its
software to rethinking its
processor development.
Tho ug h no t c o m-
pletely out of the financial
woodsthe Santa Clara,
Calif., company announced
in August that it will spend
$150 million in severance
pay in another round of job
cutsSun did report profit-
able second and third fiscal
quarters, the first profitable
quarters after five consecu-
tive losing ones.
During a 45-minute talk
to industry and financial
analysts in New York Sept.
5, President and CEO Jon-
athan Schwartz said the
company is continuing to
reinvent itself, improving
its software and services.
A key part of Suns growth
will be storage, Schwartz
said. The rapidly growing
data loads being generated
within enterprises mean
that high- performance
computing will be com-
ing to every industry sec-
tor sooner or later. That,
in turn, means that many
of the businesses in these
Sun looks to grow storage
Such products may be key to companys growth, but a lawsuit may slow its plans
industries will be turning to
Sun for help with their IT
infrastructures, he said.
With that in mind, the
company is going to focus
more of its R&D efforts on
storagemostly for the
small and midsize busi-
ness marketbecause
thats what our customers
are telling us they want,
Schwartz said.
Much of Suns efforts
will focus on its Sun Fire
X4500 Thumper Server
a 48-drive unit with a
capacity of 24TB per box.
Another key element will
be its ZFS (Zetabyte File
System) storage software,
an open-source offering
in Suns Solaris operating
system.
However, Suns push
into the competitive stor-
age space wont be an easy
one. The same day that
Schwartz was touting his
companys storage plans,
industry stalwart Network
Appliance filed a lawsuit
in U.S. District Court in
Texas, in part to thwart
Sun cl ai ms of pat ent
infringement and also to
make similar accusations
of its larger rival.
NetApp, of Sunnyvale,
Calif., claims that Suns ZFS
is patterned directly after its
own WAFL (Write Anywhere
File Layout) file system.
NetApp officials charac-
terized the suit as a defen-
sive step after Sun sought
to charge NetApp to license
its technology. StorageTek
initially made that charge
against NetApp, and Sun
continued the drum beat
after buying StorageTek. In
response, NetApp officials
reviewed its own list of pat-
ents and identified seven
that they say Sun infringes.
This is not a case of sto-
len or copied code from
either inside or outside
sources, NetApp CEO Dan
Warmenhoven said during
a call with journalists and
analysts Sept. 5.
Were not saying they
stole code from us, War-
menhoven said. Were
saying that there are clear
patterns of techniques that
we use in our file system
that are in ZFS, and that
we want Sun to stop using
it commercially.
NetApps suit, filed in U.S.
District Court in Marshall,
Texas, seeks a declaration
that it is not infringing three
of Suns U.S. patents and that
those patents are invalid. In
addition, the suit also seeks
a ruling that Sun infringed
seven NetApp U.S. patents
pertaining to data process-
ing systems and related soft-
ware within ZFS.
WAFL was developed in
the early 1990s at NetApp.
Both WAFL and the 128-bit
Solaris ZFS are based on a
transactional object model
that removes most of the
traditional constraints asso-
ciated with I/O operations,
resulting in substantial per-
formance gains.
Sun officials said the
lawsuit was NetApps reac-
tion to a new competitor in
the storage space and an
attack on the open-source
community.
ZFS is the fastest-
growing storage virtual-
ization technology in the
marketplace, and NetApps
attempt to use patent litiga-
tion to inhibit the meteoric
rise of open-source technolo-
gies like ZFS is tantamount
to being unhappy with
gravity, said a statement
released by Sun spokesper-
ANALYSIS
24 eWEEK n SEPTEMBER 10, 2007
www. eweek. com
[CONTINUED ON PAGE 26]
In fact, weve seen
the open-source
community grow and
accelerate its
activity.
JONATHAN SCHWARTZ
CEO, SUN
28p24.indd 24 9/7/07 1:47:21 PM
GOVE R N MANAGE S E C UR E
M2724 Adcode: 227US1 Ver: S_D_US
THIS ADVERTISEMENT PREPARED BY DRAFTFCB APPROVAL STAMP
AD: D. Girardi x3011
AE: A Hwang x3093, E Roberts 3721
Trafc: T Nallen x3687
VQC: MP x3531, HG x3318, LP
x2851
Studio PM: P. Chong x3496
Artist(s): PC
Job#:CASO_PROD_M2724S_D_US
ClientFldr: ComputerAssociates
Product: PROD
File name: M2724S_D_US.indd
Headline: Were secure
Campaign: IE Secure/US
Proof #: 10 9 8 7 6 5 4 3 2 1
Date: 6/22/07
Prod: C. Weber x3916
Colors: 4C
Size: Bleed:NA
Trim:7.75w x 10.5h
Live: 7w x 9.75h
Fonts: Whitney Bold/Med.,
Helvetica Neu Roman
Pubs.:
Signature / Initials Date
Trafc _______________________
Proofreader _______________________
Art Director _______________________
Copywriter _______________________
Creative Dir. _______________________
Acct. Exec. _______________________
Acct. Dir. _______________________
Mgt. Dir. _______________________
Production _______________________
Studio _______________________
Studio QC _______________________
C
o
p
y
r
i
g
h
t

2
0
0
7

C
A
.

A
l
l

r
i
g
h
t
s

r
e
s
e
r
v
e
d
.

(Security Helps Us Rake In More Dollars, Yen And Euros)
SHURIMDYAE
Were secure. Were compliant.
Now were busting out the
Congratulations. Your IT security is working hard. But theres something more it should do (besides the protection, compliance,
access, etc.). IT security should actually make your business more efcient. More exible. More competitive. CA can help. Our
Security Management centralizes your identity and access management to turn IT security into a proactive, business-building
tool. So your security strengthens customer relationships, grows partnerships and helps your enterprise address changing
markets with ninja-like agility. All with CAs best-in-class modularity, scalability and integration. But dont just take our acronym
for it. Download the white paper, Security Management: Aligning Security with Business Opportunities, at ca.com/secure.
M2724S_D_US.indd 1 6/22/07 1:00:54 PM
son Kristi Rawlinson.
Sun also rejected some
points, including NetApps
claims that Sun made the
first move in the dispute.
[I]t was NetApp who
first approached Sun seek-
ing to acquire the Sun
patents NetApp is now
attempting to invalidate,
the statement said. It is
unfortunate that NetApp
has now resorted to resolv-
ing its business issues in
a legal jurisdiction [East
Texas] long favored by pat-
ent trolls.
Despi te the vari ous
accusations in the case,
some analysts say that the
two companies will settle
this quickly since neither
side will want to engage in
a lengthy and costly legal
battle.
Any resolution depends
upon a number of fac-
tors including how each
side really feels about the
strength of its case as well
as its judgment as to how
that case might actually
fare in front of a judge
and a jury, David Hill, an
analyst with the Mesabi
Group, said in a written
report. Winning is not
certain even if you think
that you have a strong
case.
NetApp, for all its blus-
ter, appears to want only
for Sun to give up its pat-
ent infringement claims
and to not have to pay any
licensing fees, Hill said.
Sun likely wants what
is has from the beginning:
the money to which it feels
that it is entitled via its
acquisition of StorageT ek,
Hi l l sai d. However,
NetApps lawsuit places
an additional strain on
Suns position, meaning
that getting that money
could well be in jeopardy.
Even if Sun feels internally
that it has a strong case it
will likely have to fight very
hard to get it. The question
for Sun, then, is whether
the hoped-for outcome is
worth pursuing when it
demands greater effort and
generates higher risk.
The best outcome for
both sides is a settlement
that avoids the expense
and publicity that can sur-
round a high-profile legal
battle, Hill said.
Sun also needs to focus
on how to push its storage
business forward, rather
than having it get bogged
down in litigation.
James Staten, an analyst
with Forrester Research,
said the company has good
products among its stor-
age offerings, and that
more than anything else,
what Sun needs is to find
a way to get that message
out.
Sun needs to put out
a consistent marketing
message, like IBM and
[Hewlett-Packard] do, by
beating their drums all
the time, if it expects to
catch up to them in the
server and storage sec-
tors, Staten said following
Schwartzs remarks. Sun
certainly has the products.
They need to demonstrate
that better in the market-
place. IBMs servers and
storage arent that much
better in quality, but the
difference is that they say
theyre better. Sun needs to
fight back on that level.
Schwartz said that Sun
will continue to tout its
storage offerings.
Thumper utilizes the
ZFS, he said, and well
be taking the message out
to the open-source com-
munity more and more as
time goes on. In fact, weve
seen the open-source com-
munity grow and acceler-
ate its activity. Thats where
the future of development
lies.
In an announcement
separate from Schwartzs
talk, enterprise dedupli-
cation software provider
Diligent Technologies, of
Framingham, Mass., said
it has entered into a global
reseller agreement with
Sun to resell the ProcTIER
software suite through
both its direct sales teams
and the channel.
26 eWEEK n SEPTEMBER 10, 2007
www. eweek. com
ANALYSIS
SUN FROM PAGE 24
Were saying that there
are clear patterns of
techniques that we use
in our file system that
are in ZFS.
DAN WARMENHOVEN
CEO, NETAPP
NetApp is suing Sun over alleged patent infringements.
Among NetApps claims are the following:
NetApp is not infringing on three Sun patents, as claimed
by Sun
Sun is infringing on seven NetApp patents regarding data
processing systems and related hardwarein particular,
Suns ZFS technology
Sun is unfairly distributing ZFS technology to third-party
vendors
Sun has not been responsive to NetApps efforts to
resolve the issues
Sun should be ordered to pay damages
Sources: NetApp, Sun
Storage wars
Suns response in a statement from spokesperson Kristi
Rawlinson:
NetApps legal attack against Suns open source ZFS solu-
tion, which is freely available in the marketplace, is a clear
indication that NetApp considers Sun technology a threat,
and is a direct attack on the open source community.
28p24.indd 26 9/7/07 1:47:43 PM
FREEServers,
FREEApplications,
FREEFloor space,
FREEMan-hours,
FREEPower,
FREEStorage...
2007 American Power Conversion Corporation and MGE UPS Systems, Inc. All rights reserved. All APC trademarks are property of APC-MGE.
e-mail: esupport@apc.com 132 Fairgrounds Road, West Kingston, RI 02892 USA EE2A7EF-US
Introducing the revolutionary enterprise architecture
that nally pays you back.
Visit www.apc.com/promo Key Code x454x Call 888.289.APCC x9171 Fax 401.788.2797
How efficient is your enterprise system? See exactly where you stand
take our online Enterprise Efciency Audit today!
Legacy systems work ne for brute-force cooling the entire room, but skyrocket-
ing energy costs make them scally irresponsible and their fundamentally over-
sized design makes them incapable of meeting todays high-density challenges.
Even worse, power and cooling waste may actually prevent you from purchas-
ing much-needed new IT equipment. Simple problem, simple solution. Cut your
power and cooling costs and use the savings to buy the IT equipment you need.
According to Gartner Research, 50% of all data centers built before 2002 will
be obsolete by 2008 because of insufcient power and cooling capabilities.
Power and/or cooling issues are now the single largest problem facing data
center managers.
Theres only so much power and money to go around
Your service panel limits the amount of power available. Your budget limits the
amount of money. You have to stretch every bit of both as far as you can.
What you need is the APC Efcient Enterprise

.
The APC solution offers modular scalability so that you pay only for what you
use; capacity management so that you know where to put your next server; and
dedicated in-row and heat-containment systems that improve cooling and thermal
predictability. An Efcient Enterprise earns you money through the pre-planned
elimination of waste. For example, simply by switching from room- to row-ori-
ented cooling, you will save, on average, 35% of your electrical costs.
Our system reimburses you
Whether youre building a new data center or analyzing the efciency of existing
systems, your rst step is knowing where you stand. Take the online Enterprise
Efciency Audit to see how you can reap the benets of a smart, integrated,
efcient system: more power, more control, more prots.
The Efcient Enterprise

makes cooling predictable and reduces


operational expenses by...
Employing close-coupled cooling. Our innovative
InRow

architecture allows more efcient, targeted


cooling by shortening the distance between heat generation
and heat removal.
Containing the heat. Our Hot Aisle Containment System
reduces hot spots by preventing hot exhaust air from mixing
with cool air in the room.
Managing capacity. Intelligent, integrated capacity
management software gives you real-time data on your
power and cooling demands.
Utilizing right-sized components. Right-sized pay as
you grow components mean no more wasting power with
oversized legacy systems.
NEWS&ANALYSIS
28 eWEEK n MONTHERE X, 2007
www. eweek. com
CHANNELSOLUTIONS
Lets keep talking
SOLUTION PROVIDER, PARTNERS HELP BELTRAMI
COUNTY BOLSTER INTERNAL COMMUNICATIONS
www. eweek. com
A
s the government building campus of beltrami
County in northern Minnesota grew in recent
years, so did the countys IT and communications
needs. So, three years ago, the county embarked
on an ambitious modernization project, calling on
solution provider Morris Electronics for the work.
Solutions
CHANNEL
r go.eweek.com/casestudies
Morris Electronics, of
Morris, Minn., tapped part-
ners such as Tech Data and
Cisco Systems for help.
The projects first phase,
which called for creating a
single network infrastruc-
ture for various county
departments, has reached
completion. The second
phase, involving the instal-
lation of a wireless net-
work, is under way.
Like many smaller coun-
ties throughout the United
States, Beltrami, with a
population of 43,000, had
traditional voice and data
networks. But even small
counties have big IT needs,
and what worked for Bel-
trami and its employees
just a few years ago was
starting to fall short of
meeting their growing
needs for things such as
e-mail, video links and tele-
phone service. For start-
ers, Beltrami needed to tie
together its networks to
be able to share common
resources, said Shawn
Larsen, president of Mor-
ris Electronics.
New infrastructure
located in beltramis
largest city, Bemidji, Bel-
tramis county government
campus has eight build-
ings that house typical
government entities such
as administration, a com-
munity service center, law
enforcement, a jail, a judicial
center, highway and natural
resource management.
With the construction of
a judicial building and an
administration building,
which houses departments
such as motor vehicles, plan-
ning and zoning, and IT,
Beltrami County reached a
turning point. Officials con-
cluded the county needed
better interdepartmental
communications.
Ultimately, Beltrami
wanted to build a network
road map that would not
only consolidate its separate
networks but would expand
to include VOIP [voice over
IP], video, Wi-Fi and mobile
data for law enforcement,
said Larsen.
The countys modern-
ization journey began with
the goal of establishing
communications between
the law enforcement IT
network and the network
used by the rest of the
countys departments.
We needed our law
en forcement department
to be able to talk to our
accounting system, for
example, or to the attor-
CASE FILE: Beltrami County
By Lynn Haber
Beltrami County sought improved
internal communications at eight
buildings, including its courthouse.
Business problem
Beltrami County wanted to
establish communication
between an IT system used by
law enforcement and a network
used by everybody else.
Recommended solution
Design and implementation of
a new network road map con-
solidating the countys separate
networks while expanding capa-
bilities to include VOIP, video,
Wi-Fi and mobile data for law
enforcement.
Result
The county now takes advantage
of VOIP and videoconferencing
technology, which allowed it to
standardize functions such as
e-mail and reduce overall oper-
ating costs. The projects next
phase will address mobility.
28p28.indd D28 9/4/07 2:45:29 PM
neys office in order to
transfer data relevant to
cases they may be working
on, said Ron Pula, the
countys MIS director.
But connecting the two
networks required more
than technical know-how.
States often have specific
requirements for the trans-
mission of sensitive data
across networks. Beltrami
County also is required to
have a separate network
for law enforcement offi-
cers to talk to state offi-
cials. So, high on the
countys list of criteria for
finding a solutions partner
was an understanding of
how data from the county
is fed to the state.
We needed a partner
with a strong background
working within the gov-
ernment of Minnesota,
Pula said. Pula also wanted
a solutions partner well-
versed in Cisco products. A
satisfied Cisco customer for
many years, Pula believed
it was in the countys best
interest to continue with the
San Jose, Calif., vendor for
compatibility and support.
As a member of the Min-
nesota Counties Computer
Cooperative, a group of
IT professionals from the
states 49 counties, Pula
tapped into the network and
was referred to Morris Elec-
tronics. Shawn [Larsen] is
well-known in Minnesota
and works with a lot of coun-
ties. He has their trust, said
Charlie Mitchell, account
manager, Minnesota public
sector, at Cisco.
For Larsen, building a
long-term relationship with
a customer is critical.
When I met Ron [Pula],
the first thing we did was
an assessment, and we dis-
cussed what he wanted to
accomplish, Larsen said.
Then I sketched a plan
that addressed the countys
immediate needs but also
segues to its
future con-
cerns.
Mo r r i s
Electronics
initial task
involved lay-
ing the build-
ing blocks to
im plement
enterprise-
class switch-
ing. Working
on a time-
plus-materi-
als contract,
the projects
first phase,
putting in the
foundation,
took about
a month to
complete at
a cost of about $100,000.
Rather than do a fork-
l i f t i mpl ement at i on,
Larsen leveraged existing
county equipment, such
as a Cisco Catalyst 4006
Switch, a couple of Nortel
switches and VLANs (vir-
tual LANs) to upgrade the
network infrastructure.
As a Tech Data select
partner, Morris Electron-
ics tapped the distributor
to review the design Larsen
had in mind for Beltrami
County. I use Tech Data
as our safety net, Larsen
said. I want to make sure
I dont miss anything.
Morri s El ect roni cs
installed a Catalyst 4500
48PT 10/100/1000 POE
(power over Ethernet) blade
into the countys Cisco
4006 core switch, among
other equipment. We also
linked a couple of Cisco Pix
515 firewalls and a 506E,
running as
a firewall for
law enforce-
ment, into
t h e c o r e
switch with
Layer 2 and
Layer 3 rout-
ing, Larsen
said.
E s s e n -
tially, Larsen
configured
the state net-
work to pass
through the
c o u n t y s
har dwar e,
such as the
Cisco 4006,
a n d d i s -
tribute the
appropriate
traffic to the appropriate
courts. At this point, voice
and QOS (quality of ser-
vice) were also introduced
into the network. Today, the
county runs VOIP across
multiple Cisco switches and
also uses a Mitel VOIP.
According to Pula, hav-
ing a single network infra-
structure allows the county
to use the same phone
system across buildings,
standardize features for
users and reduce over-
all operating costs. Law
enforcement, for example,
which includes the sher-
iffs department and police
department, can collabo-
rate for e-mail, phone and
servers, he said.
The county also can use
its network to distribute
video anywhere within its
campus, using the inher-
ent QOS features in the
Cisco switches. Previously,
video was hard-cabled to
the back of some state-
owned equipment. The
county uses video for con-
ferencing, group training
and judicial activities.
Next up
with the core network
infrastructure in place in
mid-2006, it was time to
start Phase 2wireless
networking.
Larsen is installing a
wireless network on top of
the existing physical infra-
structure, giving county
employees, as well as citi-
zens who use the public
buildings for meetings
and presentations, mobile
access for workstations, lap-
tops or PDAs. The wireless
infrastructure also enables
VOIP LAN, extending the
range of cordless phones
from a few feet to any-
where within the 802.11
wireless infrastructure.
The initial rollout tar-
gets three county build-
ings: the administration,
customer service and
human services, and law
enforcement facilities.
Additional buildings will
be included this fall. The
end plan is to enable for
Wi-Fi all county buildings
and the ground between
the buildings, including
CHANNELSOLUTIONS
We needed a
partner with a
strong background
[in] government.
RON PULA
BELTRAMI COUNTY MIS DIRECTOR
[CONTINUED ON PAGE 31]
www. eweek. com
SEPTEMBER 10, 2007 n eWEEK 29
28p28.indd D29 9/4/07 2:45:39 PM
parking lots, over multiple
city blocks.
Morri s El ect roni cs,
Ci sco s Mi t chel l and
Pula were all involved in
the design of the wire-
less network. Larsen
came up with the ini-
ti al desi gn, Mi tchel l
said. Cisco looked at
the configuration and
made some recommen-
dations. We put together
a road map that would
allow the customer to see
beyond two months or
two years.
The plan calls for a con-
troller-based architecture
to centralize management
of the access points and
to manage the network
traffic, as opposed to man-
aging individual access
points.
Wi-Fi in the new judi-
cial building raises par-
ticular security concerns,
said Larsen. Were height-
ening perimeter testing
and encryption. But we
expect the controller-based
system to meet and exceed
our expectations.
Initial Wi-Fi rollout in -
cludes 50 access points,
increasing to about 80
when the project is com-
pleted. Beltrami is an
anomaly among county
governments, Larsen said.
Theyre taking the time to
plan and invest in infra-
structure.
One of the first coun-
ties in northern Minnesota
to tackle mobile wireless
technology, Beltrami wants
to outfit its 48 police squad
cars with laptop comput-
ers. According to Larsen,
the county ventured into
mobile wireless about
five years ago using radio
telemetry-based technol-
ogy, which was in its
infancy and was costly. He
was not involved with that
project.
Today, the police dont
have laptops to run license
plates or reports, Pula
said. They have to bring
information back to the
station to do what they
need to do.
The solution providers
strategy is to lay a founda-
tion for cellular wireless,
initiate mobility in a per-
centage of the squad cars
and cultivate champions for
the technology.
Its important
that everyone
under st and
what the tech-
nology can do
and how it per-
forms, Pula
said.
This is the
same strategy
Larsen used in Minneso-
tas Douglas County. I
started them with two lap-
tops that they used for six
months, he said. I let the
excitement grow, worked
out any issues, and this
year they rolled out a full
deployment.
Pula said the county
is learning as it grows
ON THE WEB
Be sure to log in to esp.eweek.com for in-depth analysis of the news that affects solution
providers. At the site, find columns by industry experts and eWEEK Strategic Partner editors,
solution provider profiles, news on IT career issues, channel research, case studies and
special features.
eWEEK Strategic Partner
Remember to also visit eWEEK Strategic Partners sister site, The Channel Insider,
channelinsider.com, for breaking news on the channel and the industry; ongoing coverage of
major channel events, trends and issues; and commentary from channel experts and Channel
Insider experts.
Channel Insider
Learn more about Ziff Davis Enterprises first Channel Summit, scheduled for Sept. 19 in
Chicago, by visiting ziffdavis.com/products/events/channelsummit. During the summit, industry
experts, eWEEK Strategic Partner and Channel Insider editors, and solution providers will discuss
the strategies and technologies driving the most value.
Channel Summit
www. eweek. com
SEPTEMBER 10, 2007 n eWEEK 31
CHANNELSOLUTIONS
i t s t echnol ogy i nf ra-
structure. The countys
IT department is active
in all rollouts and takes
over management of the
technology.
Lynn Haber is a freelance
writer in Norwell, Mass. She
can be reached at lthaber@
comcast.net.
BELTRAMI FROM PAGE 29
Beltrami County, in northern Minnesota, included
its administration building (above) in the IT revamp.
28p28.indd Sec1:31 9/4/07 2:45:43 PM
NEWS&ANALYSIS
32 eWEEK n MONTHERE X, 2007
www. eweek. com
By Lisa Vaas
O
n july 5, transportation security administration
airport screeners found a bag with two ice packs
inside. The ice packs had clay inside them rather
than blue gel, were covered in tape and matched
a description of materials on a TSA bulletin warning of
dry runs for terrorist attacks. Turns out it was a chunk
of cheese wedged between archaic, pre-blue-gel ice pack
technology, made out of clay.
Solutions
SECURITY
r go.eweek.com/casestudies
In this country full of smart
people, isnt anybody working
on technology that can detect
and differentiate explosive
materials or weapon like ob -
jects from cheese?
GE Security, for one, in
late December 2005 un veiled
what it called its Checkpoint
of the Future lab in San
Franciscos International
Terminal Concourse A. The
checkpoint incorporated an
array of futuristic scanning
technologies: automated
carry-on scanning, automatic
bio logical pathogen detec-
tion, millimeter-wave whole-
body scanning, explosives
trace detection on passengers
and a so-called quadrupole
resonance carpet to detect
threats in shoes.
In January 2007, the lab
was moved out of SFO and
into GEs Magnetic Cen-
ter of Excellence in San
Diego, where three of its
scanning technologies have
since wound up in a prod-
uct called the SRT (Secure
Registered Traveler) Kiosk.
The SRT looks like an
ATM with short walls. A
traveler walks onto a few
feet of quadrupole reso-
nance carpet that checks
his or her shoes for traces
of expl osi ves. Usi ng
smart-card technology, iris
image capture and a finger
reader, the kiosk identifies
travelers and checks their
stats against the biomet-
ric information stored on
a special ID card, while
also checking for traces of
explosives on the fingers.
The technology repre-
sents an evolutionary leap
in terms of explosives de -
tection. Were this technol-
ogy in place at the time,
it could have detected the
plastic explosives hidden
in the shoes of Richard
Reid, who attempted to
detonate a plane in-flight
in December 2001.
GE borrowed from tech-
nologies developed by a few
different companies to cre-
ate the Checkpoint of the
Future. L-3 Communica-
tions, for example, loaned its
millimeter-wave whole-body
imaging technology.
Millimeter wave is dif-
ferent from backscatter
X-rayan imaging tech-
nology that has raised
eyebrows and pri vacy
fearsthough both do
whole-body scans.
Backscatter is another
new type of imaging tech-
nology that many people
find objectionably intrusive.
Backscatter detects the radia-
tion that a target bounces
back. The technology, now
in use at Phoenix Sky Har-
bor International Airport,
Airport screening advances
U.S. CHECKPOINTS POISED FOR EVOLUTIONARY LEAP VIA NEXT-GENERATION TECHNOLOGIES
Passengers may soon make their way through security more quickly.
[CONTINUED ON PAGE 34]
32 eWEEK n SEPTEMBER 10, 2007
www. eweek. com
35 LAYERED APPROACH OF TECHNOLOGY AND EDUCATION DEEMED KEY TO SECURING VOIP
28p32.indd 32 9/4/07 3:58:53 PM
STOP THEM DEAD.


2
0
0
7

W
e
b
s
e
n
s
e
,

I
n
c
.

A
l
l

r
i
g
h
t
s

r
e
s
e
r
v
e
d
.
Make no mistake, theyre out there
doing everything they can to breach
your security.
But while theyre inventing new ways
to break in, Websense

ThreatSeeker

technology is analyzing over 85 million


web sites daily to nd and stop them before
they stop you. See what a difference
intelligent web security can make.
Take the Websense Security Challenge
www.websense.com/challenge
If you dont have Websense,
youre not protected.
presents an image of items
outside your body.
Backscatter X-rays pro-
duce images of photo qual-
ity that are disturbingly
frankthe Electronic Pri-
vacy Information Center,
which has called the images
a virtual striptease, has an
image on its site of Susan
Hallowell, director of the
TSAs research lab, that
gives an idea of how much
detail is rendered.
Bill Frame, senior vice
president for L-3, in Woburn,
Mass., said that millimeter-
wave technology is preferable
to backscatter in a number of
areas. First, its a very fast
approach, Frame said, with
scans averaging between
2 and 4 secondsmuch
faster than backscatter. Its
also nonradiating, relying
as it does on harmless radio
waves as opposed to X-rays.
Finally, theres cer-
tainly an image difference
between millimeter-wave
and backscatter technolo-
gies, Frame said in an
interview with eWeek. He
described the image gener-
ated by millimeter wave as
being a three-dimensional
holographic image that you
can spin around to search an
entire person. Back scatter,
in contrast, generates three
photos of a traveler.
L-3s technology uses
algorithms to automati-
cally detect anomaliesfor
example, images that repre-
sent objects outside the body.
Both it and backscatter detect
not just metallic objects but
any object, which is neces-
sary for detecting weapons
such as ceramic knives.
The fact that its auto-
matic is a plus for milli meter
wave, Frame said, given
that backscatter technology
still requires an operator to
discern if theres an object
under a persons clothes. In
that sense, theres a shift in
the TSAs thinking, and in
security in general, of auto-
mating decision making,
he said. L-3 just recently was
awarded a contract from the
TSA to test the technology
in Phoenix.
Meanwhile, outside the
United States, scanning
technology is evolving on
a parallel track. The same
e-passports that have been
delayed in the United States
due to the ease with which
data can be read from RFID
(radio-frequency identifi-
cation) chips are heading
toward ever more sophisti-
cated use in Europe.
A European version
of a biometric passport is
planned that will have digi-
tal imaging and fingerprint
scan biometrics placed on a
contactless chip. The Brit-
ish biometric passport now
uses only a digital image and
forgoes fingerprint data, but
the United Kingdom Pass-
port Service is mulling over
inclusion of such data. In
Germany, two fingerprints
will be stored on the chip
beginning Nov. 1.
Vendors are piloting ways
of dealing with the data that
the government is preparing
to hand over. Nine private-
and government-sector orga-
nizations conducted a four-
month trial that wrapped up
in February, titled miSense,
in which roughly 3,200 air-
line passengers volunteered
to take part in an acceler-
ated traveler program. The
program used fingerprint
scanning and photographic
scanning of passports. The
trial involved e-passports that
store biometric data such as
fingerprints, iris scans and
facial scans, although for
the test the fingerprint was
linked only to passport infor-
mation and stored in a data-
base for later reference.
Trial participants were
able to navigate the air-
ports involved in the trial
72 percent faster than
nonparticipants.
Of course, all this tech-
nology raises questions of
privacy. That question is par-
ticularly acute when youre
talking about such sensi-
tive data as the image of an
individuals fingerprints.
Cryptography and data
security company nCipher
is in fact working on encryp-
tion for the data residing on
biometric e-passports. Alex
van Someren, CEO and co-
founder of nCipher, said in
an interview with eWeek
that biometric passport
data has the same security
implications as RFID chips
in U.S. passports.
I dont want somebody
to reproduce a copy of my
fingerprints and plant them
on a knife at a crime scene,
said van Someren from
the companys Cambridge,
England, office. Secondly
I dont like the idea of that
biometric information [get-
ting] modified. An adept
hacker could change my
information on file.
A proposal to modify the
International Civil Aviation
Organizations e-passport
standard would add encryp-
tion to data on cards so that
only authorized decrypters
can read and decode data
a plus for e-passport security
whether youre talking about
biometric data or the stan-
dard dataSocial Security
numbers, for example
stored on U.S. e-passports.
At the moment, how-
ever, e-passport data is
weakly encrypted, van
Someren said.
34 eWEEK n SEPTEMBER 10, 2007
www. eweek. com
AIRPORTS FROM PAGE 32
CHANNELSOLUTIONS
photo
Future scanning technologies may eliminate the need to remove
laptops and cell phones from bags.
28p32.indd 34 9/4/07 3:59:10 PM
VOIP: Layer
on security
SECURITY PROFESSIONALS SAY TECHNOLOGY,
EDUCATION ARE POWERFUL ONE-TWO PUNCH
Voice is an inherently
trusted communication,
and consumers are not
conditioned to distrust the
phone in the same man-
ner that they do unsolic-
ited e-mail, said Victoria
Fodale, an analyst at In-Stat.
Effectively combating VOIP
threats requires applying the
same best practices govern-
ing In ternet security, Fodale
added.
For example, IP phones
run operating systems and
supporting software that
make them susceptible to
the same types of viruses,
worms and malware that
plague other computing
devices, Fodale said. As
such, businesses will need
to regularly assess vulnera-
bilities and deploy required
patches and updates on
this equipment.
She listed BorderWare
Technologies and Sipera
Systems as key providers
of VOIP security tools on
the infrastructure side,
and Zfones encryption
technologywhich has
been submitted to the
Internet Engineering Task
Force as a proposed public
standardas important
on the client side.
Currently, most IP
phones do not support
en cryption, Fodale said.
But if encryption becomes
standardized, SIP [Ses-
sion Initiation Protocol]
devices from different
vendors will potentially be
able to interoperate when
encrypted voice calls are
required.
Encryption is an issue
because it is possible for
someone to intercept the
signaling and associated
media streams of a con-
versation with VOIP.
If you are using a voice-
over-IP application to make
a call over the Internet, then
its possible for anybody ...
to eavesdrop on that con-
versation because most
of the voice-over-IP traffic
is still not encrypted, said
Paul Wood, an analyst with
MessageLabs.
However, Wood added,
VOIP security threats
remain largely theoreti-
cal, as hackers and cyber-
thieves tend to focus their
efforts on e-mail.
One of the factors that
we need to consider is that
e-mail is certainly the
single biggest target for
[such attackers] because it
enables them to exploit this
massive ecosystem, Wood
said, adding that the mix
of hardware- and software-
based VOIP deployments
makes it harder for hackers
to target systems.
It takes a mix of security
toolsfrom session bor-
der controllers to dedicated
firewalls for VOIP traffic
to network and host intru-
sion detection/prevention
systemsto secure VOIP,
Fodale said. She added that
the key challenge for busi-
nesses will be to integrate
VOIP security into a uni-
fied security framework.
VOIP requires a system
of protection that works
across all clients and appli-
cations, servers, and sys-
tems to the network edge,
Fodale said. In addition,
the security components
of this system should inte-
grate with the existing secu-
rity infrastructure.
To Steven Ostrowski,
director of corporate com-
munications for the Com-
puting Technology Industry
Association, in Oakbrook
Terrace, Ill., organizations
need to spread awareness
to the entire employee
base if they hope to have
truly secure VOIP envi-
ronments. Decision mak-
ers and executive-level
staff must become better
informed about the real
costs of security breaches
and the real return on
investment for both secu-
rity training and certifica-
tion, Ostrowski said.
The best security tech-
nology in the world wont
work without appropriate
human intervention, the
skills of implementers
and the vision of manag-
ers to properly deploy and
apply it, he said.
By Brian Prince
www. eweek. com
SEPTEMBER 10, 2007 n eWEEK 35
SECURITYSOLUTIONS
S
ecurity industry watchers say organizations
need to take a layered approach to VOIP security.
Voice-over-IP deployments are expected by
some to be targeted by attackers more as the number
of organizations using the technology increases, with
phone phishing, in particular, becoming a greater threat.
Locking down VOIP
Educate users about the dangers of VOIP phishing; educate
decision makers about the potential cost of breaches.
With VOIP expected to be a bigger target for attackers,
experts advise that organizations tighten the controls on
their deployments.
Assess vulnerabilities of VOIP systems and apply
appropriate patches.
Consider encryptionits not yet widely used, but it is
worth investigating, as it will prevent eavesdropping.
Integrate VOIP security into existing security infrastructure.
28p35.indd 35 9/4/07 4:03:29 PM
H
igh-definition voice
over IPas exemplified
by Polycoms HD Voice
technologyprovides
outstanding quality and clarity for
calls within a companys borders and
could be an important building block
for a range of applications in the
future. However, shortcomings of
the Public Switched Telephone Net-
workand of the telecommunica-
tions industry in generallimit the
current usefulness of the technology
outside the corporate network.
This became clear to me as I stood
in Polycoms isolated demonstration
booth at the Spring VON show in
San Jose, Calif. I was immediately
struck by the quality of the sounds
produced by Polycoms SoundPoint
IP 550 and IP 650 HD Voice phones.
When compared with a toll-quality
implementation side by side, the HD
Voice transmissions were percepti-
bly richer, fuller and clearer.
High-definition VOIP gets its full
sound in a few ways.
First of all, high-definition VOIP
uses wideband codecs between end-
points.
Normal telecommunication sam-
ples a range of audio frequencies
(from 300Hz to 3,400Hz) for trans-
mission across the limited bandwidth
afforded in the PSTN. Early-genera-
tion IP phones followed suit, as the
codecs most frequently used with
VOIP (such as g.711) were designed
to meet but not beat the expectations
for toll-quality voice. Polycoms HD
Voice phones, on the other hand,
can sample sound between 150Hz
and 7,000Hz, and the sound is then
transmitted via wideband codecs (in
this case, g.722), which can support
this wider range.
Since the human voice starts at
a base frequency of about 100Hz
and extends up toward 8,000Hz,
the improved sampling of the high-
definition technology has a number
of potential benefits.
For example, users will expend
less energy deciphering sounds
particularly easily confused conso-
nants, such as the letters f and
s. This will lead to better overall
comprehension and less fatigue for
callers who spend hours a day on the
phone. Deciphering foreign accents
or dialects should take less effort as
well, fostering improved interna-
tional dialogue.
Beyond the compression and encod-
ing algorithms, high-definition VOIP
requires some advanced engineering
on the physical phone. Improved audio
HIGH-DEFINITION VOIP IS PAVING THE WAY
FOR MORE EFFECTIVE COMMUNICATIONS
By Andrew Garcia, eWEEK Labs
INSIGHT
36 eWEEK n SEPTEMBER 10, 2007
www. eweek. com
BONO
VOX
Should You
Heed the Call
for HD Voice?
High-definition VOIP
requires some advanced
engineering on the
physical phone.
28p36.indd 36 9/6/07 10:27:26 AM
components and enhanced echo can-
cellation or noise suppression provide
better sound quality (no matter what
codec is used), but these features can
also help avoid the rumble in the low
frequencies or acoustic feedback at
the higher frequencies that wideband
codecs will open up.
Within limits
as impressed as i was with poly-
coms HD Voice sound quality at the
time I saw it demonstrated and dur-
ing eWeek Labs tests, I was struck
by the overwhelming limitations of
the technology.
The reliance on wideband codecs
means that HD Voice is a boutique
affair. The end-
poi nt devi ces
must support the
proper codecs for
full benefit, but
Pol ycom offers
HD Voice only in
its pricier and fully
featured models.
Lower-end models
designed for cubi-
cle workers are on
Polycoms HD Voice
road map.
More disconcert-
ing is high-definition
VOIPs lack of extensibil-
ity in general: Under no
circumstances will high-
definition VOIPs full audio quality
be maintained if a call touches the
PSTN. Any time a call gets routed
through the PSTN, whether through
a corporate gateway or when peering
between service providers, the call
will immediately be down-sampled
to toll quality, thereby losing all the
additional information carried by the
wideband stream.
While SIP (Session Initiation
Protocol) trunking provides some
promise of relief for this problem,
high-definition VOIP support will
most likely extend to the carriers
own customers because U.S.-based
service providers typically fall back to
PSTN connectionsrather than to
IPfor peering between carriers.
Polycom officials admit that their
greatest traction with HD Voice
comes from the largest companies
those with more than 10,000 seats
and often with international offices.
These companies will reap the great-
est benefits from HD Voice calls
placed within their own network
and between branches (or coun-
tries), relying on corporate connec-
tivity to place calls while avoiding
the PSTN.
Companies PBXes will need to
support the codecs needed for HD
Voice. Polycom officials informed
me that HD Voice has been shown
to work with the open-source Aster-
isk project, BroadSoft, Cilantro and
Interactive Intelligence systems.
However, as Ive seen in tests, mile-
age will vary.
I was able to enable HD Voice with
Asterisk with a few simple modifica-
tions, but, as is the case with the main
fork of the Asterisk 1.4 distribution,
such a step hindered the ability for
HD phones to connect with legacy
non-HD devices. As I later learned
from Kevin Fleming, director of
software development at Digium,
in Huntsville, Ala., Asterisks code
negotiations currently treat the call
legs independently, and thus never
renegotiate the initial call leg based
on the requirements of the second-
ary call legs. However, Fleming
continued, In the Asterisk SVN
trunk, we have a G.722 code module,
so this problem would not occur, and
well be putting that module into
Asterisk Business Edition as well.
HD potential
the potential for high-definition
VOIP technology is certainly intrigu-
ing. Phone systems are generally a
very long-term investment, and the
promise of improvements in
the IP telecommunications
space within the next few
years makes the technology
worthy of consideration
particularly as well-designed
devices will enhance stan-
dard narrowband communi-
cations in the meantime.
Digital-signal processor
manufacturer Texas Instru-
ments sees high-definition
VOIP as a possible founda-
tion for powerful applications
down the road.
For starters, the improved voice
clarity of high-definition VOIP will
lead to more accurate speech rec-
ognition.
If I have high-resolution sam-
pling, I have high-quality audio, and
I have speech recognition built into a
system or product or service, said TI
Director of Technical Strategy Tom
Flanagan, in Germantown, Md. The
ultimate manifestation will be when
we have enough bandwidth and high
definition is widely usedI could be
calling someone in France and hav-
ing real-time translation going on.
Such real-time translation is still a
INSIGHT
www. eweek. com
SEPTEMBER 10, 2007 n eWEEK 37
[CONTINUED ON PAGE 40]
Polycoms six-line SoundPoint IP 650
supports the G.722 wideband codec.
28p36.indd 37 9/6/07 10:27:44 AM
INSIGHT
M
ANY TOOLS ON THE MARKET STILL RELY ON THE
e-model for voice assessment, measuring network
conditions such as latency and jitter, and running them
through an algorithm to generate an R-Factor score.
This score can be translated to a MOS (Mean Opin-
ion Score) value, but MOS-based assessments are
fundamentally flawed for use with high-definition VOIP
(voice over IP), as they are essentially a comparison to
toll-quality voice. High-definition VOIP, with its increased
voice sampling capabilities, should automatically exceed
these parameters.
Many vendors have adjusted their tools with an
updated e-model that considers additional character-
HD VOIP requires new measurement criteria
istics particular to wideband audio, giving wideband
codecs the possibility for higher R-Factor scores. But
the translation to MOS values remains unchanged,
so users must take care not to compare apples to
oranges. A MOS score derived from a wideband call
is not directly comparable to one obtained from a
narrowband call.
For instance, during tests, I used Network Instru-
ments Observer 12 to do a side-by-side comparison
of two calls. I measured the same two phones by first
placing a call using the wideband codec G.722 and then
using G.711 -law. While those I called during the test
reported that the wideband codec call sounded much
clearer and richer, the voice assessment scores
for the wideband call were significantly lower than
for the narrowband call.
While our assessment tool helped because it
displayed the root cause of the discrepancy
excessive jitter that was endemic to our wide-
band-enabled network (needing further inves-
tigation)the MOS scores generated were not
useful as a comparative measure. But products
may react differently to wideband codecs, so
administrators should take care to work with the
vendor to determine exactly how wideband audio
is handled.
There are other voice assessment systems out
there that may be able to provide more accurate
voice quality assessments, but these systems
have had to be adjusted for wideband audio
support as well. For
instance, PESQ (Per-
ceptual Eval uati on
of Speech Qual i ty)
is an active, refer-
ence model -based
approach requiring the
insertion of a known signal into a voice stream that
can be accurately compared with what comes out at
the other end of the call. PESQ has the added benefit
of not caring what the network transport medium was.
But, again, accounting for codecs will be paramount as
wideband and narrowband assessments should not be
compared directly. Andrew Garcia
Using Network Instruments Observer 12, I analyzed similar
calls between two endpoints using the G.711

u-law codec
(top) and G.722 wideband codec (bottom). In my sample,
the G.722 call experienced much more jitter, causing a lower
estimated MOS score and triggering threshold warnings
from Observer (right).
www. eweek. com
SEPTEMBER 10, 2007 n eWEEK 39
28p36.indd Sec2:39 9/6/07 10:27:55 AM
ways off, however. Processing capa-
bilities need to continue to improve
to a point where the translations can
do phrases, rather than individual
words, to maintain contextual mean-
ing but without taking so long as to
introduce too much delay into the
call stream.
Of more immediate inter-
est to corporations may be the
potential improvements high-
definition voice could bring
to fixed-mobile convergence
solutions that bridge the use
of cell phones to the corporate
Wi-Fi network. High-definition
voice could use a number of
wideband codecs other than
G.722, including one known as
G.722.2, or AMR-WB (Adaptive
Multi-Rate Wideband).
Wideband AMR has already
been approved for use with
UMTS (Universal Mobile Tele-
communications System)-based
third-generation cellular trans-
missions. This codec supports
wideband audio samples but
has the flexibility to scale back
with limited connectivity. With
support for this codec on the
internal corporate PBX and desk
phones, the potential exists for
rich, high-definition voice calls
between mobile workers and
those back in the office.
Labs tests
i brought polycoms hd voice
into the lab to see exactly what
it would take to get HD Voice
working with our Asterisk IP
PBX implementation.
Starting with Version 1.4, Aster-
isk supported the G.722 codec in
passthrough mode only. This means
that Asterisk can set up a G.722-
enabled call between two endpoints
that support the codec and then get out
of the way, but the server cannot trans-
code the streams between different
codecs for devices with mismatched
support. And while Polycom officials
are investigating adding support for
other wideband codecs, G.722 is the
only one supported at this time.
To enable G.722 in Asterisk (our
server is based on Version 1.4.9), I
simply needed to add a single line
to the sip.conf configuration file
(allow=g722). I then had to con-
figure each Polycom phone with
G.722 as the codec with first pri-
ority. With these changes in place,
I could make calls between my
SoundPoint IP 550 and 650 devices
and experience all the audio quality
I expected from HD Voice.
However, interoperability with
legacy devices was another story.
While I could place calls from a non-
HD Polycom SoundStation confer-
ence phone to an HD Voice-enabled
phone using G.711, I could not com-
plete a call in the reverse direction.
The Asterisk server would show an
error indicating congestion on
the server, and the caller par-
ticipating in the testing would
experience a fast-busy signal.
It turns out that Asterisk
1.4 cannot handle the codec
negotiation necessary to com-
plete the call between an ini-
tiating caller with priority for
G.722 and a receiving caller
with priority for another codec.
Asterisks codec negotiations
currently treat the call legs
independently, and thus never
renegotiate the initial call leg
based on the requirements of
the secondary call legs, said
Digiums Fleming.
Asterisk users can look to
the bleeding edge for a reso-
lution. In the Asterisk SVN
trunk, we have a G.722 codec
module, so this problem would
not occur, and well be putting
that module into ABE [Aster-
isk Business Edition] as well,
said Fleming. We may also put
it into future s800i [Asterisk
Appliance] builds.
In my communications with
Polycom officials about this
issue, I learned that the com-
pany has achieved expected
codec negotiations when using
an SVN trunk of Asterisk.
While this feature will likely not
be part of the forthcoming Asterisk
Version 1.4, users should be able to
look forward to full support in Ver-
sion 1.6 down the road.
eWEEK Labs Senior Analyst Andrew
Garcia can be reached at andrew.garcia
@ziffdavisenterprise.com.
INSIGHT
HD VOIP FROM PAGE 37
Of more immediate
interest to corporations
may be the improvements
high-definition voice
could bring to
fixed-mobile
convergence.
40 eWEEK n SEPTEMBER 10, 2007
www. eweek. com
28p36.indd Sec1:40 9/6/07 10:28:04 AM
>> Hackers love company. Your company. Today, criminals methodically target corpora-
tions, orchestrating attacks to steal confdential information: Hacking for proft.
In addition to stopping worms, viruses and phishers, you need to crush these new,
systematic assaults from botnets to trojans. Juniper Networks comprehensive,
cost-effective threat management solutions provide uncompromising defense for your
network. Only Juniper takes a uniquely holistic approach, dispatching dedicated protec-
tion to every network and application layer vulnerability and making any network more
secure: www.juniper.net/threatmanagement


2
0
0
7

J
u
n
i
p
e
r

N
e
t
w
o
r
k
s
,

I
n
c
.
1 . 8 8 8 . J U N I P E R
42 eWEEK n JULY 9, 2007
www. eweek. com
By Andrew Garcia
In the time-division multiplexing world, as well as in the
early voice-over-IP days, customers generally had a limited
number of options for desk phones once they had settled on
a PBX solution. But with Session Initiation Protocol driving
interoperability among companies and products, customers
dont have to settle for the selections put forth by the PBX
vendor. While this interoperability will undoubtedly have more
impact on the burgeoning voice-over Wi-Fi market, desktop
phones can be freed as well. The following is a set of sample
questions to ask and requests to make when beginning an
evaluation of SIP desktop phones:
SIP DESKTOP PHONES
INSIGHT
PHYSICAL DEVICE
What is the size of the device?
What is the weight of the device?
What is the LCD screens resolution?
How many lines and characters does the screen support?
Is the screen backlit?
Does the device support video?
Is the screen tiltable?
The screen has more responsibilities for todays phones,
as they can be used for information transport, intranet Web
browsing for easing directory searches and so on.
Is a speakerphone included?
Is the device full duplex?
Provide a list of preprogrammed buttons.
How many programmable buttons does the phone have?
Are soft keys available?
Hold, mute and transfer buttons should be expected.
Look for other hard-coded buttons for functions such
as conferencing and directories.
Is a dedicated headset jack included?
Describe the connector type.
Are 10/100 Ethernet ports provided? How many?
Is there support for 802.3af POE (power over Ethernet)?
Are USB ports included? How many?
PHONE FEATURES
Many features should be expected, including call
forwarding, call transfer, call waiting, caller ID, redial,
hold and voice mail indicator.
What is the total number of lines supported?
Are intercom capabilities included?
Is an address book function available?
Is a microbrowser included?
PROVISIONING AND NETWORKING
Check all that apply:
TFTP file transfer HTTP
HTTPS (HTTP Secure) Telnet
SSH (Secure Shell) FTP
Bluetooth support NAT (Network Address Translation)
IP Security Other (Please specify.)
HIGH-DEFINITION VOICE
What codecs are supported?:
G.711 -law, A-law G.729AB
G.723 G.726
GSM G.722
G.722.2. iLBC Other (Please specify.)
What is the frequency response range for handset,
speakerphone and headset?
Is echo cancellation supported?
Is noise suppression supported?
PARTNERSHIPS
Despite todays relative ease of interoperability of core feature
sets, interoperability is a slippery slope. The closer you are to
the bleeding edge with your telephone systems features, the
more likely you will need to go with the PBX vendors partners.
Which SIP PBXes are the phones certified or tested to
work with?
Please describe the features particular to these specific
PBXes.
PRICING
Please provide detailed pricing.
42 eWEEK n SEPTEMBER 10, 2007
www. eweek. com
28p42.indd 42 9/6/07 10:11:35 AM
Coverage not available in all areas. Limited-time offer. Other conditions and restrictions apply. See contract and rate plan brochure for details. Subscriber must live and have a mailing address
within AT&Ts owned network coverage area. Up to $36 activation fee applies. Equipment price and availability may vary by market and may not be available from independent retailers. Early
Termination Fee: None if cancelled in the first 30 days; thereafter $175. Some agents impose additional fees. Sales tax calculated based on price of unactivated equipment. Certain email
systems may require additional hardware and/or software to access. Service provided by AT&T Mobility. 2007 AT&T Knowledge Ventures. All rights reserved. AT&T and the AT&T logo are trademarks
of AT&T Knowledge Ventures and/or AT&T affiliated companies.
For more information, visit www.wireless.att.com/laptopconnect or go to your nearest AT&T store.
Get AT&Ts Global 3G
LaptopConnect Card for only
$
49
99
with 2-year service agreement
on DataConnect plans $59.99
or higher.
The Internet cant hide from
the AT&T LaptopConnect Card.
Tired of playing hide and seek with the Internet? Get
the AT&T LaptopConnect Card and easily access the
Internet at mobile broadband speeds when youre out
of the office, on the road, away from hotspots.
> Delivers mobile broadband speeds in more than
165 major U.S. markets and more cities worldwide
than any other U.S. carrier.
> Send and receive email, download large
attachments, and access corporate systems
at mobile broadband speeds.
> Enables secure laptop connections to AT&T
BroadbandConnect and EDGE networks.
> Fast and easy set up.
INSIGHT
I
N SOME WAYS, the mind-set around
municipal wireless technology is much
like that around net neutrality: Most peo-
ple think its a good thing, but almost no
one can agree on what it actually means. Thats
not stopping muni wireless from wending its
way into cities across the United States, each
of which is tweaking the technology to suit the
needs of its many constituencies, as well as its
budgetary concerns.
Depending on whom you ask, muni wireless
can mean a high-speed data solution for emer-
gency workers, automated meter reading, citywide
wireless Internet access or a way to help close the
digital divide. It may even mean some combination
of those things.
Its very early, so you cant reach any final judg-
ments based on what we see so far, said analyst
Craig Mathias, principal at Farpoint Group, in Ash-
land, Mass.
Mathias added that, currently, muni wireless can
be whatever a city decides to make it but that, in
nearly every case, it involves public access to Wi-Fi.
There are probably in excess of 400 deployments on a
global basis, Mathias said. Wi-Fi is going to become
as common as cellular over the next decade. Its free
when you buy a computer. More than half of phone
handsets will have Wi-Fi.
Mathias said he thinks the availability of devices
capable of operating on more than one service, such
as cellular and Wi-Fi, will have a major impact on
muni wireless.
Convergence is a major driver for metro Wi-Fi,
he said. The cellular carriers will become dependent
on Wi-Fi. The voice bands will saturate, and they dont
have the bandwidth for multimegabit services. If [car-
riers] augment their capabilities with Wi-Fi, they have
hundreds of megabits they can make available because
its free spectrum. The technology is available, it is
being deployed, and the cellular carriers have a very
strong incentive. How can it fail?
Good question.
Muni Wi-Fiand, more broadly, muni wirelessis
showing success in only a few places.
The reasons are as varied as the locations. In some
cases, its because the municipality doesnt realize the
cost or difficulty; some cities find that they dont have
the means to manage such large
BY WAYNE RASH
eWEEK LABS
Municipal wireless, Wi-Fi
implementations are popping up
all over, but successes have been
few and far between
44 eWEEK n SEPTEMBER 10, 2007
www. eweek. com
[CONTINUED ON PAGE 49]
28p44.indd 44 9/6/07 10:14:53 AM
Powerful Ideas and Manufacturing Integrity
The Key Ingredients of a Better UPS
Dont trust your network to an inferior UPS system!
Tripp Lites heritage of innovation and quality ensures that youre getting premium
UPS performance and optimum network protection.
SmartOnline

UPS Systems
ReliableQuality manufacturing, true on-line operation, pure sine wave
power output and innovative bypass features eliminate network downtime
CompatibleTested and certied to meet stringent regulatory and network
vendor standards
ManageableFree UPS management software; SNMP, Web and telnet
monitoring and control options
ScalableCapacities up to 30kVA; external battery packs allow unlimited
runtime potential
AffordableBenets of manufacturing efciency are passed to customers;
most installation and maintenance tasks can be performed by existing IT staff
ProvenTripp Lite has an 85-year service history and manufactured the rst
UPS designed for personal computers
During every step of the design and
manufacturing process, our primary
goal is to eliminate downtime. From
the drawing board to the assembly
line, we engineer our UPS systems to
make your network more reliable.
Salim Ling
Head of Engineering
Tripp Lite
Tripp Lite UPS Systems eliminated
signicant hardware and service costs
by keeping our equipment constantly
protected and powered.
Steve Kim
Director of Network Services
Houston Independent School District
Tripp Lite offers a wide range of solutions to protect, control and secure your network.
Tripp Lites PowerAlert Software, version 12.5, has tested compatible with Cisco CallManager, versions 4.0 and 4.1, Cisco 7600 Series Routers, 7500 Series Routers and Catalyst 65XX Layer 3 Switch. Tripp Lite PowerAlert Software, version 12, has tested compatible with Cisco
CallManager, versions 3.3(4)-MCS and 4.0(2)-MCS. Go to www.tripplite.com/logodisclaimer for details. Tripp Lite is a Cisco Technology Developer Partner in the Cisco Technology Developer Program. Cisco, Cisco Systems, the Cisco Systems logo, and the Cisco Square Bridge
logo are registered trademarks or trademarks of Cisco Systems, Inc. and/or its afliates in the U.S. and certain other countries. SmartOnline is a trademark of Tripp Lite.
Secure Your Network for Less.
Instant Rebates on
UPS Systems, KVMs and
Rack Enclosures.
www.tripplite.com/eWeek
8
5
YEARS
3-Phase UPS Systems Hot-Swappable UPS Systems Power Distribution Units KVM Switches Rack Enclosures
Whats the best approach to information
security compliance?
The business side says they have to
have USB drives, iPhones
How can you securely exchange sensitive
information with partners?
Do security protocols handicap your remote workers?
How do you keep encryption simple for non-IT employees?
How do you protect data at rest?
To learn more or to register visit: http://go.ziffdavisvts.com/securitysolutions
September 26, 2007
Security Solutions:
Data, Devices and the Extended Enterprise
KEYNOTE:
Compliance Metrics: Strategies to Maximize
Compliance and Security Dr. Peter Tippett, Vice
President, Verizon Business; Security Pioneer. Formerly
Vice Chairman & Chief Technology Ofcer, Cybertrust;
creator of the rst commercial anti-virus product,
which later became Symantecs Norton Anti-Virus
FEATURED SPEAKERS:
Aurobindo (Robin) Sundaram, Vice President of
Information Security, ChoicePoint, Inc.
Joe Bernick, Chief Information Security Ofcer,
LaSalle Bank
Trent Henry, Senior Analyst, Burton Group
Jonathan Squire, Information Security Architect,
Dow Jones & Co.
Earl Porter, Director, Information Security,
Transamerica Reinsurance
HOT BUTTON PANELS:
Keeping Shared Data Out of the Wrong Hands:
Security in the Overextended Enterprise
Managing Internal Threats: Removable Devices
and Remote Access
Protecting Data at Rest Wherever it is Stored
How do you piece together the information security puzzle? With remote
and mobile employees, customers, suppliers and business partners
increasingly accessing core information systems, enterprises need
comprehensive protection that isnt unduly burdensome.
Information security can be costly, complex, and intrusive. How do you
keep trusted employees and third parties linked into your enterprise
without giving away the keys to the kingdom? How do you keep your
data secure no matter where it is?
Join Ziff Davis Enterprise for this online event as we explore effective
strategies, tactics and the latest tools to get the job done right.
TOPICS COVERED INCLUDE:
What are the best technology
strategies for compliance?
Limiting network access to service
providers, offshore developers and
other partners
Rogue, removable and remote
tips on device control management
Providing secure remote access
whats the best approach?
Keeping data at rest protected
yet accessible
Ziff Davis Named Winner
of the FAME Award
for Best Online Event by
Folio magazine!
Platinum Sponsors:
SECURITY SOLUTIONS
and complex projects; and
governments sometimes
want something for noth-
ingthat is, they want
a vendor to pick up the
costs, but they cant agree
on how vendors can make
any money.
The recent collapse of
San Franciscos much-
hyped municipal wireless
plans is only the latest dem-
onstration that theres no
such thing as a free wireless
lunch. The same thing hap-
pened in Chicago, although
at a much earlier stage of
planning. (For more on
San Fran ciscos muni wire-
less saga, see Jason Brooks
column on Page 58.)
San Francisco and Chi-
cago wanted a free network
for everyone, but neither
city was willing to com-
mit to using the network
for city services. And, in
the case of San Francisco,
at least, the forces that
run the city let the whole
thing become a political
football.
The problem is that
municipal wireless net-
works are expensive to
install, and theyre expen-
sive to run.
Without some assurance
that theyll have a stream
of revenue, companies
that might be convinced
to operate such a network
wont do it.
eWeek Labs examined
three implementations
to see where municipal
wireless is working, why,
and how enterprises may
benefit. Because, while
enterprises arent cities,
many of the factors that
affect municipal wireless
implementationsinclud-
ing complexity and cov-
erage issuesalso affect
enterprises.
In Providence, R. I. ,
Greenville, N.C., and River-
side, Calif., the powers that
be figured out that they
needed to make municipal
wireless a viable proposi-
tion for the company thats
doing the wireless work.
In the case of Providence,
it was easy because the
municipal wireless net-
work was built for the
city to support city ser-
vices. In both Greenville
and Riverside, the cities
agreed to play a role
in usingand paying to
usethe network.
Providence, R.I.
one of the most suc-
cessful muni wireless
implementations is in
Providence, R.I. In this
midsize New England
city, there was really only
one goal for the citywide
[CONTINUED ON PAGE 51]
INSIGHT
Getting muni wireless right
Have a clear idea of what you want to accomplish: Is the
wireless network only for city services? Is it intended to pro-
vide public access to the Internet? Why do you want the public
access, and will it be free or will it cost money?
Heading off into the unknown of municipal
wireless can be fraught with risk, but it
doesnt need to be. According to Motorolas
Chip Yager, city administrators need to take
the right steps to greatly improve the chances
of success for their wireless networks
whether they are intended for the cities
own use or for public Wi-Fi access. Here are
Yagers planning recommendations:
Plan for physical deployment: Do you have public structures
that you can use for mounting radio equipment or antennas?
Do you have buy-in from the public utilities that will provide the
poles and power for access points?
Partner with organizations that have the skills to plan and
implement the network and provide ongoing support: Do
you have a plan in mind for the partner to see this as financially
viable?
Know how you or your partners will install the network, get
it running, test it and fix it when it doesnt work: Do you have
a plan for how your partner will handle day-to-day operations?
Perhaps most important, gain the support and active coop-
eration of managers in your city who will have some role in
funding, operating or using the wireless network: Without the
political support you need, no amount of technical prowess will
make the network a success.
Motorolas
IAP6300 wire-
less access
point (far left)
provides the
infrastructure
for Providences
wireless mesh
network. Motor-
olas VMM6300
(left) provides
the wireless link
for Providences
vehiclesin this
case, a police
car.
www. eweek. com
SEPTEMBER 10, 2007 n eWEEK 49
MUNI WIRELESS FROM PAGE 44
28p44.indd 49 9/6/07 10:15:10 AM
Peatured Speakers:
Jim AIves, Executive Vice President, MarketinQ, Kaseya
Ayman Antoun, Vice President, Business Partners,
Americas, !BM
Gary BixIer, Director, MarketinQ, North America, AMD
Marvin BIough, Vice President, Americas SaIes, SonicWALL
Gregory Davis, Vice President, Americas ChanneI
Business, DeII
Jeffrey KapIan, Founder, TH!NKstrateQies
Edison Peres, Vice President, Advanced and Core
TechnoIoQies, WorIdwide ChanneIs, Cisco Systems
Benjamin Smith, Vice President, GIobaI ChanneI,
APC-MGE
ShirIey Turner, Director, North America, ChanneI
MarketinQ, !nteI
Dan WensIey, Vice President, Partner DeveIopment,
LeveI PIatforms
September 19, 2007
7:30 a.m. - 5:00 p.m.
ccvec L, ar eVerir receicr
Hyatt Regency O'Hare
Chicago, lL
100 quaIihed, mid-market
channeI executives
Registrants: c a, cr
ccrererce reisraicr,
ease ccrac os a
conferencesziffdavisenterprise.com.
Sponsors: cr ncre ircrnaicr
cr cor excosiVe scrscrshi
ccroriies, ease ccrac
Learice CiVas a -oo-8-b cr
Beatrice.OIivasziffdavisenterprise.com.
2007
Channel
Summit
oWFFK 3tratogic Partnor
& Channol /nsioor
The 2007 Ziff Davis ChanneI Summit, hosto by th oitors o oWFFK 3tratogic Partnor ano Channol /nsioor, is
a on-o-a-kino conrnc at which solution proviors will har inoustry luminaris shar thir xprincs ano
insights on th tchnology trnos shaping purchasing ocisions tooay. Unlik inoustry conrncs that ar limito
to inoustry-insior issus, our branoo conrnc will provio attnos with aovic on how to crat solutions
that bttr anticipat th nos o thir customrs, thrby giving thos companis a comptitiv og.
CCLL CC /C/C CC L/L CC

wireless network: to make


sure emergency services
had the communications
they needed.
The Providence project
was announced in August
2005, was first tested in
April 2006 and was dem-
onstrated to the public in
September 2006.
Chip Yager, director of
Motorolas Mesh Network
Product Group, in Lake
Mary, Fla., said Providence
is a true success.
Yager had a lot to do
with how Providence and
its CIO, Charles Hewitt,
approached muni wire-
less. When I look at the
success of Providence, it
was a given, Yager said.
We didnt have doubts that
the Motorola piece would
work fine. The successes
are the things that Charlie
Hewitt had control of, such
as managing the folks and
the pole rights.
Yager said that for the
Providence police depart-
ment to get the access it
neededa major goal of
the wireless networkhe
had to be able to control the
load and the bandwidth.
Now that the network is
in place, the police force
is using it for everything
from delivering mug shots
and reports to allowing
police supervisors to per-
form their administrative
duties from the field. Provi-
dence CIO Hewitt said this
effectively increases the
size of the police depart-
ment because it means
that officers are in the field
full time, except when they
have to physically deliver
evidence or suspects to
the police department.
Hewitt said Providence
police officers have access
to the same software in
their squad cars as they do
at their desks, giving them
true mobile offices.
Getting buy-in from the
police department was cru-
cial to the projects success,
Hewitt said. Every applica-
tion Ive ever done involves
getting the right people
involved, he said. In the
case of public safety, the
first thing I did was make
sure the chief of police
was right behind me with
his staff. We never would
have undertaken this proj-
ect if we hadnt had a good,
strong backing from public
safety.
Yager said that while
Providence is using the
unlicensed 2.4GHz band,
its not using Wi-Fi. In stead,
the city is using proprietary
communications technol-
ogy licensed by Motorola
from the Department of
Defense. Yager said this
made the network more
secure and less subject to
interference from other
devices operating on the
same frequency band.
Meanwhile, the police
department continues to
add applications. Video is
on the way, for example.
In addition, other depart-
ments will soon be joining
the Providence network.
Next, we are expand-
ing the use within public
safety and getting the fire
department on board,
Yager said. Then well
extend the use of the net-
work into the building
inspection area.
Hewitt said he doesnt
plan to add public Wi-
Fi access any time soon,
although he figures that
will come along eventu-
ally. Im sure it will hap-
pen, he said. I keep in
touch with whats going
on in Boston. The model
theyve set up is probably
what will work here in
Providence. They set up
a nonprofit and got the
activists involved. Theyve
got the municipal govern-
ment as a tenant on the
network. I dont think the
city of Providence will try
to do it on its own. We are
very challenged in getting
funding.
Greenville,N.C.
greenville, n.c., is tak-
ing a different approach
to muni Wi-Fi than some
MUNI WIRELESS FROM PAGE 49
[CONTINUED ON PAGE 53]
INSIGHT
www. eweek. com
SEPTEMBER 10, 2007 n eWEEK 51
Greenville went with
a public muni Wi-Fi
network downtown
next to the East
Carolina University
campus to stimulate
economic growth.
Nortels Whiteford
(left) said Greenville
was very focused in
the implementation.
Charles Hewitt was tasked with
deploying Providences network.
28p44.indd 51 9/6/07 10:15:28 AM
Adver t i sement
The Key to Maximum Performance and
Reliability for Windows Vista

and Beyond
2007 Diskeeper Corporation. All Rights Reserved. Diskeeper, I-FAAST, InvisiTasking, Maximizing Performance and ReliabilityAutomatically!, Terabyte Volume Engine,
and the Diskeeper Corporation logo are registered trademarks or trademarks of Diskeeper Corporation in the United States and/or other countries. All other trademarks are
the property of their respective owners. Diskeeper Corporation 7590 N. Glenoaks Blvd., Burbank, CA 91504 800-829-6468 www.diskeeper.com
A SPECIAL REPORT
W
indows Vista has finally
arrived, and reviewers are
hailing it as the best OS
Microsoft

has ever built. For corpora-


tions, it boasts robust features such as
greatly improved security, a wholly
new and highly versatile user inter-
face, significantly simplified software
deployment, and broad backwards-
compatibility. While it may not happen
right away, most if not all Windows

-
central enterprises will want to make
the move to Windows Vista.
Defragmentation
Technology
Time for a Change
Its well known that a high number
of system slows, crashes, and even
file corruption and errors can be
traced to file fragmentation.
1
File
fragmentation puts your system per-
formance and reliability in serious
jeopardy. Its no surprise, then, that
substantial performance gains from
defragmenting, in the range of 90%,
have been documented.
2
But its not only the decision to
defragment your systems that makes
the difference. The choice of defrag-
mentation technology, both before
and after your move to Windows
Vista, is crucial.
The sheer scope and activity of com-
puter systems today has made even
scheduled defragmentation, once
state of the art, obsolete. Disks
and files once measured in kilobytes
and megabytes are now measured in
gigabytes and terabytes, and the
sheer number of files has increased
tremendously. Testing has shown
that scheduled defragmentation can-
not keep pace; between defrag-
menter runs, fragmentation simply
builds up and continues to negative-
ly impact performance.
3
The True Solution to
Maximum Performance
and Reliability
Only a completely automatic defrag-
mentation solution such as Diskeeper
2007released just in time for
Windows Vistawill truly keep pace
with the ever-expanding capacity and
intense activity on todays disks.
Instead of providing partial benefit
when defragmentation runs occur, all
less headache for an already-over-
worked system administrator.
With Windows Vista, disk activity on
servers also reaches new demanding
heightsand Diskeeper Server and
Diskeeper EnterpriseServer ver-
sions are right there with advanced
technologies such as Terabyte
Volume Engine

2.0, especially
designed for fast defragmentation
on the highest capacity servers.
Diskeepers automatic defragmenta-
tion is vital during the move to
Windows Vista as well. Deployment
of a new OS is no mean featit
means hardware upgrades, changes
and revisions in policy, verification
of legacy support, carefully con-
trolled software deployment, and a
long list of other vital tasks per-
formed while continually extinguish-
ing fires and maintaining current
networks. The last things you need
during such an evolution are reliabil-
ity and performance problems from
your current systems such as slowed
disk access and response times.
And since Diskeeper 2007 already
runs on Windows Vista, the licenses
you buy now will be with you every
step of the way, all the way into and
beyond the move to Windows Vista.
Automatically maximize your sys-
tem performance and reliability now
and put disk performance problems
behind youfor Windows Vista and
beyond.
Maximizing Performance and Reliability
Automatically!

Diskeepers interface shows fragmentation levels and relative locations


of all the files and folders on the selected volume.
such as business conferencing and
video presentations. Additionally,
Windows Vista utilizes considerable
resources, and it is vital that applica-
tions offering better performance
not drain resources from an already
taxed pool.
If scheduled defragmentation can-
not keep up with current system
demands, it will be completely lost
with Windows Vista. Deploying
Diskeepers real-time defragmenta-
tion right at Vista deployment means
that peak performance and reliabili-
ty are part of the package, and one
applications and all files benefit from
increased performance all the time.
With its proprietary breakthrough
InvisiTasking

technology, Diskeeper
2007 defragments and enhances file
systems in real-time, with no schedul-
ing needed. Defragmentation is now
performed on-the-fly, with no per-
formance hit on system resources.
Your systemis consistently faster and
more reliable with Diskeeper 2007
period. In testing against scheduled
defragmentation, which leaves frag-
mented files behind after running,
Diskeeper 2007 consistently elimi-
nates fragmentation to continuously
provide maximum performance and
reliability.
3
Take advantage of our free
45-day trial and see for yourself.
Plus, Diskeeper 2007 includes
Intelligent File Access Acceleration
Sequencing Technology (I-FAAST

)
2.0, specifically designed to deliver
increased performance, speed and
reliability above and beyond defrag-
mentation benefits.
Be Completely Ready
for Windows Vista
With its stunning GUIs, Windows
Vista brings a whole new level of
operation to computer interaction.
Because of its graphical nature, and
its support of an ever-widening vari-
ety of graphical and video-based
programs, enormous files and high-
capacity disks are the norm.
Smooth, fast access to these files is
vital, especially with applications
Special Offer
Try Diskeeper 2007 FREE for 45 days!
Download: www.diskeeper.com/ew7
(Note: Special 45-day trialware is only available at the above link)
Volume licensing and Government / Education discounts are available
from your favorite reseller or by calling 800-829-6468 code 4415
For test results, white papers and case studies,
visit www.diskeeper.com/EWpaper
1
File Fragmentation White Paper
2
Article: The Impact of Disk Fragmentation, WindowsITPro
3
White Paper: Is Real-Time Defrag Needed?
DKC 2007 Advertorials 0607 8/15/07 3:44 PM Page 1
INSIGHT
other cities. In Green-
ville, muni Wi-Fi serves
the downtown area and
the adjacent East Carolina
University. Installation
began in March 2007, and
the Phase 1 installation
was completed in May.
Greenville chose Nortel
Networks to take on the
muni Wi-Fi project, a natu-
ral outgrowth of existing
city operations, according
to Greenville IT Director
Rex Wilder. We went with
Nortel because we had a
Nortel PBX and decided
to keep that system and
add Nortel VOIP, Wilder
said. It was easy to con-
tinue with a Nortel wire-
less product.
Angela Singhal White-
ford, director of munici-
pal wireless solutions for
Nortel, said Greenville was
very focused in terms of
the goals for its implemen-
tation.
Theyre focusing on
the downtown using a
wireless mesh technology,
said Whiteford in Boston.
The reason theyre doing
this is economic devel-
opment. Theres also a
tie-in with the university.
East Carolina University
thought that one way to
attract students to the
university was to adver-
tise that it has Wi-Fi in the
downtown area.
Greenville has solved the
funding problem by getting
private industry to pay for the
municipal Wi-Fi system.
In general, it s the
operator thats providing
and paying for the net-
work, Whiteford said.
We brought a service pro-
vider to the table, and that
provider is WindChannel
Communications. Thats a
big deal because a lot of the
cities say they dont want to
own and operate the net-
work. They say theyll be
an anchor tenant and give
right of way.
Another good reason
for going with a provider
is support. Smaller cit-
ies probably have an IT
staff of two to five people,
Whiteford said. For them
to own and operate these
networks, thats the last
thing they want. Thats not
their core competency.
Riverside, Calif.
riverside, calif. , is
implementing muni Wi-
Fi to ensure that all citi-
zens are being served. The
muni Wi-Fi network, still
under construction, is an
extension of Riversides
community-oriented com-
puting initiative.
MUNI WIRELESS FROM PAGE 51
INSIGHT
THE COST OF FREE WIRELESS
A
T&T is providing the city of
River side, Calif., with free wire-
less access, supported by advertis-
ing. But there are still costs involved,
said Michael Beck, assistant city
manager.
It doesnt come free, but it can
be very cost-effective, Beck said.
That is where a community can get
caught with a surprise. You have to
make sure you know what the costs
are on the city side, not just the
wireless community.
Many cities, however, are get-
ting caught up in the free wireless
hype.
In general, weve gone through
a period of early hype and expecta-
tions, said Phil Belanger, managing
director of San Francisco-based
Novarum. Its not peace, love and
free Wi-Fi. Its a valuable service.
There needs to be value for the city
and things you can charge for.
Belanger said that part of the
problem is that cities have drasti-
cally underestimated the hard-
ware requirements for installing
citywide Wi-Fi.
It takes more infrastructure
than everyone was saying, he
said. He also said that the mere
existence of muni Wi-Fi will create
demand that in turn will require
more infrastructure.
The number now is probably
40 access points per square mile,
Belanger said. In dense urban
areas, it could be 100 per square
mile.
There is no such thing as free,
said Craig Mathias, a former chair-
man of the Board of Selectmen for
Ashland, Mass. It is not the func-
tion of government to be an ISP.
What we recommend is a premium
service that costs more than the
bottom tier. Id never recommend
free Internet service, except maybe
for things like the chamber of com-
merce with a portal.
But, Mathias added, the fact that
it will not be free will not delay its
progress. Wayne Rash
Riverside makes the availability of its
network obvious in public places.
[CONTINUED ON PAGE 55]
www. eweek. com
SEPTEMBER 10, 2007 n eWEEK 53
28p44.indd 53 9/6/07 10:16:13 AM
OGRES ARE EVERYWHERE. BUT IF YOUR APP IS
AHEAD OF SCHEDULE, THEY LEAVE YOU ALONE.
OGRES ARE EVERYWHERE. BUT IF YOUR APP IS
AHEAD OF SCHEDULE, THEY LEAVE YOU ALONE.
Your challenge: build rich apps, faster.
Defy it: get a jump start with Visual Studio


Tools for the 2007 Microsoft

Ofce system.
More tips and tools at defyallchallenges.com
In the late 90s, we
started with a proj ect
called Riverside Commu-
nity Online, said Michael
Beck, assistant city man-
ager. It created a consoli-
dated portal for the city
and related entities, and
one of its initiatives was
computer training and
providing computers for
low-income households.
Beck said the next step
was providing free Wi-Fi
to the community. We
focused on the down-
town, he said. We cre-
ated the downtown wire-
less mall, which was free
Wi-Fi in the downtown
corridor, and that eventu-
ally was expanded to 27
blocks. Then we expanded
to citywide Wi-Fi.
Creating a citywide Wi-
Fi network is beyond the
means of most local gov-
ernments, so Beck called
in the experts. AT&T is
providing access to the
entire city for freeup
to 512K bpssupported
by advertising, he said.
People can pay for faster
accessup to 3M bps.
Beck said that in addition
to the public Wi-Fi network,
AT&T is installing a public
service network that operates
on 4.9GHz. The city will be
paying for this network. We
pay for each connection or
radio we install, Beck said.
Its entirely data. It includes
police, fire,
public utili-
ties, public
works and
code enforce-
ment. The
4 . 9 G H z
[band] will
be used for
w i r e l e s s
cameras.
The ci t y
of Riverside
s e r v e s a s
a model deployment for
AT&T.
Riverside is our first
deployment, said Ebra-
him Keshavarz, AT&Ts
assistant vice president of
product marketing for busi-
ness development, in Bed-
minster, N.J. We design,
build, own and operate our
networks. Riverside is the
current model of metro Wi-
Fi. The citys responsibil-
ity is to provide power and
poles, to give us permitting,
and to give us applications
and revenues as an anchor
tenant.
W h a t
we bring to
the table is
design work
about where
w e w i l l
bring assets,
access points
and access
to the net-
work already
in the city,
Keshavarz
added. We
provide access to a 2.4GHz
network for citizens and a
4.9GHz network for pub-
lic services. These access
points use a mesh model to
reach larger access points
that have wired access.
The Riverside network
is still being built, but so
far the results are prom-
ising, Beck said. AT&T
is actively installing the
radi os now, he sai d.
Were at about 50 percent
on the equipment instal-
lation2 square miles
have been live since May.
The entire system will be
installed by the end of the
year, fully operational.
Beck said the city has
some advantages over
other similar communi-
ties. One of the advantages
that Riverside has is that we
own our own electric util-
ity, he said. We have our
own fiber, and were able to
do our own backhaul using
the fiber. A wireless system
eventually has to get back
on to glass, or the wireless
system will slow to a crawl.
Most people dont under-
stand that.
eWEEK Labs Senior Analyst
Wayne Rash is at wayne.rash
@ziffdavisenterprise.com.
Riversides Wi-Fi network can
handle streaming video in police
cars and other vehicles (left). The
city has mounted wireless access
points on street lights (below).
AT&Ts Keshavarz: Riverside is
a model deployment.
INSIGHT
MUNI WIRELESS FROM PAGE 53
www. eweek. com
SEPTEMBER 10, 2007 n eWEEK 55
28p44.indd 55 9/6/07 10:16:31 AM
COMMENTARY
Shihs curve can bring smiles
Former Acer executive charted road map for IT success
ERIC LUNDQUIST
Y
ou should know three
things about Stan Shih.
He figured out the PC
industry faster and bet-
ter than any other major
executive; he came up
with one of the easiest-to-
understand descriptions of
where to make money in
computers; and he knew
when to get out.
Shih was co-founder of
what became Acer Group in
1976. In 2004, he surprised
many in the computer in -
dustry by retiring at 60 to
go into venture capital.
If it hadnt been for
Shih, the Taiwan computer
industry might still be
slogging away, consisting
solely of contract manufac-
turers always wondering
why they worked so hard
but never got to enjoy
the profits from the years
when the PC business was
riding high.
I thought of Shih and his
smiling curve description of
the computer industry follow-
ing Acers $710 million offer
for Gateway. If the deal goes
through, Acer will acquire not
only the Gateway brand but
also the eMachines brand
which it
may decide
to leave dor-
mantand,
in a some-
what com-
plicated deal,
the Packard
Bell brand, which remains
strong in Europe.
In this Internet era,
when companies figure it is
cheaper to buy keywords on
Google than do the intellec-
tual heavy lifting of building
a brand, why would Acer
be interested in buying a
universe of brands? For that,
you need to go back to Shihs
smile chart (below).
I dont know exactly when
Shih came up with the curve,
but it would seem
an appropriate
revelation to have
late one night
over a few beers,
after you had just
spent the whole
day wondering
why, as a contract
manufacturer, you
worked so hard
and earned so lit-
tle. It is also a lesson for Dell,
where the ability to be the
best manufacturer can mean
you are the best at adding the
least value. Concept, brand-
ing, marketing and sales,
and service after the sale are
where Shih identified the
greatest value add when he
was in charge of Acer and are
still the areas, in my opinion,
where PC makers can find
financial and market success.
In the past, the upper ends
of both sides of the curve have
been the province of some of
the most successful compa-
nies. Steve Jobs focus on the
curves left-hand attributes of
concept, branding and design
allows him to charge a pre-
mium price and still create
an incredibly loyal Apple cus-
tomer base. Newer computer
concepts such as the recently
introduced Pano Logic virtual
desktop box hold promise by
keeping manufacturing costs
down and sales and service-
after-sale revenues up.
Acer has now become the
third-largest PC maker in the
world, based largely on fol-
lowing Shihs smiling curve,
and that should bring a
frown to any vendor not fol-
lowing that curve today.
Editorial Director Eric Lund-
quist is at eric.lundquist@
ziffdavisenterprise.com.
COMMENTARY
Under this
model, manufacturing
is the lowest value input

V
a
l
u
e

a
d
d
e
d
Concept/R&D
Design
Manufacturing
Service after sale
Marketing
Distribution
The Stan Shih smile curve
Higher
Lower

Production chain Higher


Branding
56 eWEEK n SEPTEMBER 10, 2007
www. eweek. com
28p56.indd 56 9/6/07 10:05:56 AM
Pump it up for Web radio
Yet another boon of the Web revolution faces extinction
JIM RAPOZA
I
n the classic song,
Radio Radio, Elvis
Costello sang the words,
They say you better listen
to the voice of reason.
But they dont give you
any choice because they
think that its treason.
Of course that song is
nearly 30 years old, so I
doubt that Elvis Costello
and the Attractions were
talking about Web radio.
But much of the anger and
contempt that Elvis was
directing at commercial
radio at the time holds true
for the controversy raging
today over Web radio.
Web radio has produced
many benefits, including the
ability to listen to hometown
stations after moving, niche
music programming and
the opportunity for indepen-
dent and unsigned musi-
cians to easily promote their
music to wide audiences.
Now to you, me and
pretty much everyone
else in the world, this all
sounds pretty good. But
to the Recording Industry
Association of America,
anything that lets people
listen to what they want to
listen to rather than what
the RIAA tells them they
should listen toespe-
cially anything that lets
musicians promote them-
selves without first signing
away their souls to RIAA
member companiesis very
bad and must be destroyed.
So a course was laid out to
destroy Web radio. The plan
was to charge Web radio sta-
tions exorbitant per-channel
fees that would essentially
force most Web radio stations
to shut down. And using their
pals in government and the
copyright office, the RIAA
and its nonprofit subsidiary
Sound Exchange had these
exact rules put in place that
will basically cripple the still
nascent Web radio movement.
Of course once people
found out about this there
was a pretty big outcry, which
resulted in lots of lobby-
ing and a bill submitted to
Congress (called the Inter-
net Radio Equality Act) that
would put the rules into a
more equitable percentage of
revenue model for collecting
fees from Web radio.
While the bills chances in
Congress arent looking that
strong right now, it has had
one good effect. Faced with this
bill ruining their plans, Sound-
Exchange and the RIAA have
begun negotiations with some
groups of Web radio stations to
come up with more equitable
terms for Web radio fees.
This is good, but in my
opinion, it isnt enough. All
Web radio outfits are not cov-
ered by the groups in these
negotiations. Plus, without
the force of law, theres no
guarantee that these agree-
ments wont change.
So thats why I think now,
as Congress returns from
vacation, is the right time to
put the pressure back on to get
the Internet Radio Equality Act
passed, either by contacting
your representatives directly
or through the SaveNetRadio
Coalition at www.savenetradio.
org. Because if radio really is
a sound salvation, lets keep as
many options and outlets open
as possible.
Chief Technology Analyst Jim
Rapoza can be reached at jim.
rapoza@ziffdavisenterprise.com.
When it comes to the RIAA
and its minions, logic is
almost never involved.
COMMENTARY
www. eweek. com
SEPTEMBER 10, 2007 n eWEEK 57
28p57.indd 57 9/6/07 12:30:08 PM
COMMENTARY
S
Free Wi-Fi is up for grabs
As EarthLink falls on hard times, San Franciscans eye startup
JASON BROOKS
an francisco free wi-fi is
dead. Long live San Fran-
cisco free Wi-Fi!
EarthLink, the Internet
ISP and erstwhile municipal
Wi-Fi build-out partner for
various U.S. cities, has hit
upon some rough financial
timesrough enough that the
company has recently opted
to slash half its work force
and dramatically scale back its
muni Wi-Fi ambitions.
My home base of San
Francisco is one of those U.S.
cities, and when word came
out that San Franciscos deal
with EarthLink and Google to
roll out free wireless Internet
to every corner of the city
had fallen apart, I was feeling
pretty disappointed.
The state of wireless data
access right now leaves much
to be desired. The last thing
that cell phone carriers want
is to deliver the sort of service
Id like to consume: a plain
pipe to the Internet that I can
access through any computing
device I choose. 802.11b/g net-
working is perfect for thisits
broadly supported among
devices and operating systems,
and, through the magic of
unlicensed spectrum, you can
do it all without tangling with
the Federal Communications
Commission.
Even though the EarthLink-
Google deal threatened to
saddle San Francisco with a
muni Wi-Fi monopolist for a
term of 16 years and wouldve
meant free Wi-Fi at a throttled
rate, with broadband speeds
reserved for those who paid
$22 a month to EarthLink for
the service, I was feeling opti-
mistic about the deal.
EarthLinks service would
offer an alternative to the
cable/telco duopoly to which
the citys broadband options
are now constrained, and
the free access wouldve
allowed me to pop online to
check my mail or otherwise
fiddle with the Internet from
any quarter of the city in
which I live and work.
The potential benefits
were less clear for EarthLink.
While the company would
be the sole enhanced service
provider for the network,
there was no guarantee that
enough San Franciscans
would become subscribers to
make the in vestment worth-
while for EarthLink.
A better way forward would
be for those of us in San
Francisco who would ben-
efit from a citywide wireless
network to build one of our
own. As luck would have it,
the city has the opportunity to
do just that, with the help of a
Google-funded startup named
Meraki thats out to expand
Internet access through com-
munity deployed Wi-Fi mesh
networking.
Meraki is now distributing
its wireless mesh repeaters to
individuals in San Francisco,
some of whom will feed the
network by sharing a portion of
their available bandwidth. Mer-
akis mesh model looks inter-
esting and looks like it has the
potential to deliver to the city
the free, open-ended wireless
network we seek, leaving San
Franciscos local government
free to train its attention and its
dollars on longer-term broad-
band goalssuch as extending
fiber as broadly through the
city as possible.
eWEEK Labs Executive Editor
Jason Brooks is at jason.
brooks@ziffdavisenterprise.com.
Meraki might be able to
deliver to the city the free
wireless network we seek.
COMMENTARY
58 eWEEK n SEPTEMBER 10, 2007
www. eweek. com
28p58.indd 58 9/4/07 2:34:09 PM
To learn more or to register visit: http://go.ziffdavisvts.com/virtualization
September 20, 2007
Virtualization:
Taking Control, Managing Growth,
Exploring Opportunities
KEYNOTE:
Virtualization Overview Management
Challenges and Solutions
PANEL AGENDA:
Beyond Consolidation: Mastering and
Managing Server Virtualization
Storage Virtualization: New Tools, New Demands
Desktop Virtualization: Whats Coming Next
Virtualization is spreading quickly throughout the enterprise, reducing
deployment times and increasing the exibility of IT infrastructures.
But while its opening new opportunities, its also raising new
challenges. From the server farm to the storage pool to the desktop,
extracting the benets from virtualization projects demands superior
IT management chops.
The Ziff Davis Enterprise Virtual Tradeshow, Virtualization: Taking
Control, Managing Growth, Exploring Opportunities is designed to
deliver the advanced knowledge that you need to make the most of
your virtualization deployments. Join us for a live, interactive, day-long
event where you can hear thought-provoking presentations, see the
latest solutions to virtualization management challenges, and
meet up with your peers to expand your professional network.
Register today!
KEY TOPICS:
New strategies for managing server deployments
Storage virtualization news that will change your
infrastructure strategy
Gearing up for desktop virtualization
Platinum Sponsors:
Ziff Davis Named
Winner of the
FAME Award
for Best Online
Event by
Folio magazine!
Isnt it about time that your
VIRTUAL TECHNOLOGY
REAL BENEFITS?
delivered
Servers
Desktops
Storage
VIRTUALIZATION
Mining for answers
Would RFID have helped in the Utah mine tragedy?
WAYNE RASH
T
he recent mine collapse
in Huntington, Utah,
seems like an unlikely
topic of conversation
between technology journal-
ists.
But as it happened,
eWeek Editor Deb Donston
and I were carrying on the
typically staccato conversa-
tion that happens on instant
messaging. We wondered:
Would wireless technology
have helped locate those
doomed men?
For the most part, the
answers were obvious. Wire-
less communication, as we
know it, isnt going to reach
through even a few feet of
rock, and 1,500 feet of bed-
rock is simply impossible.
And of course, theres
the question of power. Even
supposing the impossible,
would wireless commu-
nications have the ability
to keep running after two
weeks?
But that doesnt mean
that there is not a wireless
answerjust not the tradi-
tional one. Suppose instead
that miners in Utah had had
an RFID (radio-frequency
identification) tag on their
hard hats, on their belong-
ings and on their survival
gear. Then, when the explor-
atory holes were drilled,
an RFID reader could have
been lowered down, in addi-
tion to microphones and
cameras.
While an RFID reader
isnt the same thing as two-
way communications with
trapped miners, it could
have at least established
their presence. A few sec-
onds of readings would
have determined whether
any of the tags placed on
the miners were within
range. If none were, need-
less speculation would
have been avoidedthe
families would have been
spared, and the mine offi-
cials would have known at
once to drill somewhere
else.
Even better, the RFID tags
wouldnt have had to be vis-
ible to the camera, but sim-
ply within range of a radio
signal, even if that meant
reflecting around a cor-
ner or two. The tags could
have revealed what items
were being detected, and to
whom they were assigned.
Likewise, if the tags were
all detected in one place,
at least the grim news
could be delivered to the
families, providing clo-
sure, and letting officials
know whether there was
any point in continuing to
search.
Of course, the miners
didnt have RFID tags. I
dont know that such a
means of identification is in
current use anywhere in the
mining industry, although
some companies are dis-
cussing its use in Canada
and South Africa.
RFID is still an emerging
technology. But at the very
least, shouldnt tragic acci-
dents like this provide the
wake-up call that industries,
including mining, need
to ensure that they know
where their employees are,
and that they are able to
find them when something
terrible happens?
Senior Analyst Wayne
Rash is at wayne.rash@
ziffdavisenterprise.com.
Suppose a miner had had
an RFID tag on his hard
hat or in his belongings.
60 eWEEK n SEPTEMBER 10, 2007
www. eweek. com
COMMENTARY
28p60.indd 60 9/4/07 2:36:04 PM
INTERVIEW
tion. For the complete inter-
view, go to eweek.com.
The big news coming out
of AMD right now is the
launch of Barcelona. What
can you tell us about this
processor and what it means
for the company as you move
forward with your enterprise
offerings?
Barcelona is part of our
strategy that began with
Opteron to become a sig-
nificant player in the enter-
prise. When you look back
at the early Opteron days,
it was our first attempt to
create a product that was
really, truly built around
the needs of the enterprise,
and, being able to look back
and be objective, it was
eWeek Editorial Direc-
tor Eric Lundquist and
Staff Writer Scott Fergu-
son sat down with Ruiz
in AMDs Austin, Texas,
offices right before AMD
was preparing to launch
the much-anticipated four-
core Opteron processors
code-named Barcelona.
It hasnt been an easy
road to Barcelona for AMD:
Ruiz readily admits that
there were technical prob-
lems, and the companys
financial outlook did not
ease the growing pressure
to respond to Intel, which
has managed to bounce
back in the last year with
its much improved Core
architecture. And, just a few
Hector Ruiz
AMD on the offense
CEO Ruiz expects Barcelona to
strengthen its position against Intel
D
espite a casual, low-key demeanor, hector
Ruiz knows something about a ght.
During the last several years, the chair-
man and CEO of Advanced Micro Devices has
been the public face of the companys crusade against
its main chip rival, Intel. Besides fighting for market
share and technological superiority, AMD is also waging
a high-stakes campaign in the courts with an antitrust
suit against Intel.
and the introduction of that
product really changed a lot
of peoples view of where
the enterprise was going.
On one hand, you had the
extension of 64-bit to 32-bit
with x86, and that was really
a smart thing to do.
In my view that was the
beginning of the demise of
[Intels] Itanium.
Back i n those days,
[Opteron] still really had a
strong presence, but it did
a lot of other things, too.
It created an architecture
that was very efficient.
At the same time we
launched Opteron, we
started working on Barce-
lona, which was the next
step. The interim step that
we took between Opteron
and Barcelona was the
dual-core introduction,
which took the single-
core Opteron and created a
dual-core version of it, but
all that time we were look-
ing ahead to Barcelona.
People had invested in
software as well as ecosys-
temthe hardware eco-
system and, of course, the
software ecosystem. One
of the things that dual-core
Opteron taught us about
was how powerful that was
because people were able
INTERVIEW
[CONTINUED ON PAGE 64]
62 eWEEK n SEPTEMBER 10, 2007
www. eweek. com
weeks before the new chip
was ready to come to mar-
ket, Henri Richard, AMDs
chief marketing and sales
officer as well as one of the
companys main spokespeo-
ple, announced his resigna-
quite a hell of a product.
It changed a lot of the
rules of the game. A lot
of people have forgotten
because it was 2003 when
we introduced that product,
28talkRuiz.indd 62 9/4/07 3:25:56 PM
MOBILE COMPUTING
Risk vs. Reward
Mobile PCs are the backbone oI any competitive
and Iastmoving business, and they're staples
in schools and universities, too. But as laptops
grow more ubiquitous, the risks oI cyberthreats,
theIt, and malIunction grow, as well. Managers
and administrators must consider the saIety
oI their data, the reliability oI their laptop
heet, and their overall ability to recover Irom
incidents oI theIt or damage.
VI5IT CUP VIPTUAL TPADE5HCW FLCCP to
read, watch, and hear about the innovative
security and durability Ieatures built into the
latest Toshiba mobile systems.

Cet the inside scoop Irom industry experts
Watch our keynote presentation, panel
discussion, and online videos
Pead and comment on the 5ecure and
Peliable Mobile Computing bIc
Participate in monthly pcIIs and Iive
chat sessions

5ign up today and access insightIul, practical
inIormation that will help you optimize your
heet and maximize the productivity and security
oI your mobile systems.

Reister ncw at www.tcshibabusiness.ccm.
ZiII Davis Presents:
A Continuous Virtual Tradeshow Featuring Toshiba and Intel
CHOOSING SECURE AND RELIABLE MOBILE EQUIPMENT
www.toshibabusiness.com
ToshIntelAd3 v1 indd 1 8/24/07 1:58:13 PM
to upgrade to dual-core
Opteron rather easily.
One of the things we are
doing again with Barcelona
is protecting the investment
our customers had made for
a long time. It is going to
fit into the system, and its
going to fit into the same
thermal envelope, and,
therefore, its going to have
the opportunity for people to
adopt it and use it at a much
faster rate than they would
otherwise.
The other thing that
Opteron did was begin to
change peoples views of
energy-efficient comput-
ing, which was critical. So
we believe that, in terms of
performance per watt, [Bar-
celona] will continue to set
a strong leadership posi-
tion for our customers.
The other pieceagain,
we were looking ahead devel-
oping the Opteron family
was that virtualization was
really going to become more
and more significant over
time. We put a lot of work
into Barcelona to make it
very efficient as a virtualiza-
tion machine. I believe, and
our customers are telling us,
that in terms of performance
relative to virtualization, it is
going to be a phenomenal
machinevery scalable and
a lot of things that are very
critical.
Then when you come
down to the last piece, we
put a lot of effort into put-
ting in a world-class float-
ing point capability in this
device, so it will have very
strong raw performance.
So we are very excited and
champing at the bit to see
Barcelona out there.
What is the most significant
technological advantage that
Barcelona has over the dual-
core Opteron besides the
addition of two more cores
to the silicon?
That is a tough question. I
really think that when we
look at Opteron and then
when we look at Barcelona,
Barcelona is an improve-
ment on all the things we
just talked about.
Was there any frustration on
the companys part, or on your
part, that Barcelona did not
come to the market sooner?
Absolutely.
There is nothing that
we would have been more
excited about than getting
it out earlier. But we are not
making excuses. This is a
damn difficult thing to do,
as Im sure you can imag-
ine. This is the first time
that any company in the
world has put 600 million
transistors on a chipand
you can round that off and
say its a billion.
Thi s i s 600 mi l l i on
transistors on a chip, four
cores, complex technology
and tremendous architec-
tural features.
If you could do it over again,
would you have taken the
approach to quad cores that
Intel took with its Xeon proc-
essor, which basically ties two
dual-core chips on the same
silicon?
This is one of those things
that at some point in time
you have to bite that bul-
let integrating that much
technology on a chip.
We felt that the quad
core was the appropriate
time to do that, and Im
glad we did, even though
we were disappointed
that we couldnt be a little
earlier. But now we have
that experience, which is
amazing.
We now have a talented
technical team that has
been able to figure out
600 transistors on a chip,
and we have a talented
manufacturing team that
[worked to make sure] that
when you had something
this complex, that all 600
million transistors worked,
and they have done a phe-
nomenal job.
We have gone through
a lot of learning, and, as
we have publicly stated,
the defect densi ty for
our quad-core technol-
ogy is the lowest we have
ever experienced. In all,
people worry that we are
not quite at the same
node technically as our
competition. The answer
we give is that, yes, that
is true, but we [made] a
conscious decision to be
earlier at other things,
and we were earlier in
being able to integrate
this much technology [on
a chip].
We have the Hyper-
Transport technology with
this chip that is pretty pow-
erful and the architecture
features, like the floating-
point capabilities. [If you
look at it] from that dimen-
sion, you can say we are six
months to two years ahead.
There is no question that
in our minds, based on the
data that we have from our
partners, that this is the
best virtualization machine
that is out there.
What about the fact that the
clock speed that Barcelona
will debut at2GHzis a
lower clock speed than some
customers and industry
experts had expected?
Being able to build this
product was incredibly
challenging. So, being able
to benefit from the scaling
of the frequency was also a
big challenge. We made a
decision, and we recognize
that the part we can claim
the strongest position in is
performance per watt. So
we made a decision that
we were going to be out in
the watt rangethat really
put us in a clear leadership
position.
This just happens to
translate to a frequency
of 2GHz. Frankly, I think
we are going to surprise
people. This is an area
that we made a decision
to come out in a place
where we had the clear-
est and strongest position.
I would predict to you that
at the end of the year, peo-
ple are going to be very
pleasantly surprised in
how well this is going to
scale in frequency.
RUIZ FROM PAGE 62
INTERVIEW
64 eWEEK n SEPTEMBER 10, 2007
www. eweek. com
We think visualization, not
virtualization, is going to be
the key to everything.
[CONTINUED ON PAGE 66]
28talkRuiz.indd 64 9/4/07 3:26:12 PM
PUT MORE THAN JUST TIME ON YOUR SIDE
When you have a hardware or software need at the last hour, you can rely on Insight.
But you can also count on us for your complete, long-term systems solutionsfrom planning
and design to implementation. Gain a trusted advisor. Gain Insight.
Source Code:AD069
2007 Insight Direct USA, Inc. All rights reserved. Insight is a registered trademark of Insight Direct USA, Inc. All other company and product names are trademarks or service marks of their respective owners. For all prices and products, we reserve the right to make adjustments due to errors, changing market conditions, product discontinuations or typographical errors.
Technology
Solutions
insight.com 800.927.3209
Symantec Backup Exec System Recovery
12108105
System Recovery Server Edition
- (v.7.0)
Reduce Windows recovery time
Remotely restore unattended
servers in distributed locations
Adobe

Acrobat

8 Professional
22020403
The essential PDF solution
Create, combine, and control
Adobe PDF documents
Easy, more secure distribution,
collaboration, and data collection
Sony DRX S50U - DVD burner
DRX-550U
DVD multi-burner for Windows

Vista/ XP/2000
Equipped with the Nero

7 Essentials
software suite and USB 2.0 interface
Read 24x (CD) / 8x (DVD); Write 24x
(CD) / 8x (DVD R) / 4x (DVD R DL)
Any estimates to where its
going to scale by the end of
the year?
No. We are not ready to
talk about that.
How has the market changed
in the last year, and how is
AMD preparing to respond
now that Intel is on better
footing than when the dual-
core Opteron came out?
In some masochistic way, I
like to take credit for Intel
being a better company. I
believe that is what competi-
tion does. We do recognize
and we do acknowledge that
we are going into a period of
time quite different than the
one we went into when we
launched [the first] Opteron,
and we are now in a much
more competitive space.
[Intel has] good prod-
ucts. Before, they did not
have products as good, and
now this is going to make
us stronger in a certain
sense. Now we have to fig-
ure out how to do things
even faster and better.
How do you intend to move
the products out to market
faster to improve your man-
ufacturing capabilities?
I think we are doing some
things that are going to put
us in a strong position, but
I would put [them] in the
category of highly propri-
etary. I think that you can
measure the results when
you put [Barcelona] under
the microscope.
I think you are going to
see some highly innova-
tive things, and that is only
beginning. I think that our
approach to multicore tech-
nology is different from our
competitors. I think that it
is going to make us a better
developer of technology,
and despite the size differ-
ential, by any measure our
manufacturing is pretty
strong. The fact that we are
only one-tenth the size [of
Intel] is a disadvantage to
some people, but I believe
that we are fairly strong.
Earlier this year, you lost
some market share. How did
your relationship with Dell
affect the supply chain in the
first half of this year?
You know that had a psy-
chological effect on us, but
it was unfortunately one of
those things like the stock
market, like the behavior
of subprime lending. There
were customers around the
world that were concerned
that the energy that would
be required to serve such a
large customer would take
away from our attention to
others. There were some
people who were nervous
and held back from buying
stuff from us. But the reality
is, when you look at Dells
ability to ramp, in addition
to addressing their own set
of issues, that was more of
a psychological reaction and
an emotional reaction and
not a real reaction.
We always knew what it
would take to serve a com-
plex and challenging cus-
tomer like Dell, and, while
we were prepared for it, the
outside world did not antici-
pate it. Therefore, I think we
suffered some unintended
consequences for a couple
of quarters. People thought
that we were going to have
to divert our attention, but I
think that has settled down.
Now, I think everyone
knows that our relationship
with Dell was orderly, and I
believe that is behind us.
How does the new relation-
ship between Sun Microsys-
tems, which had been an
exclusive partner of yours
for several years, and Intel
affect AMD?
Sun is a true partner, and
we have done a lot of things
in a joint fashion.
The relationship between
our engineering teams is
very strong, and, at the risk
of sounding flippant, we
really welcome the com-
petition with Intel. I really
believe that anyone that
deals with both of us even-
tually knows that we have
the better products, and if
you dont deal with both of
us, you will never know.
I can tell you in some way
that this is good for us, and
all the products that Sun
is launching or developing
continue to be AMD-based
products. And Barcelona is
going to be a very key part
of their offerings.
Sun recently announced its
eight-core Niagara 2 proces-
sor, which seemed to leapfrog
ahead of the four-core offer-
ings from Intel and AMD.
Can you explain your views
on what Sun has done for
microprocessors?
Sun has had a very respect-
able computer architecture
team that continues to
enhance SPARC. It is very
similar to IBM, which has
a very competent architec-
ture team that continues
to enhance Power. Both
of these companies have
a strategy that continues to
nurture their proprietary
architecture, but I think
both companies know how
important a standard prod-
66 eWEEK n SEPTEMBER 10, 2007
www. eweek. com
RUIZ FROM PAGE 64
AMDs new Austin campus is being designed as a
model of green building and sustainable development.
[CONTINUED ON PAGE 70]
INTERVIEW
28talkRuiz.indd Sec1:66 9/4/07 3:26:16 PM
kellsystems
contact kell systems
tel +703.818.0033
info@kellsystems.com
www.kellsystems.com
------Original Message------
From: Info, Kell Systems [info@kellsystems.com]
Sent: JUNE 28, 2007 09:30
To: David Prendergast, IT
Subject: KELL PORTABLE SERVER ENVIRONMENTS
Dear David,
Thank you for your interest, and for your time on the phone. Please nd attached the technical specication of the cabinets as
requested, and yes, we have a wide range of nishes to match your different ofces. Please let us know when it is you have in
mind to visit us for a demonstration.
Looking forward to speaking again soon.
Kind regards,
Kell Systems
CABLE MANAGEMENT FULL EIA-SPEC 4-POST 19 RACK 170 DOOR OPENING
O
REMOVABLE
FAN MODULES
BUILT-IN
POWER
DISTRIBUTION
SOUNDPROOF
CABLE PORT
DETACHABLE
SHELL FOR
FULL SIDE &
REAR ACCESS
FULLY MOBILE ON
LOCKABLE CASTORS
LOCKING
DOORS
FRONT-TO-BACK COOLING
WIDE RANGE OF STYLES & FINISHES
Bob,
This looks like a far better answer for the branch ofces upgrade program. Instead of robbing ofce space and spending
half the budget on building rack rooms everywhere, we can deploy the hardware in these, right in the ofce areas. They
look just like the furniture, but they have a full spec server environment built-in, and the soundproong gets rid of the
noise issue. The noise reduction is >96% with the doors closed.
I spoke to their tech guys and this 24U version has cooling to support 5 or 6 of our servers (plus switches, UPS, tape
drive etc.), so we would have the required room for expansion later. They are portable as well, so if a lease runs out or
something, and they have to move ofce, we can just pick up and go.
It looks like a no-brainer to me. What do you think?
Dave
David Prendergast, IT
Bob Murray, Head of IT
Roger Wills, Facilities
FW: KELL PORTABLE SERVER ENVIRONMENTS
From:
To:
Cc:
Subject:
FW: KELL PORTABLE SERVER ENVIRONMENTS
NEW!
TAKE THE VIDEO TOUR AT
WWW.KELLSYSTEMS.COM
uct is for them. I think our
role is not to challenge that
strategy but to serve them
when they need x86 proces-
sors, and thats our plan.
AMD has reported losses in
the last few financial quarters.
What are you trying to do to
rectify the companys finan-
cial picture? Also, in the years
between the release of the first
Opteron and now, AMD grew
very fast. Did you grow too fast
for your own good?
We do recognize that we
have a financial challenge.
In addition to all the prod-
uct and technological chal-
lenges in front of us that we
have to address, you have to
start at the strategy of what
we want to accomplish and
the things that we want
to do. We want our server
architecture to continue after
Barcelona and Bulldozer
[a new set of x86 processor
cores that AMD is design-
ing and will debut in 2009].
We have ideas, through the
acquisition of ATI, on the
future of computing, and we
have those plans in place.
You saw us improve from
first to second quarter [of
2007] financially. It is our
expectation that we will tele-
graph this to the industry and
that we will again improve in
the third quarter, and we will
continuously improve. All of
that is being done prudently
and judiciously. We are not
out slashing costs just to get
a quarter with a right num-
ber because we truly believe
in our vision. We believe in
our products and our road
maps.
The ot her quest i on
that you have is interest-
ingdid we grow too fast?
Quite the contrary. I think
in any industry and in any
environment, whether its
automotive or airplanes or
computers, when you have
the technology advantage
that we had from 2003 to
2006, we should have grown
faster. It was only due to
the abusive, monopolistic
behavior of our competitor
that we didnt.
Five years from now, what
does computing look like?
Is it going to be desktops
and laptops, or is there
going to be a whole new
model out there?
We think visualization, not
virtualization, is going to
be the key to everything.
The other part that I think
is going to be big is the
segmentation of the mar-
ket, to make it easier not
to have a general-purpose
machine that does every-
thing for everybody but to
be able to adjust. This is
where our multicore tech-
nology is pretty strong,
and we will be able to
do things that are great
for supercomputers and,
with minor changes, for
servers and workstations.
With further changes,
[the multicore technol-
ogy] could be even better
for desktops.
I also think that desk-
tops are going to become
an appliance. Today, it is
pretty easy to say that if
you have a four-bedroom
house, a three-bedroom
house, you have a phone
in each bedroom. I think
the desktop will become an
appliance of that type.
I think that mobile com-
puting will continue to evolve
pretty rapidly, and there are
going to be some accelerated
conversions as to whether
you want a laptop that does
a lot of things or a phone that
does a lot of things. I think
there is going to be a mixture
of products in there, but I
think definitely mobility is
going to be key.
What can you tell us about
the upcoming quad-core Phe-
nom processor for desktops,
especially in light of AMDs
recent success in selling desk-
top chips this year?
As far as desktops go, in
the foreseeable future,
[this part of the market has
got] two big buckets.
We play, and our compe-
tition plays, in the perfor-
mance-driven bucket. That
is, if you are a gamer, and
you want great technol-
ogy, that is where Phenom
comes in. It is a deriva-
tive of the server proces-
sorBarcelona. Thats
what people saw at our
analyst meeting. Its pretty
amazing that it was able to
demonstrate some gam-
ing capability that is not
available yet in the market
because of the technology.
So we believe that we are
going to have a very strong
position in that space.
The ot her space i s
the very price-sensitive,
appl iance l ike space. I
think that is more about
features and platforms.
There is closer interac-
tion with the OEMs to
figure out what kind of
platform you would like
to put into it.
Mobile is going to be
much more platform-driven
than anything else. If you
think of the phone as an
example, when was the last
time you bought a phone
because it has a 1GHz proc-
essor in it? I would guaran-
tee that you wouldnt know
what the speed of the chip
in your phone is. You care
about what you want [the
phone] to do.
What we see more than
anything else is technol-
ogy moving fast to stores to
provide the experience the
user needs. There are some
people who want to play
games on mobile [devices],
and that means that they are
going to want to have certain
capabilities on that device.
This is quite different from
the homemaker who might
want to use the product as a
Web surfing technology, for
e-mail, etc. So we need to be
able to address these issues
and answer them.
This is something my
competitor hates to hear,
but I think, frankly, that the
CPU is going to be less and
less relevant. What I think
is going to be relevant is the
platform.
I think, frankly, that the CPU
is going to be less and less
relevant. What I think is going
to be relevant is the platform.
RUIZ FROM PAGE 66
70 eWEEK n SEPTEMBER 10, 2007
www. eweek. com
INTERVIEW
28talkRuiz.indd Sec2:70 9/4/07 3:26:22 PM
e n t e r p r i s e
' | \ \ | | | | 1
For full details, Visit www.apc.com/promo Key Code w723x
Call 888.289.APCC x9147 Fax 401.788.2797
2007 American Power Conversion Corporation. All rights reserved. NetBotz, NetShelter and InfraStruXure are registered trademarks of American Power Conversion Corporation. Other trademarks are property of their respective owners.
132 Fairgrounds Road, West Kingston, RI 02892 USA AX4A6BF_NAMf
Download Free Rack White Papers
Start with the right rack,
and you cant go wrong.
Get the seamlessly integrated, fully compatible
NetShelter

rack system from APC

.
Rack PDU starts at $89.99
Power distribution that remotely controls power
to individual outlets and monitors the aggregate
power consumption.
Switched, metered, and basic models available.
Includes horizontal, vertical, and toolless mount.
Puts power in the racks near the equipment where
it is needed most.
Wide range of input and output connections from
single-phase to 3-phase.
Rack-mount Keyboard Monitor starts at $1550
1U rack-mountable integrated keyboard, monitor and mouse.
15 or 17 ultra-thin, LCD monitor with
integrated keyboard.
Ease of installation minimizes support and
maintenance costs ensuring lower cost of ownership.
Can be used in a variety of IT environments from
computer rooms to large data centers.
Cable Management starts at $29.99
Comprehensive selection of accessories designed
to organize power or data cables within a
rack environment.
Eliminates clutter and cable stress.
Zero U of rack space with the vertical cable organizer.
Quick-release tabs, toolless mounting.
APC, the name you trust for power protection, also
offers a comprehensive line of non-proprietary racks,
rack accessories and management tools that ensure
the highest availability in a multi-vendor environment.
With APC racks, accessories, and management tools,
you can design a comprehensive rack solution that
meets your availability needs for today and that
easily scales up for tomorrow.
Need assistance? Our expert Congure-to-Order
Team can custom tailor a complete rack-mount
solution that suits your specic requirements.
Contact APC today and protect your rack application
with Legendary Reliability

.
NetShelter

SX starts at $1150
Rack enclosures with advanced cooling, power distribution,
and cable management for server and networking
applications in IT environments.
Integrated rear cable management channels allow easy
routing, management and access to large numbers of
data cables.
3000 lbs. weight capacity.
Vendor neutral mounting for guaranteed compatibility.
Toolless mounting increases speed of deployment.
NetBotz

Security and Environmental


starts at $889
Protecting IT assets from physical threats.
Visual monitoring of all activities in the data center
or wiring closet.
Third-party monitoring via dry-contacts, SNMP, IPMI,
05V and 420mA.
User-congurable alarm and escalation policies.
Temperature, humidity, and leak detection.
NetShelter is completely
compatible with all APC
award-winning InfraStruXure

architecture, allowing you to


add rack, power and cooling
on a scalable as-needed basis.
The NetShelter

SX is
vendor neutral and carries
the Fits Like a Glove
compatibility guarantee.
Rack Air Removal Unit SX starts at $2600
Rear-door fan system for performance heat removal up to 23kW
Temperature controlled, variable speed fans allow reduced
energy consumption during off-peak cooling periods.
Ducted exhaust system increases air conditioning efciency
and prevents hot spots by eliminating recirculation.
Manageable via Web, SNMP, Telnet and local LCD display.
Site Selection for
Mission Critical
Facilities
White Paper #81
Re-examining the
Suitability of the Raised
Floor for Data Center
Applications
White Paper #19
Essential Rack
System Requirements
for Next Generation
Data Centers
White Paper #7
e n t e r p r i s e
' | \ \ | | | | 1

' | \ \ | | | | 1 1 J 1 1
P|a:e ]cu| ad || ||e
Z|ff 0av|s Ned|a Fnterpr|se 0|ass|f|ed 0roup:
ewEE|, C|0 ||||| a|d Bae|||e.
*Keep ]our campaign highl] visiole and increase reader
impressions o] running ]our ad four times per month in ewEEK
|c| rc|e |||c|ra||c| :a|| 1-800-/b8-8/89
UNINTERRUPTIBLE
POWER SUPPLIES
BUY SELL NEW REFURBISHED
SmartUPS

750..................$229.00
SmartUPS

1500.................$399.00
SmartUPS

1500 RM2U.......$549.00
SmartUPS

2200 RM2U.......$799.00
SmartUPS

3000 RM2U.......$999.00
www. upsf or l ess. com
( 866) 577- 3628
UPSFOR LESS
experts in uninterruptible power supplies
For your free white paper, ARIA - The
Next Evolution in Data Collection Technology,
call 1-800-664-4593, email info@lxe.com,
or visit www.lxe.com/ew.
Ruggad loba Comutars
and Vraass hatworks or
mrovad Suy Chan
Farormanca.
kwardVnnng Suort.
Network with Spider
(from $800)
Web with Spider
(from $999)
Publish for CD/DVDs
(from $2,500)
Engine for W
in & .NET
Desktop with Spider
($199)
Network with Spider
(from $800)
Web with Spider
(from $999)
Publish for CD/DVDs
(from $2,500)
Engine for W
in & .NET
Engine for Linux
Engine for Linux
Desktop with Spider
($199)
1-800-IT-FINDS www.dtsearch.com
Instantly Search Terabytes of Text
Bottom line: dtSearch manages a terabyte of text in a single index and
returns results in less than a second InfoWorld
For combing through large amounts of data, dtSearch leads the market
Network Computing
Blindingly fast Computer Forensics: Incident Response Essentials
Covers all data sources ... powerful Web-based engines eWEEK
Searches at blazing speeds Computer Reseller News Test Center
The most powerful document search tool on the market Wired Magazine
For hundreds more reviews and developer case studies see www.dtsearch.com
over two dozen indexed, unindexed, fielded data and full-text search options
highlights hits in HTML, XML and PDF, while displaying links, formatting and images
converts other file types (word processor, database, spreadsheet, email and
attachments, ZIP, Unicode, etc.) to HTML for display with highlighted hits
Spider supports static and dynamic Web content, with WYSWYG hit-highlighting
API supports .NET/.NET 2.0, C++, Java, SQL databases. New.NET/.NET 2.0 Spider API
dtSearch

Reviews
The Smart Choice for Text Retrieval

since 1991
New
64-bit beta
Contact dtSearch for fully-functional evaluations
e n t e r p r i s e
C l a s s i f i e d
Systems Management. Done.
NOTHING TO HIDE HERE.
KBOX
TM
provides equal or advanced capabilities
and performancewithout excessive hidden costs.
KACE
TM
helps medium
enterprises achieve
IT efficiency, productivity and reduce costs. Consider
KBOXthe leading systems management appliance
and get all the functionality at a price you can afford.
See for yourself in the FREE Analyst ReportBest Practices
in Lifecycle Management: Comparing KACE, Altiris,
LANDesk and Microsoft SMS. Get your copy today at
www.kace.com/eweek. Or call 888-522-3638 for details.
KBOX appliances from KACE provide substantially
equivalentand in some cases superiorcapabilities
to Altiris, LANDesk and Microsoft SMS.
Andi Mann, Senior Analyst, Enterprise Management Assoc.
Whats really lurking beneath the surface of solutions from
Microsoft

SMS, Altiris

and LANDesk

?
SYSTEMS MANAGEMENT
KACE and KBOX are trademarks of Kace Networks, Inc.
All other registered trademarks are owned by their
respective companies.
$
$ $ $ $
$ $ $ $
$ $ $ $ $
COMPETITIVE COST COMPARISON
KBOX
Altiris
LANDesk
Microsoft SMS
A KBOX solution can cost as little as
one-quarter of its software-only rivals.
Andi Mann, Senior Analyst,
Enterprise Management Associates
See Analyst Report for cost assumptions and
detailsincluding a real-world cost comparison.
Winner MMS 2007
Most Innovative Product
k-10 kace eWeek BergAd 2pr 8/2/07 12:32 PM Page 1
eWEEK (ISSN 1530-6283) is published weekly except for July 16 and 30, Aug. 6 and 20, Sept. 3, Oct. 1 and 29, Nov. 19, Dec. 10, 24, 31 and combined issues (Feb.
12/19, April 2/9 and June 25/July 2) and by Ziff Davis Enterprise Inc., 28 East 28th St., New York, NY 10016-7930. Periodicals postage paid at New York, NY, and
additional mailing offices. Single-copy price including first-class postage: $6. One-year subscription rates: U.S. $195, Canada/Mexico $295, foreign airmail $395.
All orders must be prepaid. Subscription inquiries should be directed to Customer Service Department, eWEEK, P.O. Box 3402, Northbrook, IL 60065-3402, or call
(888) 663-8438, fax (847) 564-9453; Customer Service Web site: http://service.eweek.com. Please note that changes of address require that a new application be
filled out completely, and please include both the new and the old addresses. Please allow a minimum of 4 to 6 weeks for processing. POSTMASTER: Send address
changes to eWEEK, P.O. Box 3402, Northbrook, IL 60065-3402. We periodically make lists of our customers available to carefully screened mailers of quality goods
and services. If you do not want to receive such mailings, please let us know by writing us at Customer Service Department, eWEEK, P.O. Box 3402, Northbrook, IL
60065-3402. GST registration number 865286033. Publications Mail Agreement No. 40009221. Return undeliverable Canadian addresses to P.O. Box 503, RPO West
Beaver Creek, Richmond Hill, Ontario L4B 4R6. Printed in the U.S.A.
COMPANY PAGE TELEPHONE URL
1 & 1 Internet 4-5 (877) go1and1 www.1and1.com
American Power 27 (888) 289-APCC www.apc.com/promo
Conversion Corp.
AT&T Wireless 43 www.wireless.att.com/laptopconnect
CA 25 www.ca.com
CDW Corp. 13 (800) 399-4CDW www.cdw.com
Diskeeper Corp. 52 (800) 829-6468 www.diskeeper.com/ew7
Fujitsu Computer 23 www.us.fujitsu.com/computers/reliability3
Systems Corp.
Hewlett-Packard 7 (800) 888-0574 www.hp.com/go/tameyourdata6
IBM 2-3, 19, 21, www.ibm.com
61, 68-69, 76
Insight Direct USA 65 (800) 927-3209 www.insight.com
Intel Corp. 9, 11 www.intel.com
Juniper Networks 41 (888) JUNIPER www.jupiter.net/threatmanagement
Kell Systems 67 (703) 818-0033 www.kellsystems.com
Microsoft 30, 38, 46-47, 54 www.microsoft.com
Toshiba America Inc. 63 www.toshibabusiness.com
Tripp Lite 45 www.tripplite.com/eWeek
VeriSign Inc. 75 (866) 893-6565 www.verisign.com/dm/evssl
Websense Inc. 33 www.websense.com/challenge
ISSUE FEATURES DEMOGRAPHICS
Sept. 17 New licensing landscape Developer Solutions
Storage
Sept. 24 Security Storage Solutions
Search
Oct. 8 IT budget 2008 Channel Solutions
Enterprise apps Government Solutions
Oct. 15 Green IT Developer Solutions
E DI T ORI AL CAL E NDAR
Marketing
resources
For information about advertising
in the No. 1 enterprise newsweekly,
go to www.eweekmedia.com.
Youll find the resources you need,
including our events calendar, research
and circulation summaries, as well
as background info on eWEEKs
award-winning print and online brands.
A D V E R T I S I N G C L O S I N G D A T E S
ISSUE CLOSING DATE ISSUE CLOSING DATE ISSUE CLOSING DATE ISSUE CLOSING DATE
Sept. 17 Sept. 3 Sept. 24 Sept. 10 Oct. 8 Sept. 24 Oct. 15 Oct.1
ADV E RT I S I NG S AL E S OF F I C E S
Karl H. Elken
Group Publisher & Vice President
(212) 503-5631
Jason Ratner
Group National Associate Publisher
(415) 547-8813
NATIONAL REGION
Chris May
National Sales Director, Channel
(415) 547-8241
EASTERN REGION
Matthew Merkin
Group East Coast Ad Director
(212) 503-5641
Darrell Gottlieb
Midwest District Sales Manager
(212) 503-5650
Kate McLaughlin
Northeast/Southeast District Sales Manager
(212) 503-5685
Gena Grossberg
Sales Assistant/Classified Ad Sales
(212) 503-5647
WESTERN REGION
Christina Card
Regional Sales Manager
(415) 547-8474
Kelsey Chao
District Sales Manager
(415) 547-8485
Jessica Cooper
Sales Assistant
(415) 547-8866
Tia Lambert
Marketing Specialist
(415) 547-8486
CUSTOM SOLUTIONS GROUP
Martha Schwartz
Senior Vice President
(212) 503-5643
Scott Miller
Senior Executive Sales Director
(212) 503-3835
Beatrice Olivas
Executive Sales Director
Face to Face Events
(415) 547-8476
CIRCULATION
Kelsey Voss
Circulation Director
(212) 503-5320
Dorrett McDonald
Circulation Manager
(212) 503-5340
SUBSCRIPTION INQUIRIES
(888) 663-8438; Fax: (847) 291-4816
http://service.eweek.com
eWEEKS sales and marketing staffs can be reached at
(212) 503-5600 or (800) 758-3789, or via e-mail by using the
following convention: name.surname@ziffdavisenterprise.com.
eWEEK, PC Week, PC Week Netweek, PC Week Shoot-Out,
Spencer F. Katt and Spencer F. Katt: Rumor
Central are registered trademarks of Ziff Davis
Publishing Holdings Inc. Copyright (c) 2002 Ziff
Davis Media Inc. All rights reserved. Reproduction
in whole or in part without permission is prohibited.
For permission to reuse material in this publication
or to use our logo, send e-mail to permissions@
ziffdavis.com. For reprints, contact Hiedi Brooks via
e-mail, hbrooks@fostereprints.com; phone, (866)
879-9144.
AD INDEX
www. eweek. com
SEPTEMBER 10, 2007 n eWEEK 73
28p73.indd 73 9/7/07 2:44:37 PM
74 eWEEK n SEPTEMBER 10, 2007
www. eweek. com
Spill your guts at spencer.katt@ziffdavisenterprise.com, or give the Katt a howl at 781-938-2627.
SPENCER F. KATT
Malware mashup is monstrous
Attackers phish for Monster users; Ellison aces real estate deal
T
hey did the mash, they did the monster mash, droned
the dulcet-toned Drudge as a pal told him about the
ongoing attacks against Monster.com and its users.
The employment Web site itself claims the attack is called
Infostealer.Monstres, but security experts say it isnt just
a vanilla hack, but rather a malware mashup that includes
data theft, phishing and Trojan horse attacks. Armed with
the contact information from
Monsters employer accounts, the
rsum robbers have launched
phishing attacks on Monster
users. The pal said that USAJobs.
com, a rsum posting site for
federal jobs that uses Monsters
technology, has also been
breached. Me-ouchfolks usu-
ally arent exposed to that kind of corruption until after they
get a government job, guffawed the Grimalkin.
Spence and his pal cursed the annual September inva-
sion of college students to Beantown as they dodged an
overloaded U-Haul truck that swerved onto the curb in front
of them. The duo soon ducked into Crossroads Irish Pub
in Bostons Back Bay, more to escape the collegiate chaos
than to simply imbibe. After ordering a round, the pal told
Spence that Oracle boss Larry Ellison reportedly bought the
Malibu Racquet Club recently.
Big deal. When he isnt
buying tech companies, Larrys
been buying chunks of Malibu,
no? queried the Kitty. The
pal acknowledged that Larry
had indeed been buying res-
taurants and real estate in
Malibu, but this time rumor has
it that Larry wants to team up
with former tennis star John
McEnroe to turn the club into
a world-class tennis academy.
If true, dya think both their
egos could fit on the court?
laughed the Lynx. The pal also
asked Spence if hed checked
out FakeLarryEllison.blogspot.
com, a faux blog in the style of
the popular FakeSteveJobs blog. Yeah. My favorite entry
had Fake Larry detailing how he grows bonsai marijuana
plants, said Spence.
The pal quickly changed the subject to Microsoft and said
the Redmondians were expected to launch their commu-
nications suite, featuring Microsoft Office Communications
Server 2007, Oct. 16. As he signaled the bartender for a sec-
ond round, the Furballs friend noted
that Apple founder Steve Wozniak
was nabbed earlier this year by the
California Highway Patrol for driving
104 mph in a Toyota Prius. Maybe
he was just preparing for the pos-
sible G-forces hell feel when his
co-pilot Buzz Aldrin takes the wheel
for their planned expedition to the
South Pole in a hydrogen-powered Hummer this December,
cackled the Kitty.
The pal also mentioned something else involving
Wozniak that moved fast: The Young Woz and Jobs custom
Lego-style play set. According to the Podbrix.com Web site,
makers of the toy, the play set went on sale Aug. 29 and
sold out two days later. Thats OK. Im holding out until
they come up with a Young Gil Amelio and Ellen Hancock
play set, mused the Mouser.
@
LITTERBOXLYNX
cheat-sheets.org
mantoadmire.blogspot.com
mynumo.com
And dont forget me at go.eweek.com/kattoon
RUMOR CENTRAL
28p74.indd 10 9/6/07 4:14:00 PM
Gt your r EV whit papr at www.vorisign.comomovssl or call -866-893-6565.
EV_STWC_eWeek2.indd 1 7/31/07 1:33:49 PM
WHI TE PAPER
The Latest Advancements
in SSL Technology
WHI TE PAPER
+ Introduction 3
+ SSL Overview 3
+ Server Gated Cryptography: 4
Enabling Strong Encryption
for the Most Site Visitors
+ Extended Validation SSL 5
(EV SSL): The Gold Standard
for Authentication
+ Browser Support for EV SSL 6
+ Third Party Trust Marks: 6
Inspiring Consumer Confidence
+ Summary 7
CONTENTS
WHI TE PAPER
3
The Latest Advancements
in SSL Technology
+ Introduction
Secure Sockets Layer (SSL) is the World Standard for Web Security. SSL technology
confronts the potential problems of unauthorized viewing of condential information,
data manipulation, data hijacking, phishing, and other insidious Web site scams by
encrypting sensitive data so that only authorized recipients can read it. In addition to
preventing tampering with sensitive information, SSL helps provide your Web sites users
with the assurance of having accessed a valid Web site. Support for SSL is built into all
major operating systems, Web applications, and server hardwaremeaning that SSLs
powerful encryption technology helps provide your business with a system-wide, liability
limiting security blanket for fortifying consumer condence, boosting the percentage of
completed transactions, and enriching the bottom line. Due to recent advances in SSL
technology, there is a variety of different kinds of SSL. In this paper, we will discuss some
of these advances to help you decide which would be best for your organization.
+ SSL Overview
SSL became the standard over a decade ago to ensure the privacy of online
communications. A special data le called an SSL Certicate is created for a specic server
in a specic domain for a specic entity. Similar to a passport or drivers license, SSL
Certicates are issued by trusted authorities such as VeriSign. Every entity that receives an
SSL Certicate must pass some form of authentication that veries it is who it says it is.
With the explosion of phishing and other fraudulent Web activity aimed at stealing
peoples personal information, identity authentication is more important now than ever
before. The level of identity authentication veried by an SSL Certicate differs from one
SSL Certicate to another, and from one Certication Authority (CA) to another.
With SSL, a private and public key system encrypts the connection between two parties,
such as a consumer and a Web site bearing an SSL Certicate. When the consumers
browser points to a Web site secured with SSL, a secure handshake between the two
systems authenticates both parties. Each session uses a unique session key for encryption
(the longer the key, the stronger the encryption). Once this connection is established the
two parties can begin a secure session guaranteeing the privacy and integrity of their
communications. This security is particularly important when people are sharing sensitive,
condential information over the Internet, an extranet, or even within an intranet. In the
case of e-commerce, a secure SSL connection is critical to doing business, as most Internet
users are afraid to share information with a Web site that doesnt offer SSL protection.
A small purchase here, a smaller purchase there, and a reluctance to change age-old buying
habits or reveal personally identifying information characterizes an enormous segment of
the worlds viable online consumer population. The question remains: Will potential
customers feel secure enough in their Internet dealings with your Web site to take a
meaningful plunge into the world of transacting online?
WHI TE PAPER
4
+ Server Gated Cryptography: Enabling Strong Encryption
for the Most Site Visitors
If your reputation in the online community depends upon the stringent safeguarding
of information processed through your Web site, then your Internet security solution
should include the strongest encryption available to each Web site visitor. Encryption,
as mentioned above, is the process whereby data is transformed into a code that will
be indecipherable to an unauthorized viewer. The stronger the encryption, the more
difcult it is for someone to eavesdrop on your online communications. This is especially
important if you accept any kind of online payments, connect to a bank or brokerage
account, transmit health records, must meet a governmental or other regulatory
organizations privacy and security standards, or process any kind of potentially
sensitive information.
Industry experts recommend a minimum of 128-bit encryption be used for all secure
online sessions. Some Web server-client browser congurations enable sessions with
up to 256-bit encryption protection, the strongest level of encryption commercially
available today. The strength of encryption enabled for any session depends on what your
customers browser and operating system support, as well as what your host server
systems will support. If your consumers browser or operating system doesnt support
higher levels of encryption, the session will default down to the highest level that
it can support.
For years the U.S. imposed export restrictions prohibiting browser manufacturers from
distributing products that supported higher levels of encryption. Although most export
restrictions were lifted in January 2000, there are many consumers, especially outside the
U.S., who are still using older browsers (such as those before Microsoft Internet Explorer
5.5 (export)) and operating systems (such as certain early Windows 2000 systems),
which may default to weak, lower encryption levels. The Yankee Group, in 2005,
estimated that tens of millions of Internet users connect to the Web using substandard
encryption levels.
1
SGC is an SSL extension originally created for nancial institutions exempted from the
U.S. encryption export restrictions. With SGC, encryption levels are controlled by the
server and not dependent on the client system. Once these original export restrictions
were lifted, SGC-enabled SSL Certicates are now issued to all types of Web sites, not
just authorized nancial institutions as in the late 1990's.
VeriSign offers market-leading SGC-enabled SSL Certicates so virtually every visitor to
your Web site will be protected by the industry recommended minimum of 128-bit
encryption.
1 2005, Yankee Group, Building Blocks of Transparent Web Security: Severs-Gated Cryptography
WHI TE PAPER
5
+ Extended Validation SSL (EV SSL): The Gold Standard
for Authentication
While more and more people are comfortable searching the Internet, there remains a
signicant disconnect between the numbers of surfers and those psychologically disposed
to transact business online. As a Gartner 2006 survey revealed, security concerns led
almost half of online customers to alter the way they use the Internet, at a cost of almost
$2 billion to the online business community.
2
Clearly, too many potential e-commerce
clients remain distrustful or fearful of revealing personal or nancial information to an
unseen and personally unknown entity. They need assurance and are increasingly
demanding it before they proceed through a personal revelation or nancial transaction.
These and similar observations led a group of CAs, browser providers, and WebTrust
auditors to establish the CA/Browser Forum for developing a new SSL standardone
that the online consumer world could easily comprehend and embrace. This consortium,
which includes representatives from both Microsoft and VeriSign as well as others,
created Extended Validation (EV) SSL. This new standard aims to combat the growth of
Internet threats such as phishing attacks. EV SSL requires a rigorous process of Web site
authentication and is considered the gold standard in the e-commerce industry for
authenticating the legitimate identity of a Web site. In order to issue EV SSL
Certicates, a CA must pass a rigorous WebTrust audit. VeriSign remains at the forefront
in the development and implementation of this new standard.
An EV SSL Certicate offers the online business and consumer a highly endorsed and
widely recognized level of protection from increasingly sophisticated Internet spoong
scams. EV SSL contains a number of user interface enhancements aimed at making the
identication of an authenticated site immediately more noticeable to the end user.
New high-security browsers display EV SSL Certicates differently than traditional
SSL Certicates. Rather than the subtle padlock symbol displayed by traditional
SSL Certicates, EV SSL Certicates trigger the browser address bar in high-security
browsers to change to an eye-catching green color. This change is immediately evident
to an end user and delivers a condence building effect. Overstock.com noticed that after
implementing EV SSL Certicates from VeriSign, its Microsoft

IE7-using visitors on
average completed transactions 8.6% more often than those using legacy non-EV-enabled
browsers. And, after deploying VeriSign EV SSL, DebtHelp.com realized an 11%
increase in completed transactions by IE7 users to their Web site.
2 2006, Gartner, Trends in Consumer Society
WHI TE PAPER
6
In addition to the noticeable green color, a security status bar prominently displays the
name of the owner of that Web site and the CA who has issued that EV SSL Certicate.
This eld reveals both names in turn when a visitor rst arrives on the Web site.
Like its traditional SSL predecessors, an EV SSL Certicate facilitates secure encrypted
communication between a Web site and a consumers browser. It also authenticates the
genuine nature of the Web site so all visitors know they have indeed reached the site they
intended to visit and not a counterfeit site.
You gain the benet of this gold standard for authentication as well as the powerful
protection of SGC encryption with VeriSign SSL Certicates. VeriSign offers a certicate
with both of these SSL advancements.
+ Browser Support for EV SSL
Microsoft, the rst browser manufacturer to support this new standard, integrated
the EV SSL interface enhancement with Microsoft IE7. Although relatively new to the
market, IE7 has already garnered 31% of the browser market. Additionally, Firefox 2.0
users can download an extension that enables them to see the green address bar when
they encounter a VeriSign EV SSL Certicate. Within a month of this extensions release
over 55,000 Firefox users had downloaded it. As of August 2007, no other CA offers
this benet.
+ Third Party Trust Marks: Inspiring Consumer Confidence
Virtually all shoppers acknowledge their concerns about identity theft, credit card fraud,
and other Internet scams. They have a reason to be concerned. During the one-year
period ending July 2006, the monetary loss from identity theft scams totaled $56.6
billion with an average cost per episode of $6,383.
4
The good news is that consumer awareness of solutions to security issues is likely to
increase as both the Internet security industry and certain governmental agencies get
the word out. To be sure, online consumers are already becoming increasingly savvy
about Internet security. Many now expect to see a familiar third party trust mark
identifying an online retailers Web site as a secure and viable shopping avenue. Inclusion
of an established third party trust mark on ones Web site is now essential for guiding
shoppers from the surng stage through the completion of a transaction.
Research has shown that the majority of online shoppers recognize the VeriSign
Secured Seal and indicate they would make an online purchase because of that seals
presence.
5
If you purchase a VeriSign SSL Certicate for your Web site you are entitled
to display the exclusive VeriSign Secured Seal. Displaying the seal should increase
your customers condence in your Web site and increase the number of completed
transactions you experience. Also, visitors can click on the seal to verify your site.
One week after posting a VeriSign Secured Seal on their Web site, Opodo, a leading
pan-European travel service saw a 10% jump in completed sales.
6
3 May 2007, www.marketshare.com
4 2006, Javelin Strategy/Better Business Bureau, Identify Fraud Survey Report
5 2006, Tech-Ed study
6 Warren Jonas, Head of Services Management, Opodo
WHI TE PAPER
7
Once you secure your Web site with a VeriSign SSL Certicate, all you need to do
to benet from the VeriSign Secured Seal trust mark is download and install it.
+ Summary
Credibility means a lot in the world of Internet security. With instant recognition by
88% of Web users
7
, VeriSign is by far the most recognizable Secure Sockets Layer (SSL)
security brand in the world today. VeriSign gained its leadership position by helping
the Internet security industry develop standards, update protocols, and apply the latest
technologies for the Web community. Savvy online consumers trust the VeriSign name
and feel condent about doing business with Web sites secured by a VeriSign SSL
Certicate. Naturally, this reputation wasnt created overnight. It was built upon a
platform of trust that has been cultivated for years and enhanced by the companys long-
time involvement and support of the development of the Internet security infrastructure.
Organizations that rely on Internet transactions have learned that a reliable and secure
Internet is necessary for company protability. The more secure the online consumer
feels, the more successful the online company will be in recruiting and retaining a
worthy client base. The creation of a successful online business requires the development
and cultivation of a trustworthy relationship with each potential client. VeriSigns
products enhance the building of such relationships. If you want to ensure that
potentially sensitive information is kept condential and secure, and especially if you
want your potential customers to trust that your company will value, respect and
safeguard their private information, a VeriSign SSL Certicate is right for you.
Displaying VeriSigns name emphasizes your Web sites genuineness, credibility and
trustworthiness to your customers. Your customers can then feel secure about completing
the transaction that led them to your site in the rst place.
+ About VeriSign
VeriSign operates digital infrastructure that enables and protects billions of interactions
every day across the worlds voice, video, and data networks.
Visit us at www.VeriSign.com for more information.
2007 VeriSign, the VeriSign logo, the checkmark circle, and other trademarks, service marks, and designs are registered or unregistered trademarks
of VeriSign, Inc. and its subsidiaries in the United States and in foreign countries. All other trademarks are property of their respective owners.
00024924 08-06-07
7 2006, Tec-Ed study

You might also like