Project4 6/18/08 11:56 AM Page 1 Project6 10/16/08 11:14 AM Page 1 1108red_Cover.v3 10/15/08 2:56 PM Page 1

Microsoft Thinks Different with IE8

NOVEMBER 2008 REDMONDMAG.COM

Readers’Readers’ ChoiceChoice AwardsAwards 20082008 This year, we honor our three-time winners.

+Paul Maritz: The Menace Readers Wonder If Chrome Gets Them Home Can the Cisco Kid Lasso Microsoft? How Software Can Save You Gas Project8 7/3/08 12:42 PM Page 1

           Project8 7/3/08 12:44 PM Page 2

%" ) %" "' $  $  ! '"% #$"$ & $ '$ %# ##   $  # %$ # "  +   " # $,*   $  " %! $   ## !" $")$ $ $  !$$ %$  %#$") #$ "#  " # $,  "&",   #)#$# "   " #  $ #! ! $$ #  '" "#   "%  !($)* ' &"  $ #$ !"  " !" "   $  %#$")

        

  $ &"!  ! "#$! ! $% "#$ ! %)" &$ $$  %  !,# $ #!   #(#  &%&##$ '#$&$  #!$!% !   !,# $   # $)$% $ ! *&# (%    ! % $%!# %$ ""%! $!%(#   &$ $$  %   )% $!%(#  $  %# # !    +      #%$ #$#'

$!%(#   &$ $$  %   )% $!%(#  $  %# # !    +      #%$ #$#' 1108red_TOC2.v7 10/15/08 5:06 PM Page 2

Redmond NOVEMBER 2008 The Independent Voice of the Microsoft IT Community Contents

COVER STORY REDMOND REPORT 11 Maritz: VMware’s 2008 Readers’ Choice Answer to Microsoft? The virtualization giant’s Awards: new CEO on competing with Redmond. Introducing 12 Cisco and VMware Collaborate on Next- Redmond’s Gen Data Center The companies’ new Triple Crown products could change the virtualization game. Readers love some products so much that they keep voting them Readers’ Choice winners again and again. To recognize the dynasties TIPS & TRICKS in our annual competition, Redmond is introducing the “Triple Crown,” a brand-new 15 Professor award for products that have won (at least) Powershell: three Readers’ Choice honors in a row. Get Smart and Get -Out Page 30 15 QuickTip: Next, Next, Repeat 16 Windows Advisor: Disk Cleanup Disaster FEATURES Waiting to Happen; POP3 Errors in Exchange 45 The Unlikely Contender 51 Remote Tools that Can Networking giant Cisco goes after Help You Save Gas COLUMNS Microsoft’s supremacy in the Besides carpooling and riding a collaboration-software market. bicycle to work, using the right 6 Barney’s Rubble: software can keep some gas Doug Barney money in your pocket. VMware Wants It All Page 51 58 Never Again: Derryl Steib Beware of the Company You Keep 60 Mr. Roboto: Page 45 Jeffery Hicks In the Mail 64 Security Advisor: REVIEWS Joern Wettern Product Review Reader Review A Better 19 Highly Available 23 Chrome Might Get Exchange 2007 You Home 72 Foley on Microsoft: Service Pack 1 brings high- Google’s new beta browser Mary Jo Foley availability enhancements and shows promise, but needs IE8: Microsoft added capabilities. lots of filling out. Thinks Different

ALSO IN THIS ISSUE 4 Redmondmag.com | 8 [email protected] | 71 Ad and Editorial Indexes

COVER ILLUSTRATION BY ROBERT KAYGANICH Project5 9/12/08 2:03 PM Page 1

ENERGY COSTS DOWN, KARMA UP.

Today, datacenters eat up to 30 times more energy per square foot than a typical office. The answer: IBM green datacenter and IT services. They can help you implement a conservation policy and measure, manage and report on real results against it. Many IBM customers have doubled their IT capacity; others have reduced energy costs by 40% or more. A greener world starts with greener business. Greener business starts with IBM.

SYSTEMS. SOFTWARE. SERVICES. FOR A GREENER WORLD. Take the first step toward a greener datacenter at ibm.com/green/services

IBM, the IBM logo and ibm.com are trademarks of International Business Machines Corporation, registered in many jurisdictions worldwide. A current list of IBM trademarks is available on the Web at “Copyright and trademark information” at www.ibm.com/legal/copytrade.shtml. © 2008 IBM Corporation. All rights reserved. 1108red_OnlineTOC4.v3 10/15/08 12:51 PM Page 4

Redmondmag.comNOVEMBER 2008

VirtualizationReview.com Questions with ... Get Your Virtualization Lenni Lobel Planning On! Writer Grace Townsend asks f you’re implementing virtualization anywhere in consultant and author your organization, we have the resources for you. I Lenni Lobel what We’ve recently published an in-depth series of articles developers can expect covering everything you’ll need to properly plan out your Lenni Lobel when migrating to implementation. Take a look by using these FindIT codes: SQL Server 2008. Read the full • Planning Primer: Architecture (FindIT code: VirtPA) interview online. FindIT: IntLobel • Planning Primer: Pitfalls (FindIT code: VirtPP) • Planning Primer: Security (FindIT code: VirtPS) What’s the learning curve for • Planning Primer: Benchmarking (FindIT code: VirtPB) developers who are migrating to • Planning Primer: End Users (FindIT code: VirtPE) SQL Server 2008? Quickly jump to each section of the series online! And don’t forget to apply Developers comfortable with 2005 for your free subscription to Virtualization Review. FindIT code: VSubcribe should feel right at home. RedmondEvents.com Are there any particular migration issues to be aware of? Get the Latest on Our Some companies have made an Upcoming Conferences investment in Notification Services— SQL Server 2008 doesn’t include it. f you like our magazines you’ll definitely enjoy our conferences, including Will we see more data residing in ITechMentor for IT managers and administrators, VSLive! for all levels of .NET the cloud with SQL Server Data developers and Web Design World for the Web designers on your team. Services (SSDS)? Just like Redmond, all of our conferences are independent and offer real- Yes, but it’s still very early technology. world how-to advice so you’ll learn exactly what you need to SSDS isn’t actually a relational data- know about implementing new and existing technologies. Plus, base, but more of a collection of we offer most conferences in several locations throughout the records, and it can be a nice way to year, making it easier (and less expensive!) to attend. Check out store and serve structured data. our upcoming schedule of events today. FindIT code: Events REDMONDMAG.COM RESOURCES What Are FindIT Codes? Resources Enter FindIT Code Throughout Redmond, you’ll >> Daily News News discover some stories contain >> E-Mail Newsletters Newsletters FindIT codes. Key in those codes >> Free PDFs and Webcasts TechLibrary at Redmondmag.com to quickly >> Subscribe/Renew Subscribe access expanded content for the >> Your Turn Editor Queries YourTurn articles containing those codes.

Redmondmag.com • RCPmag.com • RedDevNews.com • VisualStudioMagazine.com • VirtualizationReview.com MCPmag.com • CertCities.com • TCPmag.com • ENTmag.com • RedmondEvents.com • ADTmag.com • ESJ.com

4 | November 2008 | Redmond | Redmondmag.com | Project5 9/12/08 2:39 PM Page 1

GIANT LEAPS. SMALL FOOTPRINTS.

With the world’s data growing dramatically, IBM storage virtualization solutions can help you gain control in a responsible, energy-efficient way. The IBM System Storage™ SAN Volume Controller can reduce storage growth by up to 20% and boost utilization by as much as 30%. And combined with IBM tape solutions, some companies have reduced their TCO by as much as 50%.1 A greener world starts with greener business. Greener business starts with IBM.

SYSTEMS. SOFTWARE. SERVICES. FOR A GREENER WORLD. Get our storage virtualization whitepaper at ibm.com/green/info

1TCO estimates based on IBM internal study. IBM, the IBM logo, ibm.com and System Storage are trademarks of International Business Machines Corporation, registered in many jurisdictions worldwide. A current list of IBM trademarks is available on the Web at “Copyright and trademark information” at www.ibm.com/legal/copytrade.shtml. © 2008 IBM Corporation. All rights reserved. 1108red_Rubble6.v5 10/15/08 1:32 PM Page 6

Barney’sRubble by Doug Barney

RedmondTHE INDEPENDENT VOICE OF THE MICROSOFT IT COMMUNITY REDMONDMAG.COM NOVEMBER 2008 ■ VOL. 14 ■ NO. 11

Editorial Staff Editor in Chief Doug Barney VMware Wants It All Editor Ed Scannell Executive Editor, Features Lee Pender Managing Editor Wendy Gonchar Associate Managing Editor Katrina Carrasco icture a speech where a CEO holds forth in front of Contributing Editors Mary Jo Foley thousands of faithful customers, offering a vision Jeffery Hicks Peter Varhol that will utterly transform the way we compute. Joern Wettern P Art Staff Art Director Brad Zerbel The press pays earnest attention, spectators applaud and the Senior Graphic Designer Alan Tao

world awaits the competitive fallout. Online/Digital Media Editor, Redmondmag.com Becky Nagel Executive Editor, New Media Michael Domingo Online News Editor Kurt Mackie Is this just another keynote by Bill Here are some tough questions: Associate Editor, Web Gladys Rama Gates? Steve Jobs? Eric Schmidt? Will it work? The basic idea is sound. Web Producer Shane Lee Nope! Try Paul Maritz, the still rela- A well-designed virtual server coupled Director, Web Development Rita Zurcher tively new CEO of VMware. with well-designed storage is already The address happened at VMworld pretty close to a utility. The apps are 2008 in Las Vegas, and at times I swore largely on-demand and can be moved President Henry Allain I was at Tech·Ed,WinHEC, PDC—or easily from server to server without Vice President, Publishing Matt N. Morollo a Springsteen concert. That’s how taking them down. The big issue when Vice President, Editorial Director Doug Barney Director, Marketing Michele Imgrund packed it was. you magnify this approach is reliability. Online Marketing Director Tracy S. Cook With Hyper-V gnawing at VMware’s Redmond readers are the real virtualiza- Marketing Programs Manager Videssa Djucich heels, Maritz went for broke, announcing tion pioneers, but many of you complain not just modest improvements to main- that virtual machines and virtual servers

tain ESX’s technical lead, but a grand are not always as reliable as apps on President & Neal Vitale strategy calling for nothing less than a dedicated servers. Chief Executive Officer Senior Vice President & Richard Vitale total revamping of the data center. What if it does work? If the data center Chief Financial Officer The Virtual Datacenter Operating plan works, VMware becomes a monster Executive Vice President Michael J. Valenti President, 1105 Events Dick Blouin System (VDC-OS) is not an OS per se. vendor—one that’s every bit as powerful Vice President, Finance & Christopher M. Coates and influential as IBM, HP Administration or Microsoft. That’s big. Vice President, Audience Abraham M. Langer Marketing & Web Operations What could stop it? The sheer Vice President, Information Erik A. Lindgren Technology & Web Operations complexity of turning hun- Vice President, Circulation Carmel McDonagh dreds of x86 servers running Vice President, Print & Mary Ann Paniccia thousands of apps tied to Online Production terabytes of storage and Chairman of the Board Jeffrey S. Klein

myriad network connections Reaching the Staff into a single logical system is Staff may be reached via e-mail, telephone, fax, or mail. A list of editors and contact information is also available It’s a system that aims to manage servers, the very definition of complexity. Add to online at Redmondmag.com. storage and the network, turning this all that trying to secure such a labyrinth E-mail: To e-mail any member of the staff, please use the following form: [email protected] into one massive utility or gigantic and you can see the challenge. Framingham Office (weekdays, 9:00 a.m. – 5:00 p.m. ET) internal cloud. This isn’t the entire data What if it fails? It all depends on the Telephone 508-875-6644; Fax 508-875-6633 600 Worcester Road, Suite 204, Framingham, MA 01702 center, but only Intel and AMD servers nature of the failure. Microsoft has Irvine Office (weekdays, 9:00 a.m. – 5:00 p.m. PT) Telephone 949-265-1520; Fax 949-265-1528 and the devices attached to them. failed plenty of times and is still a 16261 Laguna Canyon Road, Suite 130, Irvine, CA 92618 On the network side, VMware plans highly trusted provider. Even if Corporate Office (weekdays, 8:30 a.m. – 5:30 p.m. PT) Telephone 818-734-1520; Fax 818-734-1528 to offer part of the solution and have VMware doesn’t achieve all its goals, 9121 Oakdale Avenue, Suite 101, Chatsworth, CA 91311 vendors like Cisco take care of the it’s still a net plus. The opinions expressed within the articles and other contents herein do not necessarily express those of the publisher. rest. Likewise, in storage, VMware will Will the VDC-OS work and will you work with storage makers—EMC, use it? Will another vendor get there anyone?—to turn all those disks into first? Send your thoughts to one, big virtual volume. [email protected].

6 | November 2008 | Redmond | Redmondmag.com | PHOTO BY RICH FRISHMAN PHOTO ILLUSTRATION BY ALAN TAO Project3 10/2/08 9:10 AM Page 1

LOWER CO2. BETTER Q4.

Companies spend millions on the energy to store their information. IBM offers a range of information management solutions that help companies use their information more strategically and efficiently. From smart archiving to deep data compression that can reduce storage needs up to 80%, Information on Demand helps companies extract real business value from their information. A greener world starts with greener business. Greener business starts with IBM.

SYSTEMS. SOFTWARE. SERVICES. FOR A GREENER WORLD. Find out how much you can save at ibm.com/green/data

IBM, the IBM logo and ibm.com are trademarks of International Business Machines Corporation, registered in many jurisdictions worldwide. A current list of IBM trademarks is available on the Web at “Copyright and trademark information” at www.ibm.com/legal/copytrade.shtml. © 2008 IBM Corporation. All rights reserved. 1108red_Letters8.v7 10/15/08 1:28 PM Page 8

[email protected]

Slim Down, Windows 7 After reading Doug Barney’s “Dreaming of Windows 7” column (Barney’s Rubble, October 2008) I have a question for Microsoft: Why doesn’t it build and sell its own proprietary PC? The de facto OS would then only have to support the PC’s components and wouldn’t need to be sold separately. A firmware type OS would be even better, and if the OS could be coded into a new master CPU chip—better still. Authorized updates or later We’ve been running it since its release versions could simply be downloaded and “burned” in. in Q1 of 2007, and we’re very happy with it. I use Vista on all my company’s PCs, With a proprietary system, code what familiar with the concept. If as well as on my personal gaming PC. would certainly be smaller, more con- you’ve ever tried to change ownership We haven’t had any problems with cise and speedier. or access rights on a file structure Vista, and we’ve been installing it main- Certain peripherals such as printers, under Vista, you know that it’s an stream for our clients as well. modems, routers and so on would nec- unworkable nightmare. I really wish everyone would stop essarily have to be supported through Second, if you’re joining a new Vista knocking Vista! those manufacturer’s own compatible machine to your Home network, this Before Vista everyone hated XP, and software—not much different from takes a lot of hunting and digging. It’s we were told how unreliable it was, what’s happening now. so simple under Windows XP to specify and that it had so many security flaws. Such a change should result in a much the local group name, turn on sharing Now, XP is the solution to everything, faster, more stable and somewhat sim- for specific folders and be done. I never and we constantly have to hear how pler system to use and the Microsoft found the place to change or specify the Vista is the devil. OS would no longer have to try to be local group name under Vista. I suppose I can only look forward to all things to all external bits and pieces. Wayne Urton Windows 7, so that we can hear how Randy Mulanax Indianapolis, Ind. bad that is, and how wonderful Vista Midwest City, Okla. suddenly will become. If Microsoft wants to fix Vista, it should My company is a Microsoft Gold Fixing Windows Vista do the following: Certified Partner, but this is our unbi- In Doug Barney’s Aug. 28 Redmond • Build-in application virtualization ased opinion; our clients are very happy Report newsletter,“Could IE8 Be Great?” so that applications “think” they’re run- with Vista, as well. he asked readers how they would fix Vista. ning on the correct version of Windows Vista is not Windows ME, and I wish Here are some of your responses: and don’t die people would stop flaming it as if it is. • Create a less resource-hungry OS Deric Slabberts First, simplify and fix access security. I • Spend more time on stability and Fransville, Witbank, South Africa used to be a pro with VAX/VMS ACL less on digital rights management rules and organization, so I’m some- (why does Microsoft assume all its users are pirates?) • Open the Windows Update site to Clarification: Whaddya Think other “trusted” vendors so that when In an October story on Windows XP an update for Java, Flash and so on (“So You’ve Decided to Skip Vista …”), Send your rants and raves to becomes available there’s a one-stop- there was some ambiguity regarding [email protected].?! shopping place. Raymond Erdey the status of downgrade rights for Please include your first and received by e-mail Microsoft customers. Redmond last name, city and state. If we would like to clarify that all Microsoft use it, you’ll be entered into a Volume Licensing customers have We don’t think Vista needs to be downgrade rights. drawing for a Redmond T-shirt! fixed—we love Vista.

8 | November 2008 | Redmond | Redmondmag.com | PHOTO ILLUSTRATION BY ALAN TAO Project5 9/12/08 1:27 PM Page 1 CARBON COUNTING FOR BEAN COUNTERS.

IBM collaboration software and services connect people faster wherever they are, which means less jet fuel, energy and money. And IBM software’s advanced deduplication and data compression can lower the energy and space costs of your collaboration infrastructure by up to half. A greener world starts with greener business. Greener business starts with IBM.

SYSTEMS. SOFTWARE. SERVICES. FOR A GREENER WORLD. See the green demo at ibm.com/green/collaboration

IBM, the IBM logo and ibm.com are trademarks of International Business Machines Corporation, registered in many jurisdictions worldwide. A current list of IBM trademarks is available on the Web at “Copyright and trademark information” at www.ibm.com/legal/copytrade.shtml. © 2008 IBM Corporation. All rights reserved. Project24 5/9/08 2:35 PM Page 1

UBDR GOLDFAST! IS

HOT BACKUPS. BUSINESS CONTINUITY. CONTINUOUS DATA PROTECTION.

UBDR Gold is the quickest and easiest way to bring a failed server back online. The pioneering bare metal recovery solution can restore a machine in less than 15 minutes. Insert the universal UBDR Gold boot CD or USB key, and press the power button. It’s just that simple. Anyone can restore an unbootable server in the absolute minimum amount of time. UBDR Gold can also be 100% scripted so no user interaction is required. Technology doesn’t have to be complex, it just has to be good. ULTRABAC SOFTWARE — PRODUCING FAST RESULTS WHERE AND WHEN IT COUNTS.

BACKUP AND DISASTER RECOVERY SOFTWARE FOR PEOPLE WHO MEAN BUSINESS WWW.ULTRABAC.COM 1.866.554.8562

© 2008 UltraBac Software. All rights reserved. UltraBac Software, UltraBac, UltraBac Software logo, UBDR Gold, UBDR Pro, Continuous Image Protection, and Backup and Disaster Recovery Software for People Who Mean Business are trademarks of UltraBac Software. Other product names mentioned herein may be trademarked and are property of their respective companies.

UB_FAST_Redmond.indd 1 5/8/08 11:58:36 AM 1108red_RedReport11-13.v6 10/15/08 1:11 PM Page 11

RedmondReport

Maritz: VMware’s Answer to Microsoft? The virtualization giant’s new CEO on competing with Redmond.

By Ed Scannell machines. So on one hand, we’re ahead New VMware n early July this year, VMware Inc. CEO Paul Maritz of them on features. On the other hand, made the decision to replace com- takes on his there is a difference in the strategic view pany co-founder and CEO Diane former company, between us and Microsoft. We believe I Microsoft. Greene, who guided the company from a there ought to be a substrate of software fledgling startup 10 years ago to a pow- in the data center capable of delivering erhouse in the virtualization market. on greater efficiency and flexibility, [one While analysts were generally surprised that] does so in an independent fashion by the move, many felt her successor regarding a variety of application loads.

Paul Maritz—former head of EMC PHOTO COURTESY BUSINESSWIRE One that can handle Windows- and Corp.’s cloud computing initiative—was Linux-based application loads and a smart choice. Smart because with others in the future. In comparison, Microsoft applying increasing pressure Microsoft has a very Windows-centric on VMware in its core markets, few have view of the future. as thick a book on Microsoft’s strategies and tactics as Maritz. From 1986 to You’ve talked about the “deconstruc- 2000, Maritz worked for the Redmond tion” of the traditional OS, which software giant, leaving when he was in You see that as a good thing, right? others have talked about before. charge of its Platforms Strategy and Well, I won’t comment either way on Why will it happen this time? Developer Group and generally consid- that, but I don’t think VMware is a It’s not the most important thing ered to be its third-ranking executive mortal threat to Microsoft in the way whether that happens or not. The point I behind Bill Gates and Steve Ballmer. that maybe Google is. want to make there is, in a lot of the new Martiz went on to found Pi Corp., approaches to writing applications— which was acquired by EMC in February. Microsoft has employed its usual particularly the so-called Web 2.0 He sat down with Redmond Editor Ed tactics of buying the market through frameworks for creating applications— Scannell to assess the challenges he faces free versions of some products and the traditional OS is well hidden. You competing against his old company, and including virtualization in the OS. have to work pretty hard at figuring out why he believes he can win. What impact do you expect that whether there’s Linux or Windows down to have? there under it. In addition, these frame- Redmond: Knowing Microsoft as As you point out, they’re using all of works like Ruby on Rails are designed as well as you do, what is your sense of their traditional approaches. So it’s multitiered frameworks. And each of how badly they want to dominate in incumbent upon us to deliver differenti- those layers makes different use of the the virtualization market? ated value going forward. Microsoft has underlying OS. So it’s possible that as Maritz: I think what they see is approxi- paid us an indirect compliment by those frameworks gain more acceptance, mately $2 billion worth of revenues essentially endorsing all of our features, people will only want enough of the going toward VMware, which they saying they’re the right set of features underlying OS to support that particular would very much like to divert a substan- and that they’ll include all of them in tier. We’re trying to enable our cus- tial portion of toward Microsoft’s coffers. their products at half the price, but in tomers to plan their infrastructure and Additionally, through virtualization, two years’ time. their application loads in an independent VMware has become a strategic vendor fashion. To plan for that,they need to to many of their customers. Microsoft What’s your biggest advantage with know they can bring application loads in likes to control things top to bottom. I regards to technical differentiation? based on Windows and Linux without think—fundamentally, with regards to We have specific features that are impor- doing major surgery.— Microsoft’s roadmap—Steve Ballmer tant to customers centered around our spends many more cycles worrying about VMotion and VM Fault Tolerance,and Ed Scannell ([email protected]) is Google than about VMware. the general management of virtual editor of Redmond.

| Redmondmag.com | Redmond | November 2008 | 11 1108red_RedReport11-13.v6 10/15/08 1:12 PM Page 12

RedmondReport

Cisco and VMware Collaborate on Next-Gen Data Center The companies’ new products could change the virtualization game.

By Tom Valovic ners including parent company EMC he centerpiece of the VMworld Corp., Hewlett-Packard Co., IBM show in late September was Corp., NetApp and others. For opti- TVMware Inc.’s Virtual Datacenter mizing network resources to better Operating System (VDC-OS) support virtualized servers, VMware’s announcement. As outlined in newly primary partner is Cisco Systems Inc., appointed CEO Paul Maritz’s keynote which, along with Intel Corp., has a address, VDC-OS is a partner-based small ownership stake in the company. architectural framework where storage, network and compute core elements are Fruitful Partnership all virtualized as resource pools. Cisco unveiled a new product at In order to accomplish this with the VMworld considered to be the first step goal of delivering product offerings toward the fulfillment of the networking next year, VMware is working with key aspect of VMware’s VDC-OS roadmap: strategic partners on capabilities related the Nexus 1000V. Ed Bugnion, CTO of to the storage and networking aspects. the company’s Server Access and Virtu- In storage, for example, the company is alization Business Unit, gave a keynote working with a large number of part- address during which he discussed the

we protect your digital worlds® 1108red_RedReport11-13.v6 10/15/08 1:12 PM Page 13

RedmondReport

new product and gave some hints as to thin VDI clients communicate with the where Cisco might be headed both in its The Nexus 1000V software switch desktop image in the data center. But if collaboration with VMware and in its will be integrated into VDC-OS. a WAN is involved, latency issues are own Data Center 3.0 initiative. Bugnion more challenging and application- announced to applause during the delivery solutions can be implemented keynote that it was the “the first third- projects between the two companies, to improve performance. party ESX switch.” In an interview, he resulting in further progress toward the Cisco is currently offering products also described it as the company’s “first still-amorphous concept of the dynamic to address these types of performance software switch.” data center. But when these products issues for both VDI and cloud com- Central to the Nexus 1000V is VN- become available, both companies expect puting, including Cisco Wide Area Link, described by the company as a that the new functionality afforded will Application Services (WAAS) and the new technology that can “bridge the improve security, policy enforcement Application Control Engine (ACE). server, storage and network-management and scalability in VMware environ- WAAS is likely to have an important domains so changes in one environ- ments, as well as improve management role to play in VMware’s vCloud initia- ment are communicated to the others.” capabilities for VMs overall. tive, which will depend on robust In a VMware environment, this means communication links in geographically that moving a virtual machine (VM) Future of the Cloud dispersed data centers, such as the between servers would alert the network Another critical area of collaboration internal cloud. WAAS will likely also and SAN that the event was taking for the two companies centers on connect to the federated cloud that place, allowing policy and state infor- VMware Virtual Desktop Infrastructure Paul Maritz addressed in his opening mation to be adjusted accordingly. (VDI) solutions, which also received keynote at VMworld.— The Nexus 1000V software switch will major emphasis at VMworld. A critical be integrated into VDC-OS; both will element in any VDI deployment is the Tom Valovic ([email protected]) is be available next year. In the meantime, communications link, whether LAN- or executive editor of Redmond’s sister there will likely be other collaborative WAN-based. In either case, thick or publication Virtualization Review.

DEFENDING AGAINST VIRUSES, MALWARE, AND HACKERS? I’LL BE YOUR EYES.

Today, 15,000 new viral threats will be created to attack your network. Predicting and intercepting these future threats is what we do. In fact, ESET® NOD32® Antivirus, with its ThreatSense® technology, is the scalable security upgrade IT Managers are turning to for faster, more precise, proactive protection against viral threats. For a free 30-day trial, visit www.eset.com.

ESET NOD32 Antivirus Business Edition A New Way To Think Smart

Proactive + Precise + Lightweight + Fast

©2008ESET.Allrightsreserved.TrademarksusedhereinaretrademarksorregisteredtrademarksofESET. Ad code:RM Project2 7/16/07 2:18 PM Page 1

#1 BEST SELLER! ... Tired of Nursing Your Exchange Server?

A nyone who has given birth to an Exchange Prevent Hiccups network knows it can get sick and needs some nursing to stay healthy. In fact, 72% GOexchange removes errors, warnings and of Exchange Administrators surveyed* have inconsistencies within the database—before “experienced” an Exchange disaster (feels major corruption makes the database fail. like the fl u)—usually from improper feeding and care. “GOexchange corrected 2,264 errors and 26 warnings.” Like many databases, constant adding and Paul Ramos, Director IT Created By deleting can corrupt an Exchange data fi le so it eventually turns sour. Replicating, Run, Don’t Crawl archiving and backing up the data doesn’t In addition to fi xing the database, stop the stink—it just stores it. You’ve GOexchange removes sluggishness and got to… improves performance by re-indexing and Solutions Inspiring Confi dence defragmenting the database to permanently Fix the Problem remove white space and deleted items. The end result is increased performance and “Life before GOexchange…was You may have tried the free utilities to fi x an absolute nightmare, late nights, Exchange. While they help, they are too stability with a compact effi cient database that’s 31 to 55% smaller! Combine this long weekends and upset users.” tedious, time consuming and lightweight to Marty Grogan, CTO keep your Exchange baby healthy. You’ve with archiving and the database is up to 91% tried the milk, now try some meat! smaller—making it much quicker to backup. Stop The Crying “..our information stores were reduced Why not call now, or visit our resource Pamper Yourself with GOexchange by 45-50%.” Dale Huitt, Systems Lead site and learn how to reduce the risk, and It’s time to try GOexchange, from Lucid8, avoid the pain. Protect your exchange data, the #1 best-selling automated disaster Automated Babysitter maximize performance, and spend a weekend prevention and optimization software for at home—instead of babysitting Exchange. Microsoft Exchange 5.5, 2000, 2003 and 2007. As the mother of all Exchange tools, First, GOexchange is easy to setup and use. GOexchange helps prevent disasters, repair Twenty minutes—that’s all it takes to get problems, improves performance, and your server up and running. Just schedule it, saves you a lot of time. and walk away! Special Offer The software notifi es the users, validates • Free Software for analysis of your the database, runs the backup, conducts “Without routine maintenance, a comprehensive system analysis and Exchange server! decreasing performance, diagnostics, logs the errors, and notifi es you • Free White Paper—“Basic Feeding increased warnings and if it discovers a “stop” error—then it repairs of Your Exchange Server.” errors accumulate and and defragments the database, generates a • Free Essential Guide to Exchange database fragmentation thorough report and schedules the next event. Preventative Maintenance transpires, leading to You can do some of this work yourself, but Go to: www.Lucid8.com/GoRED Exchange disasters.” why waste time doing repetitive maintenance, Call 425.456.8477 when GOexchange can do it for you—faster E-mail: [email protected] and more effectively than doing it by hand.

Copyright © 2007 Lucid8. All rights reserved. Microsoft® Exchange Server is a registered trademark of Microsoft® Corporation. All other trademarks are the property of their respective owners. * Refers to Survey conducted by Lucid8. See press release for more details. 1108red_T&T15-16.v6 10/15/08 1:19 PM Page 15

MCPmag.com’s Tips&Tricks QuickTip: Prof. Powershell Next, Next, Get Smart and Get -Out Repeat By Jeffery Hicks

ust about all PowerShell cmdlets support a set of common parameters. Software installation might sound like instruc- These parameters are the same across all cmdlets regardless of the tions on the back of the shampoo bottle. But it Jcmdlet’s primary parameters—which is to say the ones you use the doesn’t have to be that way. most, like -computername. One common parameter you might want to The hardest part of a software installation is use is -outvariable. often the walk between desktops. When you’re Usually you save a cmdlet’s output to a variable like this: in charge of a massive software installation PS C:\> $svc = get-service using just manual methods, your shoes will This is perfectly acceptable because you likely plan on using $svc later. But wear as much as your mouse-clicking finger. you could also create $svc this way using -outvariable: But software needn’t be installed using PS C:\> get-service -outvariable svc the “Next, Next, Finish” method. Achieve The only difference is this expression will also write the results to the the same result on hundreds of machines console. But you’ll still have a $svc object. Notice that the name of the variable doesn’t need the $. This is because the parameter’s value is a as on a single one through packaging and variable name and not an object. Here’s another way you might use it: automated deployment. PS C:\> get-service -outvariable svc | where With a little technique and the right tools, you {$_.status -eq "stopped"} -outvariable stopped | Sort Displayname | can deploy virtually any piece of software Select DisplayName through Active Directory. The deployment PS C:\> $stopped.count process is relatively simple. Check out this ancient 86 TechNet article http://support.microsoft.com/ PS C:\> $svc.count kb/314934 for the down-low on setting it up. 159 The basic steps haven’t changed much over This one-line PowerShell expression will produce a sorted list of all the years. stopped services’ displaynames, with some added benefits. The results of The hard part with automating the process is Get-Service have been saved to $svc. The filtered results from the Where- in getting the software to install “silently,” Object expression have been saved to variable $stopped. Now you can reuse the filtered services variable to work with just stopped services, without without having to prompt the user. Doing so having to rerun or retype a long PowerShell command, like this: requires either discovering the command-line PS C:\> $svc | export-clixml stoppedservices.xml switches that install the software in this mode, This is an especially useful technique for long-running commands, where or by repackaging the installation into an you need information parsed in several ways but don’t want to have to rerun entirely new .MSI file. a command. Or where the original objects will be lost but you might still One free tool that’s perfect for helping the need them: small environment with repackaging is PS C:\> dir d:\files -recurse -outvariable myfiles | measure-object WinINSTALL LE. It enables a great set of func- length -sum -maximum | Select Count,Sum,Maximum tionality for turning difficult installs into easy, If you want to do more with the files all you have to do is use the $myfiles automated installs. The process goes like this: variable. There’s no need to rerun the DIR command, unless you want an 1. From a fresh OS installation, install the updated list: PS C:\> $myfiles | sort extension | group extension | sort WinINSTALL LE software and run its Count -descending | format-table Count,Name -autosize Discover tool. PS C:\> ($myfiles | where {$_.extension -match ".doc"} -outvariable 2. Install your software of choice and rerun docfiles | measure-object length -sum).sum the Discover tool again. 2809966 WinINSTALL LE will determine what files PS C:\> $docfiles | Select Fullname and registry entries changed between the Parameters are all about efficiency. Look at the help file about_Common- two snapshots and package up the “diffs” Parameters for more information. into a new .MSI file. With this file in hand, you’re ready for testing and, ultimately, a large-scale deployment.

| Redmondmag.com | Redmond | November 2008 | 15 1108red_T&T15-16.v6 10/15/08 1:19 PM Page 16

MCPmag.com’s Tips&Tricks

Windows Advisor Disk Cleanup Disaster Waiting to Happen; POP3 Errors in Exchange By Zubair Alexander

Q: I ran the Disk Cleanup Tool and now Windows Vista POP3 set by the MaxCommandSize setting. You can resolve won’t hibernate. How do I restore it? this issue in one of two ways. The first method just increases the A: This is a known problem in Vista—it happens when you run value of MaxCommandSize, this way: the Disk Cleanup Tool,which ends up disabling the hibernation 1. Start the Exchange Management Shell. file. That file needs to be re-enabled before your machine can go 2. Type Get-POPSettings to view current settings. You’ll into hibernation mode or the hybrid sleep feature. notice the default value is 40. The Disk Cleanup Tool can be quite disastrous if it ends up 3. To increase the value to 50 (the upper limit is 1,024 disabling hibernation yet keeps hybrid sleep enabled. Many bytes), type Set-POPSettings -MaxCommandSize 50 open programs that have automated backups won’t have 4. Restart POP3 for the changes to take effect. those files saved to disk when your machine does go to sleep. The second method increases the value of MSExch- If Vista is no longer able to hibernate, run the command PopImapCommandSize via the Adsiedit.msc snap-in. It’s a powercfg -h on at the command prompt as an administrator. bit more complicated, but it’s covered in this KB article: You can find more details in this Knowledge Base article: http://support.microsoft.com/kb/945552. — http://support.microsoft.com/kb/928897.

Q: Why does the user name get rejected when some users [email protected] log in to Exchange Server 2007 via POP3? Check out MCPmag.com's column archive for more savvy A: We’re all familiar with the user principal name (UPN); tips and tricks from Jeff Hicks, Andy Barkl, Zubair it includes a user’s log-on name, the @ symbol, followed by Alexander, Eric Johnson and other frequent contributors. the domain name. Errors can occur when users have a UPN FindIT code: MCPmagTips that exceeds 40 characters, which is the default limit for

ONLINE DEGREES IN TECHNOLOGY Use your IT CERTIFICATIONS to accelerate your DEGREE ONLINE.

Microsoft, Sun, Oracle, Cisco, Comp TIA, SAS, PMI, GIAC or (ISC)2 certifications could waive up to 25% of your fully accredited bachelor’s degree.

Here’s what you can get from the online degree programs offered at Call us today at Western Governors University: X Flexible ONLINE learning 1-800-219-6689 X Up to 9 certifications built in at no extra cost or visit us online at X Programs in Networks, Databases, Security, www.wgu.edu/rdm Software and IT Management Project3 6/2/08 9:38 AM Page 1

Another fi le management problem. Another late night microwave burrito.

Clear the clutter with the FREE File Insight utility download at www.brocade.com/ cleartheclutter

FEEL LIKE YOU’RE STORING EVERYTHING AND MANAGING NOTHING? BROCADE FILE SOLUTIONS FOR WINDOWS FILE ADMINISTRATORS CAN HELP. With Brocade File Solutions for Windows File Administrators, you can automatically migrate fi les to the optimum types of media based on your rules. Stop spending late nights and weekends manually migrating file data and start providing your users with access to the data they need. Clear the clutter with the FREE File Insight utility download at www.brocade.com/cleartheclutter

© 2008 Brocade Communications Systems, Inc. All rights reserved. Brocade is a registered trademark, and the B-wing symbol is a trademark of Brocade Communications Systems, Inc. Project1 8/1/08 10:28 AM Page 1

Smart Cards Now Supported

Maximum Control. Minimum Effort.

PC Remote Control

Providing desktop support can be a headache with the large number of systems, servers and mo- bile devices located on today’s corporate network. With NetSupport Manager remote control soft- ware, you can provide seamless IT support centrally from one location, improving response times and reducing associated IT costs.

Support, monitor and train your users securely over a LAN, WAN and the Internet. Manage and monitor multiple systems simultaneously with NSM’s multi-platform support. Troubleshoot help requests efficiently with NSM’s inventory and desktop management tools.

Able to co-exist with Remote Desktop (RDP), NetSupport Manager v10.3 supports a range of OS platforms and provides an option that lets any smart card login performed on a control PC to be redirected and applied on a client PC.

Take control of your network before it controls you.

[email protected] 770-205-4456 www.netsupportmanager.com 1108red_ProdRev19.v6 10/15/08 1:22 PM Page 19

ProductReview

Highly Available Exchange 2007 Service Pack 1 brings high-availability enhancements and added capabilities.

By J. Peter Bruzzese ith the delivery of Service Exchange 2007 Service Pack 1 Pack 1 (SP1), Microsoft has Free download W taken a big step forward in Microsoft | www.microsoft.com | 800-426-9400 improving the core high-availability (HA) features in Exchange 2007. And (SCC), the fourth solution of HA that SPI, which was being used in connection Redmond didn’t stop there. It has also is offered by Exchange 2007. with a CCR solution. In the event the supplied an additional high-availability The only downside is that SP1 doesn’t active node crashes and the passive solution designed to take specific include a way to accomplish SCR node has to pick up that functionality, advantage of Windows Server 2008. through the Exchange Management the Transport Dumpster is there to Certainly one of the highlights of the Console. It requires the use of the ensure little or no loss of mail. The new release is the Standby Continuous Exchange Management Shell (EMS) Hub Transport servers maintain a copy Replication (SCR) feature. SCR joins the with PowerShell commands. of mail going through them. other three HA solutions that Exchange The passive node, when it becomes 2007 SP1 provides, and is built on the New Capabilities active, checks in with the Transport “continuous replication” concept. This is SP1 includes new capabilities designed Hub to see if there are any messages where the database and the transaction to exploit some of the advances made in in the Transport Dumpster that aren’t logs are copied over to a secondary Windows Server 2008. For example, already in the transaction logs. location—whether that location is a disk, there are cluster improvements within Duplicates are then discarded and new as in the case of Local Continuous 2008, which are now called server messages are added in. One of the Replication (LCR), or a passive node to clusters as opposed to failover clusters improvements to this feature is the a cluster, as in the case of Cluster as in previous Server versions. In SP1, ability to manually check the Transport Continuous Replication (CCR)—and there is now support for geographically Dumpster in the event that the user is then replayed into the database. dispersed clusters, or geo-clusters, for using an LCR cluster. There’s also now SCR allows you to replicate your data SCC and CCR clusters—this way users the added ability through the EMS to to a different server or servers because can have cluster nodes dispersed across check on Transport Dumpster statistics. it can accommodate multiple targets. It different routed networks. Using the Get-StorageGroupCopyStatus allows admins to establish a lag time to New support for IPv6, Dynamic Host cmdlet, there’s a DumpsterStatistics prevent a corrupt set of files from repli- Configuration Protocol support for value that shows the number of messages cating before they can stop it. It also cluster nodes and new quorum models in the Dumpster, the age of the oldest allows admins to replicate the passive that add flexibility to how servers handle message and more. side to a CCR or Single Copy Cluster node failures have also been added. The These enhancements and additions are quorum is similar to a referee that certainly welcome, and no doubt the RedmondRating prevents what is called “split-brain” Exchange Team will continue to develop syndrome, a case where two nodes are improvements to the HA feature set of Installation: 20% 8.0 attempting to be active. There are four Exchange going forward into SP2. I Ease of Use: 20% 7.0 quorum models to choose from when look forward to seeing what’s next. — Features: 20% 9.0 configuring clusters, including Node Administration: 20% 8.0 Majority, Node and Disk Majority, J. Peter Bruzzese, MCSE, MCT, MCITP: Documentation: 20% 9.5 Node and File Share Majority and No Messaging, is a regular contributor to Overall Rating 8.3 Majority: Disk Only. Redmond. He provides free Exchange training at www.exclusivelyexchange.com Key: Cleaning up Messaging 1: Virtually inoperable or nonexistent and is the co-founder of ClipTraining.com, 5: Average, performs adequately Microsoft has added some improve- which provides a screencast training library 10: Exceptional ments to the Transport Dumpster in on a variety of subjects.

| Redmondmag.com | Redmond | November 2008 | 19 GET READY FOR MICROSOFT® SQL SERVER® 2008 WITH DELL

VISIT DELL AT BOOTH 104 AT PASS COMMUNITY SUMMIT 2008 NOV 18 – 21 SEATTLE WA.

0080908_DELLOSRS0008_B(S)_v4.inddSec1:280908_DELLOSRS0008_B(S)_v4.inddSec1:2 SSec1:2ec1:2 99/11/08/11/08 110:08:090:08:09 AMAM DISCOVER THE POWER OF MICROSOFT® SQL SERVER® 2008

With SQL Server 2008, you can simplify the sizing, management, and maintenance of your SQL Server 2008 database implementations and migrations.

• Run mission-critical applications with high security, reliability, and scalability • Reduce the time and costs required to develop and manage your data infrastructure • Upgrade to SQL Server 2008 without getting locked into a proprietary software system

And because Dell is Microsoft’s largest partner, we can off er the perfect SQL solutions — less expensive, faster to deploy, and easier to manage. Which is why we’ve sold more SQL Servers than anyone else, anywhere in the world.

From sizing to services to support, Dell is the complete solution.

SIMPLIFY YOUR DATABASE AT DELL.COM/SQL2008

0080908_DELLOSRS0008_B(S)_v4.inddSec1:380908_DELLOSRS0008_B(S)_v4.inddSec1:3 SSec1:3ec1:3 99/11/08/11/08 110:08:260:08:26 AMAM Project13 9/29/08 11:45 AM Page 1

Modular power just grew up.

The Symmetra PX 250/500 fits anywhere, with no rear access required. Scalable in 25kW increments, it boasts a 96% efficiency rating. (Shown in Line up and Match configuration for 500kW and 6 minutes runtime.)

Grow in bigger increments with the Symmetra PX 250/500. Principles of InfraStruXure® Right-sized, modular power – the key to virtualizing with true efficiency! High Density-Ready Architecture... If you haven’t already virtualized your servers, you’re probably seriously 1 Rack enclosures that are HD-Ready considering it. What you may not know about virtualization is this: modular power 2 Metered PDUs at the rack level is critical to maximizing the gains made through virtualization – otherwise, oversized 3 Temperature monitoring in the racks 4 Centralized monitoring software power simply negates the efficiency advances you’ve made. 5 Operations software with predictive capacity Now, the modular power you know from our acclaimed Symmetra PX 40/80 is management fi ® more flexible than ever with the all-new Symmetra PX 250/500. Featuring modular 6 Ef cient InRow cooling technology power in larger increments of 25kW up to 500kW, it configures in parallel up to 7 UPS power that is fl exible and scalable 2 MW, for enterprises with consolidated servers that are experiencing growth Virtualization can power original virtualized on a larger scale. significantly reduce load load IT load, resulting in underloaded power Scale up... The PDU – modular power’s newest frontier. systems. Improve your efficiency by avoiding Scale down... In addition to the Symmetra PX 250/500, we also introduce the first ever fully oversizing and by downsizing at the time modular PDU. Our new Modular Power Distribution technology brings the of IT consolidation with right-sized scalability and flexibility you need when virtualizing to the power our modular scalable architecture. distribution unit – right down to the rack level. Scaling up or down no longer Downsize, but expect re-growth means powering down – or attempting to forecast future use.

Modular power – for maximizing savings from virtualization. APC is proud to be a member of the green grid. Start saving energy today by virtualizing – but not without these flexible advances in modular power – the Symmetra PX 250/500 and APC’s first ever Modular TheTh following have been tested and Power Distribution Unit. workwo best with InfraStruXure Solutions.

Modular PDU Distribution Module High Effi ciency 415V

• Doubles the power in • Plugs directly • 415V of power means higher power half the floor space into RPP and density in a smaller footprint PDU products • 60% smaller, so material • Step down and conversion rates costs are reduced • Hot swappable and safe provide more power by routing at higher voltage • Built in advanced alarms • Available in single and 3-phase and notification • 288kW now fits in 12”! Go to www.xcompatible.com to learn more.

An Improved Architecture for High-Efficiency, High Density Data Centers Download a FREE copy of APC White Paper #126: “An Improved Architecture for High-Efficiency, High-Density Data Centers”

Visit www.apc.com/promo Key Code e839w • Call 888-289-APCC x9718 • Fax 401-788-2797

© 2008 American Power Conversion Corporation. All trademarks are owned by Schneider Electric Industries S.A.S., American Power Conversion Corporation, or their affiliated companies. e-mail: [email protected] • 132 Fairgrounds Road, West Kingston, RI 02892 USA • 998-1630 *Full details are available online.

Redmond_Nov08_e839w.indd 1 9/25/2008 9:17:54 AM 1108red_ReaderRev23-27.v6 10/15/08 1:27 PM Page 23

ReaderReview Your turn to sound off on the latest Microsoft products

Chrome Might Get You Home Google’s new beta browser shows promise, but needs lots of filling out.

By Doug Barney Chrome (Beta) t Redmond, all Reader Reviews Free Download until now focused on finished Google Inc. | 650-253-0000 | www.google.com Aproducts, most of those from Microsoft. This review is a big departure. Google’s Chrome browser has so much Reader Troy, an MCT from Illinois, user’ or ‘all users’ like most programs, or potential to succeed wildly or fail miser- has an opposite view. “This thing rocks!” at least let me choose which folder I want ably that we thought we’d take a look at he says. “I downloaded and installed to install the software in?” the beta. Chrome as soon as it was available. I like Many magazines and Web sites have it. I’m an IE and Firefox user, but I have Favorite Features already had single reviewers do their to say that Microsoft and Mozilla need to One of the main comments about tests. We think there is a better way to watch their backs.” Chrome is just how sparse the interface review a product of this importance: We Keep in mind that all of these impres- is, and how few features it has compared think Redmond readers should judge sions are based on the first beta. And as to older browsers. But make no mistake; this beta tool, and so we talked with Google Inc. itself is fond of saying, it there are a few things in Chrome that more than a dozen of you. Initial reac- “launches early and iterates often.” have users tickled. tions to the beta, which shipped in “My favorite feature is the thumbnails September, ranged from “unbelievably Installation of the most recently visited pages. This fast” to “a real disappointment.” In talks with more than a dozen of you, lets you quickly get back to the site you installation was a snap—just ask Stephen last visited without having to trawl Anslow, senior database developer for through the history list,” says Roy Saddleback church in Lake Forest, Calif. Humphreys, a technical support analyst. “I wasn’t asked to close anything and didn’t Seth King enjoys how it tracks per- have to reboot—a huge plus,” he says. formance. “I love the internal task As part of the installation, Chrome will manager with the ‘Stats for nerds.’ At import your bookmarks, and again, this work, we’re currently doing some final worked fine by all reports. performance testing before we imple- Not all are in love with the installa- ment production, and would love to tion, though. “The installer stinks,” use Chrome to help distinguish basic Chrome is very stable, but complains Tim Riley, an IT manager at memory usage issues … but my company there’s a lack of polish Peng Cheng Aluminum Enterprise Inc. is much too bureaucratic for useful “It’s a user-based install that automatically tools to be downloaded willy-nilly,” during this beta period. dumps itself in the admin’s application says King, an internet architect with Vivek M. Chawla, Microsoft data folder. I like to run as a limited user, the TSYS Technology Center Inc. “As Certified Professional so this doesn’t work well for me. an Internet application developer I Whether I tried installing as admin, or really get off on the memory usage, Vivek M. Chawla, a Microsoft Certified using ‘Run As’ while logged in as a limited multiprocess-oriented tabs and ‘Inspect Professional who’s written Web apps for user, it automatically—and secretly— element’ feature. It’s great for analyzing the last 10 years, has a typical reaction: placed the installation in the admin’s what exactly ASP.NET is shipping Chrome is not quite there yet. “Chrome application data folder, which I couldn’t down to the client.” is very stable, but there’s a lack of polish access or execute files from while logged The Task Manager also scores big during this beta period,” Chawla says. He in as a limited user. What I had to do to points for usability. was also underwhelmed by the feature get it working the way I wanted was tem- “The Task Manager is awesome.I’ve set: “Who knows, maybe Google is porarily give myself admin rights, install typically got about 20 tabs open across taking the ‘minimalist’ approach too far Chrome, then de-admin myself. Why multiple windows, and eventually one of by severely under-powering things.” not give me a choice to install for ‘this them has a Flash component go nuts

| Redmondmag.com | Redmond | November 2008 | 23 1108red_ReaderRev23-27.v6 10/15/08 1:27 PM Page 24

ReaderReview

with the CPU. I love being able to kill implementation. “Tabs are brilliant in shenanigans are afoot. Here are some of the plug-in with the Chrome Task Chrome. The fact that I can tear a tab off the more interesting findings. Manager without losing any tabs in the and move it to its own window is won- Reader Anslow found a range of sites process. The worst thing that happens is derful,” Chawla says. that Chrome failed to handle. “MSN reloading individual tabs,” says Chawla. Find is another plus for Chrome. pages load horribly slowly. I also went to While sparse, there are several areas “Chrome’s CTRL+F find feature is just a Community Server-driven Web site in of Chrome innovation. “One of the incredible. It makes IE’s find feature look IE and couldn’t get in, but switched to most innovative features of this product like the severely limited creature that it Chrome and voila! Session issues in IE has to be the anonymous surfing, which has been since the very first version of were the problem—no such problem in deletes all cookies and cached pages IE. Notepad uses the same find feature Chrome. My feeling is that it will be very relating to the browser session you had that IE does,” says Chawla. site-dependent as to whether Chrome open. This is a really useful security There are, however, plenty of interface will outrun IE, but there are some sites feature and ensures your own safety glitches and shortcomings. that are DOA with Chrome, and that’s a when you don’t want other people to “I couldn’t figure out how to get the shame,” says Anslow. check on what you’ve been doing,” bookmarks listing to be always open on Curiously, Chrome is more compatible Humphreys says. the left side of the program as in IE and with Microsoft than IE. “I have both Firefox. When you have a widescreen IE and Chrome installed. Frequently, Usability display, there’s plenty of room to have when I’m downloading software from Many of the favorite features relate to that open and still have horizontal space Microsoft.com using IE, it just spins usability, including the overall layout. for viewing pages,” says Jim Sutton, a and spins and doesn’t download. But “Chrome is quick and light with a network administrator for the when I use Chrome, it connects and default screen arrangement that makes it Goochland County IT department. downloads right away. It’s ironic con- very intuitive to get around. I especially “I did like the sparse layout so that sidering it’s Microsoft’s own Web site,” like the tabs above the address bar—they more of the page shows in the browser, says Casey Wood, a senior network give the impression of more real estate but it wasn’t as big a difference as I engineer at University Health System on the screen,” says Troy from Illinois. thought it would be. Overall it’s a nice in San Antonio, Texas. For reader Anslow, sparseness is good- browser, but as someone who works at a A network admin who asked not to be ness. “As it’s very clear of clutter, you can Web-design firm my main reaction is named had an interesting experience. “I get straight to browsing and searching ‘great, another browser to test against,’” have Vista on my home computer and without assimilating ‘what’s on this says reader Cameron Huff. IE is practically unusable, it crashes so window?’” he says. “Their approaches to security, processes much,” explains this self-described Many others agree. “The minimalist and even compilation of JavaScript are Microsoft fan who is leery of Google. UI of Chrome is absolutely fantastic. It all innovative and it shows. It seems Meanwhile, Chrome “is working well for me and is unbelievably fast.” David Feldman had the opposite As an Internet application developer I really problem. “I tried Chrome on Vista get off on the memory usage, multiprocess- Business and got an execution error. It loaded the interface but I couldn’t load oriented tabs and ‘Inspect element’ feature. It’s any pages,” says Feldman, a systems great for analyzing what exactly ASP.NET or any analyst with service provider Fiserv other framework is shipping down to the client. Inc., based in Brookfield, Wis. There were other Microsoft gotchas. Seth King, Internet Architect, TSYS Technology Center Inc. “One of my home pages is a Microsoft personalized Live page. I could log into my Live account, but the personalized was a bit hard to lose the status bar at rather solid for a beta,” says Robin pages would not display—it always went first, but now that I’m used to the very Jackson, a Chrome fan. “I love it.” to the Live search screen no matter what natural, unobtrusive way that Chrome I did,” says Jim Sutton. shows status bar info—for example, the Conspiracy Theories IE doesn’t always like Chrome either. URL of a hyperlink I’m mousing over— When one vendor’s tools fail to work “I’ll tell you a funny one: I’m also testing I can’t imagine ever needing a status bar with the competition, conspiracy theo- IE8 beta 2 and tried to use it to down- again,” says Chawla. ries quickly emerge. In Chrome’s case, load Chrome, but it was a no-go, not And tabs, while not original to there are some unusual problems, but even in compatibility mode. I had to use Chrome, are highly regarded for their because it’s a beta, one can’t say that Firefox,” says MCT Troy.

24 | November 2008 | Redmond | Redmondmag.com | 3_08_Redmond_Dorian_WTB3.ai 133.00 lpi 0.00°75.00°45.00°15.00° 2/4/2008 2/4/2008 6:23:34 6:23:34 PMPM Project6Process 2/5/08 Cyan Process10:15 MagentaAM PageProcess 1 Yellow Process Black 1108red_ReaderRev23-27.v6 10/15/08 1:27 PM Page 26

ReaderReview

Extensibility access one account, the other one auto- “Some time ago, someone speculated Firefox, with its add-ins, may have set the matically gets signed out,” says reader that it would be ‘killer’ to integrate mark for extensibility, and here Chrome Earl Moniz, a network admin with the ‘Search’ with ‘Find on Page’—how about has a way to go, even in terms of sup- U.S. Army. “I concluded that because the that, Google?” pleads Anslow. porting Google’s own items.“The lack of tabs weren’t synched together in any Another of Anslow’s wish list items is a Google Toolbar really reduces usability way, I could open both Gmail accounts form fill-ins: “How about secure auto-fill where any fill-in may be required. This is and access them without one getting so I don’t have to sigh in exasperation probably the worst failure-to-deliver in logged out. Perhaps only one may run every time I need to type a URL, the beta,” says Anslow. from any single machine? Not the case: I UserID or password when away from my Add-ins are another shortcoming. “My opened one in Firefox and the other in normal machine?” he suggests. only complaint is that I haven’t found Chrome and both may be accessed Other users, including Kevin Culver, ‘Add-Ins’ like those in Firefox. From a without knocking the other offline.” who is vice president of operations for user perspective, I’d say I still like Firefox Machalek Communications Inc., want better, but as a developer I’m quickly Readers Recommend “the address bar drop-down of typed-in shedding my ties to all other browsers,” Chrome is still in beta, which is a good history. I miss that.” says TSYS Technology Center’s King. thing: You still have a chance to get your ideas heard. Here are some of the things Performance Autonomous Tabs Redmond readers are looking for. The buzz about Chrome is that it’s fast. Despite the hype, autonomous tabs— “Reload All Tabs—or Refresh All, in IE And despite the fact that it uses lots of where each tab runs as separate and talk—is missing. If your Internet connec- processing, most find the speed claims protected process—aren’t ready for tion goes off briefly, and you have, say, true. “Everyone I’ve talked to loves prime time, users say. 19 tabs open, you’ll have to refresh Chrome for just one reason: it’s fast, darn “I have two Gmail accounts. Firefox each page one at a time,” says Oladipo fast. It totally changes how you browse. only allows me to have one open at a Ademola, a reader with Intelligent Instead of keeping tabs open, you can time. I open them both, but when I Business Solutions in Lagos, Nigeria. just move on because you know that

Use your IT CERTIFICATIONS to accelerate your DEGREE ONLINE.

Microsoft, Sun, Oracle, Cisco, Comp TIA, SAS, PMI, GIAC or (ISC)2 certifications could waive up to 25% of your fully accredited bachelor’s degree with: Call us today at • Flexible ONLINE learning • Up to 9 certifications built in at no extra cost 1-800-584-4812 • Programs in Networks, Databases, Security or visit us online at and Software www.wgu.edu/redn ONLINE DEGREES IN INFORMATION TECHNOLOGY 1108red_ReaderRev23-27.v6 10/15/08 1:27 PM Page 27

ReaderReview

they’ll open again really fast,” says Jim attribute to Chrome. Killing Chrome But many readers warn that Google Donelson, with software vendor iS3 Inc. stopped the chatter every time,” says must tread lightly on user privacy. “My “Chrome is fast. Web apps like Gmail Machalek Communications’s Culver. biggest concern is what Chrome is doing run faster and smoother in Chrome than under the covers to track activity and either Firefox or IE. AJAX-heavy sites Lessons Learned report back to Google. Call me paranoid, like Digg run much faster under Chrome Firefox and now Chrome are exposing but … ” says Sutton. than IE,” says Chawla. some Microsoft browser weaknesses. Russ Hall, president of Perfect Security Not all give it high marks for speed, And if Chrome can steal market share, LLC in Hastings, Neb., agrees: “My however. “I gave Chrome a whirl and Microsoft’s image is harmed. greatest concern about Chrome is the I’ve been kind of puzzled by the number “The few minor problems are nothing amount and type of information about of people that say it’s so much faster than compared to IE. Of course there are me that the program will send to the other browsers. I did a side-by-side com- problems—it’s marked ‘beta’—but after Google advertising database. It bothers parison on three of our own sites that are at least 4 ‘major’ releases of IE over the me that they store all my searches, want kind of slow and I didn’t see any appre- course of a decade, Microsoft should to know who’s in my photos and want to ciable difference in performance between hang its head,” says Donelson. “When serve up all my ads. But do they also have Firefox 3, IE7 and Chrome,” says Huff. you consider the resources Microsoft has to know every Web site I visit?” Hall asks. Chrome seems to fit the mode of an to bring to bear, which are for the most Generally speaking, Redmond readers old-style, rich-client app. “Chrome con- part unlimited, I really wonder what goes are positive about the Chrome beta. stantly chewed my processor. Not more on there,” he adds. Granted, there are still some bugs to be and more processor, mind you, but I Chrome could be a game-changer, hunted down and some improvements to could count on the various instances to especially if it proves to support Web be implemented, but it looks like Google ultimately take more processor for the apps and services in a superior manner. may be on the right track. — same number of tabs and windows as “Extensibility and true behavior in each Firefox. There was constant chatter on tab will make it stand out as a more reli- Doug Barney ([email protected]) is my hard drive that I could always able browser,” Anslow argues. editor in chief of Redmond. 1108red_StrangeloopSpread_final.qxd 10/14/08 1:51 PM Page 2

ADVERTORIAL

Application-Involved Networks and Winning the Performance Wars

Accelerating and scaling ASP.NET Web applications means enabling the application and network to work together. By Peter Varhol

This is especially true of Web applications, which make up a large proportion of those applications developed for enterprise use. Web applications, such as those using Microsoft’s ASP.NET technology, tend to be slow because of the size and frequency of traffic that goes back and forth across the network, and because of their distributed nature in general. The sluggish performance of Web applications means that applications have to be simplified to reduce the potential for even greater performance issues.

Further, many ASP.NET performance problems can’t be solved in production by throwing more system memory or servers at them. Such brute force solutions can often have some positive effect on performance, but the underlying issues or limitations of the application will eventually bring about a perception of a slow application.

It’s certainly true that application developers can tune an application to optimize performance through code-based tuning. However, tuning during development is a he most persistent and intractable very complex process that can extend the problem faced by IT is application development lifecycle by months, and may performance. Applications that ultimately only result in minimal performance seemed fine during development improvement. and test end up running too slowly Tin production to be useful to the users and Just as important, the tuning done for one business. Because performance problems application cannot be generalized over all The mobility often aren’t discovered until the application possible applications. It has to be done to deploy is in production and serving the business, over and over again, for each individual addressing performance problems at that application. The result is a significant high-performance time can be technically difficult, time- amount of development time for each applications consuming and expensive. application is spent not on coding features, but tuning performance. Applications take quickly is a Further, poor application performance longer, which means that business is less offers an ideal opportunity to point fingers ready to take advantage of the opportunities competitive at other participants in the application afforded by new software, or must spend disadvantage. lifecycle. Those responsible for server and more on software development in general. network operation blame the application Either way, the inability to deploy high- architecture or implementation, while the performance applications quickly is a developers shrug, claim the reported competitive disadvantage. problem isn’t replicable and have nothing to fix. Wherever the problem may reside, it What’s the answer to accelerating the remains until the application is no longer performance of Web applications? If the able to fulfill its function. network is able to better understand the 1108red_StrangeloopSpread_final.qxd 10/14/08 1:51 PM Page 3

ADVERTORIAL

needs of the application, it can assist in boosting its performance. The ability of the network and application to work together makes it possible to achieve high performance and scalability without months of separate application and network tuning.

The Trend Toward Application- Involved Networks There has long been the desire to improve application operation at runtime by making The Strangeloop decisions at the network level. At first, Networks AS1000 uses technical assistance on the network for heuristics to improve the applications was about high availability and performance of ASP.NET applications. fault tolerance. Load balancers on the network worked to make sure that no part of the network received an inordinate amount of different application frameworks and tried traffic. If there were multiple application to attack the issues that can be addressed servers, load balancers could route traffic at the network. For example, they can equally to all servers, making sure that no optimize TCP protocol traffic, or perform one server became overloaded. compression.

More complex distributed Web applications But they’ve only been able to go so far caused performance problems to become because they don’t ever really understand painfully apparent. These problems began the application itself. How do we make the with SSL processing, which required application and the network work together additional horsepower that could easily be to deliver better perceived performance? moved away from the application and onto The network is usually thought of as a fast the network. Because the load balancing but largely ”dumb” transport. However, if Performance devices were already placed in a strategic the network can observe application traffic improvements position in the network, they were good over time, it may be able to understand places to solve the performance problems. how that application works. with application- involved networks But first those network devices needed an Of course, it’s not really the network that’s architectural overhaul. They had to progress observing traffic and making decisions that have the potential from looking at packets and packet traffic to can affect the size and frequency of that to enable a truly looking inside those packets in order to traffic. Rather, software that communicates better understand the type of data being with the application servers and the network seamless Web transported. And second, these load can coordinate to achieve a level of application user balancers also needed added functionality, synchronization not otherwise possible. such as SSL and compression, in order to experience. act on the information it obtained from the The network appliances and accompanying packets. This functionality comes in the form software that interact and work with the of software, which can process SSL and application are still emerging into general provide compression and decompression use. Performance improvements with algorithms. application-involved networks have the potential to enable a truly seamless Web Because of this shift toward using network application user experience. devices to speed applications, special- purpose appliances have been struggling to Peter Varhol is a principal at Technology solve application problems from the network Strategy Research LLC, an industry research in. They looked for commonalities between and consulting firm.

Read the entire white paper at: RedmondMag.com/showcase/strangeloop/1 By Peter Varhol 1108red_F1ReadersChoice30-40.v5 10/15/08 1:54 PM Page 30

The 2008 Readers’ Choice Readers love some products so Awards: much that they keep voting them Readers’ Choice winners again and again. To recognize the dynasties in our annual competition, Redmond is introducing the “Triple Crown,” a brand-new award for products that have won (at least) three Readers’ Introducing Choice honors in a row. By Lee Pender Redmond’s Triple Crown

he number three is everywhere. Three strikes, common. Winning a Readers’ Choice Award is always three traffic lights, the three-ring circus— an honor, but those products that win again and again Tthey’re all famous triads. For curious deserve special recognition for staying on top in a Googlers—sorry, Microsoft, we mean MSN competitive industry, and that’s what the Triple Crown LiveSearchers, of course—there’s even a Web site called award and logo give them. Threes.com that dedicates itself to all things triple. They have to stay on top in order to win it, though. Well, Threes.com can add a new entry to its list of The Triple Crown is for winners of three consecutive trinities—the Redmond Readers’ Choice Triple Crown awards, not just for products that have won three award, which honors products that have won (at least) times. And it doesn’t go to ISV winners, either— three consecutive Readers’ Choice Awards. although being an ISV, or non-Microsoft, winner is In fact, some of this year’s winners have won four still an important honor—but only to those products times in a row or more—but for the purposes of the that come out on top three times running. And while Triple Crown, we’re only going back two years, to 2006. there are a lot of Triple Crown winners this time A quick glance at this year’s results shows that a around, every one of them will have to come out majority of the product winners this year are taking swinging next year in order to retain the award. A couple home Redmond’s Triple Crown.And that’s why we of two-time winners might just find themselves with a invented it—not because it’s rare but because it’s Triple Crown next year.

30 | November 2008 | Redmond | Redmondmag.com | ILLUSTRATION BY ROBERT KAYGANICH 1108red_F1ReadersChoice30-40.v5 10/15/08 1:54 PM Page 31

| Redmondmag.com | Redmond | November 2008 | 31 1108red_F1ReadersChoice30-40.v5 10/15/08 1:54 PM Page 32

2008 Readers’ Choice Awards NETWORK AND SYSTEMS MANAGEMENT Best Network Best Performance circuit board (PCB) design tools to Management Product: Management Product: the PC platform. It also helped us 22 products in category 16 products in category to introduce our Unix-trained developers more rapidly to NT and ScriptLogic Desktop Authority - Microsoft Operations Manager - ease the transition to development Winner and ISV Winner 17.1% Triple Crown Winner 34.0% on the PC platform. MKS is now Microsoft System Center Operations SolarWinds Orion Network Perfor- also used in our Lightning suite Manager (formerly MOM) - mance Monitor - ISV Winner 16.0% of PCB design tools for the design Preferred Product 15.8% of high-speed PCBs. MKS continues Hewlett-Packard OpenView - to be actively used in development Microsoft Systems Management Preferred Product 12.3% and is a central part of the Server - Preferred Product 14.8% Microsoft scores another Triple Crown development environment on the It’s a huge upset for ScriptLogic’s in this category, with SolarWinds PC platform.” Desktop Authority application, which sweeping in to pick up ISV honors knocks off two competitors from over HP’s OpenView. Microsoft for its first-ever victory in Best Bandwidth/Traffic this category. System Center Monitoring Product: Operations Manager and Systems Best General Network 5 products in category Monitoring Tool: Management Server might have split Lightspeed Systems Total Traffic 53 products in category the votes between them, giving Control - Winner 23.5% Desktop Authority an opening, but Microsoft Operations Manager - ScriptLogic’s product didn’t fail to Argent Guardian - Triple Crown Winner 20.3% capitalize on the situation. Preferred Product 20.1% Cisco Systems Syslog Analyzer - Users say they love it. Scott C. Davis, Network Instruments Observer - ISV Winner 15.9% IT director for the College of Archi- Preferred Product 18.1% HP OpenView Operations for tecture, Design and Construction at Lightspeed’s Total Traffic Control is Windows - Preferred Product 8.7% Auburn University in Alabama, used one win away from a Triple Crown, Desktop Authority to untangle a Readers liked the big boys in this racking up its second straight nasty printing problem that involved category. Operations Manager wins success this year. It narrowly beat sorting out printing rights for more the Triple Crown in yet another Argent Guardian, with Network than 2,500 users on more than 70 category, this time in a field packed Instruments Observer also coming printers: “I’m the IT director, and I’ve with 53 products. Another mega- close. Interestingly, fully 10 percent got four people that report to me. vendor, Cisco, chimes in as ISV of readers in this category wrote in a I’ve got one person assigned to archi- winner with Syslog Analyzer. HP, yet product that wasn’t in our survey list. tecture, one assigned to industrial another monster player, scores with design and one to building science. It a preferred product. Readers also would take all four of us a day just to offered a long list of favorite prod- Best Web Usage Monitor: get the printing right—I’m doing it all ucts not included among this year’s 11 products in category now in a phone call and an e-mail.” survey choices. Websense Enterprise - With Desktop Authority, it’s all Triple Crown Winner 35.4% about simplicity, says Tory Skyers, senior infrastructure engineer at Best Interoperability Product: SurfControl Web Filter - Prudential Fox and Roach, a real 4 products in category Preferred Product 21.4% estate firm that operates in greater MKS Toolkit - Blue Coat Proxy SG and AV Philadelphia. “It doesn’t take a long Triple Crown Winner 38.1% Web proxy servers - time to understand what you’re Preferred Product 9.1% doing,” Skyers says. “This product is Centrify DirectControl - easy to manage and easy to get a Preferred Product 20.5% There’s no stopping Websense Enterprise, which stormed to a hold of. I like the ease of use.” Likewise (formerly called Centeris) Triple Crown by a large margin over Likewise - Preferred Product 19.5% the two Preferred Products that Best Application MKS Toolkit won its category trailed it. Management Product: handily and snatched a Triple 21 products in category Crown. Chris Hambleton, a Bristol, England-based deputy Best Asset Management/ Microsoft Operations Manager - engineering general manager for Resource Inventory Product: Triple Crown Winner 35.9% Zuken, a Japanese electronic and 12 products in category ScriptLogic Desktop Authority MSI engineering design firm, passes on Altiris Asset Management Suite - Studio - ISV Winner 15.4% via e-mail a Toolkit success story: Triple Crown Winner 25.0% “Zuken started using MKS over 10 LANDesk - Preferred Product 9.2% years ago in order to help with the Altiris Inventory Solution - It’s a Triple Crown for Microsoft transition of its Unix-based tools to Preferred Product 11.7% Operations Manager, which won by a the NT platform. This helped us to Novell Asset Manager - fairly wide margin in a large field of bring our Unix-based tools to the Preferred Product 11.7% competitors. ScriptLogic checks in market on the PC platform more as ISV winner in another victory for rapidly. This was originally used to Numara (formerly Intuit) Track-It - the Desktop Authority product. port our VISULA suite of printed Preferred Product 10.9%

32 | November 2008 | Redmond | Redmondmag.com | Project13 9/29/08 12:07 PM Page 1

WINDOWS SERVER 2008 WITH HYPER-V. The power to wrangle, rope, and virtualize the toughest workloads.

Like most IT, you’ve got whole herds of servers that need virtualizing. But you don’t need some premium-priced solution to rope ‘em in. Get Windows Server® 2008 with the virtualizing power of Hyper-V.TM In one solution, you get the power to virtualize, integrate with a broad range of management tools, and 24/7 availability—all for a refreshingly low TCO. Drink in the details at ServerUnleashed.com 1108red_F1ReadersChoice30-40.v5 10/15/08 1:54 PM Page 34

2008 Readers’ Choice Awards NETWORK AND SYSTEMS MANAGEMENT Symantec’s Altiris acquisition Best Virtual Server Product: Best Non-Microsoft Browser: looks wiser all the time, and Asset 2 products in category 5 products in category Management suite helps buoy that outlook by taking home a Triple VMware GSX Server - Triple Crown Firefox - Triple Crown Winner 77.5% Winner and ISV Winner 60.0% Crown. Altiris also scored a Preferred To be fair, our users seem to prefer Product nod in the same category Microsoft Virtual Server 2005 - Internet Explorer to non-Microsoft with Altiris Inventory Solution. We Preferred Product 28.3% options, but Firefox so dominated awarded an extra Preferred Product the non-Microsoft choices that Its stock price might have taken a laurel because Novell and Altiris we didn’t even bother awarding few hits in 2008, and it might be Inventory Solution finished in a dead Preferred Products in this category. facing new competition from heat for second place, and Numara For what it’s worth, though, Netscape Microsoft, but VMware remains king was very close behind. Navigator is still hanging on with of the Readers’ Choice virtualiza- about 3 percent of respondents. tion jungle. GSX easily won over Best License Microsoft Virtual Server 2005 to Management Product: take the rare Triple Crown-ISV Best SQL Tool: 14 products in category 6 products in category Winner honor. ESX, another VMware product, scored quite a SQL Power Tools - Winner 36.6% Microsoft Systems Management few write-in votes as well. Server - Triple Crown Winner 53.7% ScriptLogic Security Explorer for Altiris Compliance Suite - Preferred SQL Server - Preferred Product 11.2% Product and ISV Winner 18.9% Best Virtual PC Product: 5 products in category Quest Software Spotlight on SQL - Altiris Server Provisioning Suite - Preferred Product 10.8% VMware Workstation Edition - Preferred Product 6.5% SQL Power Tools continues to Triple Crown Winner and perform in the category that’s It’s a strong showing for Altiris, with ISV Winner 57.8% two Preferred Products and an ISV almost its namesake, claiming a winner—but Microsoft’s Systems Microsoft Virtual PC for Windows - second straight win in the best SQL Management Server still cruises to Preferred Product 35.0% tool category. the Triple Crown. Jared Beard, associate director of IT labs at Indiana University in Bloomington, Ind., notes one reason Best Compliance Tool: why he likes Triple Crown winner In American thoroughbred 16 products in category Workstation Edition: “Students can racing, a horse wins the ScriptLogic File System take environments with them at the Auditor - Winner 18.7% end of the semester. It lets them Triple Crown if it wins the take that VM processor hardware NetIQ - Preferred Product 18.5% to a processor back home and Kentucky Derby, the Symantec/Bindview - continue the work. A lot of times Preferred Product 12.1% when you’re working on a PC at Preakness Stakes and the the end of the class, it’s done. ScriptLogic took this category by just That machine is wiped, and it’s Belmont Stakes all in the one vote over incumbent NetIQ, which gone. [Workstation Edition] gives snags Preferred Product honors. you flexibility like you’ve never same year. had before.”

INSTALLATION AND DEPLOYMENT Best Software Best Software Best Drive Imaging Product: Distribution Product: Packaging Product: 4 products in category 11 products in category 4 products in category Symantec Ghost Suite - Microsoft Systems Management Installshield AdminStudio - Triple Crown Winner 54.2% Server - Triple Crown Winner 53.4% Triple Crown Winnner 45.4% Acronis True Image - ScriptLogic Desktop Authority - Altiris Package Studio - Preferred Product 26.3% Preferred Product & ISV Winner 17.2% Preferred Product 20.0% Altiris Migration Suite - IBM Tivoli Netview Distribution ScriptLogic Desktop Authority MSI Preferred Product 8.3% Manager - Preferred Product 6.6% Studio - Preferred Product 17.0% Almost everybody’s a winner in this Systems Management Server just Installshield adds its name to the category, but Symantec’s Ghost Suite crushed the competition in this cate- Triple Crown list with a big victory. is the big winner, bringing home a gory and picked up a Triple Crown. Altiris and ScriptLogic each pick up Triple Crown and more than 50 a Preferred Product Award. percent of the vote. Count Auburn’s Davis as a fan: “Ghost works for us and it works well,” he says succinctly.

34 | November 2008 | Redmond | Redmondmag.com | Project15 10/6/08 2:49 PM Page 1

SYMANTEC IS

FROM ANTIVIRUS TO VIRTUALIZATION TO DATA CENTER MANAGEMENT, SYMANTEC IS HARD AT WORK IN OVER 99% OF THE FORTUNE 500®. FOR AN INSIDE LOOK AT WHAT SECURITY MEANS TODAY, VISIT US AT SYMANTEC.COM/EVERYWHERE EVERYWHERE.

© 2008 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. 1108red_F1ReadersChoice30-40.v5 10/15/08 1:54 PM Page 36

2008 Readers’ Choice Awards ADMINISTRATION Best Migration Product: Winternals Defrag Manager - Best Network Automation and 16 products in category Preferred Product 22.6% Batch Processing tool: 14 products in category Quest Migration Suite for Active Acronis Disk Director Suite - Directory/Exchange - Preferred Product 11.0% ScriptLogic Desktop Authority - Triple Crown Winner 17.1% Executive Software takes the Triple Triple Crown Winner 39.8% Altiris Deployment Solution - Crown with Diskeeper, a strong HP OpenView Operations for Preferred Product 13.6% winner in the category. Windows - Preferred Product 21.2% Acronis Migrate Easy - MKS Toolkit for Enterprise Developers - Preferred Product 11.1% Preferred Product 7.6% Acronis Snap Deploy - The first two crowns in It’s another win for Desktop Preferred Product 11.1% Authority—this time, a Triple Crown. OpenView also made a This was a real barn-burner, but the Triple Crown of strong showing. Quest’s suite hung on to nab a Triple Crown and just nip an Motorsport (won over Altiris application and two Acronis an entire career, not in Best Scripting Tool: products. In this category, 10 5 products in category percent of readers voted for “Other,” showing how competitive one year alone) are the Sapien PrimalScript - the migration technology space is Triple Crown Winner 26.4% right now. Once again, we bestowed Indianapolis 500 and iTripoli Admin Script Editor - an extra Preferred Product award the 24 Hours of Le Preferred Product 20.5% because the two Acronis products tied each other. Mans; the third is Adersoft VbsEdit/JsEdit - Preferred Product 15.1% considered either the It’s a Triple Crown for Sapien Best Server Migration Product: PrimalScript, which nudges out a 7 products in category Formula One World couple of other strong competitors Altiris Deployment Solution - in the scripting space. Winner 28.9% Championship or the Quest Migration Suite for Active Grand Prix of Monaco. Best Patch Directory/Exchange - Preferred Management Product: Product 21.1% By either measure, the 17 products in category Altiris Client Management Suite - only driver to ever Microsoft Software Update Services Preferred Product 11.6% - Triple Crown Winner 51.0% It’s a second straight win for win a Triple Crown is Altiris Patch Management Solution - Altiris’s Deployment Solution, Preferred Product and which will be up for a Triple Crown the late Englishman, ISV Winner 10.9% next year. But Quest Migration Suite could provide a stiff chal- Graham Hill. Shavlik Technologies HFNetChkPro - lenge again. Preferred Product 10.0% Oh, those Patch Tuesdays—readers love them, or at least they love Best Group Policy Manager: Best Remote Microsoft’s Update Services, which 11 products in category Troubleshooting Solution: eases to a Triple Crown. Altiris 13 products in category Microsoft Group Policy Management nabbed the ISV Winner spot over Console - Triple Crown Winner 55.0% ScriptLogic Desktop Authority Shavlik’s entry at the wire. Remote Management ScriptLogic Active Administrator - Gateway - Winner 15.7% Preferred Product and Best Application Sharing Tool: ISV Winner 18.6% Altiris Carbon Copy - 3 products in category Preferred Product 13.6% NetIQ Group Policy Administrator - Citrix Metaframe - Winner and ISV Preferred Product 6.5% NetSupport Manager - Winner 48.3% Preferred Product 12.3% It wasn’t all that close, as Microsoft Microsoft Terminal Services - took the Triple Crown. ScriptLogic ScriptLogic just takes this category Preferred Product 47.0% made a strong ISV showing. over Altiris for the first time. Desktop Authority was arguably Down goes Microsoft! Well, at the product of the Readers’ Choice least in one category, anyway. By Best Disk Defragmentation and awards this year, stealing wins from the slimmest of margins, Citrix steals Drive Monitoring Tool: incumbents in several categories. the application-sharing tool category 7 products in category One caveat here, though: “Other” and ruins Terminal Server’s Triple Crown chances. Executive Software Diskeeper - actually won the category with Triple Crown Winner 33.0% almost 19 percent of the vote.

36 | November 2008 | Redmond | Redmondmag.com | Project15 10/6/08 2:48 PM Page 1 1108red_F1ReadersChoice30-40.v5 10/15/08 1:54 PM Page 38

2008 Readers’ Choice Awards SECURITY Best Firewall Product— Best Intrusion Best Secure Messaging Tool Hardware-Based: Detection System: or Service (Spam and 14 products in category 15 products in category Content Filtering): 50 products in category Cisco Systems PIX series - Cisco Systems’ Cisco Secure Triple Crown Winner 49.0% Intrusion Detection System - Microsoft Exchange Server 2003 - Triple Crown Winner 33.4% Triple Crown Winner 24.1% Symantec VelociRaptor - Preferred Product 10.0% Snort - Preferred Product 13.1% Barracuda Networks Spam Firewall - Preferred Product and ISV Winner 8.4% Sonicwall Pro and TZ series - Trend Micro ScanMail for Microsoft Preferred Product 15.1% Exchange - Preferred Product 8.9% Postini - Preferred Product 6.4% It’s a Triple Crown for industry Cisco racks up another Triple Crown It’s a landslide—and a Triple Crown— giant Cisco, which dominates with its Secure Intrusion Detection for Exchange Server in a very the hardware-based firewall System, which easily ran away from crowded field. product category. competitors in this category.

Best Anti-Virus Tool: Best Firewall Product— Best Intrusion Prevention System: 11 products in category Software-Based: 18 products in category 12 products in category Symantec Antivirus - Cisco Systems’ Okena Stormwatch - Triple Crown Winner 30.2% Microsoft ISA Server 2004 - Triple Crown Winner 28.3% McAfee GroupShield - Triple Crown Winner 26.8% Network Associates IntruShield - Preferred Product 16.4% Check Point Software Technologies Preferred Product 8.8% Trend Micro - Firewall - Preferred Product & Symantec ManTrap - Preferred Product 13.6% ISV Winner 19.7% Preferred Product 6.9% Symantec nails down a Triple Crown Symantec Enterprise Firewall - Cisco scores again with a Triple and hammers home another win in Preferred Product 19.4% Crown, this time in a category in its bread-and-butter category. ISA, ISA baby: One of Microsoft’s which “Other” actually finished in staples steals a Triple Crown by strong second place. holding off ISV winner Check Point Best Anti-Spyware Tool: and Symantec’s Enterprise Firewall. 13 products in category Best Smart Card/ Biometric/Two-Factor McAfee Anti-Spyware - Best Security Auditing Product: Authentication System: Triple Crown Winner 22.0% 23 products in category 10 products in category Trend Micro Antispyware - Preferred Product 18.0% ScriptLogic Enterprise Security RSA SecureID - Reporter - Winner 15.1% Triple Crown Winner 55.8% Webroot - Preferred Product 9.1% CA eTrust Access Control - Digital Persona - Elvis Costello sang about “Watching Preferred Product 10.1% Preferred Product 6.3% the Detectives,” but McAfee is our readers’ choice for keeping an eye GFI LANguard Security Event Log ActivCard Trinity - on the spies. And that’s a Triple Monitor - Preferred Product 11.2% Preferred Product 5.2% Crown for Symantec’s security rival. ScriptLogic comes up big again, RSA SecureID gets a Triple Crown taking the security-auditing product here with a dominant score—no one category for the first time. seems close to approaching SecureID’s popularity.

TRAINING AND CERTIFICATION Best Exam Preparation Product Best Online, Disk-Based or Best Windows Certification- or Service: Instructor-Led Training: Based Boot Camp: 10 products in category 15 products in category 5 products in category

Microsoft Press - Winner 26.0% Microsoft Press - Global Knowledge - Triple Crown Winner 26.8% Triple Crown Winner 41.6% Transcender - Preferred Product and ISV Winner 23.6% Global Knowledge - Preferred The Training Camp - Product and ISV Winner 13.3% Preferred Product 15.4% Cisco Press - Preferred Product 9.7% SkillSoft (Books24x7) - Mountainview Systems - Microsoft Press steals this category Preferred Product 9.9% Preferred Product 13.3% back after getting knocked off in 2007. Transcender still comes out It’s a big win for Microsoft Press, Global Knowledge gains the an ISV Winner. which takes home the Triple Crown Triple Crown in the boot-camp in this category. competition by a large margin.

38 | November 2008 | Redmond | Redmondmag.com | Project13 7/8/08 5:22 PM Page 1

364)&%  8PSL-FTT%FMJWFS.PSF (JWFCVTJOFTTVTFSTUIFBCJMJUZ UPWJFXBOEVQEBUFSFQPSUTGSPN BOZXIFSF"TXFMMBTUPJOUFSBDU XJUIUIFNJOUVJUJWFMZ:PVMMOPUPOMZ IBWFIBQQJFSFOEVTFST CVUZPVMM CFIBQQJFSUPP'FXFSSFQPSUTUP DSFBUF"OEUIFBCJMJUZUPTDIFEVMF TFDVSFSFQPSUTGPSBVUPNBUJDEFMJWFSZ EBZPSOJHIU8FSFUBMLJOHBCPVU $SZTUBM3FQPSUTÛ4FSWFS‰ UIFSFQPSUJOHTPMVUJPOUIBUUBLFT UIFSVTIPVUPG*5

3VTINFZPVS%BZ '3&&5SJBM PG$SZTUBM3FQPSUT4FSWFS$BMM VTUPEBZ0S WJTJU XXXCVTJOFTTPCKFDUTDPNSVTIFE

$PQZSJHIUÝ#VTJOFTT0CKFDUT4""MMSJHIUTSFTFSWFE#VTJOFTT0CKFDUTBOEUIF#VTJOFTT0CKFDUTMPHPBOE$SZTUBM3FQPSUTBSFUSBEFNBSLTPS SFHJTUFSFEUSBEFNBSLTPG#VTJOFTT0CKFDUT4"PSJUTBGmMJBUFEDPNQBOJFTJOUIF6OJUFE4UBUFTBOEPSPUIFSDPVOUSJFT4"1JTBSFHJTUFSFEUSBEFNBSLPG 4"1"(JO(FSNBOZBOEJOPUIFSDPVOUSJFT 1108red_F1ReadersChoice30-40.v5 10/15/08 1:54 PM Page 40

2008 Readers’ Choice Awards STORAGE AND BACKUP Best Backup System: Best Disaster Recovery Product Best Load Balancing Product: 23 products in category or Service: 9 products in category 27 products in category Symantec Backup Exec System Microsoft Windows Server 2003 Recovery (BESR) - Triple Symantec Backup Exec System Network Load Balancing - Triple Crown Winner 28.2% Recovery (BESR) - Triple Crown Crown Winner 53.7% Winner 18.5% Symantec NetBackup - F5 Networks 3-DNS Controller - Preferred Product 12.0% Symantec NetBackup - Preferred Product and ISV Winner 12.1% Preferred Product 12.2% Acronis True Image - Mercury LoadRunner - Preferred Product 11.9% Altiris Recovery Solution - Preferred Product 7.2% Preferred Product 9.7% Symantec dominated this category, … And it’s another Triple Crown for and the venerable BESR easily took It’s more raging success for Windows Server 2003. F5 makes a home a Triple Crown in it. Symantec as BESR takes home strong showing as ISV winner. another Triple Crown.

Best Storage Management Product: Best Clustering and Horse racing triple crowns 18 products in category Failover Solution: 7 products in category also exist in the United Symantec Storage Central - Triple Crown Winner 19.6% Microsoft Windows Server 2003 Kingdom, Ireland, Clustering Services - Triple EMC ControlCenter SRM software - Crown Winner 52.8% Canada, Japan, Hong Preferred Product 19.1% Veritas Cluster Server - Preferred Seagate Cheetah, Savio and NL35 Kong, Chile, Uruguay, Product and ISV Winner 16.0% series - Preferred Product 7.8% Ecuador and Venezuela. Neverfail - Preferred Product 7.6% Storage Central won this hotly contested category by just three Apparently, nobody clusters like votes—but it was enough to steal a Microsoft; Windows Server 2003 Most Reliable Windows-Based Triple Crown for Symantec. cruised to a Triple Crown in this category. Server Platform: 5 products in category

HP - Winner 42.7% In baseball, a player who leads the league in batting average, Dell - Preferred Product 41.0% RBI and home runs in the same season wins the Triple IBM - Preferred Product 12.0% HP edges incumbent Dell in this Crown. The last man to win Major League Baseball’s Triple clash of the titans. The final margin Crown was Carl Yastrzemski of the Boston Red Sox in 1967. of victory was just 16 votes—we almost had to examine hanging chads.

SURVEY METHODOLOGY

nce again this year, Redmond sent its Readers’ We’re also bestowing the title of Preferred Product Choice survey to readers who signed up to on products that separated themselves from the pack Oreceive one of Redmond Media Group’s but weren’t outright winners. e-mail newsletters. We received 839 responses. Of course, for 2008, we’ve established the Triple Also, again this year, we’re awarding “ISV Winner” Crown for products that have won outright for at status to non-Microsoft entries that didn’t win their least three consecutive years. Also this year, we’ve categories outright but managed to beat everybody given you a new Readers’ Choice experience, with else but Microsoft. Redmond is focused on the exten- less text, more numbers and quotes from users sive vendor community that expands on what drawn out to highlight their experiences with Microsoft already does; because Microsoft products certain products. We’re including figures such as routinely win in many categories, we developed the the percentage of the vote each recognized product ISV Winner award to recognize the leading inde- won in a given category in order to acknowledge pendent software vendors whose wares finished just that some products win with more than 50 percent behind (or sometimes even ahead of) those of of the vote, while others win with as little as 15 Microsoft’s in our standings. We did this not so percent. We’re also telling you how many entries much to level the playing field but to acknowledge there were in each category to offer context for that there are two playing fields in some cases. what the voting percentages really mean. —L.P.

40 | November 2008 | Redmond | Redmondmag.com | Project15 6/6/08 2:46 PM Page 1

Finally, Affordable Enterprise-Class Archiving

Introducing Sunbelt Exchange Archiver. Sunbelt Up to 80% smaller message store. With SEA, you’ll Exchange Archiver (SEA) is a robust new product which dramatically reduce your Exchange storage. The benefits are delivers real enterprise-class email archiving, at a price that clear: faster backup times, better Exchange performance, won’t break your budget. Get comprehensive legal and and faster recovery. regulatory compliance. Reduce your Exchange storage by up to 80%. Securely store emails on your choice of media, Journaling not required. It’s a fact that using the using the built-in Hierarchical Storage Exchange Journaling mailbox for archiving Management. And, find archived emails dramatically affects server performance. rapidly with full-text search for e-discovery With SEA, Journaling is an option – the or compliance. program’s breakthrough Direct Archiving feature stores all emails immediately after Compliance, e-Discovery, and legal they are received, keeping load off the readiness. If you need to archive emails Exchange server. for regulatory or legal reasons, SEA has you fully covered. Emails are stored in “Exchange performance No more PST headaches! SEA gets their original form, in whatever secure is suffering. Your users rid of pesky PST files that are a major media you prefer, with complete flexibility complain about email admin headache. SEA automatically finds on retention. Need to find an archived storage. Your CEO wants them, imports them, and makes them part email? Simply use SEA’s powerful of your user’s archive. integrated full-text search of emails and legal compliance. Now what?” Great for disaster recovery. No attachments, and you’ll be ready at a matter where you email is stored, business moment’s notice for e-discovery or legal continuity is assured with SEA. Using the requests. included web client, users can continue to Seamless end-user experience. SEA see and use their email even if Exchange is is fully transparent for your users, whether down. they’re running Outlook, OWA, Blackberry Archiving’s time has come for devices or even Entourage on the Mac – with everyone. Contact us today and see how no special client software needed. Trusted SEA solves your legal and compliance end users can be delegated granular authority headaches and immediately improves the performance of with the included web-interface or optional Outlook Exchange – while saving critical budget dollars. add-in. They can do off-line synchronization, and search, edit, forward, move or delete archived emails.

Get a Free Quote and See How Cost-effective Sunbelt Exchange Archiver Really Is! Email [email protected] or call 888-688-8457

Sunbelt Software Tel: 1-888-688-8457 or 1-727-562-0101 Fax: 1-727-562-5199 www.sunbeltsoftware.com [email protected] © 2007-2008 Sunbelt Software. All rights reserved. Sunbelt Exchange Archiver is a trademark of Sunbelt Software. All trademarks used are owned by their respective owners. Project14 10/6/08 2:51 PM Page 1

Try to eliminate your email p

* Your Altar Over is all! 6 Feet T

* nicely YourYour aaltarltar ffitsits nicely erver rack onon anan emptyempty servers rack Project14 10/6/08 2:52 PM Page 2 l problems with VOODOO!

Your FREE Ceremonial Server Rack Altar* could help your IT Staff:* *

• Eliminate Email Downtime • Decrease Storage & Recovery Costs • Manage e-Discovery & Archiving

ORDER ONE TODAY! Your FREE Ceremonial Server Rack Altar* will be shipped to you within 3-4 weeks. Visit www.messageone.com/redmond

**If the Ceremonial Server Rack Altar does not work try the Email Continuity Service from Dell MessageOne™. Thousands of CIO’s at global companies including Allianz Global Investors of America, Siemens and the American Red Cross Lee County Florida trust Dell MessageOne to help prevent downtime, protect communications and data, and streamline compliance and discovery.

*Actual Ceremonial Server Rack Altar to be delivered as a POSTER (image as seen on facing page).

VOOODOO:ODOO: PRP OAOACHACHH ECCOONDNDN BEBESEST APPROAPP THETHT E SSE NTINUITNTITINUNUITTY E BUBBUSINESIS NEN SSSS CONO TTOO CUUTTTINGTITINGG EDGEEDGD

© Dell 2008. Dell MessageOne is a registered trademark and, the Dell MessageOne logo, MessageOne.com, Email Management Services, and EMS are trademarks of Dell. Project6 3/11/08 11:05 AM Page 1

Quintum’s ® Intelligent VoIP Switches and Gateways ® are The Perfect Fit for Microsoft® Office Communications Server 2007

Quintum, a Microsoft Gold Certified Partner, unifies VoIP applications and traditional telephony. And now, Traditional VoIP Quintum's VoIP solutions allow easy integration of Communications Server 2007 with gateways just aren’t existing telephony communications the best fit for networks. Tenors offer real-time, seamless communication between Microsoft Unified Communications Office Communications Server 2007 and the legacy world. Tenor’s unique ‘MultiPath’ switching design assures the easiest deployment and minimum disruptions to the existing communications network.

Quintum Tenors feature a unique Unified Communications Proxy which provides 'Any to Any' connectivity between the Microsoft UC cloud and any existing network, including the PSTN, TDM equipment and SIP-based VoIP equipment. Check out our animated display at: www.quintum.com/microsoft

Frost and Sullivan found the Tenor VoIP solutions were The Perfect Fit for business VoIP networks, thus Have questions on deploying Microsoft OCS2007? recognizing Quintum with its 2007 Global Product Differentiation Ask Dr.Q at [email protected] Innovation Award.

1.877.SPEAKIP (877.773.2547) Outside the U.S. 1.732.460.9000 www.quintum.com 1108red_F2Cisco45-50.v11 10/15/08 2:05 PM Page 45

TheThe UnlikelyUnlikely ContenderContender

Networking giant Cisco goes after Microsoft’s supremacy in the collaboration-software

market. By Paul Korzeniowski

Microsoft has long been viewed as the industry bully—IT’s toughest, baddest, meanest thug. Critics have charged the company with using tactics ranging from the unethical to the outright illegal in order to grow its business. But Redmond has remained unfazed by these charges and continues boldly beating up on competitors.

ILLUSTRATION BY ERIC FIELD | Redmondmag.com | Redmond | November 2008 | 45 1108red_F2Cisco45-50.v11 10/15/08 2:05 PM Page 46

Cisco vs. Microsoft Now, though, despite its status as a $60 billion blue-chip Enterprise Server. Consequently, companies can drop the company, the company needs to be on guard. A new fighter PostPath system directly into their Exchange environments has entered the ring, one that has fought off all contenders to improve the performance of their backup tasks, or they in its market while also earning the scorn of its competitors. can dump the Microsoft e-mail system altogether. That fighter is Cisco Systems Inc. “Because PostPath was a small company, potential cus- Fresh from a long streak of conquests in the networking tomers may have had cold feet using its products to replace world, Cisco has developed a new interest: collaboration Exchange,” says Matthew Cain, research vice president at software. Through a series of both large and small acquisi- analyst firm Gartner Inc. tions, some industry observers believe the company has put Replacing Exchange appeals to many enterprises because itself in a position to seriously challenge market-leader of the product’s high cost and complexity. The Microsoft Microsoft in this increasingly important market. First, in August, Cisco paid $215 million to acquire e-mail supplier PostPath. The company quickly followed that by snapping Because PostPath was a small up presence supplier Jabber Inc. “ Market changes have placed Microsoft and Cisco on a company, potential customers collision course. The boundaries between Cisco and Microsoft’s respective kingdoms have always been clear may have had cold feet using its and, to boot, the two have had a harmonious relationship. But now Cisco has launched a concerted movement for the products to replace Exchange.” network and has pushed into that part of the application Matthew Cain, Research Vice President, Gartner Inc. arena, while Microsoft’s products have been moving down into the networking space. Both titans have been training for the anticipated slugfest, so the only question remaining solution often requires a small army of skilled technicians is: Which one will emerge more bloodied? to operate it, while PostPath is known for its simplicity. Rather than have customers install and manage the soft- New Opportunities in a New World ware themselves, PostPath is delivered in a Software as a “Paradigm shift” is an overused term in IT, but in this case it Service (SaaS) model that allows the vendor to maintain actually seems to be taking place in the software arena. The the product; customers can access it through the Internet. flattening out of corporate hierarchies; the integration of PostPath also claims that its products cost about one- data, voice and video features; and the growing popularity of fourth the expense of deploying Exchange. mobility are changing how companies operate. Rather than Globe Manufacturing Co. LLC, a Pittsfield, N.H.-based wade through piles of pink paper messages and games of company with about 400 employees, found the prospect of endless telephone tag, executives now expect to connect such potential savings appealing. The firm makes protective with one another and exchange information instantly no clothing and footwear used by emergency-services profes- matter where they’re located. Collaboration suites are sionals, including firefighters. Globe has standardized on becoming the enabler of this new, rapid-fire method of Microsoft desktop software, including Office, and has out- information exchanges, and they’re becoming quite popular. fitted its sales force with Windows Mobile devices. But the “We’re interested in collaboration services because the manufacturing company has little interest in Exchange. market is so big,” notes David Knight, senior director of “Exchange has been too complicated for us to consider Cisco WebEx. Cisco officials say they expect vendors to deploying,” says Nick Bonnett, IT specialist at Globe. sell $34 billion worth of collaboration products in 2008. In the fall of 2007, the protective-clothing supplier E-mail and instant messaging products are becoming core decided to move away from its outsourced e-mail solution. foundations in such solutions. Aware of this transformation, “Employees were having trouble accessing their messages Cisco bought PostPath, a Linux e-mail and calendaring sup- via Web mail when they were on the road,” Bonnett says. plier. While Cisco paid more for other acquisitions—the So, Microsoft was given another chance to change Globe’s company has made more than 125 purchases throughout its feelings about Exchange. At the same time, Globe was history—this one may be its most significant. PostPath’s using an outdated version of ACT! as its contact manager, products are designed to enable enterprises to replace and a number of employees had already ditched that soft- Outlook, Exchange and Office Communications Server, ware for the integrated e-mail, calendar, contact and the foundation of Microsoft’s collaboration initiative. desktop functions found in Office. PostPath has a Linux-based system that enables corpora- However, the company’s decision about which e-mail server tions to either augment or replace their Exchange systems. to choose boiled down to products from PostPath and The startup’s solution interoperates with other e-mail solu- Zimbra Inc. Globe chose the Linux-based PostPath server tions, provides a browser-independent AJAX Web client and CentOS because it functions as a drop-in replacement for works with mobile clients. The product does not require Exchange at a far lower cost. The cost of deploying PostPath, middleware to interoperate with Outlook, Exchange, Active including a high-end server, was equivalent to the cost of just Directory, ActiveSynch or Research in Motion’s BlackBerry an Exchange server license without the necessary hardware.

46 | November 2008 | Redmond | Redmondmag.com | 1108red_SecureComputing_final.qxd 10/15/08 12:14 PM Page 1

ADVERTORIAL If Firewalls Are Obsolete, How Do You Protect Your Business?

s threats to your business network severity application vulnerabilities up nearly one- have escalated, the sad fact is that third, this can mean disaster for your business. firewall technologies have not kept up. And traditional firewalls are even more challenged Many firewall products lack the critical when it comes to protecting your company’s Web features needed to protect your site from hackers determined to use it to distribute Anetwork from blended threats and multiple-vector malware to your customers and prospects or partner attacks enabled by your organization’s use of highly access points that are deemed secure by the use targeted applications like Oracle, MQ-SQL, VoIP and of encrypted sessions. This webcast will explain employees’ use of Web 2.0 applications. With the the three “must-haves” your firewall needs to keep worldwide “zombie growth rate” increasing by eight your organization safe in today’s escalating threat times over the last year and the number of high environment.

To attend the Secure Computing webcast, go to: Redmondmag.com/showcase/securecomputing/3 1108red_F2Cisco45-50.v11 10/15/08 2:05 PM Page 48

Cisco vs. Microsoft Bonnett also notes that he feels a little safer because his e-mail Shifting Landscape server relies on a Linux operating system, which is not as Slowly but successfully, Microsoft has become the domi- high-profile a target for malware as Windows. nant supplier in the messaging space. Gartner predicts that the vendor’s market share will soon near the 70 percent Putting the Pieces Together mark, putting Microsoft in an enviable position. Presence has become an important feature recently, and “Microsoft has aggressively used its strong position in the Jabber purchase was designed to fill that void in e-mail to move into adjacent markets,” Gartner’s Cain says. Cisco’s portfolio. The start-up’s software works with Cisco needed PostPath and Jabber to not only slow presence systems, including Microsoft’s Office Commu- Microsoft’s momentum in the e-mail space, but also to keep nications Server, IBM’s Sametime, AOL’s AIM, and a the vendor from gaining similar momentum in the adjacent number of offerings from Google Inc. and Yahoo! Inc. markets—mainly the collaboration space, Cain adds. The Internet Engineering Task Force (IETF) has ratified The increasing competition illustrates the changing IT Jabber’s underlying protocol—the Extensible Messaging landscape. The dividing lines between networking equip- and Presence Protocol (XMPP)—as a standard for ment and desktop applications are no longer clear. presence and messaging technologies. Microsoft is pushing down the protocol stack and trying to Cisco is focusing on more than just displacing Exchange. dabble in traditional networking areas. The Microsoft “Cisco understands a shift may be taking place in how Office Communications Server (OCS) has been positioned companies purchase and use software, and Microsoft’s as a PBX replacement, and the company has been coupling desktop dominance may be threatened,” says Brad Shimmin, Office with Live Meeting to woo WebEx customers. Soft- an analyst with Current Analysis Inc. ware has obviously become a bigger part of Cisco’s arsenal Cisco could use its new messaging products to gain a as evidenced by its aggressive moves with CSG. more advantageous position in the emerging collabora- Traditionally, Redmond and Cisco have worked together tion space and so penetrate further into Microsoft’s turf, to serve customer needs. In fact, the duo relied on Session analysts agree. The company plans to integrate PostPath’s Initiation Protocol (SIP) to integrate Microsoft Office 67 employees into its Collaboration Software Group Live Communications Server with Cisco’s Unified Communications System. But their relationship has turned more combative as the market has evolved. In June 2006, “Cisco understands a shift may Microsoft turned to Nortel Networks, Cisco’s traditional rival, for help in building UC apps. Now, the fight is be taking place in how companies clearly on—so who will win? purchase and use software, and Heavyweight Contender Cisco clearly has the size and marketing might to trade Microsoft’s desktop dominance punches with Microsoft in close quarters. The networking company generated $39.5 billion in its last fiscal year and may be threatened.” dominates most networking sectors, garnering 70 percent Brad Shimmin, Analyst, Current Analysis Inc. market share or more in those markets. As a result, many networking suppliers are now in the process of revamping their business models in desperate attempts to survive in (CSG). CSG is a key component in Cisco’s recently the coming years. An ability to integrate collaboration established Software Group, which oversees the IOS functions into the network is one reason why Cisco feels network OS, unified communications (UC), network- confident about its chances in the emerging collaboration and service-management, policy management and SaaS market space. offerings. In other words, it’s the group managing Conversely, Microsoft does not seem to understand the Cisco’s growing software portfolio. networking market. Its agreement with Nortel was Eventually, Cisco plans to integrate PostPath and Jabber designed to forge a partnership with one of the networking into WebEx, a collaboration tool purchased for $3.2 billion industry’s market leaders. But since the announcement, in April 2007. WebEx supports instant messaging, team Nortel has stumbled about in search of a viable business spaces for collaboration, wikis and document sharing, strategy, changing direction and shuffling top executives along with voice, video and data applications. While on a regular basis. WebEx serves as a cornerstone in Cisco’s battle, it did offer Another plus for Cisco is that it does not have a large support for transporting the documents users generate existing base of customers that would have to migrate while they collaborate. PostPath has now filled that void. from older collaboration platforms to more modern solu- Once PostPath and Jabber are integrated into Cisco’s tions. The company can simply start from scratch and put WebEx Connect collaboration platform, the vendor could more modern systems in place right from the start. In have the tools needed to throw some nails in the path of fact, Microsoft has seemed to struggle with that balancing the Exchange, Outlook and Office juggernaut. act. The industry seems to be embracing the movement

48 | November 2008 | Redmond | Redmondmag.com | Project10 9/8/08 3:34 PM Page 1

Advertisement Another Day, Another Crisis? The Common Denominator in Performance Nightmares

Just Another Day at the Office Diskeeper to be the only solution. You’ve probably had it happen, and “Automatic disk defragmentation for a there’s nothing quite like it. First thing server is like oil for the engine in your Monday morning, a “MUST be handled car,” he says. “One of the most useful before noon!” list of emergencies hits features about Diskeeper, when using you in the face: it on our 20+ servers, is the automatic U The sales manager is squawking defragmenting with InvisiTasking. because CRM database is slow Diskeeper helps all of our servers U Accounting is nagging because email (Domain Controllers, File, Exchange, is slow SQL, Web, etc.) perform at their very U The NAS server is averaging best. Reliability and performance issues unacceptably high counts of relating to a lack of defragmentation queued disk I/Os do not exist in our environment.” U You’re getting constant poor Diskeeper has proven the solution performance alerts from the SAN for Andrew Wise, Senior Network U Backups have not been completing Engineer at Datacore Marketing in during the backup window as 20% fragmentation that the Windows Westwood, Kansas as well. “We run These nagging, ulcer-creating problems defrag utility couldn’t get rid of. In my Diskeeper primarily on our SQL are also the subject of several emails experience, virtual machines fragment database servers with Fibre Channel from the CFO because, on top of being their disks as much as real machines. But SAN connectivity,” he says. “It keeps the bad for company production, in this time Windows systems running VMware tend database and log files defragmented at of economic uncertainty they’re also bad to have extreme fragmentation problems, the OS level to reduce the I/O on our for business. Work is being slowed down particularly when running multiple VM’s.” SAN. After installing Diskeeper and and the company is losing money. doing a full defrag, we noticed around Making Mondays Go Away 10-15% reduction in the amount of The Culprit Making the right defragmentation I/O generated and in the amount of The common hardware denominator to technology choice in today’s frantic time it took for the SAN to service each all these crises is the hard drive—the fragmentation environment is vital. request. We are a Microsoft SQL Server slowest link in a computer system. If the Scheduled defragmentation has become database shop and we process terabytes data on a hard drive is fragmented, that a problem due to the IT hours required of SQL data on a daily basis, so any already dragging weakest link becomes to schedule defragmentation and the reduction in the amount of time it takes agonizingly slower. downtime required for the defragmenter to do that processing save us money.” With frenetic requirements for to run. But worst of all, scheduled Diskeeper with InvisiTasking makes continuous data access, enormous files defragmentation is no longer fully for smooth, calm Monday mornings for and huge disk capacities, fragmentation addressing fragmentation. these and thousands of other enterprises is worse than ever; files in hundreds or The only solution that stands up to the world over. Take advantage of our even thousands of fragments aren’t at today’s escalating fragmentation is special offer and find out, free of charge, all uncommon. Brett Taylor, of Van Wert Diskeeper®. Diskeeper’s proprietary what it can do for yours. Medical Services, discovered just how InvisiTasking® technology makes bad it can get. “Our electronic medical for completely automatic, invisible SPECIAL OFFER: records server is a Microsoft® SQL defragmentation. Because it utilizes Server® and one day it came to a halt,” otherwise idle resources, it requires Discover how vital Diskeeper with he says. “I did everything: ran spyware absolutely no scheduling, freeing up InvisiTasking is to you. software, deleted numerous temp files, IT time for more important tasks. Get your FREE fully operational trial ran Windows® update, etc. but nothing There is never a negative performance version for 45 days now! (Extended would allow the server to run. It turned hit during defragmentation, and from 30 days) Download at: out that the hard drive was horribly system performance and reliability are www.diskeeper.com/monday fragmented.” consistently maximized. Volume licensing and Government/Education discounts Craig Merchant of Pace Engineering, are available by calling 800-829-6468, extension 4135. San Francisco, discovered very similar Reliability and Performance Issues problems. “I get a huge amount of Nonexistent fragmentation when I run multiple Mike Driest, Network/Systems virtual machines on my system using Administrator for Industrial Control VMware®,” he reports. “I’ve had as much Repair in Warren, Michigan, has found

© 2008 Diskeeper Corporation. All Rights Reserved. Diskeeper, InvisiTasking, Maximizing Performance and Reliability—Automatically, and the Diskeeper Corporation logo are either registered trademarks or trademarks PXOFECZ%JTLFFQFS$PSQPSBUJPOJOUIF6OJUFE4UBUFTBOEPSPUIFSDPVOUSJFT"MMPUIFSUSBEFNBSLTBOECSBOEOBNFTBSFUIFQSPQFSUZPGUIFSFTQFDUJWFPXOFST%JTLFFQFS$PSQPSBUJPOt/(MFOPBLT#MWE#VSCBOL  $"ttwww.diskeeper.com 1108red_F2Cisco45-50.v11 10/15/08 2:05 PM Page 50

Cisco vs. Microsoft to the SaaS model and away from desktop software. tion: How much of a need will there be for resellers Redmond has made some moves with products, such as when collaboration tools can be sold and maintained via its LiveOffice system, but many observers view its actions the Internet? as superficial and lackluster. One reason may be that The idea of growing through acquisitions has proven adopting a SaaS model loosens customers’ connections to viable in the networking space, but it may not work as well their systems’ underlying operating system, which has in the software market. In the networking space, devices served as a cornerstone of Microsoft’s market dominance. operate largely in an autonomous fashion, so stringing Cisco, however, must overcome some challenges in order together a number of systems with antithetical architectures to be successful. For one, it has little experience in the is possible. With software, the underlying components are desktop-application arena. more tightly integrated, so mixing and matching may not “Education will be needed in order for the company to produce viable solutions. transform itself from a networking to a software supplier,” says Current Analysis’ Shimmin. Let the Battle Commence The software giant will need to educate not only its Microsoft clearly understands software, which is the foun- own employees, but also the channel partners it has relied dation for collaboration tools. While competitors often on to deliver its wares. But that brings up another ques- castigate the company’s product features as well as the timeliness of its product deliveries— “leading edge” is not a phrase often associated with the company—the vendor has done a good job of deliv- ering functional, cost-effective products to customers. Another consideration: Is all the hype about SaaS overblown? Vendors have been touting the model since the pre-dot-com-boom days, when it used to be labeled as the Application Service Provider, or ASP, model. However, many companies have thus far shunned the SaaS approach. “Organizations feel more comfort- able housing important data within their own walls, rather than having it sit on someone else’s server,” Shimmin says. Throughout its history, Microsoft has been able to push other vendors ncing around and dictate to them how the nou An industry was going to evolve. Con- Top 10 Reasons to Use: sequently, the company sits in an enviable market position. But Cisco ® ™ ® Acronis Recovery for Microsoft Exchange represents a legitimate threat to Microsoft’s top-dog status. The networking vendor has plenty of muscle and won’t be easily intimidated.  High Speed  Smaller, Secure Archives This figures to be one after-school  Ultimate Granularity  Management Console brawl that will attract a lot of very  One-Step Recovery™  Near Continuous Data Protection interested spectators.  Easy Administration  Mailbox Access during Recovery  Auto-Generated Disaster (Active Restore™) Paul Korzeniowski is a freelance writer Recovery Plan  Integration with Acronis® True Image Echo™ based in Sudbury, Mass. He has been writing about networking issues for Download a FREE 15 day trial at www.acronis.com/RNov two decades, and his work has appeared in Business 2.0, Entrepreneur, Investors Business Daily, Newsweek and Information Week.

50 | November 2008 | Redmond | Redmondmag.com | 1108red_F2SaveGas51-54.v7 10/15/08 2:15 PM Page 51

Remote Tools that Can Help Besides carpooling You Save Gas and riding a bicycle

to work, using the here was a book published last year entitled “Muzzle the right software can Guzzle: 50 Fuel Saving Strategies” (I-Form Ink Publishing, 2007) containing 50 gas-saving tips and tricks intended to save you money on gas—something we sorely need right now. In keep some gas money chatting with various network administrators and consultants who drive to work, it appears that many are also taking whatever Tmeasures they can to save a little money. in your pocket. Graciously, a few of these IT professionals, each with a different circumstance, have decided to share some of their own tricks that could help you keep some of that gas money in your pocket. By J. Peter Bruzzese Jake Owns a Hummer2 Jake is a network admin who travels to work in his gas-guzzling H2. He personally visits branch offices that house remote servers. What steps can Jake take to avoid excess travel? We asked Tim Duggan—the lead network admin for Solution 32, whose clientele base spans New York’s Tri-State area—what he does to avoid sitting in traffic and wasting fuel. His answer was all about LogMeIn Inc. LogMeIn, based in Woburn, Mass., offers a variety of different tools, but its most popular ones have to do with remote access and remote management.

CORBIS PHOTOS | Redmondmag.com | Redmond | November 2008 | 51 1108red_F2SaveGas51-54.v7 10/15/08 2:15 PM Page 52

Remote Tools

“We use LogMeIn pretty extensively,” Duggan says. “Not and has a focus on the consumer packaged-goods industry. only can we take control of a server, but it allows us to The new feature, called RouteMizer, uses gas-saving have system alerts set up, and we’re able to check on events route optimization. and other things without taking control.” RouteMizer helps Olsen streamline his travels. I started This is a sound solution for cutting down on the need to thinking, “What other software exists for the everyday drive. You still may have to make the daily trek to your admin to use that can save him gas?” local office, but when a problem comes up at a branch I found a GPS that shows the driver how much CO2 office you have the option of eliminating a potentially long emissions are saved by taking a particular route, as well as how much fuel would be saved. Crambo SA, the Spanish We use LogMeIn pretty company that makes the Econav device, says its product “ can save you 15 percent to 30 percent in fuel and reduction of CO2 emissions. That sounds promising. In fact, having extensively. Not only can we take a GPS in general could save you gas by taking you to unfamiliar locations without you getting lost. Some GPS control of a server, but it allows us to systems help you find the fastest route, or at least the one have system alerts set up, and we’re with the least amount of traffic. Leela Loves the Outdoors able to check on events and other and Drives an SUV Leela’s not getting closer to the city—she’s moving further things without taking control.” away from it. She has decided that a good way to save Tim Duggan, Lead Network Administrator, Solution 32 money on gas is to work from home one or two days a week. To accomplish this requires setting up a home office that puts at her disposal all the tools she typically uses at work. drive. And of course you have the option to get things Leela knows that when she travels abroad, one of the done from your home office. tools her team uses to collaborate anywhere at any time is LogMeIn isn’t the only remote-management software on Microsoft’s Groove 2007. The benefit of Groove is that the market. There are hosted services, such as WebEx the data is encrypted and secure on users’ systems. So, even Communications’ PCNow and GoToMyPC,as well as dedicated software solutions involving virtual private net- works (VPNs). You may also want to consider something free that comes built into most higher-end Windows sys- Tip: tems called Remote Desktop. This feature can be found in Are you using your computer to find Windows XP Professional and Windows Vista Business, Ultimate and Enterprise Editions. The key is to make sure the lowest gas prices around? Make the port for the Remote Desktop connection (TCP Port sure you search by ZIP code or state 3389) is open on the firewall, which may be an issue on sites such as GasBuddy.com or depending on your environment. On the more expensive side is Symantec’s pcAnywhere, which has the ability to GasPriceWatch.com to locate cheaper access Windows, Linux and Mac systems for those of you gas prices. If you’re on the road, try who require cross-platform connectivity. sending a text message or e-mail to Olsen the Family Man GasBuddyToGo.com with your city, Owns a Minivan Let’s take the case of Olsen the family man, who needs a state and ZIP for the five lowest-cost minivan for his family but also uses the van for his busi- gas locations nearest you. ness. Olsen is a consultant who has to travel to see his clients, so remote connectivity isn’t going to help him. He has all sorts of network equipment and hardware that he in transit, mobile users who need to collaborate with each must take with him, so we aren’t going to make a com- other know that the data they need resides on a Microsoft muter out of him. But there is technology available that server, waiting for them to check in and download the latest can help his situation, too. discussion and file changes. The material is encrypted with In early June 2008, new software was released by bMobile only you and your team having the ability to decrypt. It Technology called bMobileRouteManager. It’s designed to also provides back-end connectivity to a SharePoint library help small and midsize wholesale distribution companies that’s configured at work.

52 | November 2008 | Redmond | Redmondmag.com | Project1 10/15/08 2:34 PM Page 1

ALTERNATIVE THINKING ABOUT SYSTEM POTENTIAL: See eye to eye with your budget— without limiting your vision.

Compromising is fine. For other people. But now you can watch your bottom line, while still getting a look into the future. The HP portfolio of solutions erases the gap between cost and innovation, while delivering reliable ProLiant technology, all at prices that require a second look. So, while others try to think outside the box—we’re rethinking what goes on inside it.

Technology for better business outcomes.

HP BladeSystem c3000 Enclosure $3,959 (Save $1,863) Lease for just $110/mo. [PN: 481658-001]

• Supports up to 8 server blade devices in a 6U enclosure • 3-year limited warranty

HP ProLiant BL260c Server $899 (Save $631) Lease for just $22/mo. [PN: 480965-B21]

HP ProLiant DL120 G5 Server • Powered by the Intel® Xeon® Processor $ • 2GB memory 849 (Save $339) • 1-year limited warranty Lease for just $21/mo. HP StorageWorks DAT160 [PN: 470064-763]

USB Tape Drive • Powered by the Intel® CoreTM 2 Duo Processorr $ (Save $80) • One 250GB SATA hard drive 729 • 2GB memory Lease for just $18/mo. • 1-year limited warranty [PN: Q1580SB]

• One-Button Disaster Recovery feature easily restores lost files, applications • Store up to 160GB on a single cartridge, while backing up to 50GB/hr.

See additional HP models which feature small form factor, high-performancerformance SAS hard drivesdrives..

To learn more, call 1-877-465-3392 or visit hp.com/servers/rethink59

Prices shown are HP Direct prices; reseller and retail prices may vary. Prices shown are subject to change and do not include applicable state and local taxes or shipping to recipient’s address. Offers cannot be combined with any other offer or discount and are good while supplies last. All featured offers available in U.S. only. Savings based on HP published list price of configure-to-order equivalent (Enclosure: $5,822 – $1,863 instant savings = SmartBuy price of $3,959; Blade Server: $1,530 – $631 instant savings = SmartBuy price of $899; Rack Server: $1,188 – $339 instant savings = SmartBuy price of $849; Tape Drive: $809 – $80 instant savings = SmartBuy price of $729). Intel, the Intel logo, Xeon and Xeon Inside are trademarks of Intel Corporation in the U.S. and other countries. © 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

I0260_M2977_A_RED.indd 1 10/15/08 3:03:59 PM 1108red_F2SaveGas51-54.v7 10/15/08 2:15 PM Page 54

Remote Tools

One of the important tools Leela uses that requires full- Chris Rides His Fuji Reveal 2.0 strength encryption and security is e-mail. She is trying Mountain Bike to Work out e-Capsule Private Mail HD from EISST Ltd. This Chris has traded in his vehicle for a good, old-fashioned tool is designed to ensure that her e-mail data is always two-wheeler—in this case, a mountain bike. This is yet encrypted using ciphers (AES256 and RSA2048). It also another way to save gas as well as improve one’s health. fortifies her e-mail against viruses. Chris works for a company in Colorado that provides However, she may need a home anti-virus solution, too. desktop and server support for people all over the world. Conveniently, there’s a wide range of choices available.AVG He has to be prepared at a moment’s notice—whether he’s Technologies CZ,for instance, offers both a basic version at home, at work or visiting others—to answer questions for free and a full version at a reasonable cost. There are also about any number of system types. offerings from McAfee Inc., Trend Micro Inc., Symantec Because he needs to have all his systems at his disposal Corp., Panda Software International S.L., ESET LLC, no matter where he goes, Chris has put together what he Kaspersky Lab, PCSecurityShield, BitDefender LLC and CA believes is the perfect solution. Using VMware Workstation, Inc. The anti-virus products from these companies come he has created a system that allows him to carry around all with different prices and features, but PCSecurityShield’s his applications and documents on a pocket USB 80GB Shield Deluxe is on the lower end price-wise and has some drive. Also, he has created every form of server configuration of the highest ratings in terms of performance. he works with—SQL, Exchange and SharePoint—and every form of desktop he supports, including Windows Caleb the Commuter Loves the Train For an IT pro who needs to be While he loves taking the train because it saves gas overall— “ and keeps him out of aggravating traffic jams—Caleb is part of ready for all situations, or the an open-ended support team for a large investment banking firm. He may work in one building, but he never knows technology partner who needs to where in that building he’ll be, what branch of the company he’ll be supporting or what kind of system he’ll be dealing support anything that exists in IT, with. So rather than lugging a laptop back and forth to work each day, he has decided to carry tools on his USB keychain. OpenOffice.org Portable is the Caleb went out and picked up a new 8GB IronKey USB drive, which company officials boast has a secure flash perfect portable application. drive. Pre-loaded with portable Firefox, Ironkey Password ” Ronald Barrett, President, R.A.R.E.-Tech Manager, RSA SecurID and a Secure Sessions service, IronKey is designed to destroy its own data if someone attempts to crack it 10 times. 2000, Windows XP,Windows Vista and Red Hat Linux. Caleb loads up the USB keychain with tools he needs on Wherever he goes, he plugs in and installs VMware Player his job, including standard administration tools, drivers for and is ready to work. systems, ISO files for re-installs and MagicDisc to be able to access those ISO files. Part Tools, Part Attitude Ronald Barrett, a network admin who consults throughout Saving gas and the environment can only be done with the New Jersey area and is the president of technology technology if the user of that technology possesses the consulting firm R.A.R.E.-Tech,recommends a few tools right attitude. You have to be consciously thinking about that he carries on a USB keychain, including ClaimWin ways to drive less and use technology that saves you time Free Antivirus portable and OpenOffice.org Portable. and distance. No doubt there are other solutions and ClaimWin, from Portableapps.com, is a free anti-virus scenarios that you might be thinking of beyond what we solution you can carry with you anywhere. It ensures you presented here. With a little market research and can sit down at any system and have it be virus free. imagination, it isn’t difficult to find the right remote- OpenOffice.org Portable, which is compatible with Office, management technology to help you save money and, WordPerfect and Lotus files, is suitable for situations maybe, the planet. — where you don’t have your laptop, you’re working at a client site that doesn’t have the latest version of Office, and J. Peter Bruzzese, MCSE, MCT, MCITP: Messaging, is a you need to open an office document. regular contributor to Redmond magazine. He has written Barrett says: “For an IT pro who needs to be ready for all several books, including “Tricks of the Microsoft Windows Vista situations, or the technology partner who needs to support Masters” (Que, 2007). He is co-founder of ClipTraining.com, anything that exists in IT, OpenOffice.org Portable is the which provides a screencast training library to clients as well as perfect portable application.” custom screencasts for internal training to users.

54 | November 2008 | Redmond | Redmondmag.com | Project15 10/6/08 2:43 PM Page 1 1108red_RackspaceAdvSpread_final 10/14/08 12:17 PM Page 1

Advanced Hosting of the Future Virtual Environments. Real IT Solutions.

ou have an IT environment that deployed to further maximize resources, expands and contracts nonstop. minimize risks and reduce costs. Scaling to meet your computing capacity needs is a given. Scaling There are two environments that have gained your hardware costs that quickly or strength and revolutionized the IT landscape: Ythat often is not. As a result, you must evaluate virtualization and cloud computing. Both of the economic impact of purchasing the hard- these solutions provide all of the advantages of ware to react to your changing IT needs or using scalability and cost savings, but in different ways. those funds to cover overhead expenses. The They can be combined into an integrated choice becomes even more difficult in economic computing solution or used independently, based downturns. upon the needs of your IT environment. Rackspace® Hosting can customize a scalable But many businesses have discovered they have solution that works for you, and then manage options. For years, managed hosting solutions and support it 24x7. You can let our experts worry have provided the service, expertise and infra- about hosting your computing environment, so structure that businesses have needed. Hosting you can focus on growing your business. solutions have also unloaded the financial burdens associated with maintaining technology It’s a Virtual World and responding to economic environments. A virtualized environment is simply that: It However, as scalability and flexibility become exists in an abstract layer between your physical even more important to compete and be servers and your software applications. These profitable, advanced hosting solutions must be virtual servers provide the same isolation as 1108red_RackspaceAdvSpread_final 10/14/08 12:17 PM Page 2

ADVERTORIAL

physical servers, plus they can be deployed, • Provides instant access from anywhere to the copied and moved rapidly. This ease and flexibility technology and applications of managing and provisioning makes scaling • Increases profitability with a pay-per-use access easier and on-demand computing capacity possible, so you can meet your performance and The cloud environment is the real-world capacity needs at a moment’s notice. response to the long-sought vision of utility computing, without the technical complexities Virtualization Hosting Benefits: or deployment concerns. You simply develop and • Prevents the under-utilization of servers and run your own applications on your hosting hardware provider’s infrastructure. And although a cloud • Reduces expense as you pay for only what you use environment lacks an abstraction layer, • Saves costs by reducing the number of physical virtualization can be used as the enabling servers technology via a network of virtual servers. With • Increases data protection with snapshots the Rackspace Cloud Hosting Division, you get during upgrades dedicated experts who are focused on providing • Contributes to disaster recovery by delivering computing as a service to your company. redundancy The IT Future Is Now The cloud Customers using virtualization can gain flexibility As you know, IT decision makers are often tasked and scalability in their infrastructures, yet with managing conflicting goals of the environment is achieve at least the same results as if their organization: reducing costs, increasing the real-world environments consisted entirely of physical revenues, improving efficiencies and offering servers. It’s a potential cost-savings option that better products, services and overall solutions in response to the allows you the freedom to grow more easily and the face of an ever-competitive market. But to long-sought economically. And the Rackspace Virtualization achieve balance in today’s economic climate, team, staffed with certified VMware professionals, they must shift the IT paradigm from a do-it- vision of utility manages the physical server, virtualization layer yourself approach to taking advantage of a computing, and virtual machines so you can make the most of hosted environment. After all, building your your solution and focus your time on taking care own virtual or cloud environments would without the of your business. require tremendous hardware and software technical investments. Plus, the costs to hire and maintain Hosting in a Cloud experts on staff and the resources to manage complexities Cloud computing is advanced technology made and update the IT environments would create or deployment extremely simple and convenient. It is essentially an additional burden on the company’s access to technology-enabled services via the bottom line. concerns. Web, and provides an array of services that delivers functional capabilities. In a cloud environment, As a result, IT leaders will have to look at different you don’t need to own the infrastructure; instead, approaches to computing, such as adopting new you have convenient access to it when you host technology in a way that accelerates positive with a company that provides a web-based business outcomes. By deploying advanced “cloud” platform. You then simply pay for what technology like virtualization and cloud computing you use. This means forgetting about the hardware in a hosted environment, they can take the next and all the hassles that come with it, including logical step toward an IT environment that procuring, installing, maintaining, patching, supports a healthier fiscal future. scaling, overpaying and replacing. You get all of the IT benefits, without the IT responsibilities. If you’re not sure if hosting is right for you, or which technology suits your needs, let Cloud Hosting Benefits: Rackspace Hosting—the world’s leader in • Saves resources spent setting up and configuring hosting—work with you to evaluate and operating systems and devices determine the solution that’s right for you and • Scales automatically with built-in clustering your environment. and responds when traffic surges • Reduces capital expenditures because you www.rackspace.com/redmond consume resources as a service 1-800-961-2888

To read the Rackspace white paper, go to: Redmondmag.com/showcase/rackspace/1 1108red_NeverAgain58.v5 10/15/08 2:16 PM Page 58

NEVER

AGAIN By Derryl Steib Beware of the Company You Keep

used to work for a small, privately owned company that really wanted all of our business and would give us a decent discount—around did business for years with a nationwide computer 15 percent—if we’d switch to them. manufacturer I’ll call Arch Computers. While we never With the discount, their offer represented a reasonable cost savings over Arch. We Imade a bulk purchase with Arch, we’d routinely give them knew that Valley had good servers, with several computer magazines frequently hundreds of thousands of dollars in PC- folks in the ranking their related business over the course of a year. department?” notebooks in As the end of the millennium Them: “No. the top five. approached, our company decided to They are use Y2K as a justification for replacing shipped from Too High a large number of remaining DOS and our marketing a Price Windows 3.11 systems. We haggled department We had no with Arch Computers for the best price and we don’t choice but to given that we were buying more than have access.” switch. Arch had 50 systems, with the goal of trying to Us: “We did provided to us for beat the price on their Web site. The $500,000 worth years, but we knew Arch sales rep we had worked with for of business with their pricing plan. The years informed us that the Web site you last year. How much bottom line was just too impor- price was the absolute best they could business do we need to do with you to tant to ignore. Several weeks passed, do for us, but that they’d give us a get a couple more Stress Boxes?” and our transition was going rather slight discount on the shipping. As we The conversation went rather dry smoothly when Arch called. They were had done business with him for years, after that, but eventually we all did get curious as to why we had not placed an we took his answer in good faith. a Stress Box. order. We told them that we were not going to order from them since Valley ‘Stress Boxes’ Started It Competition Arises had a better price. Sometime later, a new order guy As our company grew, we started to The sales rep was incredulous. He received a nifty little toy via FedEx look at server systems, not just the claimed we didn’t give him a chance to from Arch marketing. It was small, soft, workstations and notebooks that we bid his price. My engineer got on the squishy and in the shape of the boxes were purchasing from Arch. As I priced phone with them because he had they ship computers in, complete with those systems out, a different company, originally worked on the 50- plus PC an interesting cow design. Arch called which we’ll call Valley Computers, had sale. He asked why he would need a them “Stress Boxes.” We had three server-class systems that consistently bid, if we already were assured that we other people in the department, and the ranked in the top three. So we deployed were getting the best price. I believe his little toy became a real item. Valley servers and never considered exact words were: “Which is it? Either Then, an interesting e-mail conversa- Arch for servers. Valley did ask us if we you were lying to us then, or you’re tion developed between Arch and my would consider their workstations and lying to us now.” engineer, who used to be the order guy. notebooks, and so we got a quote. Arch’s business practices came into Us: “These are great Stress Boxes; can When Valley asked if they were in the question after that, and we never did you send us some more for the other ballpark relative to competitors’ pricing, business with them again. I have a feeling without giving them specific numbers, the folks at Arch got more use out of What’s Your Worst IT Nightmare? we told them that they were slightly those Stress Boxes than we did. — Write up your story and e-mail it to Ed Scannell at [email protected]. higher than Arch, so we would continue to use Arch. Valley then declared they Derryl Steib is a manager with Ergon Inc.

58 | November 2008 | Redmond | Redmondmag.com | ILLUSTRATION BY MARK COLLINS 1008red_QuestSoftwareFP_final 10/15/08 12:53 PM Page 1

ADVERTORIAL

Many enterprises are looking to Single Sign-On (SSO) Secure solutions to try to maintain the level of security for passwords on individual applications or systems, while making it easier for users to remember what their credentials are without writing them down on Authentication sticky notes attached to their monitors or calling the help desk to reset their passwords. The problem with SSO is that it undermines the security of the underlying Simplified systems. An attacker only needs to compromise the SSO credential and they simultaneously gain access to all systems managed by the SSO system. Guarding Against Weakness of User Credentials TIGHTER SECURITY WITH and Achieving Compliance with Quest Defender TWO-FACTOR AUTHENTICATION By providing an additional layer of protection, two- factor authentication strengthens the authentication process and helps to protect data and secure the network. Rather than relying on only one factor— the password—to validate the identity of a user, two- factor authentication adds a second component. An attacker who manages to compromise a user’s pass- word will still be unable to gain access without also having the second authentication mechanism.

Common methods for two-factor authentication include smartcards, USB tokens or key fobs that generate random PIN numbers every few seconds. Without physical possession of the two-factor authentication device, neither an attacker nor a user is able to gain access.

QUEST DEFENDER Two-factor authentication offers a secure and reliable solution for ensuring only authorized users are able to gain access to enterprise systems and applications. However, many two-factor authentication solutions on the market however have proprietary software and rganizations need to protect their data and network hardware. Also, many solutions require an investment in a specific resources and ensure that only authorized individuals vendor’s unique architecture and introduce additional administrative are able to gain access. The most common method overhead to maintain. of computer and network authentication remains the username and password. A recent research Quest Software offers Quest Defender to address both the Ostudy by Aberdeen Group (“Strong User Authentication”) found security concerns of usernames and passwords, as well as the that 88 percent of enterprise users have multiple usernames and issues introduced by other approaches to two-factor authentication. passwords related to work. On average, users have between five or six username/password combinations. Quest Defender integrates with your existing Microsoft infrastructure rather than requiring a separate, proprietary PROBLEMS WITH USERNAMES AND PASSWORDS database system. The integration greatly simplifies the process of With security being such a significant concern for most adding and maintaining users and decreases the costs and time organizations, most password policies have minimum complexity associated with setting up and maintaining separate databases. requirements that make them hard to crack or compromise. Quest Defender is also token- agnostic, allowing organizations to Of course, it also makes them more difficult for users to remember, use a wide variety of hardware token products rather than locking resulting in users writing them down or finding other them into a proprietary hardware solution. Quest Defender offers workarounds, as well as increased support calls from users organizations a flexible, powerful, scalable and affordable two- that can’t recall their passwords. factor authentication option.

Read the entire white paper, “Secure Authentication Simplified,”at: Redmondmag.com/showcase/quest/5 By Tony Bradley, Microsoft MVP, Director of Security, Evangelyze Communications 1108red_Roboto60.v5 10/15/08 2:17 PM Page 60

Mr. Roboto Automation for the Harried Administrator | by Jeffery Hicks In the Mail

spend a lot of time in newsgroups and discussion forums. a practical solution. I’m betting you have a few services on critical servers, and A common question involves sending e-mail from the you’d like to know when they stop. Icommand line. The answer? There are technologies you Here’s my solution using Blat.You’ll need to download the notification script can implement in VBScript to accomplish this. from jdhitsolutions.com/scripts. The batch file sends a message using your If you’re using PowerShell, there are -u [email protected] default Blat profile. You need to specify a several third-party cmdlets that will send –pw $ecr3+ service name and a send-to address. The an SMTP message from the command If you’re going to use the same server script will send a canned message and line. But what if you don’t script or aren’t settings repeatedly, then Blat can store then attempt to restart the failed service. ready for PowerShell? Then your answer them in the registry: To set this up,open the services- is a free, public-domain utility called C:\> blat –savesettings mail.red management console and go to the Blat. I know the name leaves something mondmag.com mrroboto@red service you want to monitor. Go to the to be desired, but it gets the job done mondmag.com – 25 - Recover tab and click First Failure, then with minimum effort—and it’s free.With [email protected] choose Run a Program. In the Program Blat, you can send an e-mail via the com- $ecr3+ field, type the full filename and path to mand prompt with practically no effort. This command will create a default notify.bat. In the Command Line Para- Blat is a Win32 console application profile using mail.redmondmag.com on meters section, enter the service name that has been around for a long time port 25 with the specified credentials in and an e-mail address for the SendTo and is now in the public domain. It will the registry under HKLM\Software\ parameter. The service name must be send messages via an SMTP server. PublicDomain\Blat. But don’t panic; something you’d use if you were using Blat isn’t an SMTP server itself—it’s a the user name and password are stored the SC.EXE or NET START. Don’t command-line SMTP client that sup- as encrypted strings. use commas to separate the parameters. ports all the features you’re likely to Now, let’s send some mail. If you have You can test this by killing the process need, including CC, BCC, imperson- a text file that you want to use as the associated with the service. Don’t merely ation and attachments. message body, use syntax like this: stop use of the service; you must force C:\> blat c:\files\message.txt –to it to terminate abnormally for the Give Blat a Try [email protected] –cc recovery task to execute. The script To get started,go to www.blat.net and [email protected] –subject should restart the service and use Blat download the installation file. Extract the "Network Status" to send an e-mail notification. files to any directory of your choosing. Blat will use the default registry set- This example is merely one situation You won’t really need them, but you tings for your SMTP connection. If you in which a command-line tool like Blat might want the documents for reference. always send messages to the same people, can be useful. I’m sure you’ll come up I copy the blat.exe to my System32 you can create text files and reference with your own, and if you do, I hope directory so I can call it from any com- them using the –tf and –cf parameters. you’ll let me know. — mand prompt. Open a command prompt and type blat –help to see the complete Real-World Use Jeffery Hicks ([email protected]), syntax. The basic message syntax is: Now that you can manually send mail MCSE, MCSA and Microsoft PowerShell C:\> Blat –to [email protected] –f from the command line, let’s apply it to MVP, is a scripting guru for Sapien [email protected] Technologies. He’s a 16-year IT veteran, and –subject "Check this out" –body Roboto on Demand has co-authored and authored several books, "Let’s get blatted!" –server To try out Mr. Roboto’s Blat courseware and training videos on mail.redmondmag.com solution, download the notification administrative scripting and automation, If you need to specify authentication, script at jdhitsolutions.com/scripts. including “WSH and VBScript Core: add something like this to your command: TFM” (Sapien Press, 2007).

60 | November 2008 | Redmond | Redmondmag.com | 1108rcp_RMGNewsletterAdFP.qxd 10/10/08 1:59 PM Page 1 0808red_AMDDellSpread_revised.qxd 7/13/08 3:14 PM Page 1

Plan. Gather. Analyze. Monitor. Report. Succeed. Microsoft SQL Server 2008 SQLB I SCALABILITY QUERY LARGE-SCALE BUSINESS INTELLIGENCE PROCESSING The resource manage- POLICY FRAMEWORK Business intelligence INTEGRATION ment capabilities of In SQL Server 2008 BI, The Declarative (BI) is growing as an SQL Server 2008 BI SQL Server 2008 BI performance of a Management important database augments BI Integration empower management number of parallel Framework enables the application. For services that improve of databases ranging query plans is enabled administrator to define a analysis purposes, new its ability to move and from megabytes to that executes against broad variety of policies, modifications in this transform data, including terabytes. It offers partitioned tables both watching server have made it an enhanced Lookup support for large and indices. Partition compliance and forcing easier to create better transformation (which databases and 64-bit information can now be compliance as needed. dimensions and cubes. increases the size of processors. Dell monitored in graphical, Create your own Cubes are leaner and tables to be stored in a PowerEdge servers text-based or XML custom policies or use more focused than reference table cache) with AMD multi-core displays. There is also a built-in policies; apply earlier versions, and and opens the Scripting processors provide new partition-sensitive them at the server, improvements are task, allowing developers against overloads. seek function for database or database- built-in to enhance to use either Visual Basic partition elimination. object levels. the ability to build or C#. cubes from single, denormalized tables.

About the author Mark Ferelli is the former vice president of West World Production Inc., and editor in chief of its magazine group: Computer Technology Review, Storage Inc., Storage Management Solutions, Storage And Government and Storage And Entertainment. Mark is a nationally known, award-winning journalist, covering mass storage and information management technologies and since 1988 has written hundreds of articles on those subjects. You can reach him at [email protected]. www.dell.com/SQLBI

About Dell Dell Inc. (NASDAQ: DELL) listens to customers and delivers innovative technology and services it trusts and valuea. Uniquely enabled by its direct business model, Dell is a leading global systems and services company and No. 34 on the Fortune 500. For more information, visit www.dell.com, or to communicate directly with Dell via a variety of online channels, go to www.dell.com/conversations. To get Dell news direct, visit www.dell.com/RSS. ©2008 All Rights Reserved. Advanced Micro Devices, Inc. All rights reserved. AMD, the AMD Arrow logo, AMD Opteron, and combinations thereof are trademarks of Advanced Micro Devices, Inc. Microsoft and Windows are registered trademarks of Microsoft Corporation in the U.S. and/or other jurisdictions. Linux is a registered trademark of Linus Torvalds. Other names are for informational purposes only and may be trademarks of their respective owners. 0808red_AMDDellSpread_revised.qxd 7/13/08 3:14 PM Page 2

Microsoft is at it again, releasing the latest version of its popular database management system. SQL Server Business Intelligence (BI) 2008 is the most comprehensive release of SQL Server yet! There are many enhancements to the product that will benefit your business. SQL Server 2008 BI offers enhancements to security, data encryption and backup and compression technologies that will make it a complete data management platform. In addition, many of the enhance- ments made to SQL Server 2008 BI are developer-friendly. New data types, language syntax and data-access methods for writing applications that access SQL are much faster than ever before. SQL Server 2008 BI offers many improvements to its robust set of high-availability solutions. Ready to make the move to SQL Server 2008 BI? Today Dell offers a wide range of technology solutions to run your new SQL 2008 BI systems. Dell has the expertise to help you to migrate from your older SQL Server environments to the latest in enterprise performance and reliability. Dell’s line of PowerEdge servers and PowerVault storage systems provide the high- performance and high-availability platforms for your new SQLBI Server 2008 environment. Use the following nine reasons to justify migrating to SQL Server 2008 BI on Dell PowerEdge servers with PowerVault Storage. SERVER SPATIAL ENCRYPTED RESOURCE VITAL EFFICIENCY REPORTING DATA SUPPORT Security is signed, GOVERNANCE MONITORING High availability SERVICES Additional new data sealed and An essential new FEATURES and less unplanned An essential part types have been delivered with tool, the Resource Monitoring enhance- downtime are of the BI toolkit, added to SQL Transparent Data Governor defines ments start with delivered with SQL this new server Server 2008 BI, Encryption. The database engine Extended Events, the Server 2008 BI’s offers useful including ways to transparency shows workloads and sets foundation for a new Backup Compression. relational reporting separate data and up in that data limits on processor type of event tracing Database image features with time, as well as encryption is done in and memory system. Running backups are analytical cube offsets for dealing real time over both resources. The limits alongside SQL compressed on browsing and a with tricky time zone the SQL Server BI may be configured in Trace/Profiler and disk or tape and strong new Report issues. Native spatial database and the real time, without Perfmon, Extended automatically Designer. New data support is log files. Key interrupting ongoing Events is character- uncompressed when Row Groups and available, with management is processes. The ized by its generality the database is Column Groups GEOGRAPHY and extensible over Resource Governor and integration with restored. Backup boxes appear on the GEOMETRY data third-party security does not limit access future Windows compression in SQL screen, along with r e types that enable modules. Third-party to the server by v sions. Other Server 2008 BI the controls geodetic and planar vendors can register the dedicated monitoring features affects only the for the report and data. Spatial their devices with administrator include SQL backup images, a treeview of capabilities SQL Server 2008 BI, connection. Dependency not the SQL Server the parameters, conform to the and then users can Reporting, Memory BI data and log files. images and fields. Open Geospatial use encryption keys Monitoring New Table and Consortium supplied by the DMVs, and new Matrix controls standards. modules with the deprecation events provide reporting SQL Server 2008 and Perfmon flexibility. Powerful BI data. performance Dundas® charting counters. tools are on-board.

References: Enhanced Virus Protection (EVP) is only enabled by certain operating systems, including the current versions of the Microsoft® Windows®, Linux®, Solaris, and BSD Unix operating systems. After properly installing the appropriate operating system release, users must enable the protection of their applications and associated files from buffer overrun attacks. Consult your OS documentation for information on enabling EVP. Contact your application software vendor for information regarding use of the application in conjunction with EVP. AMD strongly recommends that users continue to include third-party antivirus software as part of their security strategy. 1108red_SecAdvisor64-66.v5 10/15/08 3:47 PM Page 64

SecurityAdvisor by Joern Wettern A Better Internet Explorer

t seems like an eternity since Microsoft last updated tion. The new inPrivate Blocking fea- ture makes the blocking more robust Internet Explorer, but version 8 is just around the corner. and is easier to configure than the old IAs you would expect, it contains a number of security cookie blocking. enhancements. This month’s column will prepare you for That Isolated Feeling IE7 added browser tabs, which let you what’s in store. open multiple Web pages in the same window. An annoying and problematic The have slowed down. deleting all traces of your browser ses- side effect of this was that a misbe- When Microsoft was fighting Netscape sion can be tedious. To address this,IE8 having Web site in one tab could affect for browser market share, changes to adds a private browsing mode. other tabs and crash the entire browser Internet Explorer were frequent and When opening a site in inPrivate session. Even worse, I experienced dramatic. Today, IE’s main competition Browsing mode, the browser won’t save many cases in which IE had to be is Firefox. Browser market shares are any data from that session. But even if restarted altogether, including other fairly stable, and changes to browsers you’re browsing in the regular mode, browser windows. IE8 offers tab isola- tend to be evolutionary, rather than monumental. Not surprisingly, IE8 is not a ground- Many of the fixes that Microsoft has made over the last few years breaking update, and that’s a good have improved IE’s resiliency to security threats, and by most thing. Microsoft has taken the time to measures IE today is no more vulnerable than other browsers. refine a number of features and make IE more compatible with emerging Web standards, but users and adminis- you want to occasionally delete tempo- tion, which is designed to isolate a trators won’t have to learn new ways to rary Internet content. In older versions misbehaving Web site or add-on from perform common tasks. IE6 and IE7 of IE this was an all-or-nothing affecting other tabs and windows, let- had to be rushed to market because procedure. With IE7, you can at least ting you close just the affected tab. they were designed to address some selectively delete temporary files, your While running the IE8 beta for the major security issues. This time around, browsing history and other content. All last two months, this feature worked the IE team at Microsoft has more time too often, however, you still end up losing most of the time, but the behavior was to better test its browser in a longer, data—such as cookies from trusted not entirely reliable. Hopefully, more thorough beta program. Many of sites—that you want to keep. IE8 gives Microsoft will have this fixed by the the new features in IE are related to you even more control over what to time the product is released. usability and standards support, but it delete and what to keep. The main ben- also contains a number of security efit of this is that you won’t have to set Protection issues that are significant. up preferences for your favorite Web One of the main reasons for the success sites again after cleaning up. of Firefox is IE’s reputation for being Private Browsing Confidentiality is further enhanced by vulnerable to a wide range of exploits. One problem with browsing the Internet better blocking of methods that compa- Many of the fixes that Microsoft has on a shared or public computer is that it nies use to track user behavior across made over the last few years have leaves a trail behind from temporary files multiple sites. Older versions of IE improved IE’s resiliency to security to the browsing history. That’s not a already contain options to let you block threats, and by most measures IE today problem when you’re perusing a news third-party cookies, which are the most is no more vulnerable than other site, but it can lead to the disclosure of common method for tracking users, but browsers. This means that today the confidential information when you’re this feature was not very reliable and most vulnerable component is the user checking your Web mail. Manually allowed only for minimal configura- who does the browsing.

64 | November 2008 | Redmond | Redmondmag.com | Project12 2/4/08 2:26 PM Page 1 1108red_SecAdvisor64-66.v5 10/15/08 3:47 PM Page 66

SecurityAdvisor

Statement of Ownership, Management and Circulation Despite education of corporate and much control users get over what they (Required by 39 U.S.C. 3685, United States Postal Service) home users, too many people blindly can install. Additionally, a number of 1. Title of Publication: Redmond click dangerous links, unknowingly architectural enhancements are designed 2. Publication No. 1553-7560 download malicious software and to prevent malicious software from per- 3. Date of Filing: 09/26/08 4. Frequency of Issue: Monthly respond to phishing scams. IE7 tried to forming its dirty deeds. 5. No. of issues published annually: 12 6. Annual Subscription Price: US $39.95, Canada/Mexico $54.95, address this issue by presenting warn- International $64.95 ings to users when a potentially unsafe Administration 7. Mailing address of known office of publication: 9121 Oakdale Ave., Ste. 101, Chatsworth, CA 91311. operation was performed or when users While moving to IE8 won’t require a 8. Mailing address of the headquarters of general business offices visited suspected phishing sites. Unfor- lot of user training, there are many of the publisher: Same as above. 9. Name and complete mailing address of Publisher, Editor, and tunately, these warnings were still not more settings that can be configured. Managing Editor: obvious enough, so IE8 attempts to This may lead to some confusion for Henry Allain, President, 16261 Laguna Canyon Rd., Ste. 130, Irvine, CA 92618. make the warnings even more difficult end users and administrators alike. Matt N. Morollo, Publisher, 600 Worcester Rd., Ste. 204, to ignore. Microsoft uses the label After all, you don’t want an adventurous Framingham, MA 01702 Doug Barney, VP Editorial Director, 600 Worcester Rd., Ste. 204, SmartScreen Filter for all these settings. employee to disable the security set- Framingham, MA 01702 Wendy Gonchar, Managing Editor, 16261 Laguna Canyon Rd., Ste. 130, Irvine, CA 92618 10. Owner (s): One of the main reasons for the success of Firefox is IE’s reputation for 1105 Media, Inc, dba: 101communications LLC, 9121 Oakdale Ave, Ste. 101, Chatsworth, CA 91311. Listing of shareholders in 1105 being vulnerable to a wide range of exploits. Media, Inc. 11. Known Bondholders, Mortgagees, and Other Security Holders Owning or Holding 1 Percent or More of the Total Amount of Bonds, Mortgages or Other Securities: Nautic Partners V, L.P., 50 Kennedy Plaza, 12th Flr., For example, when visiting an unsafe tings you configured. Traditionally, the Providence, RI 02903 Web site, IE not only changes the IE Administration Kit (IEAK) was the Kennedy Plaza Partners III, LLC, 50 Kennedy Plaza, 12th Flr., Providence, RI 02903 address bar to red but also displays a best tool for locking down browser Alta Communications 1X, L.P., 1X-B, L.P., Assoc., LLC, stark warning on a red background in settings. Group Policy, which is much 200 Clarendon St., Flr. 51, Boston, MA 02116 12.The tax status for Redmond has not changed during the the browser window. Also, for all Web easier to use, was only available to preceding 12 months. sites, the site name in the URL is high- enforce a subset of the browser set- 13.Publication Title: Redmond 14.Issue date for Circulation Data Below: September 2008 lighted in the address bar so you can tings. With IE8, you can lock down 15. Extent & Nature of Circulation: easily confirm which Web site you are almost all browser settings using Average No. Copies No. Copies of Each Month Single Issue viewing, even if the URL is long and Group Policy. You’ll need to download During Preceding Published Nearest 12 Months to Filing Date convoluted. Unfortunately, most users and install an ADM template to con- a. Total Number of Copies will pay little or no attention to the figure all these settings. (Net Press Run) 84,962 84,927 b. Legitimate Paid/and or address bar, and many will continue to IE8 is not a groundbreaking release, Requested Distribution visit an unsafe Web site, no matter how but it introduces a number of important 1. Individual Paid/Requested Mail Subscriptions obvious the warnings are. Still, the new changes that make it appealing to organ- Stated on Form 3541 79,948 79,808 behavior is an improvement and, when izations and individuals alike. To prepare 2. Copies Requested by Employers for Distribution to Employees by Name or combined with user education, will for it, you should start testing the beta 2 Position Stated on PS Form 3541 146 264 result in fewer user actions that jeop- release. While it’s not yet stable enough 3. Sales Through Dealers, Carriers, Street Vendors, Counter Sales, and ardize network security. to use for all your Web activities, it’s Other Paid or Requested Distribution Outside USPS® 108 105 One problem with this protection is usable for most. Also, you should down- 4. Requested Copies Distributed by Other that it’s only completely effective if you load the documentation for the new MailClasses Through the USPS 0 0 c. Total Paid and/or let IE check Web sites you visit against Group Policy settings and start planning Requested Circulation 80,202 80,177 a list of known dangerous sites. This for implementing IE8 in your organiza- d. Nonrequested Distribution Nonrequested Copies Stated raises some privacy questions. Theoret- tion so that you’re ready for deployment on PS Form 3541 3,547 3,343 ically, Microsoft could get a history of when Microsoft releases the final ver- 1. Nonrequested Copies Distribution Through the USPS by Other your browsing behavior, and despite sion in the coming months.— Classes of Mail 0 0 2. Nonrequested Copies Distribution Microsoft’s strict policies on keeping Outside the Mail 768 1,005 this information confidential, some Joern Wettern ([email protected]), e. Total Nonrequested Distribution 4,315 4,348 f. Total Distribution 84,517 84,525 people might still be concerned about Ph.D., MCSE, MCT, Security+, is the owner g. Copies not Distributed 445 402 the privacy implication. of Wettern Network Solutions, a consulting h. Total 84,962 84,927 i. Percent paid and/or Unsafe ActiveX controls and other and training firm. He’s written books and Requested Circulation 94.89% 94.86% browser add-ons are a major source of developed training courses on a number of 16. Publication of Statement of Ownership for a Requester Publication attacks against IE. Version 8 adds more networking and security topics, in addition to is required and will be printed in the November 2008 issue of this control over which add-ons can be regularly teaching seminars and speaking at publication. 17. I certify that all information furnished on this form is true and installed and lets admins configure how conferences worldwide. complete: Mary Ann Paniccia, VP of Print and Online Production 66 | November 2008 | Redmond | Redmondmag.com | Project5 1/11/08 1:00 PM Page 1

Introducing an integrated approach to complete SharePoint protection and management

DocAve™ Software for SharePoint Changing the way Administrators manage SharePoint

FREE 30 DAY TRIAL Download at www.avepoint.com

SharePoint management made simple. Complete SharePoint protection. Now you can control and manage the back-end of With item-level backup and full-fidelity restore, all your SharePoint environments from one place. DocAve allows for fast recovery of business critical DocAve is the only truly integrated, easy-to-use documents and content. Complete SharePoint software that offers a complete set of SharePoint platform backup allows for quick and painless backup, recovery, and administration tools. One recovery of the entire system during a disaster. solution, with many mix-and-match functions, With DocAve, you’ll have complete confidence now gives you power like never before. in your SharePoint environment.

Call 1-800-661-6588 or visit www.AvePoint.com for more information or to download a free trial.

© AvePoint, Inc. All rights reserved. DocAve, AvePoint, and the AvePoint logo are trademarks of AvePoint, Inc. All other names mentioned are property of their respective owners. Orlando, Florida December 9-11, 2008 www.itvirtualizationlive.com

Register Today! Save $200 Until Attend THE Platform Agnostic November 14th Virtualization Conference Virtualization Is Revolutionizing The Datacenter—learn how to save your company time and money. Join other IT executives and senior level managers at ITVirtualizationLIve and learn how to effectively plan and implement a virtualization solution.

Participate in a variety of “How-To” sessions

Hear independent evaluations on platforms, applications and products from leading analysts, thought leaders and suppliers

Network with Peers to share insights and best practices

Save research time and fi nd the right solution for your organization and budget

Register Today Visit our web site for complete registration and conference information or call 800-280-6218 www.itvirtualizationlive.com

MEDIA SPONSORS: RESEARCH PARTICIPANTS: INDUSTRY SUPPORTER:

IT_Virt_Live_RED_Nov_v6.indd 2 10/9/08 2:19:2 Register Today! 800-280-6218 www.itvirtualizationlive.com

Conference Agenda Monday • December 8 • 2008 Workshop 1 Welcome Reception Tuesday • December 9 • 2008 Breakfast Keynote Virtualization Planning and Management Best Practices Implementation Virtualization from concept to Management Frameworks Overview Top Tips From An Actual Virtualization production • Stephen Beaver & Matthew Johnson • Andrew Hillier Administrator • Brian Mislavsky

The Citrix Solution • Simon Crosby Solving I/O Management Challenges in Virtualized The Virtualization Trinomial: Memory, Compute Server Environments • Jean-Yves Chevallier and I/O • Bob Quinn

Lunch and Exhibits Virtualization—Virtual Savings? • Shane Aubel Business Continuity and Disaster Recovery Data recovery in Virtual Environments • Jerry Melnick • Sean Barry IT Processes in a Virtualized World • Lew Smith Virtualization Security in a Nutshell. Best Practices for Building a Virtual Appliance (Part I) • Edward L. Haletky Across Multiple Platforms • Erik Troan

Planning for Virtual Storage • Drue Reeves Virtualization Security in a Nutshell. (Part II) Disaster Recovery Using VMware’s Site Recovery • Edward L. Haletky Manager • Lew Smith

General Session Exhibitor Reception Wednesday • December 10 • 2008 Keynote Platform Wars • Chris Wolf Mastering the Management of Virtualization in Top Tips for Microsoft Exchange, SQL and Production • Chip Witt SharePoint Virtualization • Jerry Melnick Effective Decision Making for Virtual Successfully Manage, Monitor, Log and Secure Playing with Fire-How to avoid getting burned by Organizations • Brandon Hamilton Virtual Environments • Bill Johnson security gaps in the rush to adopt Virtualization • Nancee Melby Lunch and Exhibits 6 Steps to a Virtualized IT Lab Environment Managing storage virtualization Business Continuity in Heterogeneous Physical/ • Ian Knox • Drue Reeves Virtual Environments • George Wu Virtual Licensing: What You Need to Know Before 5 Steps to Avoiding Virtual Sprawl VI3: 20 things you MUST know (Part I) Creating Your First VM • Chris Wolf • Richard Muirhead • Edward Haletky Capacity planning for your virtual Dynamic Capacity Management for Virtual VI3: 20 things you MUST know (Part II) environment Environments: Balancing Effi ciency and • Edward Haletky Operational Risk Thursday • December 11 • 2008 Understanding Application Virtualization Virtualization 2.0: Manageability is King CSI: Virtualization • Edward Haletky • Srinivas Ramanathan Strategies for Securing Virtualized Networks Achieving Optimal Performance from your Virtual Architectures to Deliver a Virtual PC Environment • Richard Park Infrastructure through Management and that’s Indistinguishable from a Real PC Automation • Scott Herold • Stephen Yeo Cross-Platform Virtualization: An Enterprise True Server Virtualization—Virtual Infrastructure Auditing Virtual Infrastructure: You can’t protect Strategy for Success • Ian Robinson Management • Chris Barclay what you can’t detect• Michael Berman Conference Wrap Up

For sponsorship and exhibit information contact Tamara Schneider [email protected] or 208-343-4908

IT_Virt_Live_RED_Nov_v6.indd 3 1 P Project1 4/10/07 10:01 AM Page 1 1108red_Index71.v2 10/15/08 3:43 PM Page 71

AdvertisingSales RedmondResources

AD INDEX Advertiser Page URL Acronis, Inc. 50 www.acronis.com American Power 22 www.apc.com JD Holzgrefe Conversion Corp. Associate Publisher AvePoint, Inc. 67 www.avepoint.com 804-752-7800 phone Brocade Communications 17 www.brocade.com 253-595-1976 fax Systems, Inc. [email protected] Business Objects 39 www.businessobjects.com Dell Computer Corporation C2-1, 20-21, 42- www.dell.com 43, 62-63, C4 East SALES STAFF Diskeeper Corporation 49 www.diskeeper.com Dorian Software 25 www.doriansoft.com Tanya Egenolf ESET 12-13 www.eset.com John Bubello Advertising Sales Associate Eastern Regional Sales Manager 760-722-5494 phone Hewlett Packard 53 www.hp.com 508-532-1411 phone 760-722-5495 fax IBM Corporation 3, 5, 7, 9, C3 www.ibm.com 508-875-6633 fax [email protected] Idera 55 www.idera.com [email protected] Imanami Corporation 27 www.imanami.com IT Virtualization Live 68-69 www.itvirtualizationlive.com Northwest IT CERTIFICATION & Lucid8 14, 65 www.lucid8.com TRAINING: USA, EUROPE Microsoft Corporation 33 www.microsoft.com Bruce Halldorson Al Tiano NetSupport Inc. 18 www.netsupport-inc.com Northwestern Advertising Sales Manager QUEST SOFTWARE 59 www.quest.com Regional Sales Manager 818-734-1520 ext. 190 phone Quintum Technologies, Inc. 44 www.quintum.com 209-333-2299 phone 818-734-1529 fax Rackspace US, Inc 56-57 www.rackspace.com 209-729-5855 fax [email protected] Redmond Media Group 61 www.redmondmediagroup.com [email protected] /newsletters PRODUCTION ScriptLogic Corporation 37 www.scriptlogic.com So Cal/Central Secure Computing Corporation 47 www.securecomputing.com Mary Ann Paniccia StrangeLoop Networks Inc. 28-29 www.strangeloopnetworks.com VP, Print & Online Production Amy Winchell Sunbelt Software 41 www.sunbelt-software.com So Cal/Central Jenny Symantec Corporation 35 www.symantec.com Regional Sales Manager Hernandez-Asandas The Training Camp 70 www.trainingcamp.com/super 949-265-1566 phone Production Manager UltraBac Software 10 www.ultrabac.com [email protected] 818-734-1520 ext. 101 phone Western Governors University 16, 26 www.wgu.edu 818-734-1528 fax [email protected] EDITORIAL INDEX Danna Vedder Company Page URL Microsoft Account Manager Jennifer Shepard AOL LLC 48 www.aol.com 253-514-8015 phone Production Coordinator Apple Inc. 52 www.apple.com 775-514-0350 fax 818-734-1520 ext. 112 phone AVG Technologies CZ 54 www.avg.com [email protected] 818-734-1528 fax BitDefender LLC 54 www.bitdefender.com [email protected] bMobile Technology 52 www.bmobileroute.com CA Inc. 54 www.ca.com Cisco Systems Inc. 12, 45 www.cisco.com CORPORATE ADDRESS Canada/Mexico $54.95; outside North ClamWin Pty Ltd. 54 www.clamwin.com 1105 Media, Inc. America $64.95. Subscription inquiries, 9121 Oakdale Ave. Ste 101 back issue requests and address Crambo SA 52 www.crambo.es Chatsworth, CA 91311 changes: Mail to: Redmond, P.O. Box EISST Ltd. 54 www.eisst.com 2063, Skokie, IL 60076-9699, e-mail www.1105media.com EMC Corp. 11, 12 www.emc.com [email protected] or call (866) 293- MEDIA KITS: Direct your Media Kit 3194 for U.S. & Canada; (847) 763-9560 ESET LLC 54 www.eset.com requests to Matt Morollo, VP, Publishing, for International, fax (847) 763-9564. Google Inc. 11, 23, 30, 48 www.google.com POSTMASTER: Send address changes to 508-532-1418 (phone), 508-875-6622 Hewlett-Packard Co. 12 www.hp.com (fax), [email protected] Redmond, P.O. Box 2063, Skokie, IL 60076-9699. Canada Publications Mail IBM Corp. 12, 48 www.ibm.com REPRINTS: For single article reprints (in Agreement No: 40612608. Return Unde- Intel Corp. 12 www.intel.com minimum quantities of 250-500), e-prints, liverable Canadian Addresses to Circula- Kaspersky Lab 54 www.kaspersky.com plaques and posters contact: tion Dept. or Bleuchip International, P.O. LogMeIn Inc. 51 https://secure.logmein.com PARS International Box 25542, London, ON N6C 6B2. Phone: 212-221-9595 McAfee Inc. 54 www.mcafee.com E-mail: [email protected] © Copyright 2008 by 1105 Media, Inc. All NetApp 12 www.netapp.com rights reserved. Printed in the U.S.A. www.magreprints.com/QuickQuote.asp Nortel Networks 48 www.nortel.com Reproductions in whole or part prohibited LIST RENTAL: This publication’s sub- except by written permission. Mail OpenOffice.org 54 www.openoffice.org scriber list, as well as other lists from 1105 requests to “Permissions Editor,” c/o Panda Software International S.L. 54 www.pandasecurity.com Media, Inc., is available for rental. For REDMOND, 16261 Laguna Canyon Road, PCSecurityShield 54 www.pcsecurityshield.com more information, please contact our list Ste. 130, Irvine, CA 92618. Red Hat Inc. 54 www.redhat.com manager, Merit Direct. Phone: 914-368- 1000; E-mail: [email protected]; The information in this magazine has not Research In Motion Ltd. 46 www.rim.com Web: www.meritdirect.com/1105 undergone any formal testing by 1105 Symantec Corp. 52 www.symantec.com Media, Inc. and is distributed without any The Mozilla Foundation 23, 54, 64 www.mozilla.org Redmond (ISSN 1553-7560) is published warranty expressed or implied. Implemen- monthly by 1105 Media, Inc., 9121 Oakdale tation or use of any information contained Trend Micro Inc. 54 http://us.trendmicro.com Avenue, Ste. 101, Chatsworth, CA 91311. herein is the reader’s sole responsibility. VMware Inc. 11, 12, 54 www.vmware.com While the information has been reviewed Periodicals postage paid at Chatsworth, WebEx Communications Inc. 52 www.webex.com CA 91311-9998, and at additional mailing for accuracy, there is no guarantee that the offices. Complimentary subscriptions are same or similar results may be achieved in Yahoo! Inc. 48 www.yahoo.com sent to qualifying subscribers. Annual all environments. Technical inaccuracies Zimbra Inc. 46 www.zimbra.com subscription rates for non-qualified sub- may result from printing errors and/or new scribers are: U.S. $39.95 (U.S. funds); developments in the industry. This index is provided as a service. The publisher assumes no liability for errors or omissions.

| Redmondmag.com | Redmond | November 2008 | 71 1108red_Foley72.v6 10/15/08 2:19 PM Page 72

FoleyOnMicrosoft by Mary Jo Foley

IE8: Microsoft Thinks Different

hen it comes to , it’s not Instead of putting all its eggs in the Acid2-testing basket, Upton and his business as usual for Microsoft. The ’Softies band of testers began building out a rap- W have been doing more than a few things idly growing suite of test cases around specific Web standards. So far, almost differently with their upcoming browser, most notably some all of their efforts have been focused on the World Wide Web Consortium’s rather quiet but important changes involving testing. Cascading Style Sheet (CSS) 2.1 specifi- cation. As of September, the team had With IE8, Microsoft’s browser team Windows Vista, and then took over as submitted 3,221 IE8 test cases to the has admitted that it’s not infallible. head of testing for the IE team in 2007. CSS 2.1 working group. After years of flouting Web standards “Windows testing technologies are Microsoft’s hope is that by cutting out that other browser makers adhered being used on IE8,” Upton says. “The ambiguity in existing Web standards, it to—albeit to varying degrees— execution system is still really just a can better help developers get their pages Microsoft made standards compliance a bunch of batch files. But you have to and apps to work with the standards- priority with IE8. In fact, in a very non- provision all of those with all the dif- compliant IE, as well as with other Microsoft-like move, the IE team ferent Windows and test them at scale.” standards-compliant browsers. Upton publicly flip-flopped on its plans to Even more than meeting the challenge believes one of the best ways to cut back standards. First, standards mode of “writing great code that doesn’t through this ambiguity is with a set of was going to be an option, but in the work”—which Upton defines as the job tests that help define how an implemen- tation of a standard should actually work. After years of flouting Web standards that other browser makers In other words, one of Microsoft’s goals is to provide its interpretation of how the adhered to, Microsoft made standards compliance a priority with IE8. cases test the CSS 2.1 support in IE8. Is this just Acid2 avoidance? Upton spring, Microsoft officials changed of a tester—Upton is focusing on some- claims it’s not.“Acid2 picks an arbitrary their minds and made it the default. thing else that’s new for the IE8 team: set of cases,” he says. “By the very nature Second, the IE8 team has been blog- He’s spearheading Microsoft’s efforts to of it, it excludes a bunch of things.” ging and interacting with the industry submit new test cases to standards bodies. Microsoft has a tough road ahead for the past few months. At the start of There’s more to this seemingly ho-hum getting developers to change their pages this year, the IE8 blog was a shell. When standards task than meets the eye. An and sites to handle IE8’s default “super- and if there were posts, they were in PR- early build of IE8 did manage to pass the standards mode.” It has a second difficult speak. But in the ensuing months, IE Acid2 test back in December 2007. Acid2 task trying to fix the remaining post-beta team members took it up a notch, pro- is a test page maintained by the inde- 2 bugs that cause so many of the sites I duced some useful entries and better pendent Web Standards For more on visit to not work properly engaged with developers and customers. Project group, which was Microsoft and standards without the “Compatibility Third, the IE8 team got serious about written to help browser compliance, go to Mode” button. The final IE8 Redmondmag.com. testing. Dean Hachamovitch, general vendors ensure support for FindIT code: Foley1108 is due by year’s end, so we manager of the IE development team, Web standards in their don’t have to wait long to see was so intent on stepping up how products. But does simply passing Acid2 how Microsoft’s standards-compliance Microsoft tested IE that he brought in mean a browser won’t “break the Web” strategy impacts adoption.— 13-year Microsoft veteran Jason or be compatible with other standards- Upton, the guy who used to run all the compliant browsers? I’m sure that some Mary Jo Foley ([email protected]) testing for Windows. Upton helped run browser vendors might answer yes to is editor of the ZDNet “All About Microsoft” testing for Windows XP SP2, Windows one or both of those questions, but most blog and has been covering Microsoft for Server 2003 SP1 and x64 Editions and of the IE8 team would disagree. about two decades.

72 | November 2008 | Redmond | Redmondmag.com | Project6 9/22/08 10:10 AM Page 1

GIVE YOUR DATA’S CONTINGENCY PLAN A CONTINGENCY PLAN.

HELP KEEP YOUR DATA SAFE AND ACCESSIBLE. IBM System x3400 Express IBM System x3350FROM Express IBM SYSTEM $ 0,000 $905 $ 0,000

OR $23/ MONTH FOR 36 MONTHS1

The more valuable your data, the more you need to protect it. Redundancy is critical. Like in the IBM System x3350TM Express. It comes with integrated RAID. Can our competitors say that? PN:PN: 4192E1U4192E1U So if there’s ever an unexpected problem on one drive, your FeaturingFeaturing Intel® Xeon® Processor (up to 3.0 GHz/6 MB/1333 MHz) business can keep running. Because the data you need is Predictive Failure Analysis and Light Path Diagnostics, redundant, hot-swappable power supplies and fans and up to 4 hard disk drives available in another location. Anytime you need it. Smart plan. Comes with a 1-year or 3-year customer replaceable unit and on-site limited warranty2 From the people and Business Partners of IBM. It’s innovation made easy.

IBM SYSTEM x3650 EXPRESS IBM SYSTEM STORAGE DS3400 EXPRESS $5,409 OR $139/ MONTH FOR 36 MONTHS1 $4,319 OR $111/ MONTH FOR 36 MONTHS1

PN: 7979EVU PN: 172641E Featuring up to two Intel® Xeon® Processors x5355 External Disk Storage with 1 Gbps Fibre Channel interface technology Hot-swap redundant cooling, power and hard disk drives for high availability Built-in reliability features with dual-redundant power supplies standard Comes with a 3-year on-site limited warranty2 on parts and labor

IBM EXPRESS “BUNDLE AND SAVE”

We bundle our Express systems to give you the accessories you need — while saving you money on the hardware you want. ibm.com/systems/safedata Act ibm.com/systems/innovate now. Available through ibm.com and IBM Business Partners. 1 800-IBM-7777 (mention 104CE03D) 1 866-872-3902 (mention 6N8AH09A)

1. IBM Global Financing offerings are provided through IBM Credit LLC in the United States and other IBM subsidiaries and divisions worldwide to qualified commercial and government customers. Monthly payments provided are for planning purposes only and may vary based on your credit and other factors. Lease offer provided is based on an FMV lease of 36 monthly payments. Other restrictions may apply. Rates and offerings are subject to change, extension or withdrawal without notice. 2. IBM hardware products are manufactured from new parts, or new and serviceable used parts. Regardless, our warranty terms apply. For a copy of applicable product warranties, visit: ibm.com/servers/support/machine_warranties or write to: Warranty Information, P.O. Box 12195, RTP, NC 27709, Attn: Dept. JDJA/B203. IBM makes no representation or warranty regarding third-party products or services, including those designated as ServerProven® or ClusterProven®.Telephone support may be subject to additional charges. For on-site labor, IBM will attempt to diagnose and resolve the problem remotely before sending a technician. On-site warranty is available only for selected components. Optional same-day service response is available on [select] systems at an additional charge.

IBM, the IBM logo, IBM Express Advantage, System x and System Storage are trademarks of International Business Machines Corporation in the United States and/or other countries. For a complete list of IBM trademarks, see www.ibm.com/legal/copytrade.shtml. Intel and Xeon are registered trademarks of Intel Corporation. All other products may be trademarks or registered trademarks of their respective companies. All prices and savings estimates are based upon IBM’s estimated retail selling prices as of 8/20/08. Prices and actual savings may vary according to configuration. Resellers set their own prices, so reseller prices and actual savings to end users may vary. Products are subject to availability. This document was developed for offerings in the United States. IBM may not offer the products, features, or services discussed in this document in other countries. Prices are subject to change without notice. Starting price may not include a hard drive, operating system or other features. Contact your IBM representative or IBM Business Partner for the most current pricing in your geographic area. ©2008 IBM Corporation. All rights reserved. Project6 7/9/08 11:11 AM Page 1

         

!   # %! " !  #     ! & $    $!   !   #  $   "  !! ! # ! ! !  ! !& $!) !  $  &' !    #" "& $!   ! !  !  !!  #

( %! " !& !&  !& ( !  #!  ! ! ( %  !  ! !  ( %!