REAL LABS. REAL PRODUCTS. REAL RESULTS. JANUARY 3, 2011 VOL. 28, NO. 1 $8

MICROBLOGGING CAN MEAN BUSINESS, BUT INTEGRATION IS CRUCIAL.

BY CAMERON STURDEVANT

NEWSPAPER PERIODICAL

'HOODQG6DPVXQJ $QGURLG7DEOHWV L268SGDWH (NDKDX0RELOH6XUYH\ Smarter technology for a Smarter Planet: What database integration means to this blood sample. It means doctors in Ethiopia will be able to instantly compare this blood sample to over 41,000 HIV treatment histories to help their patients receive the best treatment regimen possible. The EuResist Network is helping doctors predict patient response to various HIV treatments with over 78% accuracy—outperforming 9 out of 10 human experts in a recent study. The tool is built on an IBM analytics solution that integrates a variety of disparate databases onto a flexible IBM DB2® platform to process complex metadata more effectively than anything else on the market. A smarter organization is built on smarter software, systems and services.

Let’s build a smarter planet. ibm.com/hospital

A data visualization of 41,000 HIV case histories.

The EuResist Network is a nonprofi t partnership composed of Karolinska Institutet (Stockholm, Sweden), Max Planck Institute for Informatics (Saarbrücken, Germany), University of Siena (Italy), Informa s.r.l. (Rome, Italy) and University of Cologne (Germany). The EuResist project has been cofunded by the European Commission. IBM, the IBM logo, ibm.com, DB2, Smarter Planet and the planet icon are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at www.ibm.com/legal/copytrade.shtml. © International Business Machines Corporation 2010. eWEEK LABS Editor in Chief Jason Brooks Technical Director Cameron Sturdevant contents Senior Analysts Andrew Garcia, P. J. Connolly Contributing Analysts Wayne Rash, Matt Sarrel

eWEEK.COM NEWS This eWEEK Editor in Chief Scott Ferguson 6 Managing Editor, West Coast John Pallatto Managing Editor, East Coast Jeffrey Burt IT managers face a number of Senior Editors Jessica Davis, Darryl K. Taft challenges when attempting to Senior Writers Clint Boulton, Michelle Maisto, Chris Preimesberger, deploy consumer-oriented tech- Fahmida Rashid nologies in the enterprise. Staff Writers Nick Kolakowski, Brian Prince

CONTENT SERVICES Managing Editor Eileen Feretic Managing Editor, Editorial Production Rick Dagley Senior Copy Editor Patrick Burke Tech In-Depth Senior Newsletter Editor Alethea Yip 22 Social media tools that mimic ART/MULTIMEDIA and Facebook promise Creative Director Steve Raia Senior Production Designer Tara-Ann Fasulo to bring team collaboration to Senior Designer Brian Moore corporate users. Getting users Production Designer Michael Wirtz Designer Walter Makarucha Jr. and applications connected in Video Producer Ashley Daley a secure, reliable stream can ZIFF DAVIS ENTERPRISE mean the difference between CEO leading and being left behind Steve Weitzner in an increasingly social world. Chief Financial Officer/General Manager Mike Caruso President, Enterprise Business Jeff Strief Chief Technology Officer 38 Best of Brian Magnotta eWEEK.com Senior Vice President/Digital Media Carine Roman This issue features a Senior Vice President/Audience Marketing Peter Westerman on cyber-security regulation; Senior Vice President/Strategic Services Josh Heitsenrether slideshows on Chrome OS Senior Vice President/Internet Operations for netbooks and 25 facts Jack Margo about Intel; and stories about Senior Vice President/Community & Content Stephen Wellman Apache quitting JCP and Vice President/Editorial & Strategic Content Eric Lundquist WikiLeaks’ affect on govern- Vice President/IT Services ment security. Thomas Matthews Senior Director/Audience Marketing Kelsey Voss eWEEK (ISSN 1530-6283) is published twice monthly except combined issues in July, August and December Research Director by Ziff Davis Enterprise Inc., 28 E. 28th St., New York, NY, 10016-7930. Periodicals paid at New York, N.Y., and additional mailing offices. TRADEMARK: Copyright 2011 Ziff Davis Enterprise. All rights reserved. eWEEK Guy Currier is a registered trademark of Enterprise Media Group Inc. Reproduction in whole or part without permission is Human Resources Director prohibited. POSTMASTER: Send address changes to eWEEK Customer Service P.O. Box 3402, Northbrook, IL Deirdre Kelly 60065-3402. Printed in the U.S.A. Publication Mail Agreement No. 40009221 Return undeliverable Canadian Addresses to P.O. Box 503 RPO West Beaver Creek, Richmond Hill, Ontario L4B 4R6. Canadian GST registration Associate Business Director number 865286033 ADDRESS CHANGE OR SUBSCRIBER CUSTOMER SERVICE: Online, go to http://service. Kenny Kalipershad eweek.com, e-mail to [email protected]. Include your full name and subscription address; no attachments, Circulation Manager please. Or call Customer Service at (888) 663-8438. SUBSCRIPTIONS/RENEWALS: Subscribe online at http:// subscribe.eweek.com PAID SUBSCRIPTIONS / SINGLE COPIES: Contact Customer Service, contact information Dorrett McDonald above. One year subscriptions rates (pre-paid only): U.S., $125; Canada, $155; foreign, $195. Single copy: U.S. $8; Canada $10; foreign $12. FOR ARTICLE REPRINTS AND E-PRINTS: Contact Wright’s Media at 877-652-5295 or [email protected] to obtain quotes and order reprints. PERMISSIONS: To reuse other materials from this publication or its Website, or use our logo, contact Rights and Permission Director, Ziff Davis Enterprise, 28 E. 28th St., New York, NY, 10016. E-mail: [email protected]; phone: (212) 503-5438. eWEEK editorial staff members can be reached at (978) 887-2246 or (800) 451-1032, or via e-mail using the following convention: [email protected]. 3 ADVERTISING SALES OFFICES

contents Jeff Strief President, Enterprise Business (212) 503-5621 Katie Yeend Labs@Work Executive Assistant, Sales and Marketing 8 (212) 503-5626 RHEL 6 offers a strong foundation for EASTERN REGION hosting virtual workloads, complete with Kristin Beaulieu, Senior Vice President, Event Sales security features rooted in SELinux. (212) 503-5696 Frank Bilich, Vice President, Sales, East Coast 14 Apple’s iOS 4.2.1 (212) 503-5634 is a must-have Eric Beiner, Vice President, Strategic Accounts upgrade for the iPhone and iPad. Dana Bulkenstein, Strategic Account Director (917) 547-0535 18 Andrew Garcia predicts that Chip Zaborowki, Strategic Account Director (212) 503-5635 mobility decision-markers won’t be big Alex Dardac, Strategic Account Manager (212) 503-5651 on 4G in 2011—but that won’t last. Cherylyn Williams, Account Executive (212) 503-5606 20 Android tablets from and Jack Mechaly, Account Executive take on Apple’s iPad. (212) 503-5633 Solomon Sade, Account Executive (212)-503-5932 26 MXI’s Stealth Zone USB Heather O’Dea, Account Services Manager solutions are secure and portable. (212) 503-5791 Jenny Ruggieri, Account Executive, Developer Shed (954) 577-4311 Ext. 08 28 Oracle Sun Ray supports Florina Belorusets, Account Coordinator 28 multimedia virtual desktop workloads. (212) 503-5746 Christine Blake, Account Coordinator 30 (212) 503-5624 AirMagnet Survey Pro 8.0 helps Samantha Amoroso, Account Coordinator admins understand WiFi coverage. (212)-503-5945 32 TEXAS Ekahau Mobile Survey Tom Rousseau, Senior Vice President, Strategic Accounts delivers a promising WiFi survey tool (512) 344-9448 to Android and tablets. WESTERN REGION Lee Sellers, Vice President, Western Regional Manager 34 Cameron Sturdevant believes (415) 547-8476 Mark Glasner, Strategic Account Director social collaboration tools can increase (415) 547-8313 productivity if implemented correctly. Sandra Gibson, Strategic Account Director (415) 547-8422 36 Sara LeWinter, Senior Account Executive P. J. Connolly writes about les- (415) 547-8453 sons learned from the breach. Rachel Gordon, Account Executive (415) 547-8452 Phoebe Klein, Account Executive (212)-503-5604 40 eWEEK Labs Maria Plummer, Senior Account Coordinator 40 (415) 547-8317 Products to Watch Kristen Hoeger, Account Coordinator Featured products include Fortinet’s (415) 547-8389 Alexa Calvarese, Account Coordinator FortiMail-3000C, the Gizmox Virtual (415) 547-8451 WebGui 6.4, Regic Builder, Adobe’s PRODUCTION LiveCycle ES2.5, PBworks Customer Michael Dicarlis, Senior Production Manager Relationship Edition and QuickBooks (212) 503-6042 Enterprise Solutions 11.0. SUBSCRIPTION INQUIRIES (888) 663-8438 [email protected]

42 Critical Testing Criteria offers eWEEK’S sales and marketing staffs can be reached at guidelines for enterprise microblogging. (212) 503-5600 or (800) 758-3789, or via e-mail by using the following convention: name.surname@ziffda- visenterprise.com. eWEEK®, PC Week®, PC Week Netweek®, PC Week Shoot-Out®, Spencer F. Katt® and Spencer F. Katt: Rumor Central® are registered trademarks of Ziff Davis Publishing Holdings Inc. Copyright (c) 2002 Ziff Davis Media Inc. All rights reserved. Reproduction in whole or in part without permission is prohibited. For e permission to reuse material in this publication or to use our logo, send 4 WEEK JANUARY 3, 2011 e-mail to [email protected]. For reprints, contact Wright’s Reprints via e-mail, [email protected]; phone, (877) 652-5295.

This

Managing consumer tech

RSYVGSZIVWXSV]XLMW[IIO'EQIVSR MRFS\XSGLIGOYWIVEHSTXMSR[MPPFIXSYKL 7XYVHIZERX XEOIW ERSXLIV GVEGO EX XLI XSGSQIF] XSTMG SJ XLI GSRWYQIVM^EXMSR SJ XLI 8LIOI]EW'EQIVSRHMWGYWWIWMRLMWWXSV] IRXIVTVMWI XLMW XMQI F] HVMPPMRK HS[R SRTEKIMWWQEVXMRXIKVEXMSREQSRK SR XLI MRXIKVEXMSR MWWYIW MRZSPZIH MR VSPPMRK WIVZMGIW8[MXXIV´WQSHIP°TSWXIZIV]XLMRK SYX8[MXXIVWX]PI QMGVSFPSKKMRK WIVZMGIW ERH ERHPIXXLIYWIVWHIGMHI[LMGLMXIQWXLI] XLIMVJYRGXMSREPMX]MREFYWMRIWWWIXXMRK [ERXXSJSPPS[°QE]RSX[SVOJSVFYWMRIWW 8LIMWWYIKIXWXSXLILIEVXSJXLIGLEP ,S[IZIVF]WXMXGLMRKXSKIXLIVEJIHIVEXMSR PIRKIWXLEX8QEREKIVWJEGI[LIREXXIQTX SJETTVSTVMEXIWIVZMGIW]SYQE]EVVMZIEXE MRKXSHITPS]XIGLRSPSKMIWFSVRSYXSJ°SV WSPYXMSRXLEXGERJSGYW]SYVGSPPEFSVEXMSR TSTYPEVM^IHZME°GSRWYQIVSVMIRXIHTVSH IJJSVXWMRWXIEHSJJYVXLIVHMJJYWMRKXLIQ YGXWERHWIVZMGIWRXLIGEWISJ8[MXXIV %PWSSRXLI±GSRWYQIVXIGLRSPSKMIWMR Jason XLIWIVZMGI´WSTIRRIWWLEWHVMZIRMXWEHST XLIIRXIVTVMWI²JVSRXMRXLMW[IIO´WMWWYI[I XMSR1SWXYTHEXIQIWWEKIWEVIEZEMPEFPIJSV LEZIETEMVSJVIZMI[WSJ%RHVSMHTS[IVIH Brooks TYFPMGGSRWYQTXMSR[MXL XEFPIXGSQTYXIVW[VMX VIX[IIXMRKWIEVGLIRKMRI ‘by stitching XIRF]I;))/´W2MGO MRHI\MRKERHKSSHSPH /SPEOS[WOMERH'PMRX PMROWLEVMRK[SVOMRKXS together a &SYPXSRRSYVPEWXMWWYI EQTYTHMWXVMFYXMSR SJXLI]IEV (IG [I *SVQI8[MXXIVLEW federation of KEZIEWTIGMEPRSHXS WIVZIH QEMRP] EW E appropriate %TTPI´WM4EHEQSRKSYV VITPEGIQIRXJSVER677 ±4VSHYGXSJXLI=IEV² VIEHIV[LMGLMXWIPJLEH services, you TMGOWERHXLII\XIRX WIVZIHEWEVITPEGIQIRX XS[LMGL%RHVSMHXEF JSVFSSOQEVOPMWXWERH may arrive at PIXZIRHSVWEVIEFPIXS TSVXEPX]TI;IFTEKIW a solution.’ VITVSHYGI[LEX%TTPI 1]8[MXXIVWXVIEQMWJIH LEWEGLMIZIH[MXLXLI F]QSVIWITEVEXIZSMGIW M4EHMWWSQIXLMRK[I´PP XLERGSYPHJMXMRER]SJXLSWIIEVPMIVMRJSVQE FI[EXGLMRKGPSWIP]XLVSYKLSYX XMSRGLERRIPWERHXLIWLSVXVMKMHP]JSVQEXXIH XPSSOWEWXLSYKL%RHVSMH´W3)1WLEZI REXYVISJ8[MXXIVYTHEXIWQEOIWXLIQIEW] XLIMV[SVOGYXSYXJSVXLIQFYXGLIGOSYX JSVQIXSWGERXLVSYKL 'PMRX´WERH2MGO´WVIZMI[WSRTEKIJSV %XPIEWXXLEX´WLS[YWI8[MXXIV[MXLXLI XLIMVXEOISRXLIWIM4EHGLEPPIRKIVW TYFPMGP]EZEMPEFPIMRJSVQEXMSRGSRWYQI *MREPP]EW[IIRXIVERI[]IEV[I´HPSZI *SVMRXIVREPQEXXIVWQ]SZIVPSEHIHIQEMP XSLIEVEFSYXXLITVSHYGXWERHXIGLRSPSKMIW MRFS\VIQEMRWOMRK*SVMRJSVQEXMSRXLEX´W ]SY´VIQSWXGSRGIVRIH[MXLERH[LEX]SY´H MRXIVREPXSERSVKERM^EXMSRXLIWSVXSJ[MHI PMOIXSWIIGSZIVIHMRI;))/4PIEWIHVST STIREZEMPEFMPMX]XLEXTS[IVW8[MXXIVSFZM QIEPMRIEXNFVSSOW$I[IIOGSQERHXIPPQI SYWP][SR´XJP]FYXRIMXLIV[MPPEGSRJMKYVE [LEX´WSR]SYVVEHEVJSV´ XMSRWSGPSWIP]GSRWXVEMRIHEWXSGVIEXI]IX ERSXLIVYR[ERXIHHEXEWMPSJERI[WXEXYW I;))/0EFW)HMXSVMR'LMIJ.EWSR&VSSOW YTHEXIWIVZMGIIRHWYTQIVIP]EWERSXLIV GERFIVIEGLIHEXNFVSSOW$I[IIOGSQ

6 eWEEK JANUARY 3, 2011 WEWORKFORYOU,NOTTHEOTHERWAYAROUND. THEOTHERYOU,NOTWAYAROUNDWORKFOR . It may not seem like a revolutionary idea, but in the security industry it is. It has somehow become the norm to pass the burden of security from company to customer. Installing, maintaining, downloading, and updating is somehow your job, while finger pointing, blaming, and looking the other way is theirs. Well, at Webroot we think it’s time for a change. It’s time for security to be the service it is sold as, instead of the burden it becomes. It’s time to prevent problems instead of scrambling to fix them. It’s time for Webroot.

For more information about Webroot business solutions, call 866.915.3208 or visit webroot.com/4u I o d

©2010 Webroot Software, Inc. All rights reserved. Webroot is a trademark or registered trademark of Webroot Software, Inc. in the United States and/or other countries. Android tablets Samsung and Dell take on Apple’s iPad 20 VDI commitment Oracle Sun Ray steps up labs virtual desktop support 28 RHEL 6 handles physical and virtual workloads REVIEW: The latest Linux-based OS from Red Hat offers a strong foundation for hosting virtual workloads, complete with distinctive capabilities such as security features rooted in SELinux.

By Jason Brooks ed Hat Enterprise Linux 6, the latest version of Red Hat’s flag- ship Linux-based operating sys- Rtem, began shipping last month, boasting a bevy of core improvements around scalability, resource management and virtualization. What’s more, the system ships with a slate of updated open-source software com- ponents that stand to make life easier for developers and system administrators who want to take advantage of recent features without leaving Red Hat’s support and cer- tification umbrella to do so. (Go to tinyurl. com/3294lhj for a look at RHEL 6 in action.) Red Hat Enterprise Linux has long been a trusty go-to option for While aimed primarily at server roles, RHEL 6 can also perform well as a most server roles—if not in its official Red desktop operating system. Hat-branded form, then in one of its respun incarna- wish to host .NET applications from Linux—Novell’s tions, such as the fee-free CentOS or the Oracle rebrand SUSE Linux Enterprise Server will offer a better fit, as Unbreakable Linux. Based on my tests of RHEL 6, I Red Hat has transitioned completely away from Xen expect this new release to continue in that tradition: support in RHEL 6 and has consistently turned a cold The new release performed as solidly as ever, and it shoulder to Mono, the open-source implementation of benefits from a support term that’s been lengthened ’s .NET. Mono is, however, available through from seven to 10 years. the volunteer-based Extra Packages for Enterprise Linux At sites that rely on Xen for virtualization—or that (EPEL) project that rebuilds certain software packages

8 eWEEK JANUARY 3, 2011 Smarter technology for a Smarter Planet: What 3 million lines of code means to a piece of luggage. It means Amsterdam Airport Schiphol will be able to accurately and efficiently move 70 million pieces of luggage per year—20 million more bags per year than they used to. The airport’s automated baggage solution will allow them to increase their baggage handling capacity by 40%, so they can meet the growing demand placed on them as one of Europe’s largest transport hubs. This system is built on IBM Rational® and Tivoli® software and runs on Power Systems™. A smarter business is built on smarter software, systems and services.

Let’s build a smarter planet. ibm.com/luggage

A data visualization of the fl ow of baggage traffi c at Amsterdam Airport Schiphol.

IBM, the IBM logo, ibm.com, Power Systems, Rational, Tivoli, Smarter Planet and the planet icon are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at www.ibm.com/legal/copytrade.shtml. © International Business Machines Corporation 2010. labs@work

from Fedora for use (albeit unsup- ported) with RHEL. Also, while RHEL offers a strong foundation for hosting virtual work- loads—complete with distinctive capabilities such as security features rooted in SELinux—it doesn’t, on its own, offer as well-integrated a virtu- alization management experience as do purpose-built virtualization products such as VMware’s vSphere. However, I’ve yet to try Red Hat’s separate virtualization manage- ment product, which has remained uncharacteristically proprietary in its licensing pending the completion of an effort to port the application from C# to Java. Desktop operating system Though aimed primarily at server roles, RHEL 6 can also perform well as a desktop operating system. It The graphical tools that ship with RHEL 6 have improved over the years, but I’m ships with recent versions of all the looking forward to testing Red Hat’s separate RHEV management package. usual suspects of the Linux desk- top, anchored by Version 3.2 of the subscription, on a per-socket-pair which I used as a desktop system. OpenOffice.org productivity suite basis. An x86-64 server with two physi- In all cases, RHEL 6 was easy and Version 3.6 of Mozilla’s Firefox cal sockets running RHEL 6 will cost to install: On my server machine, Web browser. RHEL includes fewer $799 annually with standard support I was able to choose a “virtualiza- software packages than do some and $1,299 with premium support, tion host” option from one of the of its less buttoned-down Linux each with an allowance for one virtu- installer screens, which took care relations, but the EPEL repository alized RHEL guest instance. Red Hat of installing everything I needed for I mentioned above can fill some also sells editions with allowances for the headless host role I had in mind of these gaps in a desktop setting. four guests and for unlimited guests. for that machine. I’ve looked for a Red Hat has shifted its pricing Red Hat charges separately for similar option in my recent tests around a bit for RHEL 6, most nota- “Add-on Functionality,” such as high of RHEL’s freely available sibling, bly by increasing the starting price availability, load balancing and scal- Fedora, and haven’t found it. of a supported edition of the product able file system support. The Power From my test client system, I from $349 per year to $799 per year. architecture and IBM System z edi- used RHEL’s virt-manager tool to Red Hat still offers a $349 edition tions of RHEL 6 are priced sepa- connect to my host machine over an of the product, but that edition is rately. For details, go to www.redhat. SSH tunnel and install some guest now “self-supported.” (Go to tinyurl. com/rhel/purchasing_guide.html. instances. For storage, I stuck to the com/2d4xbvy for more information.) local disks on my test server. The Production Support SLA page Taking a test drive I could use RHEL’s regular on Red Hat’s Website still lists the I tested the 64-bit version of storage tools to hook up to some “basic” support tier alongside the RHEL 6 on a dual-core AMD tower shared storage, but the process for standard and premium tiers, but Red server with 4GB of RAM (which I this is far from the point-and-click Hat doesn’t offer any RHEL SKUs used as a virtualization host) and matter it is with VMware’s tools. with basic support, nor is basic sup- on a handful of guests running Fortunately, RHEL 6 benefits from port available on its own. on that machine. I also tested excellent documentation, which is RHEL 6 is sold by annual RHEL 6 on a ThinkPad, available at tinyurl.com/38t259j.

10 eWEEK JANUARY 3, 2011 labs@work

I hit my first snag after I’d installed a RHEL guest on my virtualization host and set about registering with Red Hat Network to pull down additional software and updates. I didn’t have enough unused RHN entitlements to give my guest its own entitlement, and RHN apparently wasn’t recognizing my guest as a guest. After more searching than should have been necessary, I found that I had to install a pair of “rhn-vir- tualization” packages on my host to make the RHN link work. I’d like to see these included among the packages installed through the virtualization host install option. I was able to launch a Firefox instance within an SELinux-powered security sandbox. These are the sorts of entitlement- related annoyances that make the freely available CentOS such a great option for testing out Red Hat technologies—if you’re able to self-support deploying. I outfitted my guest instance as a Mediawiki server, tapping the newly updated PHP 5.3, MySQL 5.1 and Apache 2.2. The current version of Mediawiki will run under the PHP 5.1 version that ships with RHEL 5, but it recom- mends Version 5.2 or higher. My guest server performed as expected, so I began testing some It took me a bit of time to fi gure out how to take advantage of the guest allowances of RHEL’s resource management for RHN that come with RHEL 6 entitlements. options, starting with the product’s new support for Control Groups 2GB beyond the amount of RAM My guest cloning activity trig- (cgroups), a means of grouping available on my server. The guests gered KSM, and I watched as the particular processes together and stuck to their overall physical mem- tally of memory pages shared applying resource limits to them. ory allotment, instead turning to among my guests grew. In future I created a control group to con- swap space for their needs above tests, I’ll be interested to see how tain the libvirt daemon that man- that amount. KSM performs with a greater diver- ages virtual instances on RHEL 6 to This arrangement also gave me a sity of guest instance types. ´ ensure that virtual instances never good opportunity to check out the consumed more than 3.5GB of the RHEL 6 implementation of Linux’s eWEEK Labs Editor in Chief Jason RAM on my host machine and to Kernel Samepage Merging, a sort Brooks can be reached at jbrooks@ guard against making my host inac- of deduplication for memory. The eweek.com. cessible by committing too much KSM service in RHEL 6 is switched RAM for my guests. off by default, with a separate tun- This story can be found I cloned my guest instance sev- ing service running to activate KSM online at: eral times, committing a good if needed. tinyurl.com/3y7njak

11 1&1® WEB HOSTING

”Working with startup companies on a tight budget, my clients know an online presence is needed. I use 1&1 exclusively to satisfy their requests for reliable hosting at affordable rates.“

Lance Ochs, www.vacantpixels.com 6 MONTHS FREE!*

*Offers valid for a limited time only. 12 month minimum contract term applies for web hosting offers. Setup fee and other terms and conditions may apply. Mobile software selection dependent on hosting package and requires a Windows PC. Domain offers valid fi rst year only. After fi rst year, standard pricing applies. Visit www.1and1.com for full promotional offer details. Program and pricing specifi cations and availability subject to change without notice. 1&1 and the 1&1 logo are trademarks of 1&1 internet AG, all other trademarks are the property of their respective owners. © 2011 1&1 Internet, Inc. All rights reserved. 1&1® HOSTING PACKAGES 6 MONTHS FREE!*

As the world‘s largest web host, we know the developer 1&1® BUSINESS PACKAGE: features you need in a hosting package! ■ 3 Included Domains ■ Private Domain Registration ■ Domains Included 250 GB Web Space .com. om ■ U N L I M I T E D T r a f fi c All hosting packages include domains, .infoo .org. ■ NEW: Version Management .net free for the life of your package. Software (git) ■ 2,500 E-mail Accounts Unlimited Traffi c ■ 50 MySQL Database (100 MB) Unlimited traffi c to all websites in your ■ 25 FTP Accounts 1&1 hosting package. ■ E-mail Marketing Tool ■ 24/7 Toll-free Customer Support Developer Features Extensive language support with PHP 5/6 p (beta) with Zend Framework and git version $ .99. management software. rmonth* e9 pper month*

Online Marketing Tools Need more domains? SEO tools to optimize your website. .info domain only $0.99 first year* * 1&1 Webstatistics makes it easy to monitor .com domain only $4.99 first year your progress. More great offers available on our website! Green Data Centers ® We‘re committed to hosting your site with a minimal impact on the environment.

Get started today, call 1-877-GO-1AND1 www.1and1.com labs@work Latest Apple iOS is a winner for most users REVIEW: The Apple mobile operating sys- tem’s 4.2.1 release ships—and has only one hitch.

By P. J. Connolly OS 4.2.1, the latest update to Apple’s mobile operating sys- tem, is a must-have upgrade ifor the iPhone and iPod touch, and that goes double for the iPad. The new release raises the iPad’s capabilities and user experience to a level of functionality that iPhone users have had in their hands for five months and, on both platforms, Left: When originally released, the iPad offered a hardware-based orientation selector, underscores Apple’s latest advance- but that has been moved into the menu of open applications, with the hardware switch ment of the art of mobile computing. converted into a mute switch to match the iPhone. Right: The multitasking feature of The iOS upgrade includes Air- iOS is really more like the old Switcher of early Mac OS releases: It suspends the state of the application, but processes alerts and notifi cations in the background. Print, a wireless printing feature that will initially be available to few users, and AirPlay, media streaming fea- computer running iTunes 10.1. The Portuguese and Traditional Chinese. tures that will be useful for a broader download and installation time will Many of these features fit the cat- range of iOS device users. Apple also vary for users, but one can plan on egory of “at last,” but the quasi-multi- gave users an early Christmas pres- it taking a half-hour to an hour— tasking feature will dwarf the others in ent in the form of free use of the Find possibly longer on slower links. importance for all but the most con- My iPhone application for the iPad, This release marks the first time trolled corporate deployments. Other iPhone 4 and fourth-generation iPod that iPad users have had access to features (such as folder-based applica- touch. Find My iPhone, available core iOS 4 features. They include tion organization, the Game Center, for purchase by users of older iOS multitasking, after a fashion (the TV episode rental, text search on Web devices, will locate a device on a application’s state is saved, but alerts pages displayed in Safari, and the uni- map and allow the user to remotely and notifications can be passed to fied in-box with threaded message display a message on it, play a sound, the user); access to a wider range of view) will be valuable to a shifting range lock the device or wipe it if the device enterprise-grade device management of users, depending on their interests is beyond physical recovery. and security technologies, such as and how they use their devices. Installing iOS requires that the Cisco Systems’ AnyConnect VPN device—which can be an iPad, an client; and much broader language One disappointment iPhone or later, or recent models support with the addition of 25 Perhaps the only disappointment of the iPod touch—be synced with a more languages, including Korean, I have with iOS 4.2.1 is that Apple

14 eWEEK JANUARY 3, 2011 THE CONVERSATION BEGINS HERE

WHERE the mobile, cloud, & virtualization marketplace unites

APRIL 17-20, 2011 BELLAGIO, LAS VEGAS

Questions Answered • Strategies Defined • Relationships Built

MOBILE KEYNOTES CLOUD & VIRTUALIZATION KEYNOTES

Jay Freeman Aaron Hillegass Ilja Laurs Joe Belfiore Nils Puhlmann Jim Reavis Steve Riley Peder Ulander CYDIA BIG NERD RANCH GETJAR MICROSOFT ZYNGA CLOUD SECURITY CLOUD.COM ALLIANCE WEB SERVICES

U How to build, market, and deliver apps U ROI of implementing cloud and seamlessly virtualization platforms and solutions U How to leverage cloud-based services U Emerging trends in cloud computing for mobile app delivery U How to plan and implement virtualized U How to deploy virtual infrastructure to environments support mobile development teams U Getting optimal business efficiency U Compare security solutions for mobile using Microsoft and VMware app delivery virtualization solutions.

NETWORK WITH YOUR PEERS! Network with your peers, carriers and a wide range EWEEK DISCOUNT of mobile infrastructure, product and service vendors! Save an extra $50 – use code: EWEEK Get bet-the-business market knowledge for business leaders, developers and IT managers exploring PLUS! Register now for Early Bird Special! or implementing cross-platform mobile development, Register by Feb 4, book 3 nights at the Bellagio cloud computing and virtualization. for reduced $149/night rate and get $100 Bellagio Gift Card!

REGISTER TODAY! TheConversationBeginsHere.com or call 800.505.1201 labs@work

chose to pull some of AirPrint’s device. But once the printer was functions at the last minute by updated, it was a simple matter to removing the ability to print to a print from an iPad and an iPhone. shared printer on a Mac running AirPrint exposes a limited, but the very latest update to Mac OS X, useful, subset of the printing func- Release 10.6.5, or to a Windows PC tions and doesn’t involve the cloud- running iTunes. Currently, a hand- based workarounds that were previ- ful of newer HP inkjet and laser ously necessary. printers work with AirPrint, but This release of iOS is a must- device manufacturers are catching have-now for iPad users, who will up in a hurry. finally be able to take advantage For example, the day after iOS of Apple’s latest mobile operating 4.2.1 became available, Electronics system. Users of the iPhone 4 and For Imaging announced the release 3GS can expect a positive experience of PrintMe Connect, allowing iOS as well. devices to print directly to EFI’s Although the current limits on Fiery printers and multifunction AirPrint’s usefulness are disappoint- peripherals. However, as of Dec. ing, it’s nice to see something new 10, the page for the printer software Finding text on a Web page is made in the all-too-often humdrum world possible in iOS 4.2 for the iPad: Enter- download featured a form request- of printing. ´ ing a word or phrase in the Search box ing notification upon the software’s brings up results from one’s preferred public release. search engine or the current page. Senior Analyst P. J. Connolly can be More adventurous users will reached at [email protected]. find details at Websites of vary- The printer I used to evalu- ing trustworthiness on how to ate AirPrint, an HP LaserJet Pro activate the parts of AirPrint that M1536DNF (see story below) This story can be found are embedded in Mac OS X 10.6.5, required a touch-up to its firmware online at: if they wish. before I could print from an iOS tinyurl.com/25p7pcn A multifunction printer that’s hardly ho-hum

very office needs a workhorse, and HP’s LaserJet Pro As with HP’s other networked printers, the Web Jetadmin )M1536DNF is a solid multifunction printer that allows utility can be used to provide centralized remote management users to take advantage of Apple’s AirPrint for the iPad of multiple printers. and iPhone. The printer is ideal for medium-duty use where Although the printer’s maximum duty cycle is rated at 8,000 wired Ethernet and telephone connections are available. pages per month, HP recommends that monthly usage fall The M1536DNF is fast: It’s rated at up to 26 ppm (pages per between 500 and 2,000 pages. This makes it a good choice for minute) under sustained printing, and the time between submit- smaller offices and workgroup scenarios, where average users ting a job and the output of the first page is said by HP to be print a few pages a day. less than 9 seconds. It’s economical, too: HP lists the printer It’s not easy to get excited about a printer, but the at $299.99, and the duplex printing option (a standard feature) M1536DNF looks interesting, if only because of its support for allows users to save a significant amount of paper on lengthy AirPrint. Although cloud-based printing services such as HP’s print jobs. own iPrint are useful avenues for outputting documents from a The M1536DNF was a breeze to set up and configure. At just mobile device, the combination of the M1536DNF and AirPrint under 26 pounds, it’s fairly easy to unbox and put into place. manages to be both simple and effective—P.J.C. Much of the basic configuration, including network functions, is entered at the machine’s front panel, and a built-in Web man- This story can be found online at: agement server can be used for advanced device configuration. tinyurl.com/35rr67x

16 eWEEK JANUARY 3, 2011 Smarter technology for a Smarter Planet: What 99.9% system uptime means to a kilo of gold. It means that the futures contract for that gold can trade instantly and more securely. The Dubai Gold & Commodities Exchange (DGCX) has maintained their complex network of worldwide members for four years without a single security breach due to malware, and without any unplanned downtime. The DGCX worked with IBM Security Solutions to help implement an intrusion prevention system that builds security into every aspect of their online trading services and proactively adapts to ever-evolving threats. A smarter business is built on smarter software, systems and services.

Let’s build a smarter planet. ibm.com/exchange

A data visualization of the settlement prices for gold, silver and other commodities from March 1 to September 1, 2010.

IBM, the IBM logo, ibm.com, Smarter Planet and the planet icon are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at www.ibm.com/legal/copytrade.shtml. © International Business Machines Corporation 2010. Enterprises not big on 4G labs@workcommentary Mobility decision-makers won’t be swayed by 4G in 2011, but that stance won’t last long. Andrew Garcia

n the wireless predictions column I wrote a although it will improve as the year goes on. few weeks ago, I called 2011 “a testing and That’s because carriers aren’t making it easy appraisal year” for enterprises when it comes for consumers to get on board with 4G due to the to 4G. I posited that coverage would not be limited range of devices currently shipping and the pervasive enough on a national, regional or local broad range of technologies being marketed as 4G. basis for enterprise mobile implementers to confi- The carriers and hardware makers aren’t empha- dently promise mobile applications or services that sizing 4G heavily among their new smartphones rely on 4G’s bandwidth boost and network latency at this time, as numerous highly touted lines reductions, while knowing that the majority of (from the Nexus S for T-Mobile to the Samsung their users could not take advantage of them. Galaxy family to the array of Windows Phone 7 Jason Armitage, senior analyst with Yankee devices) appear on the market solely with 3G con- Group, seems to concur, writing in his 2011 predic- nectivity. However, I expect this state will change tions piece: “Wireless operators have mostly missed rapidly after CES this month, where numerous the mark when it comes to marketing 4G services 4G device announcements are anticipated. for business, and, as a result, Armitage also predicts enterprises will be slow to ‘carriers aren’t that operators will start warm to 4G. Although opera- experimenting with tiered tors are banking on business making it easy for data pricing based on data applications such as video volume and download speed conferencing, virtualization consumers to get as carriers continue to move and machine-to-machine on board with 4g.’ away completely from flat- communications that will rate pricing for mobile data. benefit from the enhanced His prediction of experi- speeds and latency improvements of 4G networks mentation with bit buckets shared across mul- to drive adoption among corporations, business tiple devices caught my eye, as I blogged about decision-makers don’t see the value—yet.” my desire for just such a service plan two years A different Yankee Group report iterated that ago: I wanted a $60 plan that would let me share many enterprise mobile decision-makers didn’t 25GB among five devices. understand what 4G wireless technology was, Two years later, I still feel good about that and fewer thought the technology was needed to price and those numbers, but my inner pessimist enhance employee productivity. I suspect the for- thinks operators will be slow to adopt that model. mer number has grown since that report shipped, Too much of their public success is based on the but we’re all coming around to the idea that carri- number of activations, and their profit is based ers are using the marketing term “4G” to convey on the number of devices, each with its own the idea of “faster and better than 3G,” rather separate data plan. I think, at best, we can hope than trying to adhere to strict ITU (International that one operator may experiment with such a Telecommunication Union) definitions. plan toward the end of the year. If it succeeds, Armitage thinks consumer adoption will help others will follow. ´ drive 4G forward in the enterprise by demon- strating productivity gains and use cases when Senior Technical Analyst Andrew Garcia can be employees bring their own devices to work, but reached at [email protected]. I continue to think it will be hard to plan around 4G until there is a critical mass of adoption This story can be found online at: and coverage. And that won’t happen in 2011, tinyurl.com/2be52gl

18 eWEEK JANUARY 3, 2011 BUILD YOUR BUSINESS No matter the size of your company or budget, you can increase your ROI with the Ziff Davis Enterprise BuildROI Program.

Take advantage of our awardwinning editorial, millions of IT buyers, and proven marketing results in:

Print and Online Advertising Lead Generation Lead Management Strategic Consulting Custom Content Digital/FacetoFace Events EndtoEnd Solutions and more…

Programs start at just $5,000.

Visit www.BuildROI.com or contact [email protected] for more information today.

BuildROI.com features a robust Resource Center fi lled with downloadable content and more. Check it out. labs@work

Android tablets from Samsung and Dell take on Apple’s iPad REVIEW: Samsung’s and Dell’s Android tablets support Flash content, stor- age expansion via SD cards and user-removable batteries.

By Clint Boulton and Testing Samsung’s Galaxy served this Web surfing role better if Nicholas Kolakowski Samsung’s Galaxy Tab is an excel- it included a larger display, closer to fter Apple’s iPhone rede- lent little Android 2.2-based Web surf- the 9.7-inch screen on Apple’s iPad. fined expectations of how ing device that also delivers a great The device sports an enhanced a should look experience for most Web applications, TFT display with 1,024-by-600 reso- Aand operate, a thicket including those apps that rely on Flash, lution that measures 7 inches on the of rival devices running ’s which performed well for me wherever diagonal, weighs in at a delightful Android platform sprung up in the I encountered it. I was able to call up 13.5 ounces and is about a half-inch iPhone’s image—more or less. Now, one app or Website, then open up to thick. The Galaxy Tab is equipped a similar assortment of Android with a 3G radio on the Verizon Wire- OEMs is set on repeating this cycle less network, along with a WiFi radio with the tablet form factor into which that performed well in my tests. Apple’s iPad has breathed new life. The Galaxy Tab is powered by a eWEEK’s Clint Boulton and Nich- 1GHz processor, and the storage olas Kolakowski have been testing capacity is 512MB of ROM, 592MB two iPad challengers, Samsung’s of RAM and 2GB of user memory. Galaxy Tab and Dell’s Streak, and It’s accompanied by a preinstalled have found that when it comes to 16GB microSD card, which supports data input, Android 2.2 benefits from up to a 32GB microSD card. the expanded tablet real estate, even After powering on the Galaxy, I though these units’ respective 7- and was pleased by the crispness of the 5-inch displays seem cramped com- screen, the familiar icons and the vir- pared with the iPad’s 9.7-inch screen. tual keyboard—a much larger version With that said, the smaller displays of the ones I tested on the Motorola- make for devices that are signifi- and HTC-built Android handsets in cantly lighter in weight than the iPad. the last 12 months. The Tab feels What’s more, these Android like an oversized Samsung Galaxy S devices support Flash content, stor- handset, such as the Fascinate, age expansion via SD cards and Captivate, Vibrant or Mesmerize, and user-removable batteries—three One gets the sense of how small the Android smartphones with 4-inch conveniences users are unlikely to Tab is when taking it out of the box. It’s screens and only a virtual keyboard see from Apple any time soon. really not much larger than the HTC Evo as the access point. Samsung’s Galaxy Tab is avail- 4G or the Motorola Droid X smartphone, But this was no 4-inch screen: able from Verizon Wireless for both of which have 4.3-inch displays. Typing anything on this keyboard $599 without a service contract, was fast, and I could use two thumbs with an available $20 data plan three more browser windows to run that yields 1GB per month. Dell’s multiple apps at the same time, just as To read Clint Boulton’s full Streak sells for $300 with a two-year I can do on a desktop PC or netbook. Galaxy tablet review, go to: AT&T contract or $550 unlocked. However, the Galaxy Tab would have tinyurl.com/2dyg67e

20 eWEEK JANUARY 3, 2011 labs@work

to type e-mails and text messages. the process of receiving over-the-air The Streak also offers a front- In my tests, the device’s 4,000 updates to Version 2.2. facing VGA camera. Unlike Apple’s mAh battery typically lasted a whole At 7.7 ounces, the Streak feels iOS, with its comparatively easy day with moderate-to-heavy use— hefty in comparison to 4.5 ounces access to the company’s FaceTime better performance than I’ve come for some Android smartphones. But video-conferencing application, to expect from my Lenovo ThinkPad when weighed against the 3G-enabled Android users will likely need to or Eee PC netbook. What I found Apple iPad at 1.6 pounds, the Streak wait until third-party developers start somewhat annoying was the way feels light. However, with only a exploiting the hardware for their own the Tab’s screen would go dark if video apps. At the left untouched for more than a few moment, there’s a seconds in order to conserve power. lack of ways to use A strong selling point of the Tab the front- and rear- over the iPad, aside from Flash facing cameras in support, is the 1.3-megapixel front combination. camera and the 3-megapixel rear From the home camera. However, even though the screens, users Tab’s cameras worked well enough can use the icons for shooting pictures to be uploaded along the bottom to to the Web, they proved inconsis- access the phone, tent for video. I found video qual- The 5-inch Streak straddles the line between consumer tab- browser or applica- ity for chats via Skype grainy and let and smartphone. In the United States, it retails for $300 tions screens. With pixelated. I preferred using Skype with a two-year AT&T contract, and $550 unlocked. its 1GHz Snap- Mobile on my Droid X, which fea- dragon processor, tures an 8-megapixel camera that’s 5-inch multitouch screen, the first apps sped along with nary a stutter. great for video. impression is more “this is a phone The Streak also supports Adobe If you want a tablet for serious by Dell” rather than “this is a tablet.” Flash 10.1, a competitive differentia- video conferencing, wait for the The touch screen is responsive, tor for non-Apple tablets. Those who iPad 2 or a larger Galaxy Tab. but after months of staring at Sam- operate a Dell ecosystem will appre- sung’s Super AMOLED screens for ciate the ability to sync their multi- Testing Dell’s Streak tablet the Samsung Galaxy S smartphone media and contacts with their PCs, Dell’s Streak is intended to be a line and the Galaxy Tab—as well while those with Google accounts hybrid between a tablet PC and a as Apple’s high-resolution Retina will have the usual Android-enabled smartphone, and that runs the risk of Display—the Streak’s screen came access to Gmail and messaging. disappointing users in each of those off as somewhat dim. For enterprise users, the default roles. The Streak’s 5-inch screen and One of the Streak’s advantages is Streak offers Quickoffice, calen- weighty form factor might prove too battery life. Over two days of moder- dar and integrated GPS leveraging cumbersome for smartphone users. ate use on WiFi networks—including Google Maps for on-the-road navi- On the other hand, those in search Web browsing, video, e-mail, navigat- gation. Syncing Exchange with the of a tablet may find that same 5-inch ing, instant messaging and picture Streak is an exercise in hair-tearing screen too small in comparison to taking—it merely sipped power. aggravation, which is not entirely the Apple iPad and the host of 7-inch The Streak’s 5-megapixel camera unexpected given Android devices’ tablets now hitting the market. is pretty standard-issue for Android inconsistent record in that area. That being said, a subset of users devices. In low-light conditions, the According to Dell, IT administra- will probably appreciate a smaller flash seemed short-range and weak. tors will have the ability to manage tablet that can be carried in one The Streak’s size makes it slightly passwords, remote wipe and per- hand and can also make phone calls. cumbersome as a camera, and the form similar functions with their For those users, the Streak offers a device often needed to be stabilized organizations’ Streaks. ´ solid, fairly standard-issue Android in both hands or against a flat sur- 2.2 experience. Dell’s unit shipped face in order to take a non-blurry To read Nicholas Kolakowski’s initially in August with Android shot. The was the bright full Dell Streak review, go to: Version 1.6, but these devices are in spot here, shooting in 720p. tinyurl.com/2c9aop9

21 tech in-depth

Socializing in the enterprise Social media tools that mimic Twitter and Facebook promise to bring team collabo- ration to corporate users. Getting users and applications connected in a secure, reliable stream can mean the difference between leading and being left behind.

By Cameron Sturdevant integration tools that seek to ease of integration tools and a dearth of tatus update services, interconnection problems, while standards mean that IT managers sometimes called micro- maintaining the fast-flowing and must pay careful attention to a wide blogging, took off in lightweight nature of social media range of integration tools to curtail 2010. A Pew Research interactions. client creep. To this end, there are SCenter study released It’s fair to say that business some emerging efforts that are on Dec. 8 revealed that users aren’t looking for another worth watching. 8 percent of American adults who place to search for the informa- use the Internet also tion necessary Connecting social systems use Twitter. Using to do their job. Jonathan Green, vice president social media tools in And IT man- of information technologies at the enterprise pits agers in larger Den-Mat, a dental-care products open sharing against enterprises company, implemented Chatter as corporate controls. It may encounter part of a broader Salesforce.com also opens a range multiple social rollout. “We chose to implement of integration ques- media platforms Chatter to support our new direct- tions about how best inside a single to-consumer product Snap-On to connect people organization. Smile and to collaborate quickly and applications in What’s the with our vendors, partners and an activity stream best way to use ultimately customers,” he said. that is immediately social collabora- Green implemented Salesforce relevant, secure and tion tools with to replace an aging CRM manage- collaborative. ment application run- IT vendors, includ- ning on its IBM AS400. ing Salesforce.com, ‘we chose to implement chatter The Salesforce installa- Socialtext, Socialcast, to ... collaborate quickly with tion was also integrated Yammer and a host of with a manufacturing others, have taken notice our vendors ... [and] customers.’ component that is still of the social media explo- —jonathan green, den-mat run on premises. Chat- sion by releasing a new ter is used to facilitate wave of social media tools communication between for the enterprise. The big bang partners? Is there a better way to sales and accounting. that is the birth of social media integrate social media and back- Green indicated that Chat- platforms includes the initial end systems? ter adoption has been success- formation of specifications and The answer today is that a tangle ful enough that he may migrate

22 eWEEK JANUARY 3, 2011 tech in-depth

off an existing intranet and use Chatter to support internal collaboration. To connect social media systems to your key applications, vendors such as Cast Iron and a host of others use custom-coded tem- plates and REST (Representational State Transfer) APIs. The good news is that social media tools are no strangers to the integration process. On the consumer side, Facebook, Twitter, LinkedIn and other social platforms can share posts and status updates across platforms. The not-so-good news is that specific integration tools that are built to support specific platforms are the norm today. For example, there is a specific Salesforce.com integration that links Salesforce’s Chatter social collaboration tool with Facebook and Twitter. And Socialtext provides SocialPoint to interoperate with Microsoft’s SharePoint intranet software. When it comes to connecting the social puzzle pieces, REST The Socialcast platform blends social teams with application actions in a unified APIs are the mainstay for posting activity stream. actions such as a status update into another platform’s activity stream. places them into an activity stream spread participation and the need Emerging tools including the Atom that will be read by a person. for corporate data control. To be programming language and JSON One example of this is the inte- clear, these specifications are still (JavaScript Object Notation) are gration provided by Cast Iron, piping hot from the forge. being considered for use in social which uses templates to capture One specification is Activity- platforms to share updates. noteworthy events from a back-end Streams, an effort to enrich data In addition, Socialtext is explor- system (such as an SAP inventory feeds between social platforms by ing a Twitter-supported develop- management system) and releases standardizing the format used to ment called Annotations to han- the data (such as a ship date) into exchange information. dle payloads that are greater than an activity stream that a salesper- In the consumer world, this 140 characters. son will read—all in near real time. means making it easier for plat- IT managers have choices when This bypasses the batch-process forms such as Foursquare to it comes to “socializing” the non- reporting process that traditionally exchange status, comments, book- human elements of a social media would have been used to present marks and news with other sites platform. Unlike classic enterprise this information. such as Identi.ca. process integration, in which data The specification has been is taken from one application and People who need people unevenly adopted among enter- given to another, social integration Two standards are emerging to prise social media tools, but it’s takes specific types of events and manage the tension between wide- useful as an indication of the work

23 tech in-depth

needed to ease information sharing technology decisions could get left profile creation, Salesforce.com’s between platforms. behind when it comes to imple- Chatter recently gained the ability Much of the work in the Activity- menting social media projects. to pull in a user’s Facebook profile Streams specification work seeks to information. avoid manual integration efforts. Securing the socialites After ensuring that the IT basics The use in the enterprise could be As the consumerization of enter- are up to snuff, IT managers who important for connecting actions prise social collaboration pushes are considering a social media inte- that are performed at a particular forward, the commercial-grade gration project must consider the time by either a person or an appli- social platforms distinguish them- security technology used by each of cation—called an actor—against selves from consumer platforms the platforms. According to Sean another person or application— by wrapping security policies that Whiteley, senior vice president of called an object. product marketing at Sales- ActivityStreams also refer to tar- force.com, the Chatter plat- gets such as photo albums. The form explicitly prohibits stream in an ActivityStreams envi- Open ID as a user authenti- ronment is the now familiar feed cation method at this time, of activities for a particular person although he thinks the or social object. While the work standard is a good one for has a decided consumer bent, it’s consumer and “prosumer” clear that the emerging specifica- applications. tion could be used in enterprise Conversely, Matt Wilkin- social media platforms. son, the vice president of Another specification, OStatus, products at Socialcast, is an open specification for dis- said that OpenID is used tributing status updates between Salesforce.com’s Chatter brings together people by Reach, Socialcast’s flag- different social networks. The and activities while also recommending people ship microblogging tool. goal is to enable disparate social and groups that might be of interest to me. Related to the authentica- media hubs to route status updates tion methods used to gov- between users in near real time. As protect corporate secrets around ern who—and what—has access to is typical of the social media space, the activity stream. For IT man- the activity stream is the main ques- both of these specifications are at agers, this means that some of tion of single sign-on. IT managers version 1.0. the most basic infrastructure— should take care to ensure that any In the lightweight spirit of social including the directories that hold social media platform they consider collaboration, the OStatus authors authoritative data about employees implementing has support for the are hoping that the widespread use and contractors—must be in order single sign-on solution already used of RSS or Atom feeds will facilitate for a social collaboration project to in the organization. the spread of OStatus. While the succeed. One of the best ways to pre- specification description refers to In fact, while social media prod- vent a social media platform from general-purpose social networks, ucts are pushing productivity with being orphaned is to ensure that there are opportunities to apply consumerlike crowds, IT basics users can easily access the activity OStatus sharing models to enter- become even more relevant to stream without being burdened prise social platforms. success. A clean, well-maintained with another set of credentials. ´ Further, some of the security directory is necessary to support protocols that enable social sys- the security underpinnings that Technical Director Cameron Stur- tems to talk with one another and control access. devant can be reached at csturdevant the back-end systems are also fresh Almost as important is directory @eweek.com. from the oven, including OAuth information, which is essential for (tinyurl.com/26y9lh8). populating user profile data. In a This story can be found Thus, IT managers who lean nod to the importance of easing online at: heavily on standards when making employee adoption through simple tinyurl.com/2celng3

24 eWEEK JANUARY 3, 2011 quit stalling

Virtual stall.

It happens when virtualization deployments grow fast across an enterprise or across silos. Eventually, you run into scalability issues. It gets harder and harder to map the application to the infrastructure. Visibility diminishes. Process issues multiply.

CA Technologies can help you break through virtual stall and realize the value of your virtualization investment. We offer virtualization management solutions that can help you prioritize applications and measure both physical and virtual performance.

To overcome virtual stall and accelerate real results, visit ca.com

you can

Copyright ©2010 CA. All rights reserved. labs@work

Stealth Zone delivers secure The M500 Stealth Key comes in sizes portable computing ranging from 1GB to 64GB. I tested the $479 8GB model. All models have a REVIEW: The MXI Stealth Zone series of USB- Bluefl y Processor and are FIPS-validated. based computing environments offers a lightweight (M700 Bio) or metal enclosures but highly secure computing solution for govern- (M550 or M700 Bio). ment workers. To set up the M500, I simply needed to insert the device into a By Andrew Garcia representatives expect the devices to Windows PC, which automatically XI Security’s Stealth be available for enterprise customers installs the necessary drivers, just Zone series of USB- sometime in 2011. as it would with an ordinary thumb based computing envi- I tested the 8GB version of the drive. I then received a prompt to Mronments could be M500 Stealth Key, which lists at start the Access Standard software appealing to government workers $479. MXI offers a range of capaci- contained on the stick, which is used looking for a secure, portable com- ties for the M500 model, ranging to individually manage Stealth Keys. puting solution that doesn’t require from 1GB to 64GB in size, as well Using the Access Standard soft- lugging around a laptop or accessing as a range of other models that offer ware, I could set up access pass- a network. biometric fingerprint authentication words for a single user and for These devices, called Stealth Keys, feature a Bluefly Processor and a customizable Windows XP embedded operating system envi- ronment on a single USB stick that looks just like any other USB flash drive. Having this complete, separate and bootable computing environ- ment on a USB stick means that a Stealth Zone user’s files and pro- grams won’t be compromised by infected kiosks or other unmanaged PCs, while the user retains the flexi- bility to take a fully outfitted and cus- tomized application set along. And by fully encrypting the operating system and applications—along with the user’s files and settings—Stealth Zone devices are validated for FIPS (Federal Information Processing Standard) 140-2 Level 3 compliance. At this time, the Stealth Keys On the normal install, administrators can set up the Stealth Key for use by one user. are available only to govern- In the custom menu, administrators can set the stick to support up to 10 users, set ment customers, although MXI the restore password and create password complexity rules.

26 eWEEK JANUARY 3, 2011 labs@work

the device administrator using the environment may be fairly useless installed: Microsoft Office 2003 on normal setup wizard. Using the by default—possibly with no con- top of the Windows XP Embedded alternate custom wizard, I could figured network connections, USB OS with Internet Explorer 7. From also configure the stick to support devices and optical drives, and mini- the preboot environment, adminis- more than one user (all Stealth Keys mal display resolution by default. trators can switch the Stealth Key support a maximum of 10 users), To connect a generic instance to the into a maintenance mode of opera- set the management code needed network, I needed to run a mini- tion that disables the write filters to restore the M500 to a factory adaptation from the Stealth Zone imposed upon the Stealth Key dur- state, or create and enforce pass- applet in the System Tray, which ing normal operations, to add more word complexity rules. takes a couple of minutes to identify software or patches that will be Customers looking to manage and configure any wired or wireless needed for day-to-day use. ´ many Stealth Keys can also look into LAN connections used by the PC. MXI’s Access Enterprise manage- To save time, users should defi- Senior Analyst Andrew Garcia can be ment system, which can be used nitely look into creating hardware reached at [email protected]. to configure and enforce policies profiles for any machines that across a fleet of Stealth Keys. will be commonly used with the Stealth Key. This story can be found Booting issues My M500 test unit came with online at: At this point, the MXI Stealth a meager collection of software tinyurl.com/2vhy3cp Zone should be able to boot any PC, as long as the PC supports booting from a USB device and is configured to do so in the BIOS. Encrypt Stick 5.0 adds portable browser However, I didn’t experience quite the success I expected with my col- ncrypt Stick 5.0 adds a portable Web browser to ENC Security Systems’ lection of test PCs. )fine USB drive security software, ensuring that enterprise customers The Stealth Key was able to cor- can safely browse their corporate Webmail or other Web assets from an rectly boot my Lenovo ThinkPad untrusted PC without leaving telltale cookies and browsing history behind. T400 and a custom-built dual-core As with prior versions, Encrypt Stick 5.0 provides a simple way to encrypt, trans- Athlon PC. However, though my port, and access sensitive files and other data on a USB stick with 512-bit polymor- M1330 was able to phic encryption without the need to install software anywhere. Version 5.0 adds a start the boot process, it ultimately Webkit-based browser on the Encrypt Stick, storing history and bookmarks within failed to fully recognize that the its encrypted vault instead of on the PC. Stealth Key was connected. ENC Security representatives warned me that Private Browser was going to render When working properly, the pages slower than a normal desktop browser—despite marketing to the contrary on Stealth Key boots into a preboot its Website—and the Private Browser certainly lived down to this advanced billing. For environment, whereupon the user instance, I found that while www.eweek.com rendered in Internet Explorer 9.0 in 5 is asked to log in using the same seconds, the same page load took 15 seconds using Private Browser on the same PC. credentials created from Access Another time, an Entertainment Weekly (www.ew.com) home page took 4 seconds to Standard. The user can then choose render in IE, but 30 seconds in Private Browser. whether to adapt the MXI boot envi- I also found that I could not use Encrypt Stick’s Private Browser to directly down- ronment to the PC hardware, creat- load and save attachments or files from the Web to any Encrypt Stick-encrypted ing a profile that’s tailored to the vaults. Instead, I needed to save files to the local PC hard drive or to the public vol- hardware specifics of the machine ume on the Encrypt Stick and then move the file to one of my encrypted stores. in question. Profiles for no longer ENC officials again claim that both these issues will be resolved in forthcoming accessible hardware can be deleted releases, although no timeframe was provided for either fix. from within the advanced section of Released in November, Encrypt Stick 5.0 for Windows can be purchased directly from the preboot environment. www.encryptstick.com for $40. Customers who bought a previous version of Encrypt Without adapting the Stealth Stick can download the upgraded version of Encrypt Stick with Digital Privacy Browser Key to the hardware (called gener- for free. (A longer version of this review is online at tinyurl.com/36gqt83.)—A.G. ic mode), the operating system

27 labs@work Oracle Sun Ray steps up VDI support REVIEW: The first release of Sun Ray software and hardware since Oracle’s acquisition of Sun shows commitment to multimedia virtual desktop workloads. By Cameron Sturdevant Sun) remote desktop services. racle landed a one-two For IT managers who are already punch with releases of using Sun Ray Software, upgrad- new Sun Ray thin-client ing should be a fairly easy process. Osoftware and hardware, SRSS 4.2 (the server software portion) the first upgrade to the desktop vir- installer can automatically upgrade a tualization platform since Oracle’s prior release of SRSS with the new acquisition of Sun. The refreshed features and patches. For organiza- software and hardware include new tions that already use the Windows media, Adobe Flash, audio, USB and Connector, the upgrade process is a multidisplay support. bit more involved. In either case, prior As such, Oracle is joining the users of SRS should have little trouble VDI (virtual desktop infrastructure) implementing the current version. battle for the eyes and ears of enter- prise users. VMware with its PCoIP, Tested on Solaris 10 Citrix with HDX and Microsoft with I tested SRS 5.1 on a Solaris 10 RemoteRX are all boosting the audio virtual machine hosted in a VMware and visual performance characteris- vSphere 4.1 environment using tics of hosted desktop systems. Oracle Lenovo server hardware. I connected hopes that Sun Ray Software (SRS) to the SRS 5.1 setup using the lat- 5.1 will be paired with the improved est Sun Ray 3i all-in-one 21.5-inch Sun Ray clients for users who want a thin-client and Sun Ray 3 standard premium hosted desktop experience. thin-client devices. Oracle isn’t the only VDI maker Using the SRWC 2.3 connection The Sun Ray 3 is a small-footprint thin- that depends on specialized hard- infrastructure, I was able to use the client device that supports secure con- ware to get enhanced graphics and nections and uses an external monitor newly enhanced audio and USB redi- multidisplay graphics support. to run a line of no-frills workloads. rection, and I also saw the improved VMware PCoIP requires Teradici- Adobe Flash media playback fea- equipped displays to take full The two main components are Sun tures. I used the audio input support advantage of PCoIP. Thus, while Ray Server Software (SRSS) Version to send input from a microphone virtual desktop technology is clearly 4.2 and Sun Ray Windows Connec- connected to a Sun Ray 3i. The audio advancing, IT managers who want tor (SRWC) Version 4.2. and USB redirection services are to support workloads that go beyond Both components are incremental welcome capabilities to SRS 5.1, run-of-the-mill word processing and improvements over their respective but they don’t stand out from the order entry will need to factor in the predecessors. Neither sets new stan- efforts competitors are making to cost of specialized hardware. dards for remote access solutions, bring high-performance graphics SRS 5.1 is actually a package of but both are well-appointed and and audio and video performance software components, each with a worthy of consideration in enter- to the remote desktop. separate name and version number. prises that use Oracle (formerly Many of the enhancements made

28 eWEEK JANUARY 3, 2011 labs@work

As is typical of Sun-originated equip- ment, the Sun Rays are designed to work out of the box only with the Sun virtual desktop environment. This means that employees of nearly any technical skill level can deploy the hardware, which involves simply plugging in the appropriate net- work, keyboard and mouse cables. Once the connections were com- pleted, I just tapped the touch- sensitive power button, and the Sun Ray 3i automatically searched for the Sun Ray Server on the local network. The devices automatically Sun Ray Software 5.1 adds incremental support for hardware clients, including fi rm- updated to the most current firm- ware upgrades and more control over systems operating as kiosks. ware version and almost immedi- ately presented a desktop and log-on to SRS 5.1 are aimed at support- The Sun Ray 3 is a small form credentials screen. ing remote Windows 7 desktops and factor thin-client device that con- The Sun Ray 3 thin client, shipped remote desktops that run on Win- nects to an external monitor, key- at the same time as the 3i, is a no- dows Server 2003 R2 and Windows board and mouse. The Sun Ray 3i nonsense workhorse thin client for Server 2008 R2. I used Windows is an integrated, beautiful, 21.5-inch line-of-business workloads. The Server 2008 R2 to share USB storage wide- screen thin client with 1,920- Sun Ray 3 is small, slim and clearly devices among multiple clients in my by-1,080 display resolution. Both designed to withstand wear and tear test infrastructure. Aside from sharing are zero-management systems that in work environments from the the USB device, there was no other are specifically designed to integrate shop floor to public kiosks. special setup required on my part to with Oracle’s Sun Ray server soft- With a U.S. list price of $249, the make the device available for use. ware. Sun Ray 3 comes with four USB 2.0 During tests, it was common for me The Sun Ray 3i is the more inter- ports and one each of 10/100/1,000 to make changes that disconnected my esting of the two devices. The all- Ethernet, serial and DVI-I ports on Windows sessions. New in this ver- in-one unit, which has a U.S. list the back. There are two USB 2.0 sion of SRS 5.1 is an auto-reconnect price of $699, started shipping in ports, a smart-card slot and audio feature that automatically reconnected October. The Sun Ray 3i is simple to connectors on the front of the unit. my Sun Ray clients to the running deploy and includes plenty of design As is typical with premium thin- Windows session without a hitch. smarts to go along with the durabil- client devices, including the Sun Organizations that are using Sun ity and simplicity that I saw during Ray 3i, there are no fans or moving Ray 3 series clients will like the fact my tests at eWEEK Labs. The back- parts in the Sun Ray 3. that SRS 5.1 automatically upgrades panel cable-management cover is The Sun Ray 3 worked fine as a the firmware on these devices to magnetically mounted for easy, tool- virtual desktop display terminal and bring them up to date for use in an less access to connectors and cables. should fit in well where order entry, SRS 5.1 environment. The Sun Ray 3i is equipped with public kiosk or standard word process- five USB 2.0 ports, serial and analog ing workloads are the order of the day. ´ Sun Ray hardware video out and audio in/out ports, and The newly revamped Oracle Sun a 10/100/1,000 Ethernet port. My Technical Director Cameron Sturdevant Ray 3 and 3i thin-client systems carry test units were shipped with easily can be reached at [email protected]. on the Sun strategy of making easy- adjusted stands. The Sun Ray 3i can to-deploy hardware that supports also be used with a VESA-compliant Two stories on this topic can a variety of user virtual workloads wall-mounting system. be found online at: while maintaining central, secure I used the Sun Ray 3i and Sun tinyurl.com/33pfe3c and control over desktop systems. Ray 3 in my SRS 5.1 environment. tinyurl.com/35cwepg

29 labs@work

by installing the newest refer- ence driver provided directly from AirMagnet Survey Nvidia’s Website. AirMagnet officials reported conflicts with Pro 8.0 speeds WiFi a handful of Nvidia drivers in the past, so wireless administra- tors experiencing similar prob- network planning lems should consider video driver updates as a potential resolution. REVIEW: Survey Pro 8.0 adds multiadapter sup- Breaking barriers port, customized reports and real throughput heat Survey Pro 8.0 breaks the multi- maps to AirMagnet’s survey and planning software. sensor barrier, adding the ability to use two sensors concurrently in order to perform multiple types By Andrew Garcia While Survey Pro 8.0 worked of survey scans at the same time. irMagnet Survey Pro 8.0 flawlessly on one test machine, it While Survey Pro 8.0 may be used adds multiadapter sup- crashed frequently on the other. with any combination of adapters port and real throughput That necessitated a system reboot suggested in the documentation, Acoverage heat maps to each time to get the application AirMagnet recommends using its help administrators understand going again. new multiadapter kit to ensure WiFi coverage better and faster. consistent results due to However, hardware interoperability antenna placement and sen- could be of concern to some users. sor type. AirMagnet, a Fluke Networks It’s basically the same company, updated its Survey Pro kit that’s sold for use with product to include support for Analyzer Pro: a five-port two concurrent sensors, theo- USB hub that can be taped retically allowing administrators to the back of a laptop to complete surveys faster and screen with Proxim 8494-US cheaper. And new features such 802.11a/b/g/n USB sticks. as the throughput heat map and However, the Survey Pro customizable reports provide bet- kit comes with two Proxim ter understanding of real network USB sticks and costs $345, conditions out on the floor, with since Survey Pro supports more manageable tools to help only two adapters for use document and quantify those at one time. findings. Using multiple sensors Survey Pro 8.0 costs $3,995, but allowed me to complete the customers using previous versions survey work in less time of Survey Pro that have an up-to- with fewer passes walking date support contract may upgrade AirMagnet supports two adapters for use as sensors through the halls, as I could to the new version for free. Like in Survey Pro 8.0. AirMagnet sells a kit, including conduct different types of AirMagnet WiFi Analyzer Pro 9.0, two Proxim 802.11a/b/g/n adapters and a USB surveys simultaneously and which was released at the same hub, for $345. could look at different radio time in November, Survey Pro 8.0 AirMagnet engineers traced the bands at the same time. works on machines running 64-bit problem to a conflict with an out- Survey Pro 8.0 offered three Windows operating systems. dated Nvidia video driver. I had types of scans: a passive scan I tested Survey Pro 8.0 on two the latest driver provided by the that looks at signal strength from machines, each running a 64-bit laptop manufacturer installed, but access point beacons, an active version of Windows 7 Ultimate. AirMagnet resolved the problem scan that measures coverage when

30 eWEEK JANUARY 3, 2011 labs@work

associated with a specific network and an active iPerf scan that mea- sures the throughput performance of an associated network. Wireless network planners can also conduct surveys tailored toward voice over WiFi perfor- mance, as long as they have a copy of AirMagnet’s VoFi Analyzer installed on the same machine. (I did not have a license for VoFi Analyzer and was unable to test this functionality.) AirMagnet does not currently offer a version of VoFi Analyzer for 64-bit operating systems, so this feature is currently available only to survey PCs run- ning 32-bit operating systems. Restrictions on scans There are limitations on which types of scans may be run at the same time. While I could run two active surveys or two passive sur- veys simultaneously, if I performed an active iPerf session, I could run only a passive scan on the sec- ond sensor. Apparently, this same restriction applies when running With Version 8.0, I could conduct active and passive surveys at the same time. Here, one VoFi scan as well. we see the survey process midstream, as I walk and point my way around the build- Conceived to do basically what ing, collecting WiFi signal information. Meru does through its E(z) RF Service Assurance Module via a levels, the measured bandwidth Custom templates include person- walkabout tool rather than through performance up and down, and the alization options, such as letting a the infrastructure itself, the iPerf measured PHY data rates for every company change the text provided survey measures real throughput location along my survey path. in report headers, change the logo obtained over the WiFi network. However, the in-application help and add custom contact details. The results generated a coverage documentation about using iPerf, On the content side of things, heat map designed to show wire- which requires another PC on the administrators can change or omit less administrators exactly what network to act as the iPerf server, the introduction or methodology data rates and real throughput per- is in obvious need of updating: sections and customize technical formance will be at any point sam- The instructions include outdated details contained within the report pled during a survey walkabout. and nonoperational links to the to better match network design and This allowed me to better under- software and instructions needed performance objectives. ´ stand how 802.11n bells and whis- to perform the test. tles, such as spatial multiplexing In addition to previously avail- Senior Analyst Andrew Garcia can be and beamforming, translate into able canned reports—such as cov- reached at [email protected]. actual performance within my erage by network name, access campus and building. On the heat point or channel—Survey Pro This story can be found map found on the display tab, I 8.0 lets administrators create and online at: could view the signal and noise customize their own templates. tinyurl.com/35xbcnl

31 labs@work Ekahau Mobile Survey troubleshoots WiFi networks REVIEW: Ekahau Mobile Survey delivers a promising WiFi survey tool to Android smartphones and tablets, but it’s limited by the pool of hardware on which it can be used. By Andrew Garcia kahau Mobile Survey for Android-based smart- phones and tablets delivers Ea promising foundation for an easy-to-use WiFi troubleshooting, assessment and planning tool. How- ever, current limitations in the pool of hardware on which the product can be used—along with feature depen- dencies on more expensive Ekahau products—could limit its appeal. In my tests, I found Mobile Survey best at identifying the weakest points in a network, calling attention to places lacking coverage that’s up to snuff with the network’s design objectives. However, Mobile Survey is not the best choice for obtaining a complete pic- ture of the highs and lows of network coverage and performance. According to Ekahau representa- Left: I could set Android to show the Mobile Survey widget on the home screen, dis- tives, Android was the only feasible playing detected signal strength, data rate and connected AP for actively surveyed choice on which to deliver its new networks. I could also start and stop background monitoring from the widget. mobile-device-borne WiFi assess- Right: Active survey results are compared against a baseline template organized ment tool because there are numer- toward the particular network’s design objectives. Users can see by the color code ous devices on the market and lots of if one criterion fails to meet the baseline. consumer uptake. They added that the iPhone WiFi API was not open now for $299, is not available for pur- OS 2.1 or higher, the experience is or accessible for application devel- chase through the Android Market. optimized for devices with at least a opment, and BlackBerry’s market Instead, users will need to configure 480-by-800--resolution screen. potential seemed too much on the the phone to accept software from However, Ekahau’s Website explic- decline. Additionally, the Windows non-Market sources, then purchase itly warns that Android devices for mobile story was in too much flux: and download the code from https:// AT&T won’t work with Mobile Site Windows Mobile was all but gone shop.ekahau.com. Survey due to the carrier’s require- from the market, and Windows I tested Mobile Survey on a Sam- ment to block non-Market applica- Phone had not yet proved to have sung Vibrant for T-Mobile. Though tion sources. The full list of currently legs or consumer appeal. Mobile Survey should work on most supported devices can be found at Mobile Survey, which is shipping Android devices running Android tinyurl.com/37qzmr4.

32 eWEEK JANUARY 3, 2011 labs@work

Active and passive surveys 5GHz. Ekahau representatives say Mobile Survey conducts both active this limitation isn’t on the software and passive WiFi surveys, conducting side, and if the hardware supports the active assessment against the con- 5GHz—as the Samsung Galaxy Tab nected WiFi network as configured in does—then Mobile Survey will, too. Android’s WiFi Settings tool. There’s no link between the application and Background scans the WiFi Settings tool, making it Mobile Survey can conduct a bit annoying to reconfigure the scans while the application is in device to survey a different network. the background on Android, as I The results of a passive survey— could easily trigger a background shown on the AP (access point) scan by pressing the Play icon on tab—present the MAC addresses, net- the Test tab before switching to a work name, channel, detected signal different application. strength and wireless security protocol It also delivers an Android wid- used for each detected network. These get that can be used to start back- features are common to most free or ground scanning from the oper- cheap WiFi stumbling tools. ating system’s home screen. The When used in conjunction with an nifty widget also shows the con- active scan to a configured network, nected AP, along with the detected Mobile Survey does try to classify signal strength and data rate for rogue APs. It shows the associated Mobile Survey comes with fi ve default the connected network. and therefore trusted network in Requirement Profi les, which are used to The product can present network green, with other SSIDs (service set defi ne the baselines. maps as well, but only through inte- identifiers) sourced to the same MAC gration with Ekahau’s Site Survey address as the trusted network shown nectivity, Web/E-mail, Voice over WiFi, software for PCs. Once users copy in black. All other detected networks High Speed Connectivity and Location over Site Survey-generated ESX files are considered rogue and shown in Tracking. By default, the Voice over to Android via a MicroSD card, they red. With no network connection for WiFi profile is less forgiving of packet should be able to view the floor plan an active survey, all detected networks loss and delay, while the High Speed and access-point placement, with are then considered rogue. profile looks for higher data rates. I the ability to tap on an AP to see The active survey functionality could fine-tune the parameters for each hardware and configuration infor- offers a little more utility for the buck, criterion in any profile to better meet mation, along with detected WiFi periodically sampling the associated my network design objectives. survey results for that device. How- network to present signal strength, Data rate assessments provided by ever, I didn’t have a copy of Site Sur- data rate, packet loss, round-trip delay Mobile Survey do need to be taken vey on hand, so I wasn’t able to verify and detected rogue signal strength. with a grain of salt, as the measure- that functionality. On the Test tab, the detected levels are ments will show the best effort of To help customers extract the then compared against baselines for the client used in the Survey rather maximum benefit from Mobile each of those metrics as defined in a than the possible rates delivered by Survey, Ekahau offers slightly dis- Requirement Profile, which allowed the network. This is because the counted bundles of Mobile Sur- me to easily see how the performance typical Android phone offers a mini- vey and Site Survey Professional of a real device in the field com- mal 802.11n design. For instance, for the much weightier price of pares to the design objectives for the my Vibrant supports a single $4,695. ´ network in question. stream for a maximum data rate of Performance violations against 65M bps (MCS 7). Senior Analyst Andrew Garcia can be the baselines are noted on screen on Also, for the bulk of potential reached at [email protected]. the Test tab—and recorded within users, Mobile Survey will only pull the log tab as well—for later analysis. in information about the 2.4GHz This story can be found Mobile Survey comes with five pre- band, simply because the majority online at: set Requirement Profiles: Basic Con- of Android devices don’t yet support tinyurl.com/354cleg

33 labs@workcommentary Socializing the enterprise Social collaboration tools are poised to increase productivity if implemented in a way to prevent silos. Cameron Sturdevant

ill social media spell the end of don’t want another communication stream on the e-mail in the enterprise? It’s cer- desktop. Adoption of social media tools isn’t just a tainly not the first time this ques- matter of training users to implement a new tool. tion has been posed, if you substi- Users want to know that the effort they put into tute groupware, wiki or intranet for social media. a social media platform is going to provide some E-mail—like the mainframe and Windows XP— immediate payoff. Being marooned on a social likely has a long life ahead of it. But it’s not an media island is a threat that users want to avoid. irrelevant question this time around. And e-mail sets a very high performance and reli- A study commissioned by Skype and conducted ability bar against which any other communication by Incites Research shows that e-mail usage is set tool is measured. One reason e-mail chains get out to decline slightly in 2011, although the same study of control is because there is nothing quite so good shows that e-mail is one of the two indispensable at covering your hindmost parts as an e-mail. And communication methods. More than 90 percent almost every business circumstance has a widely of people in the workplace use e-mail, compared known and well-understood e-mail workflow. Even with fewer than 40 percent e-mail’s biggest problems— of workers who use social ‘will social media spam and volume—are media tools. fenced in with preventative The better way to ask the tools open a new tools and established best- question, however, is, “Will practice guidelines. social media tools open a wave of user When networks were new wave of user produc- productivity?’ unreliable, store-and-for- tivity?” I pose the question ward tools modeled on the this way to suggest that IT physical postal system were managers should be looking a huge step forward in aid- at how social media tools ranging from Salesforce. ing business communication. These limitations com Chatter to Socialcast or Socialtext can help no longer apply. set the stage for a productivity boost in their The benefits of breaking out of the e-mail silo enterprises. are real for organizations that can make the jump. At eWEEK, we’ve covered social media tools Transparent, controlled, secure collaboration tools for the last couple of years. In those examinations are available today. An e-mail-only communica- we looked at the pros and cons of what was then tion stream imposes a curtain that technology an emerging technology. What’s changed in the can draw back. intervening time is the wildfire spread of social Reliable networks, socially savvy users and an media adoption among consumers. unforgiving economy have all set the stage for an The growth of Facebook and even Twitter among evolution in business communication. IT manag- a growing number of workers is joining a number of ers should lead the way in outfitting organizations other trends that are shaking up traditional IT con- with the collaborative tools that both speed up and trol over how we work. Bringing your own device, a increase the value of insider communication. ´ tsunami of mobile device models and the upheaval in mobile computing operating systems are all Technical Director Cameron Sturdevant can be co-factors that are forcing IT to accommodate new reached at [email protected]. ways of doing business. While skirting the constraints of e-mail can be This story can be found online at: exciting, it’s also clear that most knowledge workers tinyurl.com/393vrtl

34 eWEEK JANUARY 3, 2011 labs.eweek.com

Log on NOW and get:

Independent reviews of IT products and services in the context of real-world concerns

Insight on product evaluation, selection, implementation and maintenance from your IT peers

The opportunity to contribute to eWEEK Labs’ testing methodologies, to ensure that products and services are being evaluated in a way that is meaningful and relevant to busy enterprise IT pros

The chance to contribute your own comments, suggestions and even product reviews

Access to a rich database of IT product information and specs

go to: labs.eweek.com Gawker theft a wake-up call labs@workcommentary Underestimating your own vulnerability is a recipe for disaster. P. J. Connolly

ell, my holiday plans saw a new use on more than one site. “Easy to remember, item move to the top of my to-do hard to guess” describes these, and they’ll hold up list. Because I was lazy and Gawker against a dictionary attack, although I reckon that Media was sloppy, I had to deal anyone who really wanted to crack them would with the “pleasant” task of sweeping through my do so—probably sooner rather than later. password collection. It’s a lesson for anyone whose Although I should have known better, I made livelihood depends on secure systems remaining the mistake of changing my Gawker password to that way. one of my garden-variety passwords during one of The big story was that over the weekend of the site’s occasional authentication hiccups earlier Dec. 11-12, Gawker admitted in a post on its this year. I’d meant to get around to resetting it to various sites—which include , , something fairly obscure, but didn’t. , , Jalopnik, , and Life- Now, I’m paying for my laziness by going through hacker, as well as Gawker itself—that its central three or four devices, trying to figure out where I password database had been compromised. It might have used the ID and password combination seems that the Gawker IT that was in the Gawker data- organization had used the base. A group calling itself long-obsolete DES (Data ‘by midday of dec. Gnosis is claiming respon- Encryption Standard) to 12, almost 200,000 sibility for the theft of the encrypt the password store, password data- had ignored at least a month’s user ids and base, and reports indicated worth of warnings that some- that by midday of Dec. 12, thing fishy was going on, and passwords had almost 200,000 user IDs and had let its production servers been cracked.’ passwords had been cracked get about three years behind and posted in a torrent for the on kernel patches. In short, entire world to see. the company’s IT crew had utterly failed at its job. The only thing I can claim to have done right is This would amount to dereliction of duty in to use more than one ID for my personal business, any IT organization with pretenses to credibility. and to keep my business e-mail traffic separate But since the editors of the main Gawker site from my personal e-mail. Although I’m going to have, in effect, dared anti-organizations such as be extra careful about my identities and passwords Anonymous and 4chan to come after it, one has to for a long while, I don’t feel like much of a chump. compare the behavior of Gawker Media’s editorial After all, I’m not the Gawker employee who and IT staff to the kind of idiot who climbs into encrypted the passwords using an insecure the lion pen at the zoo and is surprised by the method. I’m not the Gawker IT manager who extent of the resulting injuries. blew off three years’ worth of kernel patches. As of the afternoon of Dec. 13, the company And I’m not the Gawker leaders who dared the seemed to be placing as much of the responsibil- Internet to hack away. Those are the people who ity on those users who chose weak passwords look like chumps. ´ (which included Gawker founder Nick Denton’s “24682468,” or the word “password” used by Senior Technical Analyst P. J. Connolly can be reached almost 2,000 accounts) as it did on its IT staff, who at [email protected]. created the conditions that were so easily exploited. Of course, I failed as well. As do many people, This story can be found online at: I have a few medium-strength passwords that I tinyurl.com/2vxxuhb

36 eWEEK JANUARY 3, 2011 Reach. Connect. Engage.

Delivering the IT buyers marketing craves, the qualifi ed leads sales demand and the fi nancial performance CEOs require.

Da a ategic Service r St s urpassed MarketExpertis s Un e amic Databas n Dy e

Depth ReportingandAnalytic - In s ld ClassConten r Wo t

For more information, email [email protected] or visit www.ziffdavisenterprise.com BLOG IS MORE CYBER-SECURITY of REGULATION THE ANSWER? survey of critical infrastructure companies by Enter- best Aprise Strategy Group reported that the companies with the most industry regulations to address tended to have . com better security practices, something that did not strike me eWEEK as all that surprising. What did strike me as somewhat surprising are some of the things people agreed that the government should do in regard to cyber-security. STORY According to the survey, which fielded answers from APACHE BLASTS ORACLE 285 security pros, 39 percent said the government AND QUITS JCP should “enact more stringent cyber-security legislation along the lines of PCI.” Thirty-two percent believed the ather than lighting a peace pipe, the Apache Software government should create legislation with higher fines RFoundation has shot an arrow at the Java Community for data breaches. Process and quit the JCP executive committee as a result of “My guess is that they want to codify a set of strict the recent JCP EC vote approving the road maps for Java SE requirements and controls into a single universal regula- 7 and Java SE 8. The JCP’s executive committee passed the tion,” said Jon Oltsik, Java Specification Requests (JSRs) for Java Platform, Standard an analyst with Enter- Editions 7 and 8 (JSRs 336 and 337, respectively) by a vote of prise Strategy Group. 12 to 3. Voting against the ratification of the new specifications “Remember that these were Apache, Google and individual EC member Tim Peierls, organizations do elec- who resigned from the Java SE/EE executive committee. Doug tronic business with less Lea, another independent member, also resigned from his post. secure firms that could At issue is Oracle’s refusal to provide a technology com- compromise their secu- patibility kit (TCK) to the ASF for its Harmony open-source rity as well. The current implementation of Java and the Oracle-sponsored JCP EC landscape is made up of security ‘haves’ and ‘have nots,’ sanctioning the situation by ratifying the JSRs along with the which makes us all less secure.” “field-of-use” restrictions that limit Harmony. Despite voting In his testimony before the U.S. Senate committee on “yes” for the Java 7/8 JSRs, six EC members (SAP AG, IBM, Homeland Security and Government Affairs on Nov. 17, Mark the Eclipse Foundation, Red Hat, Credit Suisse and individual Assante, president and CEO of the National Board of Infor- member Werner Keil) voiced concerns about the licensing mation Security Examiners, said new regulations are needed restrictions—but not the technical content—of the JSRs. to provide risk-based performance requirements that dis- Six other EC members (Oracle, HP, Ericsson, Fujitsu, VMware courage what he called a “predictable and static defense.” and Intel) voted “yes” with no comment. On one hand, regulations can serve as a solid baseline for ASF President Jim Jagielski told eWEEK, “The results of security; on the other, they can serve as false indicators if the Java7/8 JSR votes ... mean that the EC has approved security is reduced to filling out a compliance checklist. a major fundamental JCP specification which, along with The call for better regulation was loudest among busi- its TCK license, makes distribution of a tested, compatible nesses that are already heavily regulated. Fifty-seven implementation impossible under any open-source license. percent of companies dealing with three or more compli- “They allowed a JCP member [Oracle], which openly ance regulations said they want more stringent cyber- ignored the letter of the law as well as the repeatedly stated legislation, compared with 31 percent of firms that must intent of the community, to do it again, at the expense of a meet less than three compliance mandates. fellow EC member and the Java community at large. The What all this shows, Oltsik said, is that businesses refusal to vote ‘no’, in fact, was tacit approval.” know what’s working and what’s not. To read the full story, go to tinyurl.com/35cbrq7. tinyurl.com/32uz6ma

38 eWEEK JANUARY 3, 2011 STORY are properly assigned, “sensitive information doesn’t WIKILEAKS AND CHANGING get into the wrong hands.” The U.S. Office of Management and Budget has GOVERNMENT SECURITY ordered each agency that handles classified informa- tion to perform a security review of its procedures. In s cables continue to trickle out of WikiLeaks, it response, the U.S. Department of Defense will “rethink Aappears that both WikiLeaks and the United States computer security procedures and change its policies in government have learned some hard lessons. a revolutionary way,” said Pace University’s Hayes. “Previously with security breaches, the focus has At the moment, the changes involve banning all been on the outside threat,” said Darren Hayes, com- removable devices on classified systems. The DoD said puter information services program chair at New York’s there will be other changes coming, such as a network Pace University. He added that in the past, there hasn’t monitoring solution that will identify anomalous network been “enough mention of internal threats.” activity and changes in how data is transferred between The WikiLeaks debacle essentially boils down to an classified and unclassified computers. insider data breach, according to Hayes. As a result, orga- For WikiLeaks, the question is no longer about whether nizations and the federal government are now reviewing it will get shut down soon; it’s about money. Instead of their policies to prevent similar breaches in the future. a single DNS provider, the site now has a round-robin As for U.S. military analyst Army Private Bradley setup of at least 14 DNS providers directing traffic to its Manning, the one suspected of leaking the cables to several domain names. WikiLeaks, “He simply had too much access to sensi- Despite losing the wikileaks.org domain name, Web tive government information,” said Thom VanHorn, vice hosting, ongoing denial-of-service attacks and getting president of global marketing at Application Security. He blacklisted by some countries, the site remains up, bol- added that if employees “only have access to the infor- stered by nearly a thousand mirror sites worldwide that mation necessary to do their jobs” and access privileges are keeping the content online. But PayPal, MasterCard and Visa have suspended accounts, and Switzerland’s PostFinance suspended one SLIDESHOW of the bank accounts set up for founder Julian Assange’s Chrome OS legal bills. Even though PayPal released all the funds to the foundation raising funds for the site, it said the for Netbooks accounts will remain inaccessible. The bills are going to mount, and the site needs a legal fund for when the United States lawyers come knocking. U.S. Attorney General Eric Holder has made no secret of his desire to prosecute Assange. To read the full story, go to tinyurl.com/335mm9r.

SLIDESHOW 25 Facts About Intel This slideshow provides a rundown of 15 fea- tures of Google’s Chrome OS for netbooks. The Intel has developed the computational architecture netbooks running this OS will be available in underlying arcade games and industrial electronics, as mid-2011. Google also announced the formal well as PCs. The tablet PC and mobile markets are also launch of the Chrome Webstore, which has more in the company’s sights. In addition, its researchers than 500 Web applications for Chrome OS net- have focused on ultra-wired homes, robot butlers and books—and, eventually, for Chrome OS tablets. more efficient cloud computing. This slideshow details 25 facts about Intel’s history and current workings. tinyurl.com/3ahfhl8 tinyurl.com/32h7jhq

39 products to watch

eWEEK editors recommend new Fortinet’s FortiMail-3000C hardware, software (IWMKRIHXSHIPMZIV WIGYVIIQEMPTVSGIWWMRK and services that MRGSVTSVEXIQIWWEKMRK enterprise IT decision- IRZMVSRQIRXW*SVXMRIX´W *SVXM1EMP'MWELMKL makers should have WTIIHQIWWEKMRKWIGYVMX]ETTPMERGIXWYTTSVXWYTXSYWIVW[MXLEWMRKPI on their radar. W]WXIQERHMWWEMHXSSJJIVETIVGIRXTIVJSVQERGIMQTVSZIQIRXSZIVMXW TVIHIGIWWSVW8LI*SVXM1EMP'MWWYMXIHJSVPEVKIIRXIVTVMWIWGEVVMIVWERH ETTPMGEXMSRWIVZMGIERH7%%7 WSJX[EVIEWEWIVZMGI TVSZMHIVWIWTIGMEPP]XLSWI WYFNIGXXS4'(77SV,4%% ,IEPXLRWYVERGI4SVXEFMPMX]ERH%GGSYRXEFMPMX] %GX VIKYPEXMSRWMRXLIVIXEMPTE]QIRXJMRERGMEPERHLIEPXLGEVIMRHYWXVMIW8SLIPT IRWYVIXLIWIGYVIHIPMZIV]SJGSRJMHIRXMEPSVVIKYPEXIHGSRXIRXXSGYWXSQIVW TEVXRIVWERHIQTPS]IIWXLIETTPMERGISJJIVWHIRXMX]&EWIH)RGV]TXMSR &)  [LMGLIREFPIWIRGV]TXIHQIWWEKIWXSFIWIRX[MXLSYXXLIRIIHJSVER]YWIV TVSZMWMSRMRKSVEHHMXMSREPLEVH[EVItinyurl.com/38pbgdf

Gizmox’s Visual WebGui 6.4 8LI:MWYEP;IF+YMJVSQ+M^QS\MWHIWMKRIHXSFIEVMGL RXIVRIXGPSYHERH7%%7ETTPMGEXMSRTPEXJSVQXLEXI\XIRHW 2)8HIWOXSTTS[IVXSXLIRXIVRIXMRXIVQWSJHIZIPSTQIRX Ragic Builder ERHYWIVI\TIVMIRGI%GGSVHMRKXS+M^QS\:MWYEP;IF+YM 6EKMG&YMPHIVMWHIWMKRIHXSIREFPIXLI WEZIWYTXSTIVGIRXMRXLIHIZIPSTQIRXTVSGIWWSJHEXE HIZIPSTQIRXSJ;IFFEWIHHEXEFEWI GIRXVMGETTPMGEXMSRWJSV7%%7;IFSVGPSYHF]EPPS[MRKXLI ETTPMGEXMSRWMRQYGLXLIWEQI[E]XLEX YWISJ;=7;=+XSSPWERH:&PMOIHIZIPSTQIRXTVEGXMGIW WTVIEHWLIIXWEVIGVIEXIH°YWMRKEWTVIEH SV<%10FEWIHTVSKVEQQMRKXEPWSJSWXIVWGYWXSQM^EXMSR WLIIXJSVQXSJMPPSYX6EKMGGPEMQWXSLEZI ZMETSMRXERHGPMGOHIWMKRXSSPWXLEXGERIPMQMREXIXLIRIIH HIZIPSTIHEYRMUYIERHJPI\MFPIHEXEFEWI XS[VMXI,810'77ERH.EZE7GVMTX:MWYEP;IF+YMMWWEMHXS IRKMRIXLEXGERWYTTSVXER]HEXEWGLIQE EPPS[XLI2)8[E]SJHIZIPSTQIRXJSVGVIEXMRKTS[IVJYPYWIV [MXLSYXGVIEXMRKER]HEXEFEWIXEFPIW*IE MRXIVJEGIWXLEXVYRSRWXERHEVHFVS[WIVWERHQSFMPIHIZMGIW XYVIWGSQQSRP]RIIHIHMRIRXIVTVMWI [MXLSYXER]TPYKMRWtinyurl.com/39j4ruv HEXEFEWIETTPMGEXMSRWEVIEYXSQEXMGEPP] ETTPMIHXSETTPMGEXMSRWGVIEXIHSR6EKMG tinyurl.com/2wqyyja

40 eWEEK JANUARY 3, 2011 products to watch

Adobe’s LiveCycle ES2.5 %HSFI0MZI']GPI)RXIVTVMWI7YMXI )7 MWWEMHXSHIPMZIVE WYTIVMSVGYWXSQIVI\TIVMIRGIF]I\XIRHMRKXLIZEPYISJI\MWXMRKFEGO IRHW]WXIQWERHIREFPMRKHIZIPSTIVWXSFYMPHERHHITPS]ETTPMGEXMSRW UYMGOP]XMWHIWMKRIHXSIQTS[IVFYWMRIWWYWIVWXSQEREKIETTPMGEXMSR IRZMVSRQIRXWFEWIHSRXLIMVWTIGMJMGRIIHW%GGSVHMRKXS%HSFI[MXL 0MZI']GPI)7YWIVWGERFIXXIVMRXIVEGX[MXLMRJSVQEXMSRXLVSYKL MRXYMXMZIYWIVI\TIVMIRGIWMQTVSZIHIJJMGMIRGMIWZMEFYWMRIWWTVSGIWW EYXSQEXMSRERHIRLERGIHGYWXSQIVWIVZMGIXLVSYKLTIVWSREPM^IH GSQQYRMGEXMSRWQEREKIQIRX tinyurl.com/3y5ys7e

PBworks Customer Relationship Edition 8LI4&[SVOW'YWXSQIV6IPEXMSRWLMT)HMXMSR WYTTPIQIRXWXVEHMXMSREP'61WSPYXMSRWF]TVSZMH MRKEGYWXSQIVJEGMRKIRZMVSRQIRXJSVZIRHSVW ERHGYWXSQIVWXS[SVOXSKIXLIVSRFSXLTVIWEPIW HSGYQIRXWLEVMRKGSSVHMREXMSRERHRIKSXME QuickBooks Enterprise Solutions 11.0 XMSR ERHTSWXWEPIW TVSNIGXVSPPSYXWYTTSVXERH RXYMX´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tinyurl.com/33xyay9 UYMGOP][MXLZMVXYEPP]RSPIEVRMRKGYVZISVHS[RXMQI *IEXYVIWMRGPYHIEHZERGIHMRZIRXSV]IRLERGIHFYMPX MRVITSVXWFEPERGIWLIIXWF]GPEWWX[SGSQTER]JMPIW ERHGYWXSQVITSVXMRKtinyurl.com/2v5chbd

To submit a new or newly updated product for consideration, please visit labs.eweek.com and look for the “List your products” link at the upper-right corner of the page. 41 critical testing Enterprise criteria: microblogging

Here’s what to look for when evaluating enterprise microblogging services or features. BY JASON BROOKS

Enterprise microblogging services grate with your existing directory services integration with all an organization’s appli- can offer an organization’s users a new to ease user provisioning and deprovision- cations and collaboration networks, it’s way of collaborating with one another, ing. Also, evaluate these services’ capabili- important that these services offer APIs of keeping tabs on important company ties for providing single sign-on support, to enable company developers to take information and of staying up-to-date such as through SAML or OpenID. care of required integration operations. on the activities of partners, customers and others outside the organization. FEDERATION WITH SECURITY As with any Here are some factors to consider OTHER UPDATE SYS- company data and authen- when evaluating one of these services. (04) TEMS No piece of col- (07) tication credentials, security laboration or communica- is an essential consider- DESKTOP APP SUP- tions software is an island. Avoid erecting ation. Make sure that data traveling over PORT Microblogging new data silos and keep open the lines the network can be encrypted, and that (01) applications tend to be of communication with users outside your authentication credentials never pass Web-based, but most also organization by seeking out microblog- through the wire or the air in the clear. If offer support for native desktop clients, ging services that support federation the service is hosted, the provider should which are available from either the with other services. Make sure that the discuss the measures it takes to ensure vendor or third parties. Check to see products offer controls for managing and, physical security and to keep the various what offline access to data and support if needed, limiting this federation. clients’ data isolated. for delayed status updating these client applications support. Also ensure that INTEGRATION WITH DATA EXPORT Before clients are available for the operating OTHER APPLICATIONS funneling valuable data systems and OS versions you require. (05) Along similar lines, organi- (08) into a new microblog- zations can get more value ging service, evaluate the MOBILE APP SUPPORT out of microblogging services if the prod- options the vendor offers for export- Status update services ucts integrate with existing enterprise ing this data, either for discovery and (02) tend to offer a mobile applications in their environments. This archiving purposes, or to import into a component, in the forms integration can take the form of status new system if your organization opts of SMS text support and of native cli- feeds that appear in CRM or collabora- to switch services. ´ ents for multiple smartphone platforms. tion pages, or of notifications from those Make sure that these clients are avail- systems that appear in the streams that eWEEK Labs Editor in Chief Jason able for the device types deployed in microblogging systems expose. Brooks can be reached at jbrooks@ your organization. eweek.com. API AVAILABILITY DIRECTORY AND AUTHEN- Because it’s unlikely that This story can be found TICATION Look for micro- (06) any microblogging sys- online at: (03) blogging services that inte- tem will offer points of tinyurl.com/2655puu

42 eWEEK JANUARY 3, 2011 faster server ROI.

With budgets flat and workloads exploding, it’s time to unleash the innovation and cost savings locked up within your aging server infrastructure with next generation HP ProLiant servers powered by 8- and 12-core AMD Opteron™ 6100 Series processors. Upgrade now and experience: )*1(j\im\iZfejfc`[Xk`feiXk`f1 0fidfi\jXm`e^jfe\e\i^pXe[Zffc`e^1 +/#*/'`ekfkXcjXm`e^j]fi\m\ip(''lj\ij2

Transform your server environment while building the foundation for the HP Converged Infrastructure. All for an investment that pays for itself in as little as 2 months.1 Unleash faster server ROI now. Outcomes that matter.

See the proof. Access our ROI calculator and register to download your podcasts at hp.com/servers/unleash6

20 YEARS OF x86 SERVER INNOVATION

HP ProLiant DL385 G7 Server HP ProLiant BL465c G7 Server  8D;Fgk\ife GifZ\jjfiDf[\c(*+  8D;Fgk\ife GifZ\jjfiDf[\c()/?<  +>9d\dfip#lgkf),>9dXo  />9d\dfip#lgkf),>9dXo  Lgkf\`^_k / jdXcc]fid]XZkfi_`^_$g\i]fidXeZ\J8J_Xi[[i`m\j  Lgkfknf ) _fkgcl^jdXcc]fid]XZkfiJ8J#J8K8# n`k_jkXe[Xi[ZX^\%Filgkf(J==fiC==_Xi[[i`m\jn`k_ or SSD drives optional drive cages.  @ek\^iXk\[C`^_kj$Flk* `CF* gifm`[`e^`e[ljkip$c\X[`e^  @ek\^iXk\[C`^_kj$Flk* `CF* gifm`[`e^`e[ljkip$c\X[`e^ management and 8X faster remote console performance management and 8X faster remote console performance  Knf@ek\^iXk\[?GM`iklXc:fee\Zk=c\o=XYi`Z:fem\i^\[ $2,599 (Save $498) Network Adapters C\Xj\]fialjk0&df%! Starting at $3,079 SmartBuy GE1',/0$'', C\Xj\XjcfnXj//&df%!

Copyright © 2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. AMD, the AMD Arrow logo, AMD Opteron and combinations thereof are trademarks of Advanced Micro Devices, Inc. 1, 2 =fi[\kX`cjfeZcX`djlYjkXek`Xk`fej#m`j`k_g%Zfd&j\im\ij&lec\Xj_ !Gi`Z\jj_fneXi\?G;`i\Zkgi`Z\j2i\j\cc\iXe[i\kX`cgi`Z\jdXpmXip%Gi`Z\jj_fneXi\jlYa\ZkkfZ_Xe^\Xe[[fefk`eZcl[\Xggc`ZXYc\jkXk\Xe[cfZXckXo\jfij_`gg`e^kfi\Z`g`\ekËjX[[i\jj%F]]\ijZXeefk Y\ZfdY`e\[n`k_Xepfk_\if]]\ifi[`jZflekXe[Xi\^ff[n_`c\jlggc`\jcXjk%8cc]\Xkli\[f]]\ijXmX`cXYc\`eL%J%fecp%JXm`e^jYXj\[fe?GglYc`j_\[c`jkgi`Z\f]Zfe]`^li\$kf$fi[\i\hl`mXc\ek ?GGifC`Xek ;C*/,>.j\im\i1*#'0.Æ+0/4JdXik9lpgi`Z\)#,002?GGifC`Xek9C+,Z>.j\im\i1jkXik`e^Xk*#'.0 %=`eXeZ`e^XmX`cXYc\k_ifl^_?\nc\kk$GXZbXi[=`eXeZ`XcJ\im`Z\j:fdgXepXe[`kjjlYj`[`Xi`\j ?G=J: kfhlXc`]`\[Zfdd\iZ`XcZljkfd\ij`ek_\L%J%Xe[`jjlYa\ZkkfZi\[`kXggifmXcXe[\o\Zlk`fef]jkXe[Xi[?G=J:[fZld\ekXk`fe%Gi`Z\jj_fneXi\YXj\[feXc\Xj\+/dfek_j`ek\idn`k_X]X`i dXib\kmXcl\gliZ_Xj\fgk`feXkk_\\e[f]k_\k\idXe[Xi\mXc`[k_ifl^_;\Z\dY\i*(#)'('%Fk_\iZ_Xi^\jXe[i\jki`Zk`fejdXpXggcp%?G=J:i\j\im\jk_\i`^_kkfZ_Xe^\fiZXeZ\ck_`jgif^iXdXk any time without notice.