linuxworld_vol1issue.. - Dayton Microcomputer Association

Transcription

linuxworld_vol1issue.. - Dayton Microcomputer Association
L
TI
S UN 3
ER Y 00
IL A 2
A PL 1,
3
ET S
R DI ER
SE MB
EA CE
PL DE
Taking the Cost Out of Firewalls: Knowing Your Linux Pays
WWW.LINUXWORLD.COM
THE LEADING MAGAZINE FOR ENTERPRISE AND IT MANAGEMENT
PREMIER 2003 VOL.1 ISSUE 1
Why
Migrate
L
SPECIA R
PREMIEE!
ISSU
— OF —
LWM
Facing
Microsoft’s
Fury...
Taking the Geek Out of Linux
A Talk with Michael Robertson of Lindows.com
to
Linux?
A comprehensive
solution for
enterprise IT
By Gaël Duval
Cofounder of
MandrakeSoft
FREE
$198
Exclusive Interview with Eric Steven Raymond
LWM talks to the cofounder and president of the Open Source Initiative (OSI)
$9.99US $9.99CAN
0
09281 02976
09
2
The Rise of Linux
in the Enterprise
Big Gains in
Small Business
Dominance is the forecast
for coming years
The benefits of Linux
for small business USA
DVD!
SIGN UP
NOW
INCLUDES THE COMPLETE...
SEE PAGES 50-51
FOR DETAILS
Special Charter
Subscription Offer!
ARCHIVES!
EllisIsland.org Welcomes
70 Million Visitors a Month
With Oracle, HP and Red Hat
More than 70 million monthly visitors look for their past
with the IT infrastructure of the future:
HP Adaptive Enterprise Solutions,
Oracle9i Real Application Clusters,
and Red Hat Enterprise Linux
oracle.com/hp
or call 1.800.633.0753
Copyright © 2003, Oracle Corporation. All rights reserved. Oracle is a registered trademark of Oracle Corporation and/or its affiliates. Other names may be trademarks of their respective owners.
PREMIER 2003
2
www.LinuxWorld.com
TM
www.LinuxWorld.com
3
PREMIER 2003
TABLE OF CONTENTS
Inside...
What’s
THE LEADING MAGAZINE FOR ENTERPRISE AND IT MANAGEMENT
PREMIER 2003 VOL.1 ISSUE 1
[7]
From the Editor
Beyond the Hype
BY KEVIN BEDELL
[9]
Guest Editorial
‘Back from the Future’
BY ALAN WILLIAMSON
[16]
Separating the Wheat
from the Chaff
Evaluating a candidate’s skills
BY ROB JONES
[22]
Practical Methods for
Combatting Spam
Tackling the problem
of overflowing inboxes
BY DAVID F. SKOLL
[32]
Striking the Balance
Free software projects have
to find a reasonable balance
between business interests
and other interests
BY IAN LANCE TAYLOR
[34]
NetOp Remote
Control for Linux
Instant access to Linux machines
REVIEW BY TOM MONTGOMERY
[36]
Hyper-Threading Linux
HT performance gains make a strong
case for Linux
BY PAUL BEMOWSKI
[40]
Enterprise Management
for Linux Server
Consolidation
A holistic approach to migration
BY JAH’J UAN ROGERS
[10]
[44]
The Rise of Linux in the Enterprise
[46]
Big Gains in
Small Business
Linux provides a complete
solution for a growing
manufacturing company
BY MARKUS KLAUSER
Dominance is the forecast for coming years
A Talk with the
Father of sendmail
Eric Allman on evolution
in the IT universe
BY VINCE RE
INTERVIEW BY ALAN WILLIAMSON
PREMIER 2003
4
www.LinuxWorld.com
FREE $198 DVD!
SEE PAGES 50-51
FOR DETAILS
[52]
— SIGN UP NOW —
TABLE OF CONTENTS
SPECIAL CHARTER SUBSCRIPTION OFFER!
Linux Initiatives at IBM
Nobody ever got fired for picking...Linux?
An interview with Scott Handy
INTERVIEW BY KEVIN BEDELL
[54]
Making Linux
Unbreakable, Keeping
Linux Open
LWM speaks with Wim Coekaerts,
Oracle’s Linux liaison
INTERVIEW BY JEREMY GEELAN
[58]
Taking the Cost
Out of Firewalls
It pays to know your Linux
BY RAM SAMUDRALA
[60]
[70]
Linux Virtual Private
Networking Fundamentals
Choosing the right solution for your network
BY J.C. UTTER AND JOSH SNYDER
[64]
[66]
You’ve Come a
Long Way, Unix
A talk with Michael Robertson, CEO of Lindows.com
BY JAMES TURNER
INTERVIEW BY JAMES TURNER
Show Me the License
Buying open source software at
your company? Make sure you’ve
got the right license...
BY MIKE OLSON
[68]
Introducing the
Linux 2.6 Kernel
Technical improvements will
accelerate adoption
BY DAVE FULLER
[74]
Taking the Geek Out of Linux
Reflections on the rich history of Unix
Ensuring Availability of
Applications on Linux
[28]
[18]
Why Migrate to Linux?
A comprehensive solution
for enterprise IT BY GAËL DUVAL
The right solution for your business
– LWM
EXCLUSIVE–
INTERVIEW!
BY BOB WILLIAMSON
[87]
Cross-Platform
Integration
with X Windows
[78]
Creating a transparent mixed
environment for users
[96]
Introduction to the
Linux Desktop
BY HERMAN VERKADE
Who Owns Unix?
Around the LinuxWorld
An exclusive interview with esr
A look at Linux in the
Windows-centric enterprise
Brought to you by
Linux Business Week
INTERVIEW BY KEVIN BEDELL
BY MARK R. HINKLE
www.LinuxWorld.com
5
PREMIER 2003
FROM THE EDITOR
[
EDITORIAL BOARD
]
Editor-in-Chief
Kevin Bedell [email protected]
Senior Editor
James Turner [email protected]
Health Care and Biotechnology Editor
Dan Bent [email protected]
Industry News Editor
Steven Berkowitz [email protected]
LAMP Technologies Editor
Martin C. Brown [email protected]
Desktop Technologies Editor
Mark R. Hinkle [email protected]
Contributing Editor
Dee-Ann LeBlanc [email protected]
Networking and Security Editor
Robert Shimonski [email protected]
Advocacy Editor
Steve Suehring [email protected]
[INTERNATIONAL ADVISORY BOARD]
Wim Coekaerts, Director of Linux Engineering
Oracle
Gaël Duval, Cofounder/Director of Communication
MandrakeSoft
Samuel J. Greenblatt, Senior Vice President
and Chief Architect, Linux Technology Group
Computer Associates
Scott Handy, Director of Linux Software Solutions
IBM
Simon Phipps, Chief Software Evangelist
Sun Microsystems
[
EDITORIAL
]
Editorial Director
Jeremy Geelan [email protected]
Deputy Editor
Alan Williamson [email protected]
Managing Editor
Jennifer Van Winckel [email protected]
Editors
Gail Schultz [email protected]
Nancy Valentine [email protected]
Jamie Matusow [email protected]
Jean Cassidy [email protected]
[
OFFICES
]
SYS-CON MEDIA
135 Chestnut Ridge Rd. • Montvale, NJ 07645
Telephone: 201 802-3000 • Fax: 201 782-9600
LinuxWorld Magazine
(ISSN #1544-4511)
is published bimonthly (6 times a year)
by SYS-CON Publications, Inc.
Postmaster send address changes to:
LINUXWORLD MAGAZINE
SYS-CON MEDIA
135 Chestnut Ridge Rd. • Montvale, NJ 07645
COPYRIGHT © 2003 BY SYS-CON PUBLICATIONS, INC.
ALL RIGHTS RESERVED. NO PART OF THIS PUBLICATION
MAY BE REPRODUCED OR TRANSMITTED IN ANY FORM OR
BY ANY MEANS, ELECTRONIC OR MECHANICAL, INCLUDING
PHOTOCOPY OR ANY INFORMATION, STORAGE AND
RETRIEVAL SYSTEM, WITHOUT WRITTEN PERMISSION.
FOR PROMOTIONAL REPRINTS, CONTACT REPRINT
COORDINATOR.SYS-CON PUBLICATIONS, INC., RESERVES
THE RIGHT TO REVISE, REPUBLISH AND AUTHORIZE ITS
READERS TO USE THE ARTICLES SUBMITTED FOR
PUBLICATION. ALL BRAND AND PRODUCT NAMES USED
ON THESE PAGES ARE TRADE NAMES, SERVICE MARKS,
OR TRADEMARKS OF THEIR RESPECTIVE COMPANIES.
WORLDWIDE NEWSSTAND DISTRIBUTION
CURTIS CIRCULATION COMPANY, NEW MILFORD, NJ
LINUX IS A REGISTERED TRADEMARK OF LINUS TORVALDS
LINUXWORLD® IS THE REGISTERED TRADEMARK OF
INTERNATIONAL DATA GROUP, INC.
SYS-CON IS USING THE MARK PURSUANT
TO A LICENSE AGREEMENT FROM IDG
www.LinuxWorld.com
Beyond the Hype
Welcome, and thank you for
Have you been looking for a straight
head-to-head comparison of Windows
and Linux for use as a desktop operating
picking up LinuxWorld Magazine!
system? You should read “Introduction
to the Linux Desktop” by Mark Hinkle,
f you’re familiar with our sister
also in this issue. Mark does a great job
publications, including Java
comparing the two side by side, with
Developer’s Journal, .NET
screen shots and application notes.
Developer’s Journal, and
Mark is vice president of operations for
WebSphere Developer’s Journal,
BY KEVIN BEDELL
NeTraverse, a consulting company spethen you know the extremely
cializing in Windows-to-Linux migrahigh standards for content we strive
tions, and is on the Formation Board of the Desktop
for at SYS-CON Media. LWM will be no different.
Linux Consortium.
We’ll be working hard every issue to help you
We’ll also be bringing you useful and practical
understand what’s happening in the Linux world.
information on other important projects in the open
But really, our goal is more ambitious than that. It
source community. For example, in this issue
seems you can get information on Linux everywhere
AlanWilliamson (editor-in-chief of Java Developer’s
today – not a day goes by without more Linux news
hitting the wires and popping up on technology sites. Journal, and deputy editor of LWM) interviews Eric
Allman, the original developer of sendmail, the open
We don’t want to add to the noise. We want to rise
source e-mail processing application that dominates
above it and tell you what’s important. We want to
e-mail processing on the Internet. And in “Linux
help you learn how to maximize the impact of Linux.
Virtual Private Networking Fundamentals,” JC Utter,
So finding information on Linux is easy. But
president of ImageStream Internet Solutions, and Josh
finding value from Linux is harder. It requires you
Snyder, also of ImageStream, go over the pros and
to know which actions to take and, sometimes
cons of using Poptop, one of the most popular Linux
more important, when to take them. That’s where
VPN server solutions, which is fully open source and
LWM comes in. That’s the value we provide to you.
We talk to the industry experts. We have relation- free. Want to know when it makes sense to use Poptop
ships both high and deep inside the companies that and when it won’t meet your needs? JC and Josh lay it
all out to help you make an informed decision.
are changing the technology landscape using Linux.
What do all of these articles have in common?
For example, when Larry Ellison needed to know
They’re all written by experts and they all give
how Oracle Corporation could benefit from Linux,
he asked Wim Coekaerts to investigate for him. Wim you firsthand, practical information on what’s
really important.
now leads Oracle’s Linux technology group – and
Linux has arrived. It’s ready for prime time.
he’s here in the premier issue of LWM as well.
Think of us as your source of information on
IBM is getting into Linux in a big, industry-changwhat the real opportunities are, how to leverage
ing way. They run Linux on a whole range of hardthem, and how to manage the associated risks.
ware, from low-end workstations all the way up to the
Linux is poised for an explosion of growth in the
mainframe. They have an entire portfolio of applicanext 18–24 months – we’ll have the thought leadtions that run under Linux and literally thousands of
ers here, helping you make sense of it all.
software developers working on Linux. Scott Handy is
Thanks again for picking us up. Hang on for a
director of Linux Software Solutions for IBM and
wild ride!
when you hear IBM discussing Linux, it’s most likely
Scott doing the talking. If you’re interested in what
LINUXWORLD MAGAZINE WWW.LINUXWORLD.COM
Scott thinks are the low hanging fruit‚ projects with
A B O UT TH E A UTH O R
which companies can get started and realize great
returns using Linux, you need to check out our interKevin Bedell is editor-in-chief of LinuxWorld
view with Scott here in the premier issue of LWM.
Magazine. With a degree in engineering as well as an
Interested in why you should migrate to Linux?
MBA and years of experience as a developer, architect,
Why not get the word straight from Gaël Duval,
team lead, and department manager, Kevin has seen
creator of Mandrake Linux and cofounder of
all sides of this puzzle. He recently authored a book
MandrakeSoft? Gaël is a member of our International
on Jakarta Struts for SAMS Publishing and is working
Board of Advisors and authored the article “Why
on a book on Apache Axis for O’Reilly.
Migrate to Linux?” that appears in this issue.
[email protected]
I
7
PREMIER 2003
GUEST EDITORIAL
The World’s Leading i-Technology Publisher
President & CEO
Fuat Kircaali [email protected]
‘Back from the Future’
VP, Business Development
Grisha Davida [email protected]
[
]
ADVERTISING
Senior VP, Sales & Marketing
Carmen Gonzalez [email protected]
Like many of the Linux devotees
VP, Sales & Marketing
Miles Silverman [email protected]
Director of Sales and Marketing
Megan Mussa [email protected]
Advertising Director
Robyn Forma [email protected]
Advertising Sales Manager
Alisa Catalano [email protected]
W
Associate Sales Managers
Carrie Gebert [email protected]
Kristin Kuhnle [email protected]
[
PRODUCTION
]
Production Consultant
Jim Morgan [email protected]
Art Director
Alex Botero [email protected]
Associate Art Directors
Louis F. Cuffari [email protected]
Richard Silverberg [email protected]
Tami Beatty [email protected]
[
]
SYS-CON EVENTS
President, Events
Grisha Davida [email protected]
Conference Manager
Michael Lynch [email protected]
Sales Executive, Exhibits
James Donovan [email protected]
[
C U S T O M E R R E L AT I O N S
]
Circulation Service Coordinators
Niki Panagopoulos [email protected]
Shelia Dickerson [email protected]
Edna Earle Russell [email protected]
Manager, JDJ Store
Rachel McGouran [email protected]
[
]
SYS-CON.COM
VP, Information Systems
Robert Diamond [email protected]
Web Designers
Stephen Kilmurray [email protected]
Christopher Croce [email protected]
Online Editor
Lin Goetz [email protected]
[
ACCOUNTING
]
Financial Analyst
Joan LaRose [email protected]
Accounts Receivable
Kerri Von Achen [email protected]
Accounts Payable
Betty White [email protected]
[
SUBSCRIPTIONS
installed, happily sit there and keep
up with your office e-mail, act as an
Internet gateway/firewall, and even
out there, I turned to Linux when
provide some file sharing capabilities…all out of the box, without the
the deep-pocket budgets dried up.
need to install or purchase any additional software. It was an offering that
e could no longer afford the
was simply irresponsible to ignore.
big-iron alternatives of the
Naturally, at first the big irons of the
day that were traditionally
BY A L A N W I LLI A M S O N
world tried to ignore it, citing such
first on the shopping list.
reasons as scalability and redundancy.
There was a perception that if we
But if your office only had 50 users then such
were to be deploying server-side solutions, then
dreams of running eBay were just that: dreams.
we needed reliability and performance that
The whole notion of what a server is was comweren’t typically on offer from the PCs of the day.
pletely turned on its head.
This was back in the days when a “workstation”
Linux, with its simple message of “it just
was more than just a high-end PC (although if
works,” was proving that PCs weren’t the old
you looked at specifications of what the workstaunreliable machines that we were led to believe
tion actually was, you’d probably be chortling
they were. In fact, they were performing such an
right now).
admirable job, as Jonathan Schwartz at Sun comLinux was viewed as this “hobbyist” thing that
mented recently, that “uptime was measured in
only true hard-core geeks played with. No serious
business was done with it. Fast forward five years, years.”
There’s no denying that Linux has brought us
and how different the world looks now. The very
back from the future and saved the business
same big-iron companies we blindly followed,
community millions in terms of computing hardwith their promise of unbridled power and
ware. But Linux has matured along the way.
uptime, are now heralding Linux as the second
Moving to Linux no longer means you’re entrustcoming.
ing the company’s IT strategy to a summer stuSo what changed? What happened between
dent who happened to throw together a Red
then and now?
Hat/Debian server from some old PCs he found
Economics is, of course, a main driving force
in the cupboard.
in this change of heart. Big iron costs big bucks,
Quite the opposite. Approach the likes of IBM,
and with the general economic downturn comHP, and Sun and ask about their Linux offerings
panies could no longer afford to keep up-to-date
and you’ll be surprised at the prices they quote
with the continual cycle of upgrading their hardback at you – not only within your budget, but
ware. An alternative had to be sought. In addiwith support. Linux has been ready for the corpotion, developing countries such as India, Asia,
rate world for some time now, but like those
and Africa never had the big budgets in the first
colossal oil tankers that take a week to change
place – they were always left with the “seconds”
direction, the corporate world is finally beginning
of the western world, never really getting a
to take notice.
chance to catch up, let alone leapfrog ahead.
The journey has just begun; we are just getting
Yet, the desktop PCs that we happily threw out
warmed up!
every year had more than enough processing
power inside them. Sure, they struggled to make
LINUXWORLD MAGAZINE WWW.LINUXWORLD.COM
Microsoft Windows usable, but as a raw processA B O UT TH E A UTH O R
ing power goes they were powerful. Linux managed to harness this power and bring it back into
When not answering your e-mails and working on
vogue. Linux was the trampoline that bounced
the next issue of LWM or JDJ, Alan heads up a small
the PCs from the dumpster back into the server
team dubbed the “Thunderbirds of the Java industry,”
room.
providing on- and offsite rescue for Java projects in
Your typical 2–3 year-old PC that you wouldn’t
trouble. For more information visit www.javaSOS.com.
dream of running with anything more demandYou can also read his blog: http://alan.blog-city.com.
ing than Windows 95/98 would, with Linux
[email protected]
]
[email protected]
For subscriptions and requests for bulk orders,
please send your letters to Subscription Department
Cover Price: $5.99/issue
Domestic: $49.99/yr (12 issues)
Canada/Mexico: $79.99/yr
all other countries $99.99/yr
(U.S. Banks or Money Orders)
Back issues: $12 U.S. $15 all others
www.LinuxWorld.com
9
PREMIER 2003
FEATURE
The
Rise
of Linux
in the
Enterprise
Dominance is the forecast for coming years
PREMIER 2003
10
www.LinuxWorld.com
FEATURE
BY
V I N C E
R E
Given the rise and rise of Linux in the enterprise, LWM invites one of the giants
of the commercial computing world, Computer Associates, to sketch for us its “take”
on what the rest of 2003 has in store...
ver the past couple of
years, Linux has transitioned from the IT fringes
to the technology mainstream. With giants such
as IBM, HP/Compaq, and
Computer Associates (CA) now firmly on
the Linux bandwagon, Linux has surpassed
UNIX to move into the number-two position in terms of new server operating systems.
According to the latest research figures,
this rate of expansion will continue to
accelerate. Gartner predicts that the Linux
market will surpass $9 billion in revenue
within four years. International Data Corp
(IDC) concurs, anticipating a growth rate of
28.2% annually for Linux until 2006.
As the number of Linux applications
multiplies, its penetration into the corporate world continues to gather steam. Just a
few years ago, Linux enterprise involvement was restricted largely to services such
as file and print sharing or simple Web
serving. While these functions continue to
be important, Linux is increasingly being
utilized for enterprise-scale e-mail, firewalls, and database servers, and for a wide
range of network and network management services.
Linux is also up to date in the technical
sense, and it is playing a vital role within
organizations in the deployment of all sorts
of next-generation technology.
Organizations developing sophisticated
new applications based on emerging Web
services or grid computing standards are
finding Linux to be an ideal server platform. As these new technologies become
more commonplace, Linux stands to have
an increasingly important role.
Further, Linux has distinct scalability
and portability advantages compared to
other architectures. Applications developed
for Linux can scale from small Intel commodity boxes up to the largest mainframes
O
www.LinuxWorld.com
with very little effort. CA has validated this
with the ability to take applications originally developed for Linux on the Intel
architecture and have them run on mainframe Linux with very little effort. CA’s
experience – spanning millions of lines of
code and dozens of products – demonstrates that Linux is robust enough to provide the kind of portability across architectures that was only dreamt of in the past.
The scalability and low cost of creating
applications that function across multiple
architectures is an important advantage
that will help Linux continue to gain
strength in the server marketplace. Instead
of making platform-hosting decisions
based on the relatively small “sweet spot”
offered by a single platform and architecture, Linux makes it possible to mix and
match according to the needs of the organization. Companies can pick the platform –
from Intel boxes up to mainframe – based
on the number of users, as well as
price/performance, market conditions, reliability, and security issues.
An example of this at CA is an important
in-house HR application that operates
using an Ingres relational database. For 10
months of the year, it is hosted on a medium-sized Sun server that copes well with
routine demands. But with 16,000 employees worldwide, enormous traffic is generated during the annual performance review
cycle. During that period, CA moves the
backing Ingres database to a mainframe
Linux environment to handle the peak
load. Except for improved response times,
users are generally unaware of the difference, and CA doesn’t have to dedicate otherwise unused capacity to the application
year-round.
Mainframe Linux
Without a doubt, enterprise Linux
deployments to date have paralleled the
ascendancy of commodity Intel server
11
boxes. The rise of the Internet and the
sweeping adoption of distributed applications over the past decade have generated
an explosion in the number of servers IT
must manage. Due to its sheer cost effectiveness, Linux has successfully invaded
this market and is steadily rising to dominance within it.
The rapid increase in distributed servers
seemed more attractive than a centralized
mainframe-based computing model – at
first. But in some organizations, server proliferation has begun to spin out of control.
These days, it’s quite common for organizations to be running hundreds or thousands
of Intel and UNIX servers, many of them
single-application boxes. It’s also common
for companies to have no idea exactly how
many servers they have, or what applications rely on which combinations of servers.
This proliferation of commodity servers
has proven far more costly than many previously predicted. Though smaller, scaledout systems are less expensive than mainframes, IT needs many more of them to
support the business. That translates into
high costs, more exposure to potential
security breaches, and a greater management burden.
In response, server consolidation continues to blossom. Gartner says 70% of its
enterprise clients are now trying to consolidate, compared to only 33% three years
ago. Many of these consolidation projects
involve Linux, and vendors like IBM and CA
are heavily involved in the process.
A B O UT
TH E
A UTH O R
Vince Re is chief architect and a technology
strategist in the office of the CTO at Computer
Associates (CA). With extensive experience in
the areas of mainframe and Linux systems
management applications, he works closely
with CA’s technology groups. He has been
responsible for much of CA’s middleware and
common services infrastructure, and recently,
many of CA’s Linux initiatives on the mainframe. Vince holds a bachelor’s degree in
physics and a master’s degree in computer science from the Stevens Institute of Technology.
For more information, go to www.ca.com.
[email protected]
PREMIER 2003
FEATURE
It is possible, for example, to consolidate
UNIX and Linux servers onto a mainframe
such as the IBM zSeries. Under this model,
you can transform a single mainframe into
hundreds of virtual servers, each running
individual copies of Linux.
One midwest hospital chain, for example, had 40 small Intel servers hosting email, Web server, directory, and various
health care applications. It consolidated
them onto one IBM eServer z900 running
multiple instances of Linux. Its health care
claim-processing system originally
spanned multiple servers. As the amount
of claims on this system grew from $800
million to almost $6 billion over four
years, it became a constant source of trouble for IT. It took integration onto the
mainframe/Linux environment to bring
about the needed improvements in efficiency. That organization now processes
350,000 claims daily – 12 per second. The
IT manager reports that he can create a
new virtual server in two minutes compared to a day or more per server for Intel
boxes. Other advantages cited include a
50% cost reduction per server, a performance increase of 3 to 1, and a mean time to
failure that’s gone from 6 years to more
than 30 years.
With the successful integration of so
many infrastructure servers, the hospital
chain is currently involved in the next step
– application integration. This includes a
PeopleSoft migration as well as database
consolidation from SQL Server to IBM’s
DB2 Universal Database. Once again, Linux
is the operating system of choice.
While the mainframe Linux model may
not be right for every situation, it is certainly growing in popularity in the enterprise.
So when does consolidation make the most
sense?
Slim. Fast.
Tim Dougherty, IBM eServer director, blade
server strategy, displays IBM’s “blade,” the
thinnest computer server in IBM’s four
decades of manufacturing computers. Almost
the size of a clipboard, one blade packs more
computing muscle than a room full of IBM
servers from ten years ago.
SOURCE: HTTP://WWW.IBM.COM
• When multiple distributed infrastructure
servers need to handle tasks such as file
and print, Web, and e-mail
• When consolidation of multiple databases is needed
• When there is a need to manage more
with limited resources
• When there are sites with excess mainframe capacity
• When application peak traffic periods
are complementary
• When scalability and performance needs
are extreme
• When applications can benefit from close
proximity to existing mainframe data
• When more space is needed in the data center or where environmental costs are high
• When the volume of distributed servers
becomes too great to keep up with routine maintenance, updates, etc.
Obviously, each platform has its own
sweet spot in terms of the number of users
“the market for blade servers
will rise to $3.7 billion in 2006,
from $133 million this year...
In all likelihood, Linux will
become the preferred OS”
PREMIER 2003
12
it can comfortably support and the amount
of complexity it can manage. It wouldn’t
make sense to host one small application
on a mainframe or to attempt to cobble
together a huge application on a few distributed Intel boxes. Therefore, it is up to IT
to mix and match according to needs. But
clearly, mainframe Linux has a major role
to play as the server consolidation trend
takes hold. And as the platform has roughly
the same management costs on Intel as it
does on mainframe, look for Linux to
become the OS of choice in server consolidation projects over the coming years.
Blade Server Linux
Another form of consolidation that has
Linux in the forefront is blade servers.
Instead of moving from commodity boxes
to the mainframe, though, blade servers
house multiple boards on one chassis,
thereby cutting the power, cooling, and
hardware costs of computing. IBM, Intel,
Dell, and HP, to name a few, are investing
heavily in blade servers.
Market research firm IDC forecasts the
market for blade servers will rise to $3.7 billion in 2006, from $133 million this year. In
all likelihood, Linux will become the preferred OS. HP, for example, launched a
range of blade server offerings based on
Linux. Because Linux is lightweight, has
lower memory requirements, and makes
better use of CPU power than alternative
operating systems, it is ideal for blade
servers, which require flexibility and scalability due to heat restrictions.
AOL, for instance, recently announced
that it is testing blade servers with a view to
widespread adoption. With an average of 2.5
million subscribers active on AOL at any
www.LinuxWorld.com
FEATURE
given time, its 800 RISC-based UNIX servers
are kept busy managing log-ons and username and password verifications, as well as
parental-control activations. As many of these
servers are coming up for retirement, blade
servers running Linux are likely to take over
as a more efficient way to handle the load. So
far, AOL has installed 56 IBM BladeCenter
servers. These have 14 “server-on-a-board”
systems per chassis. Each runs Red Hat Linux
7.3. Once the pilot demonstrates the cost,
scalability, and performance advantages
anticipated, AOL will replace all 800 UNIX
systems with Linux-based blade servers.
Desktop Linux
For many years, analysts have
announced Linux as the rising force in the
server marketplace. With mainframe and
blade server Linux systems now adding to
the established trend of widespread Linux
adoption on commodity Intel boxes, that
prediction has come true even more forcefully than many expected. Those same analysts, however, have always maintained that
Linux would never become a major player
on the desktop – until recently.
Over the past six months, in fact, there
has been a significant shift in the willingness of enterprises to investigate the largescale commercial usage of Linux-based
PCs. Faced with harsher economic times,
many businesses are rethinking their
approach to the desktop and have become
amenable to new strategies.
Many modern business applications,
after all, are browser based. Rather than a
high-powered and expensive desktop loaded
with proprietary software, some are evaluating a thin-client desktop model based on
open source elements. As desktops come up
for replacement, some companies are looking to cut costs. Instead of buying the latest
desktop hardware/software, they see the
value of harnessing Linux to gain several
more years of use out of existing hardware.
Companies like Merrill Lynch, for example, are looking into this approach as
reported widely in the media. Since Merrill
Lynch began working with open source
software, it has significantly reduced hardware and software costs. Currently the company is investigating Linux on the desktop
with the initial goal of 20% of its desktops
using open source products.
Embedded Linux
In the area of embedded applications,
Linux has risen to prominence with a minimum of fanfare. As these systems are largely invisible to users, they receive scant
www.LinuxWorld.com
attention in the media. Yet here, too, Linux
has quietly conquered the market.
Embedded Linux involves porting the Linux
kernel to run on a particular CPU and board,
which will be put into an embedded device. For
the most part, the APIs and kernel are the same
for embedded Linux as for desktop Linux.
Many of today’s common computer
devices, such as wireless hardware, routers,
switches, and other networking hardware,
all use Linux to run embedded systems.
High-profile consumer devices like the
Sony PlayStation and TiVo utilize Linuxbased embedded systems. A number of
major automakers such as DaimlerChrysler,
BMW, and Ford are also using Linux in electronic products. Why? Instead of designing
application-specific hardware, these
automakers are now beginning to get
behind cross-industry standardization
using a Linux kernel to plug any device into
it. The cost advantages could be staggering.
BMW, for instance, has developed a wireless environment to collect serviceability data
on each vehicle, which can be relayed to the
dealer. Once that system is up and running,
the dealer can monitor the smooth operation
of sold vehicles. The dealer can then tell a driver to bring the car in for a check-up based on
performance criteria falling outside preset
thresholds. Interestingly, such systems open up
a whole new area of risk management and
security, which CA is helping to resolve. Before
you relay any vehicle data wirelessly, you have
to ensure user privacy and overall system security. Only when that is well in hand will it be
possible to broadly use such a system, or introduce innovative approaches to vehicle security
such as biometrics, i.e., validating user IDs in
order to start a car with a thumb scan.
Linux and Grid Computing
Yet another area of the IT landscape being
successfully invaded by Linux is grid computing. Simply put, grid computing technology enables access to applications and data,
processing power, storage capacity, and a
vast array of other computing resources. It
involves clusters of servers that are joined
together over the Internet and uses standard
protocols, and it is increasingly harnessing
open technologies such as Linux.
Among other things, grid computing allows:
• Coordination in or between physically
dispersed virtual organizations.
• Availability of computers, data, software,
storage, and other resources.
• Controlled access by resource providers
and consumers, which defines who can
share, what is shared, and which conditions allow sharing.
13
www.linuxworld.com
Subscribe
Today!
Operators are
standing by...
don’t miss another
issue of LWM!
SAVE 30%
OFF!
99
$
49
REGULAR ANNUAL COVER PRICE $71.76
YOU PAY ONLY
12 ISSUES/YR
*OFFER SUBJECT TO CHANGE WITHOUT NOTICE
CALL
CUSTOMER SERVICE
AT
1-888-303-5282
The World’s Leading i-Technology Publisher
FEATURE
Linux Creates Reorganization at CA
In the mid to late ’90s CA decided it was worth placing a strategic bet on Linux based
on early customer adaptors. For most of its 27-year history, CA has concentrated on the
development of products that break down the barriers between different platforms – either
to manage the heterogeneous enterprise or to act as middleware between complex systems.
CA products support everything from IBM mainframes running z/OS and OS/390 down to
PDAs running Pocket Windows. In keeping with this tradition, CA is now firmly behind Linux
with over 60 CA Linux applications now available for the distributed and mainframe environment.
What initially caught CA’s attention was the fact that a range of efficient tools didn’t adequately support Linux. In particular, Linux servers didn’t integrate well in an enterprise environment with equipment running on other platforms. With more and more clients deploying
Linux, it was up to us to come up with the software.
CA released its first Linux products in
April 1999, management agents for the
Unicenter TNG management package, to be
followed up later that year with the complete network and systems management
package. Since then, CA has steadily continued to port products over to the Linux platform. Each is compatible with popular versions of the Caldera, Red Hat, SuSE, and
TurboLinux versions of the Linux operating
system.
For enterprise management, CA offers
modules for Unicenter covering service-level
management, job scheduling, Web server,
WebSphere, and cluster server management as
well as network and systems management for
devices, applications, and databases running
on Linux. The BrightStor storage management
line also has products specifically designed to
back up and restore Linux systems, and CA
enterprise back-up software supports Linux in
a heterogeneous environment.
In addition, CA offers a variety of security management applications covering virus
protection, policy compliance, security monitoring, and access control either in a Linux
environment or for Linux boxes operating in
a mixed environment.
To support this major investment in Linux, CA has established a dedicated Linux Technology
Group that spans all of its major brands:
1. Enterprise management (Unicenter)
2. Storage (BrightStor)
3. Security (eTrust)
4. Portal and business intelligence (CleverPath)
5. Database management and application development (Advantage/Jasmine)
6. Software life cycle management (AllFusion)
Rather than being one product group within the company as a whole, the Linux team operates at a strategic level. This has resulted in the formalization of CA’s Linux efforts and the
integration of the operating system into all of CA’s product lines.
The Linux Technology Group has three main aims: greater optimization of Linux in terms of
reliability, availability, and performance; securing and preserving data, applications, and systems to minimize risk; and integration of Linux into the cross-platform environment in order to
allow seamless integration with the heterogeneous nature of the modern enterprise.
The interoperability of this network
transforms the grid of servers into a single, large virtual computer for the end
user. How this model will evolve remains
to be seen. It may eventually morph into
an entirely new computing platform, or it
could grow into an alternative to today’s
lower-level platforms. Whatever happens,
though, Linux is already widely used in
this development and will lead the way.
Already, IBM and Ford have invested
heavily in the development of economical
commercial uses for grids, and CA is
working to provide the management
framework that viable grid computing
demands.
Perception Trouble
While gazing into the crystal ball is
never an easy proposition, it seems certain
that Linux will continue to steadily increase
its market share in the server, desktop, and
embedded marketplaces. It remains to be
seen whether Linux will rise to the occasion
and defeat Microsoft in the desktop marketplace, but its dominance in the server
space is assured.
Why? The tide appears to have turned
with regard to corporate perception of
Linux. Up until about two years ago, most
executives were reticent toward Linux.
Their apprehensiveness was routed in
ongoing support and security concerns
about the open source movement as a
whole. Some feared that any hacker out
there could gain access to Linux systems
and that they were better protected using
proprietary systems. But as the recent spate
of security and virus alerts has demonstrated, proprietary software is, if anything,
more open to attack that open source products.
More and more these days, CTOs are
vocalizing that once they become familiar
with the open source model and experience
how it works, they realize that more eyes on
the source code means greater security in
the long run. The bottom line is that more
people are actively looking out for the security of your systems.
That’s why Linux is experiencing more
interest from clients than ever before. In
2001, Linux came up less than 10% of the
time during client interviews. Today, it
comes up two-thirds of the time. That percentage is increasing markedly from month
to month, and it seems only a matter of time
before every major software and hardware
vendor is forced to adopt a full-blown Linux
strategy in order to remain competitive.
LINUXWORLD MAGAZINE WWW.LINUXWORLD.COM
PREMIER 2003
14
www.LinuxWorld.com
The
WE MAKE LINUX
5 TIMES
FASTER
storage sof t ware company.
FACT: Performance tests show VERITAS makes Linux five times faster. Ever seen a penguin fly?
veritas.com
Copyright © 2003 VERITAS Software Corporation. All rights reserved. VERITAS, the VERITAS Logo and all other VERITAS product names and slogans are trademarks or registered
trademarks of VERITAS Software Corporation. VERITAS and the VERITAS Logo Reg. U.S. Pat. & Tm. Off. All other trademarks are the property of their respective owners.
LINUX CAREERS
Separating the Wheat
from the Chaff
Evaluating a candidate’s skills
BY
Welcome to my first LinuxWorld Magazine column. Some credentials are in order:
R O B
J O N E S
Rob Jones is the president of Glacier
Technology Services, an IT recruiting
firm based in Savannah, GA.
[email protected]
looking for candidates who can do the job.
We want to know that they are qualified
and can immediately be productive members of the company. With reduced company resources, making the correct hire is
now more important than ever.
With Linux/open source technologies,
you have the advantage of being able to look
at candidates’ résumés and get an insight
into their experience, even before you
pick up the phone and interview
them. No, we have not developed a
crystal ball that can see into a candidate’s background and ascertain his
or her skills. But with some
research on your part, you can
quickly identify experienced
candidates.
Experience with
open source projects
and participation in
LUGs or Linux User
Groups are two key items to
look for. These are not the only
things to look for on a Linux/open
source résumé, but they are items you can
use if you understand their meaning.
Open source projects are usually community-based initiatives. Individuals contribute
their time and energy to further Linux adoption. Candidates usually work on the projects
for no compensation, just a desire to learn
and contribute. That sounds noble, but one
of the biggest reasons for this was that the
developer wanted Linux to work on a particular product, and at the time there was no
formal Linux support provided. So enterpris-
ing developers just did it on their own, which
I think is amazing and one benefit of the
open source development platform.
For a candidate to have demonstrated
skills that can be verified is a huge asset
when reviewing résumés. Hiring managers
want to see an individual with experience
programming in C and a storage-related
skill set; managers can go to the Web site of
a relevant open source project and review
the work of that candidate to determine if
he or she has the desired skill set.
Since open source projects for the most
part are community based, the development
work has been reviewed by many different
individuals. The code is widely scrutinized
before it’s included in the project. The quality of experience that developers gain from
this exposure is hard to quantify. For
someone working on a driver, it takes
quite a bit of work to get that driver
included in the official kernel
tree. You can be sure, as the
hiring manager, that when
candidates have had their
work accepted into the
official tree, they have
experience that is documented and measurable.
Keep in mind that it’s
not only developers who
participate in open source projects. Many projects have large teams. So
a candidate could gain skills with project
management, QA/testing, as well as enduser support and documentation. Wouldn’t
it be great to be looking for a Linux system
administrator who has been testing the
very technology that you are implementing
at your organization. Talk about on-the-job
training! You can feel comfortable that the
candidate has the technology skill set, as
well as hands-on experience with technology used in many different environments.
Recently, more corporations have been
PREMIER 2003
16
www.LinuxWorld.com
I am the president of Glacier Technology Services, an IT recruiting firm based in
Savannah, Georgia. In March of 2000, we formed a division called HotLinuxJobs that
focuses on recruiting Linux and open source candidates on a nationwide basis.
his column will focus on different
aspects of recruiting and certification within Linux. It will offer
advice on the different Linux certifications and which ones would be
the best for your employees to
have, as well as guidelines on recruiting the
best candidates. This month’s column
focuses on résumés and how to recognize
the best candidates.
Some quick history you should be aware
of: Linux/open source may be new to your
company, but it’s not a new technology. The
Linux kernel has been around since 1991, and
many individuals have dedicated their careers
to its development. One of the first things to
understand is that Linux is a community
effort and the deep commitment of its developers is the reason behind its rapid adoption.
Without the community, there would be no
Linux. Since the average turnover costs 1.5
times the annual salary in lost productivity,
recruiting costs, and general turmoil, you
need to do everything you can to optimize
your chances of picking the best player.
Assuming your company is implementing Linux/open source technologies, your
job is to find experienced candidates.
Reviewing Linux/open source résumés for
quality is no different than reviewing
résumés for other IT positions. We are all
T
A B O UT
TH E
A UTH O R
www.linuxworld.com
LINUX CAREERS
sponsoring projects. Many of the larger
technology companies that we are all familiar with (IBM, HP, and Intel, just to name a
few) have numerous employees within
their organizations who are actively
involved with open source projects. The
companies understand the return that
working on open source projects can bring.
Their employees have an invaluable insight
into developing technologies, as well as the
experience from working on the projects.
The following scenario demonstrates the
important potential of one’s involvement in
open source projects. An electronics company located in San Jose was looking for a software engineer who had experience with certain graphics and video drivers. As we began
our search, we were flooded with résumés
from individuals interested in this job. While
sorting through them, we came across a
candidate who could have easily been overlooked. Here was an applicant in his senior
year of college with minimal work experience. Fortunately for us, however, a section
of his résumé was dedicated to the open
source projects he had engaged in. To our
surprise, he was the maintainer for one of
the specific drivers we were looking for. For
those who are not aware of what a “maintainer” is in the open source world, it’s the
person who oversees that particular project.
This experience solidified his qualifications for the job. We knew that by having
his code scrutinized by other open source
developers and accepted, he had the necessary skill set we were looking for. As a
result, he is presently a member of that
company’s engineering team.
Another area for hiring managers to look
for on a candidate’s résumé is participation
in a Linux User Group or LUG. LUGs are
usually named for a city or region. There are
user groups for other IT disciplines, but it
seems that LUGs offer and provide quite a
bit of experience to potential candidates.
LUGs provide great support and resources
for problems or questions with Linux/open
source technologies. The questions on LUG
mailing lists range from the simple to the
extremely complicated involving multiple emails and opinions. You can see if a candidate is very active and if he or she is answering all types of support questions. This is
another way a community resource can be
used to judge a candidate’s experience level.
The benefit a corporation may gain
from hiring someone who is heavily
www.LinuxWorld.com
involved with his or her local LUG can be
expressed through the following example. A
manufacturer in the midwest was looking
for a Linux system administrator to take
care of its growing network. As a result of
its search, the company decided to hire an
individual who happened to be the president of his local LUG. With this great support network at his fingertips, he was able
to solve some pressing issues with the organization’s network through the support of
his fellow open source comrades.
Essentially, this company gained more
than it could ever have imagined. Not only
did they hire a very competent system
administrator, but also one with a support
network that could not be matched. The
end result is a company that is experiencing
an unprecedented decrease in downtime.
Open source projects and LUGs are two
Linux community entities that give you, the
hiring manager, additional tools for evaluating a candidate’s skills. While a candidate
who has not been involved in either open
source projects or a LUG may still be qualified, these types of experiences can make
for a more rounded candidate with better
access to solutions for your firm.
Next
Issue!
Coming Hot off
the press here’s a
sneak peek at the
next issue of LWM!
COMPLETE CONFERENCE
AND EXPO COVERAGE
Conclusion
The world of open source has changed the
landscape of recruiting technology professionals. The ability of individuals to engage in
open source projects, or the realization of the
benefits gained by being a member of a local
LUG, are key items that cannot be overlooked
by corporations when reviewing applicants’
backgrounds. Companies are always looking
for ways to determine the competence of new
employees, whether through skills tests or
obtaining a sample of code they have written.
Rest assured, there is not a tougher test that
can be administered to an individual than the
process of becoming an accepted member of
the open source developer community. This
will go a long way in determining the caliber
of the person you are looking to hire.
LU
EXC
!
SIVE
AUG. 4-7 • SAN FRANCISCO, CA
STRATEGY...
The Linux Desktop: The Second Wave of Linux
______________
DR. MIGRATION COLUMN...
Linux Alternatives to the Windows Server
______________
LINUX BUSINESS & TECHNOLOGY...
SMB Delightful Deliveries Makes the Move to Linux
______________
FEATURE...
Linux Adoption in the Health Care Industry
______________
VENTURE CAPITAL...
Disclaimer
There are plenty of qualified individuals
who don’t engage in open source projects
and/or are not members of their local LUG.
The purpose of this column is to identify
additional resources that are available to
corporations based upon the open source
development model.
The Economics of Linux: New Opportunities
______________
INTERVIEWS...
Kevin Bedell talks with Dave Dargo,
vice president of Oracle’s Linux Program Offices
and
Stormy Peters, open source program manager
of HP’s Linux & Open Source Lab
LINUXWORLD MAGAZINE WWW.LINUXWORLD.COM
17
The World’s Leading i-Technology Publisher
Why
Migrate
COVER STORY
Migrate
Linux?
to
A comprehensive
solution for enterprise IT
PREMIER 2003
18
www.LinuxWorld.com
COVER STORY
BY
..
G A E L
D U VA L
The world offers a number of computer operating systems; in fact, they’ve never
been so abundant. Big names like Apple’s Mac OS and Microsoft’s Windows have been
dominant for a long time, but there is an important emerging operating system
called Linux. After the initial hype of 3–4 years ago, Linux is spreading like wildfire
across the globe, silently yet successfully.
ne of the most important
aspects of Linux is the
huge community of
developers working on it.
This incredible development force is made possible by the concept of open source, or free
software, which allows thousands of highly
skilled developers throughout the world to
create and build software quickly and efficiently.
As a result, Linux has quickly become
one of the most promising operating systems available. Not only has Linux proven its
superiority in the server field as a robust and
efficient system, it has also greatly matured
as a full-featured desktop alternative. So why
are more and more users – individuals and
corporations – using these strange free software products instead of traditional equivalents from the proprietary world?
First of all, Linux is valued as a high-performance operating system due to its modular nature – entire portions of the operating system can be easily added or removed
to greatly affect performance. Additionally,
Linux now supports most PC hardware
devices, including even the “latest and
greatest” products. Linux’s extensive range
of features has increased dramatically over
the past few years. Linux is certainly not a
computer hobbyist’s plaything anymore; it’s
becoming more and more difficult to find
areas that it cannot handle. Finally, the
commercial offerings based around Linux
have dramatically improved, including certification, training, support, and deployment of complex solutions.
Another key advantage of Linux is that it
includes only open technologies based on
public standards (when available). This
means that Linux is always a smart choice
because the included technology is very
likely to already be a standard in the IT
world – technology that is compatible and
interoperable with other operating systems.
With Linux, you will never become a prisoner of technology as often happens in the
Windows and Macintosh worlds.
For example, with Linux it’s very easy to
communicate over a network with just about
any other computer platform, with various
protocols, such as for exchanging data files.
Even in the office productivity field Linux is
rapidly gaining superiority with its
OpenOffice and KOffice office suites, which
understand a number of different office file
formats, including MS Office documents.
On the other hand, the way that Linux
and its applications are developed and produced ensures that it’s very perennial
because in the free software world, even if a
software project is abandoned by its original
authors, there is always someone, or even a
new team of developers, willing to maintain
and release new versions of the software.
Another distinctive advantage of Linux
and free software applications, maybe the
most important, is that software is designed
and created for users by users. In the traditional software industry, new features are
introduced by a software company solely
because the company thinks it will be a
good idea, perhaps as the result of a marketing survey. In the Linux world, the
approach is totally different: users request
new features and free software developers
implement them. The resulting products
and features answer real needs, which is
really the purpose of designing and building software in the first place.
In other words, in the Linux world, software makers don’t decide what the users
need. Users decide.
www.LinuxWorld.com
19
O
Not Just an Operating System
Linux is widely regarded as an operating
system – specialized software that can run
various hardware devices attached to a PC,
with an interface so the user can take
advantage of those peripherals. But with
Linux, you not only receive a basic operating system. A full Linux system is usually
offered as a “Linux distribution,” such as
Mandrake Linux, on a number of CD-ROMs
that include a wide assortment of many of
the best applications available for the operating system.
This comprehensive collection of software is selected, tested, and integrated into
the Linux distribution by Linux vendors;
the result is a fully customizable multipurpose IT system.
So what does this mean to a computer
user? Normally, after installing a traditional
operating system on a computer, you can
do...well, not much, really. You can use
some simple utilities, play a few games that
come with the system, and, on recent systems, connect to the Net and browse the
Web. But if you plan to do something really
useful for your business or for your personal needs, you’ll first have to locate and purchase all the software packages needed for
each task.
Now take a look at a modern Linux system. Not only are you provided with a comprehensive collection of Internet utilities
such as Web browsers, graphical FTP
clients, e-mail readers, chat programs, and
so on, but the system also includes just
about everything you’ll ever need for office
tasks, such as a complete office suite, calendar applications, project managers,
finance applications, and much more.
Do you need to modify and create
graphics? No problem! You’ve also got a
A B O UT
TH E
A UTH O R
Gaël Duval has been a Linux activist since
he discovered Linux in 1995. He released the
first version of Mandrake Linux in summer
1998 with the goal of making Linux easier to
use. He cofounded MandrakeSoft in late 1998
and is currently the director of communication
at MandrakeSoft, among other tasks.
[email protected]
PREMIER 2003
COVER STORY
first-class, full-featured image manipulation program plus a 3-D modeler. Need to
burn CD-Rs or DVD-Rs? Easy-to-use graphical applications for these tasks and more
are also included.
Linux also excels in the server area: all of
the most common and powerful Internet
services are yours. Run your own DNS server, file and print server, and FTP server. Not
enough? Then run your own Internet Web
server, e-mail server, a SQL database, and
so on. It’s all in there. These are not small
basic applications, but “real deal”
applications that power most Internet Web
sites and related services.
Last but not least: What is the cost of
development tools under Windows? Often
very expensive. But extremely powerful
development tools – including various programming and scripting languages, toolkits,
and integrated development environments
– are all standard in a Linux distribution.
And of course, all the related documentation is provided, often in a number of different languages.
Yes, all this and much more is included
in a $60 Linux pack. As a result, comparing
the price of Linux with Windows doesn’t
make much sense unless you consider the
price of all the extra applications that you
will need with Windows and other operating systems.
porate environment. The existing network
infrastructure benefits greatly after being
migrated to Linux. Authentication and
security services, DHCP servers, print
servers, Internet gateways – all of these can
be switched safely and easily.
Additionally, intranet and Internet
servers such as Web servers and database
servers will benefit greatly from a migration
that results in added stability, fewer bugs,
and extended uptime.
As for migrating desktops to Linux, this
is a new area that needs to be addressed
more carefully because experience in this
field has not been as extensive as in the
server area. Linux is certainly mature
enough to replace Windows efficiently and
safely on the desktop, but resistance can
arise from users who will need to learn
something slightly different from what
they’re used to. Fortunately, the jump is
much less dramatic than it was when
switching from MS-DOS to Windows, or
even from Mac OS to Windows!
In the desktop area, it’s important to
think about which applications must run
on the workstations, because it’s not yet
possible to find a Linux equivalent for
each and every Windows application.
Nevertheless, solutions do exist to resolve
these issues, including emulators for
Windows applications or using a dual-
“So is Linux good enough
to win the OS war?
Absolutely, if you
consider only its price”
Migrating to Linux:
Why and How
More and more companies are migrating parts or all of their infrastructure to
Linux. They need a system that is more efficient, more flexible, more open, more
robust, and more customizable. In these
challenging economic times, businesses
also need to reduce their total cost of ownership. Linux is certainly the best solution
for all of the reasons stated above, and
more.
At the same time, it’s important to consider what exactly can be migrated in a cor-
boot method. Emulation software can be
used to run a complete Windows system
under Linux or for running individual
Windows applications. The dual-boot
method allows users to have Linux and
Windows installed on the same machine,
but the PC must be rebooted to switch
between operating systems, which
requires added time.
Before migrating to Linux, it’s also
important to list all of your computer hardware and make sure it’s supported.
Unsupported hardware is becoming less
common under Linux, but it does still hap-
PREMIER 2003
20
pen, especially in specialized areas such as
professional sound production.
It’s often easier to migrate to Linux in
several steps. One technique is to begin
with the network infrastructure, then the
servers, and finally the desktops. In all
cases, it’s important to ensure that a good
level of knowledge is available within the
company, especially if the information system teams are deeply rooted with Microsoft
proprietary technologies. Getting in touch
with a Linux service provider for support
and assistance is also a good idea when
considering a migration.
Migrating to Linux is certainly the best
option for reducing the total cost of ownership of an information system because of
suppression of most licensing costs and
reduction of costs related to system administration – a Linux-based environment will
need few administrators compared to other
systems. It’s also the best solution for
increasing the efficiency and the stability of
the whole infrastructure.
And the Winner Is...
For years analysts have been predicting that
Linux would never gain on Windows, that
Linux would rise and fall, that Linux is just
hype. But very few of them (apart from “evangelists” in the Linux world) predicted that Linux
and open source would continue to grow, first
in the server area and now in the desktop area.
The reality is that many new companies
and individuals continue to jump onto the
Linux wagon every day. If it keeps going at
this pace, you have to wonder: Which operating system will win in the end?
Although this question may sound a bit
ridiculous, it’s interesting to think about the
“good enough software” concept. “Good
enough software” refers to a product that is
far from perfect but can do, more or less,
what it’s been designed for. With the consideration of other factors such as price,
this good enough software often gains more
success than equivalent or better software.
For instance, MS-DOS was chosen by IBM
for its PCs in the early ’80s over other alternatives not because it was the best available operating system, but because it was
the cheapest. On the other hand, in the
early ’90s the NextStep operating system
was considered to be one of the best modern operating systems available, but it died
prematurely because it was too expensive.
So is Linux good enough to win the OS
war? Absolutely, if you consider only its
price. But Linux is, without a doubt, much
better than “good enough”!
LINUXWORLD MAGAZINE WWW.LINUXWORLD.COM
www.LinuxWorld.com
E-MAIL
Practical Methods for
Combatting Spam
Tackling the problem of overflowing inboxes
In the last year or so, unsolicited bulk e-mail, more affectionately known as
“spam,” has made headlines and angered, irritated, and frustrated millions of e-mail
users. It’s even having a significant impact on the infrastructure of the Internet; AOL
reports it blocks approximately 1 billion spam e-mails per day. Such a high volume
consumes considerable resources.
As founder and president of Roaring Penguin
Software, Inc., David Skoll applies his experience in custom software development, network
design/security, Web, e-mail, and FTP server
configuration to solving the networking, systems, and software tools challenges of enterprises. David is the developer of MIMEDefang
and creator of rp-pppoe, a PPPoE implementation for Linux that is deployed across Linux
servers and clients worldwide. Most recently, he
developed and now offers CanIt, an industryleading anti-spam solution for enterprises.
[email protected]
Outlook, Pine, or whatever program Alice
uses to create and send e-mail. Alice composes her e-mail and then clicks “Send.”
Alice’s MUA contacts her service
provider’s SMTP server. SMTP (Simple
Mail Transfer Protocol) is the agreedupon “language” for transferring
mail across the Internet. Alice’s
MUA tells the SMTP server
who is sending the e-mail
and who the recipients are
(in general, there can be
many recipients). It then
sends the message header
and bodies. Once the SMTP
server has collected the
message and agreed to
transfer it to the final destination, Alice’s MUA reports successful
transmission.
The SMTP server stores the message on
disk and attempts to send it to its final destination. If Bob is across the country and
uses a different ISP, Alice’s ISP’s server
determines which server handles mail for
Bob’s domain. It looks up this information
in the Domain Name System (DNS). DNS is
a large, decentralized database that maps
machine names (like www.roaringpen
guin.com) to IP addresses (like
216.191.236.23). DNS also tells mail servers
where to send mail for a given domain.
Alice’s ISP’s SMTP server connects to
another SMTP server and transmits the
message, much as Alice’s e-mail program
PREMIER 2003
22
his article will describe how
spammers can get away with
spamming, why spam is such a
problem, and why it’s likely to
remain a problem for quite a
while. However, it’s not all bad
news; I’ll give you concrete tips for reducing spam and lowering the cost of spam to
your organization. As an added benefit,
some of the techniques serve to increase
spammers’ costs.
T
How Internet E-Mail Works
To understand spam, we first have to
understand how e-mail flows across the
Internet. Suppose Alice wants to e-mail
Bob; Figure 1 shows how it might work.
Alice sits down at her computer and
starts her Mail User Agent (MUA). This is
simply the technical term for Evolution,
A B O UT
TH E
A UTH O R
D AV I D
F.
S KO L L
did in the first place. The server may contact the final SMTP server responsible for
Bob’s e-mail directly, or there may be a
series of servers that relay the message. The
exact path taken by the mail depends on
Bob’s ISP, and to some extent on conditions
on the Internet at the time. For example, if
Bob’s ISP’s main SMTP server has crashed,
mail may be temporarily routed to an alternate server. Alternatively, Alice’s ISP’s server
may hold on to the mail and retry transmission periodically.
Eventually, Alice’s message arrives at the
final server that holds Bob’s mail. The mail
stays there until Bob connects
to retrieve it. When Bob
clicks on “Check for New
Mail” in his MUA, the
MUA contacts Bob’s ISP’s
server and downloads
mail. Rather than using
SMTP, this final download usually uses a protocol called Post Office
Protocol 3 (POP3) or
Internet Message
Access Protocol
(IMAP). Regardless, once
the mail is safely on Bob’s computer,
it is usually deleted from the ISP’s server.
How Spammers Exploit
Internet E-Mail
When SMTP was designed some 21 years
ago, it met the design goals admirably – it
was a simple, easy-to-implement, reliable
mechanism for getting mail from Alice to
Bob. Understandably, of course, it did not
meet goals which weren’t important 21
years ago, but have become very important
today. SMTP suffers from the following
shortcomings:
• There is no mechanism for authenticating a sender. That is, anyone can fake email from Alice, and Bob will have a
www.LinuxWorld.com
E-MAIL
hard time telling that it isn’t actually
from Alice.
• Even if we could authenticate senders,
SMTP has certain special senderaddresses that must always be accepted
as valid, no matter what. These special
addresses are intended for error reporting, but can be exploited by spammers.
• SMTP doesn’t define a policy for relaying
mail. Until fairly recently, many SMTP
servers would happily accept e-mail from
anyone, for anyone, and relay it onward.
In the next section, you’ll see why these
so-called “open relays” are a problem.
Unfortunately, neither SMTP nor the
underlying Internet protocols were
designed with security or authentication in
mind. On the one hand, the simplicity of
the protocols leads to the rapid expansion
of the Internet and the dramatic growth of
the Web. On the other hand, it also led to
problems like spam and Internet fraud.
A Few Years Ago: Open Relays
In the past, spammers would actively
search for and exploit open relays. An open
relay is an SMTP server that will accept email from anyone and send it to anyone
else, without requiring authentication. The
reason open relays were so attractive is that
they serve as bandwidth multipliers.
If a spammer on a dial-up line wants to
send one million messages, that could take a
while if he or she has to send each message
individually. However, an open relay allows
the spammer to batch up messages – for
example, he or she can send one message
and tell the relay to send it to 100 recipients.
This reduces the spammer’s bandwidth by a
factor of 100 – an enormous savings.
The problem of open relays led to the
formation of DNS-based real-time blacklists. Just as the DNS can hold information
about host names and addresses, it is also
possible to maintain databases of known
open relays. SMTP software can consult
these databases and refuse e-mail from a
known open relay.
DNS-based blacklists are useful, but
they can also cause problems. Some blacklists are overly aggressive, blacklisting
whole swaths of the Internet because of
one badly behaved server. They also may
be slow to remove open relays once they
have been fixed. Relying on such overly
aggressive blacklists can result in legitimate
mail being lost.
On the other hand, more conservative
blacklists are reactive – they require ample
proof that a machine is an open relay
before listing it. Unfortunately, by the time
the relay makes it onto the blacklist, the
spam has already been sent and the spammer begins searching for another open
relay to victimize.
Spammers still use open relays because
they can help obscure the original source of
the e-mail. So real-time blacklists are
worthwhile, but be aware that they will not
stop all or even most of your spam, and
banning mail based on the fact that its
relay is in a blacklist will cause you to lose
valid e-mail.
Alice
B b
More Recently:
Cheap Broadband
In the last couple of years, residential
broadband has become cheap enough that
many people can afford a fast Internet connection. This means that spammers can
send directly from their cable modem or
DSL link, without requiring the bandwidth
multiplication of an open relay. For example, a spammer with a cable modem capable of transmitting 500KB/s can theoretically transmit just over a million 5KB
spams per day. Thus we see a couple of
trends: spam messages tend to be fairly
short now, because home spammers don’t
have the benefit of bandwidth multiplication. Also, we see message mutation –
spammers insert random characters into
message headers and bodies to try to fool
software that recognizes “known-spam”
messages. If you have to transmit every
message from your computer anyway, you
might as well mutate it to make widespread
detection of identical messages difficult.
Anti-Spam Tools
Anti-spam tools can be divided into the
broad categories described in this section.
Blacklists and Whitelists
These tools cover both real-time DNSbased blacklists as well as personal blacklists and whitelists maintained by server
administrators or end users. Blacklists and
whitelists have a number of problems. They
tend to be reactive, kicking in only after
spam has been delivered at least once. They
may also be overzealous, stopping legitimate e-mail. Finally, blacklisting by sender
address or domain is practically worthless,
because these can easily be faked.
Distributed ‘Bulk-Measurement’ Tools
MU
A
MU
A
MT
A
The Distributed Checksum
Clearinghouse (DCC) collects statistics
about how many copies of a particular message have been sent. Clients can query the
DCC and refuse messages that “look” bulky,
by whatever criteria the client uses. For
example, you may choose to reject a message if 350 identical copies of it have been
sighted in the wild. DCC is a very clever
idea, but it only samples a small percentage
of all Internet e-mail. It can also be fooled by
hash-busting techniques (message mutation
to fool duplicate-detection) and may yield
false positives for mailing-list traffic.
23
PREMIER 2003
SM
OP3 or IMAP
MT
A
MT
A
SM
FIGURE 1
M
ALICE EMAILS BOB
www.LinuxWorld.com
E-MAIL
Distributed Spam-Reporting Centers
One example is like Vipul’s Razor. Razor
allows you to report spam to a central
clearinghouse, and other Razor clients can
query the clearinghouse to see if a message
has been reported as spam. Razor uses
sophisticated techniques to try to fool
mutations and hash-busting, but again, a
determined spammer can probably work
around it, and Razor also sees only a small
percentage of all Internet e-mail traffic – as
of mid-March 2003, Razor processes
around 15 million e-mail messages per day,
which is probably much less than 1% of the
Internet’s daily e-mail volume.
The content-filtering category can be further divided into tools that come with a
built-in set of rules, and tools that “learn”
from your incoming e-mail. The hottest topic
in mail filtering recently is so-called Bayesian
filters. You train these filters by marking your
incoming mail as spam or non-spam. Using
statistical techniques, the filters eventually
come to recognize key words or phrases that
are useful for distinguishing spam from nonspam, and can automatically characterize email fairly accurately.
Content filtering has some disadvantages. Because it must analyze the mail
message, content filtering can be applied
False Positives
In an ideal world, you’d set up your mail
server with its arsenal of anti-spam tools,
and it would automatically get rid of almost
all of your spam, leaving you only with
valid messages and the occasional spam
that slips through.
Unfortunately, almost all spam-detection tools have a nasty side effect: they
occasionally misclassify valid e-mail as
spam. This kind of misclassified e-mail is
called a “false positive,” and is a showstopper for many people. Many businesses
feel they cannot afford to lose even a single
potential client or sales lead, so they do
“Spam is a problem because
of a combination of technical,
economic, and social conditions”
Sender-Verification Tools
not discard e-mail identified as spam.
Instead, they simply tag it or file it in a different folder. Unfortunately, this means
that you have to check the spam messages
every so often to extract the occasional
valid e-mail. This wastes time and defeats
the purpose of having automatic spamdetection tools.
These tools examine the content of email messages, and (with varying degrees of
sophistication) attempt to classify e-mail as
“spam” or “non-spam.” Simple-minded
content filters can often incorrectly categorize e-mail, much to the annoyance of both
senders and recipients, but better-designed
and more sophisticated filters can achieve
quite high accuracy rates.
only after the sending SMTP relay has
transmitted the message. If content filtering
is done on the mail client, then you’ve
already wasted time downloading the mail
so your filter can examine it. On the other
hand, some organizations that filter on the
server use a single set of rules for the entire
organization. This may or may not be
acceptable; what the engineering group
considers spam might not be spam to the
marketing group.
Content filtering is expensive in terms of
CPU time. And Bayesian filters can quickly
build a rather large database of word or
phrase frequencies; if you want to have
individual Bayesian filters for thousands of
end users, you could be looking at significant amounts of storage.
Content filtering can be fooled. A filter that
uses externally supplied rules needs constant
updating. While it is harder to fool Bayesian
filters, it is still possible. By carefully crafting email messages, an attacker could cause the
Bayesian database to grow significantly. Also,
Bayesian filters require a fair amount of work
from the end user to train them.
In spite of these problems, filters are
currently the most accurate way to sort
spam from non-spam, and Bayesian filters
are probably the best way to customize filtering per recipient.
PREMIER 2003
24
www.LinuxWorld.com
These tools attempt to verify that the
sender address exists. There is no satisfactory automatic way to determine this, so
some tools send out a “challenge” to
unknown senders. If the sender does not
reply with a correct response within a certain time period, the mail is discarded.
Challenge/response tools are probably
highly effective, but they are also very
annoying for people who are trying to communicate with you. Many people will not
bother responding to a challenge to prove
their existence, especially if they just
dashed off a quick note to a sales or information address on a Web site. Also, the email traffic caused by the outgoing challenges may itself be viewed as spam if challenge/response systems become widespread.
Content Filters
Profile of the Ideal
Anti-Spam Tool
After all this discussion, we can build
the profile of the ideal anti-spam tool.
1. The tool must work with current protocols and Internet infrastructure: A true
solution to the spam problem will probably require complete reengineering of
Internet e-mail protocols; such reengineering is unlikely to happen within the
next decade, if at all. So practical antispam tools must work within today’s
SMTP environment.
2. The tool must not depend on a significant fraction of the Internet adopting it:
It’s no good to say “if only all SMTP service providers would provide strong
authentication...” because it won’t happen. Getting even a small fraction of
Internet users to agree to change something on their mail servers is nearly
impossible.
E-MAIL
lor messages to evade filters; if different
users have different filtering rules, it’s
hard to know how to construct a message
that will evade them all.
8. The tool should be efficient and not
overload the mail server.
3. The tool should run on the mail server:
Updating software on a few million mail
servers is far cheaper than distributing
software to hundreds of millions of enduser PCs. Filtering on the server also
saves download time for dial-up users.
4. The tool should be broad-spectrum and
capable of easily integrating new antispam technologies as they become available: Simply using real-time blacklists
and leaving it at that, or only doing simplistic word or phrase filtering, just won’t
cut it. Because the spam versus antispam battle is an arms race, our antispam tools must be capable of identifying and reacting quickly to new spammer tactics.
5. The tool should be flexible: This follows
from the previous point; it should be
easy to modify the tool to stop new
spammer tactics.
6. As far as possible, the tool should preserve both the sender’s and the recipient’s privacy: It should not expose the
contents of e-mail to anyone unless the
recipient explicitly consents to such
exposure.
7. The tool should be customizable on a
per-recipient basis: What’s spam to you
might be fascinating news to someone
else. Server-based filtering should not
arbitrarily decide for end users what is
spam and what isn’t; end users should be
able to select their own level of filtering,
and set their own level of tolerance for
false positives. Individual users should
decide whether or not they want to put
correspondents through the hassle of a
challenge-response system. Per-recipient
customization has the additional benefit
of making it harder for spammers to tai-
A combination of tools that comes very
close to our ideal profile is SpamAssassin
combined with MIMEDefang. Both of these
tools are freely available under open source
licenses.
SpamAssassin is a Perl-based filter that
performs hundreds of checks against email headers and bodies, and assigns a
score to each check that matches. The
scores are designed so that any mail scoring
under 5 points is probably not spam, and
anything scoring 5 or over probably is
spam. Because SpamAssassin uses sound
statistical methods to derive the scores, it is
amazingly accurate and produces very few
false positives. SpamAssassin also integrates DCC and Razor clients.
Of course, as time goes by, the
SpamAssassin rules become less effective,
because spammers change tactics.
Nevertheless, the basic SpamAssassin rules
retain their efficacy for several months,
which is enough time for the SpamAssassin
crew to identify new spam tactics and
update the rule set.
In addition, the latest release of
SpamAssassin features Bayesian filtering,
so it can learn to distinguish spam from
non-spam from your mail stream. This
extends the useful lifetime of a particular
SpamAssassin release quite a bit.
SpamAssassin can be integrated into the
mail server in several ways. Probably the
most common is to call it from “procmail” –
when the mail message is about to be delivered to your mailbox, SpamAssassin scans
it and can affect how the message is delivered.
However, a more efficient method is to
integrate SpamAssassin directly into the
MTA. The popular Sendmail MTA has a
method for hooking content filters right
into the SMTP conversation; this method is
called “Milter,” for “Mail Filter.”
MIMEDefang is a C- and Perl-based milter that integrates with Sendmail and
SpamAssassin (and a number of virus scanners). MIMEDefang uses architectural
tricks to make Perl scanning efficient –
ordinary PCs can easily handle 100,000
messages per day, and some organizations
have MIMEDefang deployments that handle almost 2 million messages per day.
Note that there are other content scanners out there, such as CRM-114, a very
sophisticated statistical classifier, and
Bogofilter, another Bayesian filter. There’s
also POPFile, a Bayesian filter designed to
pull mail off POP3 servers and classify it.
There are also other Sendmail milter
programs, many of which are listed on the
Milter Community Site. However, in this
article, I concentrate on SpamAssassin and
MIMEDefang for a few reasons:
SpamAssassin is the best-known contentscanning tool, and it also integrates many
other anti-spam tricks such as the DCC and
Razor. It’s also under active development.
And MIMEDefang is the milter I’m most
familiar with (having written it). It’s also
easy to customize the behavior of your
Sendmail server with MIMEDefang, and I
believe that rapid customization is the key
to reacting to new spammer tactics.
www.LinuxWorld.com
25
PREMIER 2003
SpamAssassin and MIMEDefang
E-MAIL
However, all of the anti-spam ideas presented here are applicable to any mail server and any mail filtering system. Depending
on your setup, however, some of these
ideas may be more work to implement with
a non-Sendmail system than with a
Sendmail server running MIMEDefang.
Using MIMEDefang
and SpamAssassin
Once you download and install
MIMEDefang and SpamAssassin, your mail
server will automatically tag messages that
look like spam. You can configure your email client to look for these special tags and
file spam in a separate folder or even discard it entirely.
For more control, however, you can customize MIMEDefang’s filter. MIMEDefang
filter rules are written in Perl, so you need
to know a bit of Perl before you tackle filter
customization. However, this programmability yields tremendous flexibility. Here are
some things you can do very easily with
MIMEDefang; the Perl recipes are available
from the MIMEDefang mailing list archives:
• Automatically reject messages scoring
higher than a specified spam value.
• Remove large attachments and replace
them with URLs.
• Reject mail in certain character sets,
such as Korean.
• Redirect suspected spam to a spamtrap
e-mail address.
• Detect and remove viruses and Windows
executables.
• Blacklist certain domains unless the
sending relay matches the domain.
For example, it is very effective to block
mail from “hotmail.com” unless the name
of the sending relay ends in “hotmail.com”.
While this can block legitimate messages,
this rarely happens, in my experience. It
does block a lot of spam, though.
Once you become used to MIMEDefang,
you can explore tricks to combat spammer
strategies. Let’s look at a few of these tricks.
Spammers often do not wish to incur this
expense; they simply ignore the failure and
never resend the message.
Therefore, a very effective technique is
for your mail server to keep a list of “known
senders”; that is, a list of senders who have
ever attempted to send e-mail to the server.
If mail from an unknown sender arrives,
the sender is added to the list and a temporary failure notice is issued. If the sender is
legitimate, the mail will be resent (typically
after 15–30 minutes) and will be delivered
as usual. If the mail is from a spammer
using special “never-retry” software, the
mail will never be delivered.
This simple rule is very cheap, uses very
little bandwidth, and stops anywhere from
10–20% of spam with no human intervention and practically no false positives.
With a little effort, this rule can be programmed into MIMEDefang.
Check the HELO string
The rules of SMTP state that the sending
relay must identify itself upon connection
with a so-called “HELO” command. This
command is supposed to contain the full
host name of the sending relay. However,
some spamware uses the host name of the
receiving relay in the misguided belief that
this will somehow relax anti-relay or antispam rules. Since your own mail server
should never connect to itself, you can simply reject mail from any mail server claiming to be your own.
Other spamware uses an IP address in
the HELO command, often a completely
random IP address to try to confuse recipients and cause them to misdirect spam
complaints. Refusing mail from machines
that use an IP address in the HELO command is cheap and effective.
The two HELO checks, on our mail server, stop about 2.5% of all the mail we
receive.
Check for Sender/Relay Mismatches
Spammers want to send messages cheaply. The normal rules of SMTP allow for a “temporary failure.” That is, the receiving server
can tell the sending server that it is unable to
accept mail for the moment, but the sender
should retry a little later. This allows
workarounds for transient problems, such as
a full disk or a broken network connection,
that are expected to be fixed later on.
Well-behaved SMTP servers queue the
outgoing message and retry periodically.
This rule is not suitable for general-purpose use, because it could yield many false
positives. However, we have discovered that
rejecting mail from senders at “hotmail.com”,
“aol.com”, “yahoo.com”, and “ibm.com”
unless the sending relay’s name ends in the
corresponding domain stops about 5% of our
incoming mail volume. Our mail logs show
that all such stopped mail is almost certainly
spam – we see sender addresses such as
“<[email protected]>” and “<tibia32
[email protected]>”, which appear to be
randomly generated, as well as obvious spam
sources like “<[email protected]>”.
PREMIER 2003
26
Force a Retry
Use Open-Relay Blacklists
Open-relay and other spam-source
blacklists can be very effective; unfortunately, they can also yield a lot of false positives.
We recommend that before you block mail
based on results from an open-relay database, you configure MIMEDefang to tag
such mail first. After a month or so, you’ll
get a feel for how aggressive or conservative
the database is, and you can decide whether
or not to trust it to reject mail automatically.
Summary
Spam is a problem because of a combination of technical, economic, and social
conditions. Current e-mail protocols cannot enforce authentication; sending e-mail
is so cheap that even dismal response rates
make spamming profitable, and enough
people are taken in by spam fraud that it
makes the con artists keep spamming.
Unfortunately, all of those conditions
are difficult to change. An overhaul of email protocols is not likely in the short to
medium term. One of the attractions of email is the very low cost of sending e-mail;
any solution that makes it expensive to
send e-mail will also change the nature of
e-mail and make it much less attractive.
And as long as there are gullible people out
there, spammers will always have a nonzero response rate.
Given these conditions, the fight against
spam will be a long, grinding arms race. No
single tool or technique will vanquish spam;
instead, we need to use combinations of
tools and techniques to restrict the strategies available to spammers. By forcing certain behavior on spammers, we can lower
the cost of dealing with spam and improve
our spam-fighting tools’ automation.
Resources
• Distributed Checksum Clearinghouse:
www.rhyolite.com/anti-spam/dcc
• Vipul’s Razor:
http://razor.sourceforge.net
• “A Plan for Spam” (Bayesian filtering):
www.paulgraham.com/spam.html
• SpamAssassin: www.spamassassin.org
• CRM-114: http://crm114.sourceforge.net
• Bogofilter: http://bogofilter.source
forge.net
• POPFile: http://popfile.sourceforge.net
• MIMEDefang: www.mimedefang.org
• Milter Community Site: www.milter.org
• CanIt: www.canit.ca
• Open-Relay Blacklists:
http://dmoz.org/Computers/Internet/
Abuse/Spam/Blacklists
LINUXWORLD MAGAZINE WWW.LINUXWORLD.COM
www.LinuxWorld.com
DR. MIGRATION
Introduction to the
Linux Desktop
A look at Linux in the Windows-centric enterprise
This column is dedicated to helping IT managers understand and investigate
Linux as an alternative to commercial server and desktop solutions. As a Windows
refugee I’ll share my experience, providing both strategic and tactical advice on how
to take advantage of the Linux operating system. I hope this column will be a
resource for understanding the business case and technical pathways to migration.
Meet the Doctor
BY
M A R K
R.
H I N KL E
market share and coffers overflowing with
cash. Paradoxically, at no time in computing history has a community development effort or an alternative operating
system posed such a looming threat to an
industry leader as Linux now does to
Microsoft.
Linux vs Commercial
Operating Systems
Mark R. Hinkle is the vice president of
operations for NeTraverse, a Linux software
company that specializes in Windows-to-Linux
migration. He is on the Formation Board for
the Desktop Linux Consortium.
[email protected]
most organizations’ needs. In spite of this, a
responsible manager should pursue the
best value (features plus performance
divided by cost). It’s a Microsoft world, but
Linux is a popular option that offers good
value – and hopefully the competition that
will drive improvements in both operating
systems.
Despite Linux’s growing popularity,
there’s quite a gap to bridge, especially as
Microsoft enjoys a comfortable lead in
The business case for Linux involves
many factors: improving your overall TCO
(total cost of ownership), adding functionality, and improving stability, productivity,
and overall knowledge worker efficiency.
This is a tall order for an operating system
that some have described as a hacker science project. As you embark on your personal investigation you’ll probably have to
consider the following issues:
• Software licensing costs: One of the
strongest selling points associated with
Linux is the Open Source/Free Software
model. Software and operating systems
are community property that can be
downloaded for free from the Internet.
However, this is simply the tip of the
iceberg, a “free ticket” to a great show.
Once you figure the cost savings for
administration and benefits from
increased productivity, you’ll realize
this is simply a low barrier to entry and
only a fraction of the real value of
Linux.
• Reduced administration: In the typical
office, whether it’s an SMB (small-tomedium business) or an enterprise, the
cumulative costs for administrators,
help desks, and the tools needed to support these functions can become costly.
Linux can be remotely administered
with a very secure set of open source
tools, enabling administrators to fix
problems even as users continue uninterrupted in their everyday work.
PREMIER 2003
28
www.LinuxWorld.com
’ve been a dedicated Microsoft user
since the beginning. However, the
increasing frequency of operating
system upgrades, rising minimum
hardware requirements, and the
general lack of valuable features
included in new releases prompted me to
explore alternative operating systems. For
years, I turned primarily to Microsoft for
my computing needs both in my personal
life and for the businesses I’ve been
involved with. In recent years Linux has
emerged as a viable alternative to Microsoft
for all my computing needs, be it an enterprise server or personal desktop. The Linux
alternative and the strategies for migrating
from Windows to Linux will be the subject
of this column.
As you explore Linux as an alternative to
your existing infrastructure, the reasons to
migrate to Linux should be business driven,
not ideological. Anti-Microsoft sentiment
seems to be growing, but at best it should
be only a catalyst for researching alternatives. The simple fact is that Microsoft does
offer a complete set of tools to address
I
A B O UT
TH E
A UTH O R
DR. MIGRATION
At one time the number of reasonable
objections to Linux outweighed the benefits of migration for many organizations.
That day has passed. Linux is now a realistic and responsible solution for more companies, schools, and government organizations than ever. Despite this fact there are
several popular objections to Linux on the
desktop, to which I offer short rebuttals.
These points may help reassure those of
you who are on the cusp of making a commitment, or at least beginning to research
Linux as an alternative to your current IT
solutions.
• Forking: Many IT managers fear forking
or diverging Linux development that
could result in incompatible vendorspecific versions. This is a legitimate
concern. However, major hardware vendors like HP, IBM, and Dell are working
in the open source community to drive
standards that will ensure an enterpriseclass operating system. The most
notable initiative to date is the United
Linux project (www.unitedlinux.com),
which is a collaborative effort for standardization of a Linux platform that can
be used as the base for Linux vendors to
then apply value-added services and
software. The success of this project will
help ensure that fragmentation and
divergence are avoided, and that a consistent high-quality product continues
to emerge.
• Lack of familiar applications: Windows
has enjoyed an 18-year history as a desktop operating system with over a million
applications available to the Windows
user. However, Linux development is
making exponential gains in valid productivity applications. Additionally,
there are some very good ways to
migrate your existing Windows applications to Linux while preserving your
investment. In particular Win4Lin
(www.win4lin.com), a Windows operating system integration program, allows
you to integrate existing Windows operating systems and applications into your
Linux operating system. This solution
has an 18-year history on SCO Unix and
over the past few years has been migrated to Linux. Fortune 500 companies like
Oracle, AT&T, and McDonald’s have
already adopted this technology.
• Support: Since the operating system is
developed in the general community, it’s
unclear to many where they could turn
for support. IBM, the world’s largest software services company, is fully committed to supporting Linux on the enterprise,
SMB, and community levels. However, for
the SMB the best support options are
available from the Linux distribution vendors, whose main form of revenue will be
generated by supporting the Linux operating system and applications. Red Hat
has emerged as the leader in this field,
and German software distributor SuSE is
following close behind. Additionally, a
rapidly expanding number of regional
VARs (value-added resellers) have the
ability to help businesses execute a
dependable technology plan.
• Lack of Linux expertise: Many organizations have spent so much time and
money in training their staff on
Windows or other operating systems
and applications that the learning curve
is their biggest factor for not moving.
This is probably the most legitimate of
www.LinuxWorld.com
29
• Improved stability and productivity:
Linux is truly a multiuser/multitasking
environment with good resistance to
crashes, and it allows users to resist the
need to reboot. It is not uncommon for
computer users to go weeks or months
without a reboot. Imagine how much
time you may be losing already; one
reboot a day per computer-dependent
worker adds up fast. Especially if that
reboot is accompanied by an unnecessary break (a cup of coffee and a “bull
session” while my computer is rebooting
may take several minutes). If that one
reboot costs a company five minutes per
employee per day, multiply that by the
number of employees, and losses in productivity are substantial.
• Customizability and open source: With
commercial operating systems you often
end up paying for unutilized or underutilized features. Most Windows users
today utilize only a small fraction of the
features and software made available to
them when they buy the Microsoft
Office suite and the operating system.
Implementing an open system like Linux
enables you to choose to install thousands of applications or just the applications you need, with little or no licensing
costs.
Biggest Objections to Using Linux
all objections – until they look at their
five-year planning horizon and consider
the risks of a subscription-based
Microsoft upgrade path. Retraining
costs are significant in any move from
one operating system to another, but
system upgrades every two years from
Microsoft require some training as well.
Decision makers need to carefully weigh
these costs when deciding between
moving to a new operating system or
staying with the old. With a well-defined
phase-in plan it’s possible to minimize
retraining costs over time while realizing the benefits of a Linux operating
environment.
Hopefully you now have some confidence in why you should be investigating
Linux as a desktop alternative. The next
step is to do some firsthand research and
see the operating system in action.
The Linux Desktop from
a User’s Point of View
Most people who first see the Linux
desktop are surprised by its similarity to the
environments that they are already using.
The most popular environments are the
KDE (www.kde.org) and GNOME
(www.gnome.org) desktop environments.
Despite the stigma Linux has of being a
“geek’s” operating system, there are many
community projects aimed specifically at
making the Linux operating system friendly
to the novice Linux user and those who
may be quite experienced using other operating systems, like Windows.
The desktop environments shipped with
most major Linux distributions are very
similar to those that you’re accustomed to
in Windows. Many have a button in the lefthand bottom corner were you can “start”
gaining access to applications or find control panels to adjust settings. The desktop in
most popular environments has the familiar
trash can and a file browser as on the
Windows and Mac operating systems. The
familiar network neighborhood icon is
absent by default, but there are a number of
open source projects that provide the same
functionality for Linux. Nearly all of these
crossover networking solutions are based
on the Samba project (www.samba.org),
which can communicate with Microsoft’s
file- and printer-sharing protocol, SMB
(Server Message Block).
PREMIER 2003
DR. MIGRATION
Now that you understand the similarities
between the Linux and Windows desktop
environments, let’s look at the differences.
The first is the workspace guide. This allows
you to create virtual desktops, where applications can be stuck on each desktop like
sticky notes. Rather than minimizing applications to view the desktop, users can sim-
ply stick a few applications on each desktop
and navigate their virtual workspaces via a
grid on the taskbar. However, it’s as simple
to minimize applications as in Windows.
Another useful feature is the design of the
Linux GUI (graphical user interface). It utilizes the X Windows system, which is not
necessarily tied to a physical piece of hard-
ware like the traditional PC. It’s actually a virtual display that can be displayed to a local
computer monitor or forwarded to another
screen connected via a network – perhaps
one of the most useful and underutilized features of Linux. System administrators and
help desk personnel can take over an X
Session remotely, fix problems they can
duplicate, and diagnose firsthand the problems that may exist with a system – all from
the comfort of their support desk. This is the
same precept as PC Anywhere and the popular GoToMyPC.com. Additionally, this redisplay can be securely tunneled via the SSH
protocol to avoid network snooping.
We can take this solution one step further. Because Linux is a multiuser operating
system able to serve many accounts from
one PC or server, identical or customized
desktops could be redisplayed to dumb terminals or other PCs. With a little know-how
you could eliminate PCs that require individual updates and constant hardware
upgrades. The life of the PC on the desktop
could be extended by years and upgrades
could be made in the data center rather
than at each user’s desk. At the very least it’s
an ideal solution for call centers and the
like, where terminals are shared between
users on various shifts. The idea of centralized computing is an old idea from the days
of the mainframe. It may not be the ideal
solution for everyone but it has merit for
many situations. One popular Microsoftcompatible solution provider, Citrix
(www.citrix.com), has demonstrated the
value of this model, though their core competence is reducing bandwidth and delivering Windows terminals over latent networks. Terminal services is a useful solution
for many problems; I discuss this idea in
detail in future articles.
The fact is that out-of-the-box or freshly
installed, most Linux desktop distributions
mimic the popular commercial desktop
operating systems. However, the Linux
desktop is infinitely configurable, and
polling many users on the configuration of
their desktop may result in drastically different results.
Figure 1 shows Windows 2000
Professional running Microsoft Word, Excel,
Windows Media Player, and AOL Instant
Messenger. Figure 2 shows Red Hat Linux
8.0 with the GNOME Desktop Environment
running Open Office Writer (word processor) and Open Office Math (spreadsheet),
GAIM (instant messaging client), Win4Lin
(Windows on Linux solution), and Evolution
(a Microsoft Outlook–style e-mail client).
PREMIER 2003
30
www.LinuxWorld.com
FIGURE 1
WINDOWS 2000 PROFESSIONAL DESKTOP
FIGURE 2
GNOME DESKTOP
DR. MIGRATION
Practical Solutions:
Easy Linux Test Drive
In the coming months we’ll discuss tactics for migrating to Linux from a Windows
environment. Many organizations today
already have Linux running in the back
rooms and data centers where the most
technical employees work. However, many
decision makers have never seen the operating system in action. In the interest of
improving your firsthand knowledge as well
as to give you insight into how the operating system compares to your current operating system, I would like to offer a practical tip on how to go about your investigation of Linux. Software distribution companies like Red Hat (www.redhat.com), SuSE
(www.suse.com), and Mandrake
(www.mandrakesoft.com) all offer affordable desktop solutions for less than $100
(the cost is for the installation media, documentation, and support – not software royalties). However, it will be necessary to dedicate a computer for running Linux. I would
instead suggest a less-committed solution.
As a first step I suggest a distribution
that can be run from a bootable CD and can
be running on your desktop in less than a
minute. Many free projects are available for
download. Many of these distributions are
developed to solve certain problems. The
advantage is often that the file systems are
read-only, so they can’t be altered in a hacking attempt. Practical applications for this
technology are for simple tamper-proof firewalls, unsophisticated Web servers, rescue
disks, operating systems for thin-client
computing applications, and live demos.
There are varying reasons to use an
operating system that can be run from a CD.
There are many practical uses for this type
of configuration, as I’ve mentioned, but the
reason most germane to this conversation is
that this is an easy way for users to see a
demonstration of the Linux operating system. Listed below are some other great uses
for this type of distribution:
• Rescue disk: Quite a few excellent rescue
disk solutions are freely available for
download – a functioning operating system with network access is only a reboot
away. Since file systems can be read by
the Linux operating system, files can be
edited, drivers can be downloaded, and
the knowledge base of your manufacturer can be surfed, despite the desktop
computer’s broken state.
• Product demo CD: Imagine walking into
a customer’s office, popping a CD into
his desktop computer, and demonstrat-
www.LinuxWorld.com
Figure 3 KNOPPIX operating system
ing your product on his machine. Using
a bootable CD with the appropriate software is a good way for you to make a
high-impact impression.
• Diskless workstations: One of the easiest
ways to repurpose old PCs is to create
diskless workstations. These workstations
could be early-generation Pentium class
PCs, damaged machines with software or
hard disk problems, or computers with
low customization requirements. Virtually
any PC that has a CD drive and working
processor could be put into low maintenance service by simply setting the computer to boot from a CD (a variety of
solutions exist in this space). Take a look
at workers who simply need word processing, e-mail, and Web access. Imagine
never having to fix a user-caused error
again. Updates to the system could be as
easy as changing a CD. Once again, this
may not be the solution for everyone but
it’s definitely food for thought.
Your First Linux Operating
System: KNOPPIX
For the purposes of this discussion, I recommend a distribution called KNOPPIX
(www.knopper.net/knoppix), a more full-featured bootable Linux distribution. This operating system is a good way for anyone without firsthand Linux knowledge to look at the
features available today in most desktop
Linux distributions. The best part about
KNOPPIX is that it can be downloaded via
31
Windows and burned onto a CD for use on
your existing PCs. By default the KNOPPIX
operating system will not write to your hard
drive or damage your existing operating system. However, it is possible to alter your hard
drive or to run your monitor at a resolution
outside the manufacturer’s recommendations if you pass certain commands to the
system. As always, you should read the documentation and proceed at your own risk.
How It Works
KNOPPIX is a one-CD, live file system that
can be customized as a rescue system, security scanner, or platform for presentations
and demos, or as a full-featured portable
production platform with tools like KOffice
and StarOffice. The underlying GNU/Linux
base system is modified to boot non-interactively into a working X Window and KDE
configuration, with all auto-detectable
devices configured, ready to start applications. Because of the on-the-fly compression
of KNOPPIX the whole file system can contain up to 2GB of software on the typical CD.
Best of all, KNOPPIX can be used without
altering your existing desktop computer.
What Applications Are
Included with KNOPPIX?
What’s truly amazing is the sheer number
of applications available from this one CD –
over 900 installed packages in all. This col—continued on page 67
PREMIER 2003
INDUSTRY OPINION
Striking the Balance
Free software projects have to find a reasonable
balance between business interests and other interests
There is a potential conflict of interest between business and society, and that conflict can arise in free software. It’s up to all of us to choose how to resolve that conflict.
Ian Lance Taylor discovered free software and
the GNU C compiler in 1990 and has never
looked back. He has contributed to dozens of
free software packages, wrote the GNU/Taylor
UUCP software package, and was a coauthor of
the book GNU Autoconf, Automake and Libtool.
[email protected]
whole. Successful free software development
efforts generally require central maintenance
– one person or a small group of people who
weave the various contributions together
while maintaining the overall harmony. It’s
neither anarchy nor dictatorship.
The interests of society are best served
when the central maintainers are free to
choose the changes they prefer. When the
maintainers make good choices, the project
succeeds. If the maintainers make bad
choices, that project will fail, or else different maintainers will pick up the
sources and start making their own
choices, an occurrence known as a
fork.
Businesses, of course, are
interested in profit. When the
maintainers of a free software
project work for a company
with a direct business interest in the project, their decisions about the project are
no longer entirely free;
they are constrained
by the needs of the
business.
The potential problem is not really that
business interests will cause bad choices to
be made. After all, it’s probably not good for
the business if the free software project fails
or is forked by somebody else. The potential problem is that business interests will
cause certain good choices to not be made,
either because they are against the interests
of business or simply because the maintainers don’t have time to focus on particular issues.
This issue is not purely theoretical. In
fact, in my years in the free software community, I’ve seen it frequently. Rather than
speculate about other people’s motivations,
I'll give an example from my personal experience. For a few years I was the GNU binutils maintainer and also an employee of
PREMIER 2003
32
edical researchers agree
that the best way to see
whether drugs are really
effective is large-scale
double-blind testing,
which is expensive. Most
such drug testing these days is paid for by
drug companies. Naturally, they tend to test
their new, expensive, patented drugs. There
are relatively few tests run on old, cheap drugs
with expired patents or no patents, even when
those drugs might have interesting new uses
that could help lots of people.
It’s pretty obvious that there is a potential conflict of interest between drug manufacturers and public health. It’s less obvious
how to resolve it. The present resolution is
not quite putting the fox in charge of the
hen-house – but it’s pretty close.
Why am I writing this in a magazine
about Linux? To remind you that there is a
potential conflict of interest between business and society, and to talk about how that
conflict can arise in free software.
Free software is important to society
because it gives us all a computer environment that we are free to use and to change.
When that environment becomes steadily
more powerful and easier to use, as has
happened and continues to happen with
Linux, then we all benefit. However, those
improvements don’t happen by themselves;
they happen because people work on them.
Free software at its best is a collaborative
effort in which many developers work together in different ways to produce a harmonious
M
A B O UT
TH E
A UTH O R
BY
I A N
L A N C E
TAYL O R
Cygnus Solutions (which was later purchased by Red Hat). During that time I
often had to choose to implement features
useful only for specific Cygnus customers
rather than features useful for a broad
range of people. For example, to this day
the GNU binutils include a program which
can convert an ELF object file into a
NetWare Loadable Module. That program is
rarely used even on the Intel x86 platform,
but in fact several man-months of time
were put into supporting other processors –
work which I doubt anybody has ever used,
as it was intended to support the Processor
Independent NetWare project which was, in
the end, canceled. That time could surely have been better spent, and in fact
the nlmconv program continues to
have a minor cost as the current binutils maintainers have to make sure
that it continues to compile, and
will eventually have to decide to
get rid of it.
On the other hand, I don’t want
to minimize the benefits of having
businesses pay the maintainers
of free software projects. Most
obviously, it gives those maintainers more time and more resources
to work on the project.
But we as a society shouldn’t let these
benefits blind us to the potential conflicts.
As with most things, we have to weigh the
benefits and the costs.
In fact, I think that as a society we’re
doing fairly well right now with free software. I think that most free software projects
have found a reasonable balance between
business interests and other interests. But as
free software becomes steadily more popular, business interests become steadily more
entangled with the free software world.
I don’t want the free software world to
wind up like the drug industry. I hope you
agree with me and see that although it hasn’t
happened yet, it still could. Fortunately, as
with all things in the free software world,
we’re all free to choose what will happen.
LINUXWORLD MAGAZINE WWW.LINUXWORLD.COM
www.LinuxWorld.com
PRODUCT REVIEW
NetOp Remote
Control for Linux
Instant access to Linux
machines around the globe
R E V I E W E D
Have you ever needed to get to a Linux desktop on your network, whether to pro-
BY
TO M
M O NTG O M E RY
Product Snapshot
vide desktop support or install an application that required a GUI interface to install?
Target Audience
With NetOp Remote Control for Linux, you don’t have to drive across town to do it.
Tom Montgomery is a 15-year veteran of the
IT industry. He spent 7 years with CSAA (AAA
Northern California), where he learned much
of the skills he possesses today including an
in-depth knowledge of IBM mainframe networking, OS2, Novell, Windows, and network
infrastructures. In 2000, Tom left CSAA to test
the IT contractor market, which is when he
founded Remote Visions, Inc. Since June
of 2002, Tom has been dedicated to the
software side of his business.
[email protected]
usually as a Web server, fileserver, or mail
server, and we’re seeing more and more
on the desktop. NetOp lets us get to those
Linux machines just as quickly and easily
as we can get to one of the Windows
machines.
Here’ s how NetOp works – our support staff has a NetOp Guest on their
computer, and they can connect to a Host
running on a client’s machine, giving
them full control of the keyboard, video,
and mouse no matter where the client is
located. NetOp has had a Guest program
for Linux out for a year or two, but there
was no way to get control of a remote
Linux desktop. With the introduction of
the NetOp Host for Linux, it doesn’t matter whether the end user is on a Windows
machine, a Linux machine, or even a
Solaris machine (yes, NetOp has a Host
for Sun SPARC boxes as well!), we can still
support them. A typical use is the occasion where Telnet or SSH won’t work
because a GUI interface is needed to
install or use a certain application, such
as Oracle or WebSphere.
Other helpful features are the chat and
file transfer features. Chat lets us have an
instant message–type chat between our
support staff and any machine with a
NetOp Host on it. The file transfer lets us
easily drag and drop files from Windows
to Linux and Linux to Windows. NetOp
also includes a handy Phonebook tab to
PREMIER 2003
34
etOp Remote Control is a
remote desktop application geared toward enterprise-level technical support. Since the early ’90s
NetOp has been known for
its speed, stability, and high level of security. We have used NetOp for Windows for
years to support our customers, providing
real-time technical support across the
Internet (and modems when the network
is the problem).
NetOp has cut down travel time and
has reduced incident response time from
hours or days to mere minutes. It also lets
us support many more clients than we
could otherwise, since we aren’t running
all over the place. One of our biggest challenges is that we keep finding Linux
servers here, there, and all over the place –
N
A B O UT
TH E
R E V I E W E R
Network administrators
Level
All Linux users
Pros
• Immediate, direct desktop connectivity
• No need for separate products or interfaces to support Windows and Linux
• Faster than VNC
• No other products do the same
• Free tech support for the life of the
product
Cons
• Not free (but pays for itself very quickly)
• Not as fast as Windows Remote Control
Platforms
Linux, Sun Solaris, Windows, OS2, DOS,
and handhelds
Pricing
Available in combined Guest/Host packages or as stand-alone modules. Guest/Host
packages start at $179. Flexible licensing is
available “Per User” or “Per PC.” NetOp products, along with no-charge, toll-free support,
are available in North America from the
CrossTec Corporation or authorized resellers.
For a free fully functional evaluation copy
visit www.NetOpUSA.com
call 800 675-0729
or e-mail [email protected]
www.LinuxWorld.com
PRODUCT REVIEW
help us connect to PCs without having to
remember their settings. With the NetOp
Guest, we simply set up a phonebook
entry for machines we regularly control –
one double-click, and we’re connected
and remote controlling the machine. It’s
that fast and easy!
The NetOp Host for Linux isn’t as fast
as the NetOp Host on a Windows platform due to bitmapping instead of the
GDI hooking that Windows uses, but it is
much faster and less resource intensive
than VNC. Also, unlike VNC, NetOp lets
you connect to the desktop session that
is running and does not start a new X
Window session, basically enabling you
to see what the user sees. Typically, when
you connect via an X Window, whatever
you’re doing is dependent on your X
Session – meaning if you disconnect, the
process you are running stops. Again,
with NetOp Host for Linux you’re connected to the actual desktop, so if you
disconnect, the actual process continues
to run. This can be particularly helpful if
the Guest PC is in a nonsecured area and
you need to start a database process that
might take several hours. I used to work
at a bank where some procedures had to
run overnight and you had to worry
about whether an after-hours maintenance person might accidentally poweroff the PC. You can start it, disconnect,
and then come back to it later without
worrying what goes on with the PC in the
interim.
Officially, NetOp runs only on Red Hat
Linux, and that’s what we’ve used it on, but
it should work on just about any other flavor of Linux as well. On the support Web
site, www.netop.com/tech, there are installation instructions for SuSE Linux as well.
The installation is very simple via Red Hat
Package Manager, and there’s also a TAR
package available. CrossTec Corporation,
the North American distributor of NetOp,
provides a free full evaluation at
www.crossteccorp.com and also provides
free pre- and post-sale tech support.
Overall I’m very happy with NetOp for
Linux because it lets me reach places I
couldn’t reach before, and I’m pleased
with the performance and flexibility that it
gives me as a technical support entity.
LINUXWORLD MAGAZINE WWW.LINUXWORLD.COM
www.LinuxWorld.com
FIGURE 1
REMOTE CONTROL WINDOW AND TOOLBAR
FIGURE 2
WINDOWS 2000 PROFESSIONAL CONTROLLING A RED HAT LINUX SERVER
35
PREMIER 2003
FEATURE
HyperThreading
HT performance gains make
a strong case for Linux
PREMIER 2003
36
Linux
www.LinuxWorld.com
FEATURE
BY
PA U L
B E M O W S KI
Linux currently enjoys tremendous momentum in the contest for the enterprise
data center. Several factors contribute to this momentum, including the high cost of
alternative platforms, newfound maturity and stability in the Linux OS, and undoubtedly the success of Intel’s high-end line of Xeon processors. With these processors
comes a new technology that holds great promise: Hyper-Threading.
ith the introduction
of the Xeon, Xeon DP,
and Xeon MP processors using the P4 core
architecture, Intel
has incorporated a
new feature known as Hyper-Threading or
HT. HT is Intel’s implementation of a technology known as Simultaneous MultiThreading, or SMT, that allows a single
physical processor to execute multiple
threads concurrently. This new feature has
great potential in the heavily threaded
back-end systems that Linux is targeting in
the enterprise data center.
W
Understanding Hyper-Threading
In an SMT system, a single physical
processor duplicates some of the on-chip
architectural state, allowing the processor core
to make greater use of available resources. The
second architectural state holds another
thread context, allowing the processor to
more completely use its resources when an
active thread encounters some type of latency.
For example, when a processor encounters a cache miss, there is a slice of time
that is normally wasted while the processor
makes a long-latency read from main
memory. In this brief slice of time, the vast
majority of the processor’s resources sit
idle, while the processor reports itself as
busy to the operating system. In an SMT
system, the processor will use an on-board
thread scheduler to immediately execute
the second on-chip thread context’s
instructions, making use of otherwise wasted cycles.
Figure 1 illustrates the basic architecture
of an SMT processor. Most of the processor’s resources, such as the cache and the
www.LinuxWorld.com
Physical Processor
Physical Processor
Architectural
State
Architectural State
Architectural
State
Logical
Processor
Cache
Cache
Processing Resources
Processing Resources
Non SMT Processor
SMT Processor
FIGURE 1
BASIC ARCHITECTURE
computational units, are shared between
the two on-chip thread contexts.
SMT does incur some overhead. When
two threads contend for the same processor resources, it is the responsibility of the
on-chip thread scheduler to interleave the
two active threads. For this reason, in certain situations a non-HT processor will outperform an HT processor. The net effect
however is an overall improvement in performance for multi-threaded applications
running on HT-enabled systems.
HT-Enabled Systems
From a hardware perspective, three subsystems must work together to enable HT:
the processor, the chipset, and the BIOS.
Processor
Currently, all members of Intel’s Xeon
processor family support HT. Xeon here is
not to be confused with PIII Xeon. When
Intel converted the Xeon’s architecture to the
P4 core, it dropped the Pentium designation,
calling the new processors simply Xeon.
Xeons currently come in three flavors:
Xeon, Xeon DP, and Xeon MP. All recent versions of these processors will support HT.
Some older Xeon and Xeon DP processors,
37
commonly characterized by a smaller 256
Kb L2 cache, do not support HT. If you are
purchasing a used Xeon system or used
Xeon processors, be sure to confirm that
they support HT.
In early 2003, Intel released the 3.06GHz
P4 on 0.13 micron technology. This new P4
supports HT, and signals the introduction
of HT to desktop systems. Look for Intel to
continue to support HT on all of its subsequent P4 releases.
Chipset/BIOS
HT requires chipset and BIOS support.
Most of Intel’s newer chipsets are supporting
HT. The following link presents a table of
Intel’s current server/workstation chipset
offerings. The last row in the table indicates
whether the chipset supports HT technology.
http://www.intel.com/design/chipsets/line
card/svr_wkstn.htm
The Basic Input/Output System, or BIOS,
allows a user to set parameters affecting system hardware, before the system boots to an
operating system. As such, the BIOS is generally tightly coupled to the chipset on which it
is installed. In a BIOS that supports HT, the
user will have an option to enable/disable
HT support on the processor/chipset. With
HT enabled on the system, the BIOS presents
each physical processor to the operating system as a pair of logical processors. From that
point, it is the responsibility of the operating
system to make intelligent use of the additional hardware resources.
Linux Support for
Hyper-Threading
Given a processor/chipset/BIOS combination that supports HT, the operating system also needs to support the feature. SMT
introduces many nuances that affect thread
scheduler performance. The first Linux kerA B O UT
TH E
A UTH O R
Paul Bemowski is an independent consultant,
focusing on Java and Linux solutions to
enterprise computing problems.
[email protected]
PREMIER 2003
FEATURE
nel with explicit support for HT was 2.4.18.
Since then the 2.5.x kernel’s thread scheduler has incorporated numerous enhancements that will further increase performance on HT-enabled systems.
Next, we’ll look at HT support in the 2.4
and 2.5(2.6) series kernels.
Hyper-Threading in the 2.4.18+
Linux Kernel
The current stable Linux kernel branch
is 2.4.x, initially released in January 2001.
The 2.4 kernel has since undergone extensive patching, initially for critical bug fixes,
later for feature enhancements and support
for new hardware.
Because the BIOS will present even a
single HT-enabled processor to the OS as
two logical processors, all HT configurations should use SMP (Symmetric MultiProcessing) kernels. Pre-2.4.18 SMP kernels
may recognize two processors in an HT
configuration; however, the scheduler is
completely unaware of the logical/physical
processor differentiation. The 2.4.18 patch
release added some features to the stock
scheduler to make it behave better with HT
hardware. A 2.4.18+ kernel is strongly recommended for HT configurations.
FIGURE 2
TOP RUNNING ON A DELL SYSTEM WITH TWO PHYSICAL PROCESSORS, HT ENABLED
Once you have successfully booted the
HT configuration, run top. If HT is properly
configured, you should see twice as many
CPU states as you have physical processors
(two virtual CPUs per physical CPU).
Figure 2 is an example of top running on
a Red Hat 7.3 system (2.4.18) with two
physical Xeons and HT fully enabled. Note
the CPU states 0–4, indicating the four logical processors.
2.5.x Thread Scheduler Improvements
It would be wise to add this as a different
boot configuration so that you can boot
HT or non-HT. (To create an explicitly nonHT configuration, add the ‘noht’ boot flag.)
3. Finally, reboot the system. Before it
restarts, enter the BIOS setup program.
Under the processor options you will be
able to enable or disable HT. Enable HT,
and boot to the 2.4.18 or later SMP kernel with the additional parameters.
As is standard in Linux kernel versioning, the 2.5.x versions of the kernel are the
development branch that will become the
2.6.x stable releases. The 2.5.x kernel added
a number of features to its thread scheduler
that should extend the performance
improvements of HT even further.
A scheduler patch in 2.5.32 introduced the
concept of a shared runqueue. The shared
runqueue allows two (logical) CPUs, which
share resources like cache, to have a scheduler parallel known as a shared runqueue.
The shared runqueue may have many applications, but the initial implementation was
created specifically with HT in mind. This
new concept optimizes the kernel thread
scheduler for HT in the following ways:
• HT-aware passive load balancing: This
feature addresses the physical CPU
imbalance problem – one physical CPU
may be running two active threads,
while a second physical CPU sits idle.
Passive load balancing will attempt to
schedule new active threads on an idle
physical processor.
• HT-aware active load balancing: Active
load balancing also addresses the physical CPU imbalance problem, this time
for currently active threads. If three
threads are running on three logical
CPUs, and one thread goes idle freeing a
physical processor, the scheduler will
migrate an active thread from the physical processor running two threads to a
physical processor running none.
• Thread affinity: Thread affinity is important in SMP as well as SMT systems.
Processors use cache memory to hold
data and instructions that the processor
is using at the moment. By attempting to
keep threads scheduled on the same
processor, the efficiency of the cache is
greatly increased. Moving a thread
PREMIER 2003
38
www.LinuxWorld.com
Enabling Hyper-Threading in a 2.4 system
Given an HT-enabled hardware configuration, use the following steps to enable HT
in a 2.4 kernel:
1. First, confirm that your kernel is version
2.4.18 or later, with SMP support. There
are many ways to do this, the easiest is to
execute the “uname –a” command in a
shell. For Red Hat users, Red Hat 7.3 was
the first distribution release to support HT,
incorporating a 2.4.18 kernel. If you are
using another distribution, check the kernel version before attempting to use HT.
2. Next, modify your bootloader (grub or
lilo), adding the following parameter to
any other boot parameters currently
necessary for your system:
acpismp=force
Hyper-Threading on 2.4.18+
Thread Scheduler
Performance testing multithreaded
benchmarks under the 2.4 kernel series still
shows some wide scatter in the data. This is
because the scheduler still cannot make
intelligent choices regarding logical/physical processors in many situations. Under
some conditions, 2.4 will still schedule two
active threads on the same physical CPU,
causing performance degradation. This
condition is often random, causing data
points from multithreaded benchmarks to
vary considerably. “Full” HT scheduler support was not incorporated into the kernel
until 2.5.32.
Hyper-Threading in the 2.5.x
Linux Kernel
FEATURE
between physical processors requires
the processor to repopulate its cache
from main memory, causing performance degradation.
In an SMT system, because the logical
processors share cache, the thread scheduler need only attempt to keep threads
attached to a physical processor. The
scheduler is free to move threads between
adjacent logical processors with no performance degradation due to a stale cache.
• HT-aware task pickup: This will allow
the scheduler to pick up tasks on a perphysical CPU basis, rather than per-logical CPU basis. Task pickup is related to
thread affinity above.
• HT-aware wakeup: This allows threads
that were woken up on active logical
processors with an idle sibling to be
woken up on the sibling processor. (As
you might imagine, sibling processors
are adjacent logical processors.)
These features work together in the 2.5.32+
kernel to make more efficient use of the new
hardware features of HT systems. In addition,
the kernel performs in a more consistent
manner by continually making optimal use of
the processors. The 2.4.18 kernel still performs
better as a whole on an HT system, however, it
does so in a less predictable manner.
Performance Gains Using
Hyper-Threading
cpuinfo on an HT system
The /proc/cpuinfo file recognizes four logical processors with HT enabled on a dual physical
processor system. Also note the “ht” flag, indicating a Hyper-Threading processor.
processor:
2
processor:
0
vendor_id:
GenuineIntel
vendor_id:
GenuineIntel
cpu family: 15
cpu family: 15
model:
2
model:
2
model name: Intel(R) XEON(TM) CPU 2.20GHz
model name: Intel(R) XEON(TM) CPU 2.20GHz
stepping:
4
stepping:
4
cpu MHz :
2193.407
cpu MHz:
2193.407
cache size : 512 KB
cache size:
512 KB
fdiv_bug :
no
fdiv_bug:
no
hlt_bug :
no
hlt_bug:
no
f00f_bug :
no
f00f_bug:
no
coma_bug : no
coma_bug:
no
fpu :
yes
fpu :
yes
fpu_exception: yes
fpu_exception: yes
cpuid level : 2
cpuid level: 2
wp :
yes
wp:
yes
flags :
fpu vme de pse tsc msr pae mce
flags:
fpu vme de pse tsc msr pae
cx8 apic sep mtrr pge mca cmov
mce cx8 apic sep mtrr pge mca
pat pse36 clflush dts acpi mmx
cmov pat pse36 clflush dts acpi
fxsr sse sse2 ss ht tm
mmx fxsr sse sse2 ss ht tm
bogomips : 4377.80
bogomips:
4377.80
processor : 3
processor:
1
vendor_id : GenuineIntel
vendor_id:
GenuineIntel
cpu family : 15
cpu family: 15
model :
2
model:
2
model name : Intel(R) XEON(TM) CPU 2.20GHz
model name: Intel(R) XEON(TM) CPU 2.20GHz
stepping :
4
stepping:
4
cpu MHz :
2193.407
cpu MHz:
2193.407
cache size : 512 KB
cache size:
512 KB
fdiv_bug :
no
fdiv_bug:
no
hlt_bug :
no
hlt_bug:
no
f00f_bug :
no
f00f_bug:
no
coma_bug : no
coma_bug:
no
fpu :
yes
fpu:
yes
fpu_exception: yes
fpu_exception: yes
cpuid level : 2
cpuid level: 2
wp :
yes
wp:
yes
flags :
fpu vme de pse tsc msr pae mce
flags:
fpu vme de pse tsc msr pae
cx8 apic sep mtrr pge mca cmov
mce cx8 apic sep mtrr pge mca
pat pse36 clflush dts acpi mmx
cmov pat pse36 clflush dts
fxsr sse sse2 ss ht tm
acpi mmx fxsr sse sse2 ss ht tm
bogomips : 4377.80
bogomips:
4377.80
OK, you’ve built a Xeon-based HT system. What kind of performance improvement can be expected? Which applications
will benefit from HT, and which will suffer?
Needless to say, HT is targeted at heavily
threaded applications. Single-threaded, compute-intensive applications will see minimal
performance enhancements. It should be
noted, however, that nearly all modern desktop and server systems make extensive use of
threads. Server applications generally process
socket IO on a thread-per-socket basis.
Desktop applications under X Windows will
often be processing socket or disk IO, X calls,
and the application code in parallel.
To date, performance benchmarks for HT
systems have focused on server-side systems.
This should not be surprising; Intel only
recently released HT on a desktop-focused
processor (the recent P4). A Web search will
quickly find many papers from the past year
detailing performance of HT systems.
A recent IBM white paper by Duc
Vianney ran several benchmarks both with
and without HT enabled on 2.4 and 2.5 kernels. Vianney’s work showed a slight per-
formance degradation of single-threaded
processes with HT enabled, but performance improvement for the 2.4.19 kernel was
approximately 30%. With the enhanced
scheduler in the 2.5.32 kernel, the same
benchmarks showed a 51% improvement.
Data from an upcoming Java Developer’s
Journal article exploring heavily threaded
Java applications on HT systems indicated
typical performance gains of 10–15%, with
some tests indicating gains of up to 75%
running Java 1.4 on a 2.4.18 HT system.
www.LinuxWorld.com
39
Summary
SMT is here to stay. As processors
become more sophisticated, the raw speed
of the processor will become even less of a
factor in overall system performance due to
added features like HT. Some have speculated that SMT and related technologies
will spell the end of the megahertz wars.
As with any new hardware technology,
software is catching up. Subsequent Linux
— continued on page 42
PREMIER 2003
Enterprise
SERVER CONSOLIDATION
Management
Linux
Server
for
A holistic approach
to migration
PREMIER 2003
Consolidation
40
www.LinuxWorld.com
SERVER CONSOLIDATION
BY
J A H ’J U A N
R O G E R S
Many businesses are exploiting the cost-effectiveness, stability, and scalability of
running applications on Linux, today’s fastest-growing operating system. However,
managing multiple distributed applications can be costly and difficult.
he performance and costeffectiveness of server consolidation are driving IT personnel to consolidate their databases, Web application servers,
and mission-critical applications to the Linux platform. Businesses
need reliable hardware and software to
ensure the availability and performance of
their applications.
Successful implementation of Linux
applications in server consolidation efforts
requires a partner that takes a holistic lifecycle perspective on migrating to Linux and
manages Linux applications within a heterogeneous enterprise environment.
Linux server consolidation impacts
three distinct areas:
• Server consolidation planning: IT personnel must be able to extract and evaluate the performance, throughput, and
responsiveness of existing workloads to
accurately determine which hardware
configuration requirements will be
needed on Linux.
• Coordination of application software
deployment: Long before applications
are deployed on Linux, installation of
software can be a major issue.
Businesses must be able to plan seamless software installations, upgrades, and
maintenance over hundreds or even
thousands of Linux servers.
• Service management: Once applications
are ported to Linux, IT personnel must
be able to measure and assure ongoing
return on investment and end-to-end
response times.
T
business cycle, analyze the current service
levels, and determine the appropriate
workloads to migrate and consolidate. Of
key importance are the performance and
capacity issues that result after migration.
Under- or overconfiguring the target platform can have equally undesirable results.
Overconfiguring results in overspending on
unnecessary hardware, while under-configuring causes systems performance issues
impacting availability and service delivery.
Not only is it critical to understand which
hardware configuration is necessary on the
Linux target, it is equally critical to ensure
that the consolidated environment can continue to meet business needs to avoid recurrence of misprovisioning. Some of the critical factors to ensure the success of Linux
server consolidation plans are listed here:
• Complete understanding of the resource
requirements of application workloads
considered for migration and consolidation (candidate workloads)
• Complete understanding of the business
cycle impact on underlying candidate
workload resource utilization
• Ability to evaluate multiple alternatives
to lower IT costs per transaction with
associated impact (positive or negative)
on service levels
• Assurance that ongoing performance of
migrated and consolidated workloads
will continue to meet service levels
• Visibility for all stakeholders who need
to see the performance of their workloads throughout the server consolidation process and ongoing thereafter
these personnel have the ability to closely
forecast the future in terms of the responsiveness and throughput of business applications. It’s not enough to simply trend
underlying resource utilization because
response time and throughput do not bear a
direct relationship to underlying resource
usage (such as CPU utilization). In fact, use
of such trending typically leads to significant undersizing with concomitant negative
impact on business availability post-consolidation and migration. A typical response to
the inaccuracies of trending usually leads to
significant hardware resource overprovisioning, thereby lowering the ROI of any
migration and/or consolidation effort.
In many cases, the existing IT environment may have sufficient underlying
resource capacity, but be inefficiently used
or suffer from response time and throughput bottlenecks. Modeling capabilities are
critical in these environments, offering
rapid identification of transaction responsiveness and throughput bottlenecks in
CPU, I/O, network, and cross-system interdependencies. These modeling capabilities
can further build on existing analysis and
reporting components to provide information and rapid insight into all the critical
planning and analysis activities listed here:
• Eliminating overspending on unnecessary hardware resources
• Allowing deferral of hardware resource
purchase by accurately projecting when
upgrades are required in terms of impact
on responsiveness and throughput
• Allowing easy, quick evaluation of lower
cost alternatives (hardware, load balancing, tuning, etc.)
• Justifying and scheduling system upgrades
A B O UT
TH E
A UTH O R
Moving non-Linux applications to Linux
is not as simple as moving databases and
applications. To ensure success, customers
must understand the underlying resource
requirements of workloads on their existing
platforms, determine the effects of the
Determining if, when, and what additional resources are needed to assure ongoing responsiveness and throughput is paramount. Applications and hardware that
scale inadequately will affect business availability. IT personnel must always be aware
of the hardware resources and applications
in use on their systems. It’s imperative that
Jah’Juan Rogers, Sr. is product marketing
manager, Linux for BMC Software, Inc. In this
role, Jah’Juan is responsible for product strategy
and marketing of the BMC Software Linux
product line. He is a frequent tradeshow
speaker and has presented at BEA eWorld and
the CMG Performance Management Show. He
also has been published in The Red Hat
Journal and Dell’s Power Solutions Magazine.
[email protected]
www.LinuxWorld.com
41
PREMIER 2003
Server Consolidation Planning
SERVER CONSOLIDATION
by creating actual versus planned graphs
and reports demonstrating need
• Ensuring ongoing cost-effective delivery
of the right level of service to users and
customers – with visible proof
• Providing “what if?” scenarios to better
determine how workloads and systems
will perform under various resource,
tuning, and optimization scenarios
• Ensuring adequate capacity and required
levels of service on an ongoing basis
Businesses are not only consolidating from
variations of Unix, they are also consolidating
Windows environments and migrating to
Linux. These businesses require the same
types of performance viewing, management,
analysis, and planning solutions to help facilitate the ongoing performance optimization
and consolidation and/or migration activities.
Coordination of Application
Server Deployment
Many businesses are exploiting the costeffectiveness, stability, and scalability of running applications on Linux. While offering
obvious technical and economic benefits,
deploying applications to Linux also introduces some unique deployment, system
management, security, and reliability challenges. The logistical challenge associated
with installing, upgrading, and managing an
environment with hundreds (or even thousands) of Linux systems running diverse
applications must be addressed efficiently
and effectively. Make sure that your solution
addresses the following business needs:
• Installation and software deployment to
Linux
Hyper-Threading Linux
• Deployment of heterogeneous applications
over hundreds or thousands of Linux nodes
• Reduction of scheduled maintenance
downtime
• Reduction of operational costs of a
decentralized Linux environment
• Controlled interoperability and application software prerequisites when software is upgraded
• Improved productivity of the IT staff that
is responsible for application installations and upgrades
Open Configurations
Disparate combinations of the Linux operating system and applications running on
Intel or zSeries will cause application implementation issues. Different deployment configurations and permissible methods can provide a flexible and customized environment,
but they also make a single, straightforward,
standardized, general procedure impractical.
The concept behind flexibility is customization – making the system behave the way you
want it to, not the way the engineers imagined
you’d want it. You need to turn this flexibility
into controlled power, not chaos. You need a
way to perform specific and simultaneous
installations and maintenance tasks on multiple machines, each configured in a way that
best fits your business needs.
Security
Once you have solved the issues of variety, flexibility, and power, the issue of security remains, and if this issue is compromised, the rest of the solution is worthless.
Security for the components within the
Linux operating system is dependent upon
Service Management
Service management is the last, but by
no means least important, area of Linux
server consolidation. Customers must be
able to manage their Linux, Unix, and
Windows environments from a service-level
perspective. If you are consolidating your
servers to Intel or zSeries hardware, you
need the tools to manage the process from
an application perspective. You need to
know how your applications are performing
from an end-to-end perspective. In other
words, you need the answers to the following questions:
• How did my application perform before
I moved to this hardware?
• Is it performing better?
• What is my end-to end response time?
Overall Enterprise
Management for Linux
Enterprise Management for Linux (EML)
ensures the business availability of Intel and
zSeries servers and their applications by solving day-to-day performance problems, tracking long-term performance, and providing an
evaluation of existing workloads to assist in
server consolidation. EML provides application deployment, end-to-end monitoring, and
management for application infrastructure
and tools to help measure service levels.
LINUXWORLD MAGAZINE WWW.LINUXWORLD.COM
formance by a conservative 25% in heavily threaded server applications, there’s an even stronger case for Linux servers over major Unix
platforms for data center use on a cost/performance basis.
Hyper-Threading technology promises to make the Intel/Linux
combination even more attractive to IT managers and systems architects looking to upgrade their enterprise software platforms.
— continued from page 39
kernel releases will make more sophisticated use of the available
hardware features. Over time, Linux support for HT will mature,
resulting in further performance gains.
The Linux community is waiting with bated breath for Linus
and crew to tackle the final bugs in 2.5.x, and release the 2.6 Linux
kernel. After a stabilization period (which could be significant),
major distributions will migrate to the 2.6 kernel. All the while, HTenabled hardware will be finding its way into enterprise server
racks. When the 2.6-enabled distributions hit this hardware, serverside performance will measurably increase, with no hardware
investment whatsoever.
Hyper-Threading technology specifically targets performance
gains on heavily threaded applications. These applications are most
commonly found in enterprise server platforms – application servers,
Web servers, Web services platforms, and Java-based systems. Dell,
HP (Compaq), and IBM are all putting forth powerful Xeon-based
systems with 2–16 processors running Linux. If HT can improve per-
PREMIER 2003
the expertise of the personnel or the abilities of the management tool you use. An
effective tool should find components that
are security hazards and not only warn you
of them, but provide an option to automatically replace them with secure components.
References
• Red Hat kernel version mapping: www.unixgods.org/~tilo/redhat_versions.html
• 2.5 kernel: www.kernel.org/pub/linux/kernel/people/rusty/
Hyperthread_Scheduler_Modifications.html
• HT-aware scheduler support: http://lwn.net/Articles/8553
• “The Future of the Linux Kernel”: www.linux-mag.com/200301/kernal_01.html
• IBM whitepaper on HT performance in 2.4 and 2.5 kernels:
www-106.ibm.com/developerworks/linux/library/l-htl
• Dell HT paper: http://ftp.us.dell.com/app/3q02-Mor.pdf
LINUXWORLD MAGAZINE WWW.LINUXWORLD.COM
42
www.LinuxWorld.com
www.linuxworldexpo.com
Big Gains in
Small Business
Linux provides a comprehensive solution
for a growing manufacturing company
Today Linux is not just about cost savings reported by enterprises, not just about
BY
M A R KU S
KL A U S E R
Markus Klauser heads a consulting and systems
integration company near Philadelphia. He has
been a consultant and integrator specializing
in Unix/Linux systems for more than 15 years.
[email protected]
Currently, Troemner has a homogenized
server environment, running exclusively on
Red Hat Linux and supporting 110 PC clients.
OSAS has evolved along with Troemner,
with 17 core and vertical applications available with both graphical and character
interfaces. This dual interface capability is
unique to OSAS. It offers veteran users at
Troemner rapid data entry and information
retrieval via the character option. It also
provides less-frequent users with the intuitive interface so valued in a GUI environment. Troemner is also utilizing HylaFAX, an
open source fax server that provides OSAS
Purchase Order faxing as well as MS
Windows document faxing. OSAS is written
in Visual PRO/5, a language developed and
marketed by BASIS International, Ltd.
Today, the “open” principle is extended
through ODBC access to the OSAS database.
As the need has arisen, Linux servers
implemented at Troemner have demonstrated the ability to provide a solution in
any area. For example, when a leading
Troemner customer introduced EDI
requirements, Linux proved its ability as a
communications-friendly operating system, running automated scripts on a daily
basis to perform EDI data exchange with
the VAN. Integrated into daily workflow,
these scripts provide logging and
archiving, e-mail status, and
order entry/billing functions.
With the more recent
prevalence of spam and email–borne viruses, Troemner
draws on SpamAssassin and
MIMEDefang from among the
open source offerings.
MIMEDefang integrates real-time
e-mail virus scanning at the gateway, using the engine provided by
Sophos. This tunable and highly reliable solution was implemented on an entrylevel Pentium machine.
Troemner has not been isolated from
rapidly expanding file storage requirements. Samba provides file and print services as well as the logon controls of a PDC.
While total data is less than 100GB, the
growing set of file types (including Word,
Excel, PowerPoint, SolidWorks, CadKey,
PREMIER 2003
44
www.LinuxWorld.com
security demanded by Web servers, and not just about government and academia:
Linux is also about Small Business USA.
here, in the roots of the U.S.
economy, Linux provides a
complete end-to-end solution. Providing the same reliability that yields record uptimes running Web servers,
Linux also offers 100% availability in its role
supporting the areas of application, database, fax, file/print, e-mail, Primary and
Backup Domain Controller, SPAM Filter,
firewall, antivirus control, intrusion detection, and disaster recovery – all critical core
services in any business environment.
T
Background
Founded in 1838 and located in
Thorofare, New Jersey, Henry Troemner,
LLC, is an ISO 9001–certified company
employing more than 150 people. The company is proud of its international reputation
for providing the highest quality calibration
and certification of mass, pipette, and temperature measurement instruments.
Troemner continues to manufacture precision weights and has added an array of laboratory apparatuses to its product line.
In 1988, Will Abele, president of
Troemner, faced the challenge of finding a
comprehensive software package that
could support his growing manufacturing
A B O UT
TH E
A UTH O R
company. His immediate concern was the
software application’s ability to handle the
financials, manufacturing control, and
company billing. He also wanted to move
the payables from a service bureau to an
in-house system.
Abele chose OPEN SYSTEMS Accounting
Software (OSAS) and installed it on an eightuser Linux system. Open Systems is an established software company founded in 1976 on
the fundamental premise of providing commercially successful accounting and business
software with source code included. Abele’s
key reason for choosing OSAS was the availability of its source code.
Little did Abele know that
the same rationale he applied
to his selection of OSAS
would be shared by the open
source community. The open
source concept has enabled
Linux to evolve into a
mature, versatile, and
reliable business operating system.
The Troemner
Environment
www.linuxworld.com
Small Business Strategy
The VAR had the opportunity to ask Troemner VP John Rowley a few questions on small
business strategy. Here’s what he had to say...
Why Linux?
• It’s a stable, open source platform that allows better scalability and flexibility than NT products.
• There are minimal to no licensing fees compared to SCO/Unix and Microsoft NT.
• Linux appeals to ownership because it is more entrepreneurial in nature than “Big Business”
networking products.
• A large network of collaborative resources (the Linux community) exists to deal with programming/implementation issues.
What IT concerns face small business today?
• We are a small business with thousands of customers. There are not many enterprise solutions for small companies with small IT budgets. Enterprise solution is defined as accounting, CRM, MRP, etc.
• Microsoft products have the tendency to lock us into other Microsoft products.
• IT costs are growing disproportionately to sales. Customer expectations are driving this
without necessarily increasing the amount they purchase.
• There’s not enough clear and objective information available in the marketplace for a small
company to make IT decisions. Most press is geared toward larger organizations.
JPG, and so on) is delivered to MS Windows
clients from Linux servers using Samba. In
addition, Samba delivers business-critical
FoxPro and MS Access databases and the
services of HylaFAX to the desktop. The
project of delivering these services, previously provided by Novell and NT servers,
was accelerated when system response was
doubled using Samba on same-generation
hardware. After the initial transition, the file
server recorded 120-day uptime and bettered both of the previous systems’ everyseven-days preventive reboots. It also eliminated the often badly timed server lockups.
When world events re-emphasized the
need for data security and disaster recovery,
Troemner initiated a project to augment
daily, and in some cases twice-daily, backups using Microlite BackupEDGE. Troemner
considered offsite backup but deemed the
cost per GB prohibitive. The company
selected Rsync. Rsync provides a highly efficient file synchronization scheme both on
local servers and across the network.
Troemner is aware of Linux’s proven ability to provide e-mail and Web services. Email services on Linux provide messaging,
calendar collaboration, meeting planning,
and contacts sharing to MS Outlook clients.
The “turn on and forget” reliability of Linux
has also been demonstrated with this solution. Since conversion to e-mail on Linux in
www.LinuxWorld.com
2000, perhaps a single reboot was mandated
to restore e-mail functioning. This performance ensures Troemner personnel’s productivity and also allows a consultant/administrator to apply resources in constructive
tasks. Most recently, Troemner’s Web site
was updated with content presented using
Apache/MySQL/PHP on Linux.
Troemner VP of Operations and IT
Manager John Rowley points to the “entrepreneurial nature” of Linux as one of its
appeals, and he quickly adds both cost benefits and flawless reliability to the list.
Rowley also appreciates the Linux community’s large network of collaborative
resources, which provides technical support alternatives – including responses
from the product’s authors. While Troemner
is nowhere near a pioneer in the adoption
of Linux, newsgroups and Web resources
provide backup and the reassurance that
they are not alone in any situation.
Resources
•
•
•
•
•
•
•
SpamAssassin: www.spamassassin.org
MIMEDefang: www.roaringpenguin.com
Sophos: www.sophos.com
Samba: www.samba.org
HylaFAX: www.hylafax.org
Microlite: www.microlite.com
Rsync: rsync.samba.org
Industry
Newsletter!
The insider intelligence
you need to keep
ahead of the curve
FREE
e-Newletters...sign up today!
Go to www.SYS-CON.com
The most innovative products, new releases,
interviews, industry developments, and
plenty of solid i-technology news can be
found in SYS-CON Media’s Industry Newsletters.
Targeted to meet your professional needs, each
e-mail is informative, insightful, and to the
point. They’re free, and your subscription is just
a mouse-click away at www.sys-con.com.
Select the
Industry
Newsletters
that match
your needs!
Choose one –
or try them all!
LINUXWORLD MAGAZINE WWW.LINUXWORLD.COM
45
The World’s Leading i-Technology Publisher
EXCLUSIVE INTERVIEW
Talk
A
with the
Father of
sendmail
Eric Allman
on
evolution
in the
IT universe
A B O UT
E R I C
A L L M A N
Eric Allman is Sendmail, Inc.’s chief
technology officer and cofounder. Eric
authored sendmail, the world’s first Internet
Mail program, in 1981 while at the
University of California at Berkeley.
PREMIER 2003
46
www.LinuxWorld.com
EXCLUSIVE INTERVIEW
I NTE R V I E W
BY
A L A N
W I L L I A M S O N
LWM’s deputy editor Alan Williamson recently had the opportunity to speak with
Eric Allman about sendmail, open source, and the secret to great software.
LWM: It wouldn’t be overstating the case to
call you a living legend. How does it feel to
be the creator of one of the most used pieces
of software on the Internet?
Eric Allman: I sure don’t feel like a legend. I
have to remind myself sometimes that I
haven’t taken the typical career path – it’s
always seemed very natural to me. Mostly
I’ve worked on what seemed interesting at
the time, and that’s served me well. Of
course, luck had a lot to do with it too.
LWM: Many new technologies have
emerged, but still one of the most used
communication channels is good old trusted e-mail.What would you attribute this
success to?
Allman: E-mail fits the needs well. It has
immediacy without being demanding (the
telephone needs to be picked up right now).
There will always be a place for voice mail and
instant messaging of course, and to a certain
extent IM will replace some use of e-mail, just
as e-mail replaced some use of fax and fax
replaced some use of postal mail. But none of
those technologies went away – far from it.
E-mail is also complementary to a lot of
these other technologies, and in some cases
may even enhance them. For example, as IP
telephony emerges I expect to see at least
some revival of voice mail – but transmitted
via e-mail.
LWM: Software goes through many evolutions in its lifetime.With sendmail over 20
years old now, what are the 3 most significant stages sendmail has gone through?
Allman: The first version of sendmail was
actually called delivermail. This was preInternet and depended heavily on all the
other mail subsystems (UUCP, Berknet,
etc.) having their own queuing. The transition from there to sendmail, which included adding queuing and Internet support,
was major.
that continues to happen from version to
version. So in a lot of ways sendmail has
evolved more than made revolutionary
changes.
LWM: With the advent of MIME, you can
pretty much send anything using e-mail.
Do you think we’ll still be discussing email, as we know it now, in another 20
years?
Allman: Yes, probably. But the public might
not recognize it as such. I’m using a
PowerBook right now to type this, and it
doesn’t look much like the PDP-11 where
the first versions of sendmail were developed. But despite the addition of a graphic
...it all comes down to
“good engineering” –
anyone can do it if they
are obsessive enough
LWM: sendmail is one of those great pieces
of software that you can literally forget
about as it “just works.”What’s your secret?
Allman: Before I did sendmail, I worked on
the INGRES project at Berkeley. INGRES
was one of the first Relational Database
Management Systems (the other was
System R, which evolved into DB2). A lot of
the emphasis in DBMS is reliability, recovery, etc., which requires a certain way of
thinking about the problem. So I guess it
all comes down to “good engineering” –
anyone can do it if they are obsessive
enough.
The second big transition was between
sendmail 5 and sendmail 8, which pulled in
a lot of ideas that had been added into
other versions of sendmail. It was a conscious attempt to remerge the various code
lines and modularize a lot of the internals.
This transition also added the M4-based
configuration system that sendmail has
today.
I’m not sure there has been a third
major transition yet, but there have been
some significant jumps that occured over
time. I’m a big believer in making many
small changes instead of a few large ones
when you can. For example, the sendmail 5
to sendmail 8 transition involved a fair
amount of modularization in the code, but
display, a mouse, networking, larger disks,
lower power consumption, and lots and
lots of software, it’s still a von Neumann
stored program architecture. After all, the
holographic messages you see in futuristic
science fiction flicks are probably running
on SMTP.
www.LinuxWorld.com
47
PREMIER 2003
A B O UT
TH E
I NTE R V I E W E R
When not answering your e-mails and working
on the next issue of LWM or JDJ, Alan heads
up a small team dubbed the “Thunderbirds of
the Java industry,” providing on- and offsite
rescue for Java projects in trouble. For more
information visit www.javaSOS.com. You can
also read his blog: http://alan.blog-city.com.
[email protected]
EXCLUSIVE INTERVIEW
Allman: Definitely both. There was certainly
a cause-and-effect relationship between the
two as well. But it’s also important that, as
you noted earlier, sendmail does pretty
much “just work” – even if you may not be
wild about the configuration language (I’m
not at this point). Without that basic reliability people would have moved off it years ago.
“Frankly, five years ago I
didn’t think Linux was really
ready for prime time outside
of a deeply technical shop.
That’s changed a lot”
LWM: Do you think the SMTP protocol
should get a major overhaul to combat the
new challenges of today’s Internet, such as
spam and overly large e-mail attachments?
Allman: That sounds like a trick question. I
have to say yes, but no. I believe we need to
evolve SMTP, but I’m not wild about throwing it out and starting over. Fortunately, the
ESMTP structure permits extensions, so I
think making the changes we will need is
possible without switching to a major new
framework.
I also think an evolutionary approach is
essential to avoid having a commercial
entity try to “privatize” e-mail protocols. I
think that would lead us back to the bad
old days of a fractured network, which is
what sendmail was trying to address in the
first place.
LWM: You are involved with Sendmail, Inc.,
a commericial venture to support sendmail.What challenges are you facing in
providing support for an open source product?
Allman: Depending on how you look at it,
either a lot or not much at all. We certainly
have some instances where people prefer to
run open source rather than commercial,
and I view that as just fine, although some
of our salespeople might not always agree.
But the open source gives us market awareness and reputation that just can’t be
bought.
The biggest challenges we have right
now are the same as any company has
these days: a sluggish economy.
Fortunately, e-mail isn’t one of those trendy
things that companies can put off until
things improve. Instead, in bad times companies look hard at finding a better, cheaper way of doing things, and standardsbased mail tends to be less expensive than
proprietary systems.
LWM: It is reported that around 70% of
total e-mail transmitted comes in contact
with a sendmail gateway at some point in
its journey. A significant penentration by
anyone’s standards. Do you think this has
to do with the fact that sendmail was primarily an open source project or that it
was adopted by many of the Unix variants
as the preferred mail router? Maybe both?
LWM: sendmail has benefited from the
explosive growth in Linux over the past
decade. How has this changed what you are
doing at Sendmail, Inc.?
Allman: sendmail has always been written
to be extremely portable, so from the point
of view of the code base, not much has
changed at all. But from the commercial
point of view, it’s a major thing. Linux is a
Tier 1 platform for us, and that’s significant at a small company. Linux is a major
player in the server world, especially for
companies that are extremely cost-conscious. Linux has been a major driver in
our partnerships with HP and IBM, for
example.
LWM: What is the most common support
call you’ve seen with sendmail? What are
the top “gotchas” for most people?
Allman: The top gotchas? When they don’t
read the documentation, definitely.
Seriously, the vast majority of questions are
pretty simple ones that are answered in the
documentation, such as how you do masquerading, but that’s going to be true on
any product. But there are also a lot of
nonobvious questions that pretty much
run the gamut. People do an immense
amount of interesting things with sendmail.
LWM: Are you seeing a shift in attitude
from the Fortune 500 toward embracing
open source technologies, such as sendmail,
Apache, and Linux?
The History of sendmail
— 1979 —
— 1981 —
— 1982 —
— 1993 —
— 1998 —
— 2003 —
Eric Allman releases
delivermail
————
delivermail uses FTP
to transmit e-mail on
the ARPANET
————
delivermail ships
with BSD
Allman changes the
name to sendmail after
Bill Joy notes he doesn’t like delivermail
ARPANET moves to
TCP/IP
————
SMTP Protocol
(RFC821)
introduced for
moving mail
around
sendmail releases 8.0
with m4 configuration
Allman & Greg Olson
announce formation
of Sendmail, Inc.
sendmail installed on
approximately 80% of
all mail servers
PREMIER 2003
References
• A Brief History of Mail:
www.coruscant.demon.co.uk/mike/sendmail/history.html
• Wikipedia: www.wikipedia.org/wiki/eric_allman
• Open Source Timeline: www.linuxcertification.com/manpage/timeline.php3
48
www.LinuxWorld.com
www.linuxworld.com
EXCLUSIVE INTERVIEW
Allman: Without a doubt. Not surprisingly,
a lot of this results from vendors that
they’ve already heard of (notably IBM and
HP) throwing their weight behind open
source, but a lot has to do with cost consciousness and an increasing faith in
Linux. Frankly, five years ago I didn’t think
Linux was really ready for prime time outside of a deeply technical shop. That’s
changed a lot.
LWM: Let’s spool back some 15 years ago –
sendmail would have been roughly 5 years
old.What was your outlook for the future
back then? Did you see sendmail having a
limited shelf life?
Allman: I didn’t expect it would last this long,
although it wasn’t anything particularly to do
with sendmail per se. Not much software
lasts that long (10 years is a good life span),
and I figured it would have had a more ordi-
to speak at economics conferences, albeit
about open source in general, not sendmail
in particular. And it’s just cool to see how
they rely on this body of code I wrote. It’s
the ultimate in ego strokes when people
actually use your stuff – speaking as someone who was raised in academia where success is often claimed because a couple of
hundred people read your paper.
As for throwing up my hands in horror,
let me count the ways.... I think prudence
suggests that I shouldn’t be too explicit
about the amazingly stupid things that people try to do. Use your imagination.
LWM: People and organizations alike are
paranoid about security. Should they be?
Allman: Arguably, not paranoid enough. Or
more precisely, they care too much about
things that aren’t all that important and not
enough about the things that are important.
“It [e-mail] has immediacy without
being demanding (the telephone
needs to be picked up right now)”
nary life cycle. And honestly, if sendmail had
just sat on the shelf it would have died a long
time ago – bit rot sets in all by itself.
Look at the sorts of code that have
thrived over a long period of time, for
example Unix in all of its derivatives. There
has been a huge amount of work done on
such code. There has been a direct progression from 6th Edition UNIX (the first kernel
I hacked on) to FreeBSD, but there isn’t
much in FreeBSD that resembles that predecessor. Similarly, although I can show you
code that I wrote for delivermail that is still
in sendmail 8.12, there isn’t much of it.
LWM: When you go onsite to a see customer,
what makes you have a wry smirk? And
conversely, what makes you throw your
hands up in horror?
Allman: For the smirk, probably that only
the techies know who I am. I had one case
several years ago where a vendor rep came
in and told me all about sendmail (getting
much of it wrong) without even realizing
who I was. I enjoyed letting him chew on
his foot for a while. That has changed some
since I started Sendmail. Now I get invited
www.LinuxWorld.com
Some pet examples of mine from both
the physical and cyber worlds: firewalls are
trusted far too much, in that they are sometimes used as an excuse for having inadequate security inside the firewall. “Hard and
crunchy on the outside, soft and chewy on
the inside” is the way I’ve sometimes heard
it described. On the other hand, people
sometimes worry too much about obscure
points of cryptography that aren’t going to
make much difference in the typical (nonmilitary) world. In the physical world, we
aren’t anywhere near as worried as we
should be about people stealing our mail
from the end of the front path; identity theft
is a serious and under-appreciated problem.
Subscribe
Today!
Connect online
for fastest service...
don’t miss another
issue of LWM!
SAVE 30%
OFF!
REGULAR ANNUAL COVER PRICE $71.76
YOU PAY ONLY
49
99
$
12 ISSUES/YR
*OFFER SUBJECT TO CHANGE WITHOUT NOTICE
LWM: To your knowledge, what is the
biggest installation you know that sendmail is currently deployed in?
Allman: I couldn’t even guess. Most of the
Fortune 500 run sendmail at least somewhere, although the largest would probably
be an ISP somewhere. But ISPs often don’t
like to talk about the details of their technologies.
LINUXWORLD MAGAZINE WWW.LINUXWORLD.COM
49
LOG ON
TO
www.LinuxWorld.com
The World’s Leading i-Technology Publisher
FR
FREE
FREE
LINUX RESOURCE DVD
$198 00
Value
SIGN UP
NOW!
Charter Subscription Offer
Two Exclusive Offers One Linux Magazine
You Can't Do Without!
By now, i-technology professionals are aware that Linux is emerging from
the back room at a blistering speed. It is headed straight into the boardroom.
— SPONSORED BY —
As software giants like IBM , HP, Sun, Oracle, and CA strive to make Linux
easier for companies to adopt and deploy, LinuxWorld Magazine reflects
how the market for Linux solutions is maturing, with insightful articles, features, interviews, and news. LWM editors and contributing writers are all
thought leaders in their own right, writing Linux books, giving Linux lectures,
and circulating widely within the Linux/ open source world while holding
down their real-world day jobs. Finally, a magazine dedicated to the IT managers and business leaders involved with assessing/making the business
case for Linux has arrived!
Subscribe NOW at our low introductory price
and receive a FREE DVD with the complete
LinuxWorld.com Archives, Leading Linux
Software like Mandrake Linux that you can
use right away and more.
Receive a FREE copy of our
first issue, and you can still take
advantage of our Special Offer
https://www.sys-con.com/linux/subscr
LWM also offers an
online version of every
print issue through
our Digital Edition
e-Newsletter.
@
One Year - Digital Edition
(International Subscribers Only) - $39.99
Includes the electronic edition (.pdf) and a FREE Archives
CD of your choice!
Other Linux properties offered
by SYS-CON Media include
Linux Business Week e-Newsletter,
www.linuxbusinessweek.com, and
LinuxWorld.com e-Newsletters.
https://www.sys-con.com/linux/subscribecharterofferLW.cfm
Two Year / 24 Issues - U.S. - $89.99 (Save $54.76 off newsstand price)
One Year / 12 Issues - U.S. - $49.99 (Save $21.89 off newsstand price)
Two Year - Canada & Mexico (airmail) $119.99 (Save $48)
One Year - Canada & Mexico (airmail) - $79.99
Two Year - All Other Countries (airmail) - $176.00 (Save $40)
One Year - All Other Countries (airmail) - $99.99
ibecharterofferLW.cfm
FOR MORE INFORMATION
contact customer service at
1 (888) 303-5282,
or e-mail
[email protected].
INTERVIEW
Linux Initiatives
at IBM
Nobody ever got fired for picking...Linux?
Linux is moving into businesses across a broad range of industries, and IBM is a
big supporter. In this exclusive LWM interview, Scott Handy, director of Linux
Software Solutions for IBM Corporation, shares with editor-in-chief Kevin Bedell his
thoughts on the mainstream acceptance of Linux – the past, present, and possible.
LWM: IBM seems to be getting behind
Linux in a big way.What are some of the
major initiatives right now?
Scott Handy: We have a very broad focus
on Linux for large accounts and for small
and medium-sized businesses. Within that,
we focus on particular industries – namely
retail, finance, public sector (including government), manufacturing, and telecommunications.
Linux adoption has been strong in all
industries, so there have been cross-industry initiatives as well including e-commerce, CRM, ERP, and accounting software.
Overall, we have a broad set of programs
starting with a focus on solution providers
and in particular application developers.
We have an initiative called “Speed Start
Your Linux Application” in which we provide free technical support for Linux and
IBM software on Linux to developers as
well as development tools and software,
including the DB2 database, WebSphere
Application Server, WebSphere Studio tools,
Lotus tools, and Tivoli Management
Software.
The developer pick-up from the program has been extremely strong. In the
past year we’ve had more than 6,500
applications developed using our software
on Linux – all of which use WebSphere
Studio and the rest of the IBM software
family.
We also have a direct sales force and
Business Partners that cover the customers
and customize solutions based on their
needs. I think customers vote with their
wallets when they buy solutions on Linux,
and we’ve had more than 6,300 successful
customer engagements on Linux – clearly
showing penetration beyond the Global
2000 into small and medium-sized businesses and across a broad range of industries.
Kevin Bedell is editor-in-chief of
LinuxWorld Magazine. With a degree in
engineering as well as an MBA and years of
experience as a developer, architect, team lead,
and department manager, Kevin has seen all
sides of this puzzle. He recently authored a
book on Jakarta Struts for SAMS Publishing and
is working on a book on Apache Axis for O’Reilly.
[email protected]
LWM: Why does it make business sense for
IBM to commit development resources to
projects like Linux that don’t generate
license revenue?
Handy: There’s a tremendous demand
from customers for Linux, and we’re in the
business of providing customers with the
solutions that they want. The fact that
Linux is the fastest growing server operating system in the world validates that customer demand. So we provide development
resources to accelerate Linux’s acceptance
into the enterprise by helping it mature
into a mainstream enterprise operating system.
The benefit to IBM is really the solution
stack that we put around Linux that customers do buy – which is the software,
PREMIER 2003
52
A B O UT
TH E
I NTE R V I E W E R
I NTE R V I E W E D
BY
KE V I N
B E D E L L
hardware, and services around the Linux
operating system. Most customers do actually buy the Linux operating system, by the
way, just not directly from us. We recommend that they buy the supported enterprise versions from Red Hat or one of the
UnitedLinux partners.
LWM: When IBM purchased Lotus
Development Corporation, many corporations felt that it was “safe” to adopt Lotus
Notes because IBM was behind it. Are you
seeing similar attitudes now that IBM is
behind Linux?
Handy: I think that’s a good analogy. When
we bought Lotus back in 1995, they had
about 3 million seats of Lotus Notes. By
promoting Lotus in the enterprise we’ve
been able to grow that to over 105 million
seats, so it’s certainly safe to say that’s been
a successful endeavor.
We’re now seeing a similar mainstream
acceptance of Linux. But I think IBM adds
more than just credibility. It also adds solutions around Linux. The Linux operating
system is not necessarily a solution and
what we bring to the table is our hardware,
software, and services, plus our solution
providers that deliver applications for
Linux.
LWM: What do you see as the “value proposition” of Linux for corporations?
Handy: Linux’s initial attraction was
around price/performance, reliability, and
total cost of ownership. It also proved to be
very flexible, runs on a wide variety of
hardware, and has gained broad industry
support.
More specifically, the two killer applications that drove its success on the server
were Apache for Web servers and Samba for
file and print serving. And as customers
started there, they were extremely happy
with the reliability and performance char-
www.LinuxWorld.com
INTERVIEW
acteristics. Now customers are saying they
want to expand that and get those same
reliability and total cost of ownership benefits for their business applications. That’s
what’s fueling the growth of Linux.
LWM: What concerns do managers in general have about adopting Linux? Are these
concerns valid?
Handy: Usually the first concern we hear is
about how to get mainstream support for
Linux. And usually that’s just a matter of
educating them on the wide variety of support options available. Support is available
directly from the distribution companies,
and IBM provides direct support for Linux
with the same terms and conditions,
including 24x7 support, that we provide for
IBM operating systems.
Next, I think that customers want to
adopt Linux but don’t want to reinvent their
infrastructure on top of Linux. That’s why
we’re seeing such a broad acceptance of
middleware on top of Linux, including our
DB2, WebSphere, Lotus, and Tivoli products. Sales of those products more than
doubled year over year in 2002 because
customers didn’t want to reinvent an ebusiness infrastructure on Linux. We are
able to provide that infrastructure with
software that’s been ported from Unix and
Windows and has already been battle tested in real, production customer environments.
LWM: If I were a senior technical person
who wanted to use Linux, what arguments
could I use when I approach my management?
Handy: The real Linux momentum started
at the senior technical management level. It
was a grassroots effort driven by the fact
that you could install Linux without a purchase order and without approval from
anyone. And those initial pilots and production projects were highly successful and
gave those senior technical managers
ammunition to expand.
A few years ago, we found that CEOs
weren’t aware that they had Linux installed
when in fact they did. Then, as more and
more vendors publicly announced support
for Linux, the breadth of Linux projects
installed became clear to middle management. The senior technical managers were
usually justifying Linux because it provided
Unix reliability at Intel price points.
www.LinuxWorld.com
LWM: Moving up the line, what arguments
could middle management use to sell Linux
to senior management?
Handy: Middle management based decisions on expanding Linux on the success of
the initial Linux projects they had. And in
fact, Linux was providing Unix reliability at
Intel price points. They found they could
scale Linux using clusters or server consolidation on larger servers up to and including
Linux on the mainframe.
Also, as more software became available
for Linux (such as IBM’s software portfolio,
where we now have more than 75 products
shipping on Linux) as well as software from
key application providers such as SAP, JD
Edwards, and SAS, middle management
could more easily integrate Linux into their
existing environment.
“The unique thing
about Linux is the
GPL license, which
forces all derivatives
of Linux to have their
source code published”
LWM: Is Linux on the radar at the senior or
chief executive levels yet? Should it be?
Handy: Absolutely! Almost all senior managers either have a Linux plan or are being
asked for one because it’s so well known
that Linux is being adopted by major corporations around the world – many of
which believe they’re getting a competitive advantage using Linux versus the
alternatives. It’s only natural that CIOs
have a plan for what they’re doing with
Linux.
LWM: If I were a manager interested in
Linux, where is the “low-hanging fruit”?
That is, which areas of the business should
I look to first when considering adopting
Linux?
Handy: Managers usually start with a pilot
that they move into production. Usually,
the pilot applications are for workload consolidation or deploying new applications or
workloads. For example, a customer I’m
working with now is starting with a JD
Edwards application. In our experience,
these pilot applications have all been successful. Then they expand Linux to other
areas of the business.
LWM: Which Linux distributions does IBM
support or recommend? Is IBM considering
their own distribution?
Handy: IBM recommends and supports
Red Hat and UnitedLinux, including the
distributions from UnitedLinux’s partners.
IBM has no plans for its own distribution.
LWM: What is the future of AIX?
Handy: AIX will continue to expand. In fact,
since we started our Linux initiative back in
1999, AIX market share has grown. We continue to see AIX drive further up into more
scalable servers – into 32-way configurations and beyond – as well as expanding in
the mid-range base.
Scott Handy,
director of
Linux Software
Solutions for
IBM Corporation
LWM: Do you see Linux fragmenting similarly to Unix? What forces might keep that
from happening?
Handy: No. The unique thing about Linux
is the GPL license, which forces all derivatives of Linux to have their source code
published. That’s very unlike Unix. Because
of that the industry is all sharing the same
Linux kernel and for 10 years running has
kept to a single code base.
LINUXWORLD MAGAZINE WWW.LINUXWORLD.COM
53
PREMIER 2003
INTERVIEW
Making
Linux
Unbreakable,
Keeping Linux Open
Thanks to the active support
of giant companies like
Oracle, the Linux OS just goes
on getting better and better
A B O UT
W I M
C O E K A E RT S
As well as being a member of the distinguished
International Advisory Board of LinuxWorld
Magazine, Wim Coekaerts is director of Linux
Engineering, Oracle Corporation, where he
manages a team of talented Linux developers.
Wim, Oracle’s Linux liaison, was hand-picked
by Oracle chairman and CEO Larry Ellison to
lead Oracle’s Linux kernel team and is responsible for ensuring that Oracle works collaboratively with the Linux community.
PREMIER 2003
54
www.LinuxWorld.com
INTERVIEW
INTERVIEWED BY JEREMY GEELAN
What’s Oracle's strategy on Linux? LWM sought out the man hand-picked by
Oracle chairman and CEO Larry Ellison to manage a team of talented Linux developers
and serve as the company’s director of Linux Engineering: Wim Coekaerts.
im Coekaerts leads
Oracle’s Linux kernel
team and is responsible for ensuring that
Oracle works collaboratively with the
Linux community. LWM wanted to find out
in greater detail Oracle’s history, involvement, commitment, and future plans with
regard to Linux.
W
LWM: How long have you personally been
involved with Linux?
Wim Coekaerts: I’ve been using Linux since
1993, and I became seriously involved in
Linux at work when Larry Ellison asked me
to build a Linux-based network computer
in 1999, a year after Oracle became the first
vendor to release a commercial database
available for Linux. Today, my team of very
talented Linux kernel developers are
responsible for ensuring that Oracle works
collaboratively with the Linux kernel community.
LWM: What’s Oracle’s current commitment
to Linux?
Coekaerts: Oracle makes Linux
Unbreakable, collaborating with Red Hat,
UnitedLinux – which includes Conectiva
S.A., the SCO Group, SuSE Linux AG, and
Turbolinux – and others in the Linux community. Together, we support, test, tune,
and improve the Linux kernel to ensure stability, reliability, security, and manageability for all Oracle products on Linux. We
believe Linux is a great choice for enterprises and are committed to helping our customers take full advantage of Oracle software on Linux.
Coekaerts: As Oracle’s Linux liaison, it’s my
responsibility to ensure that we cooperate
symbiotically with the Linux kernel community. We embrace and support the open
Linux architecture by contributing significant open source code to the Linux community. This helps accelerate the power,
performance, ease of use, and dependability of Linux. And we provide enterpriselevel, seamless technical support for Red
Hat Advanced Server and all operating systems powered by UnitedLinux.
LWM: How does Oracle help its customers
take full advantage of Oracle software on
Linux?
Coekaerts: We’ve made numerous
announcements over the years and much
progress, underscoring our investment
and commitment to Linux. Through our
technical contributions, front-line support, initiation of security evaluations on
Linux, and strategic partnerships, Oracle
makes Linux Unbreakable so customers
can safely, securely, and reliably deploy
Linux in mission-critical enterprise environments.
LWM: What exactly does a “Linux liaison” do?
LWM: How about open systems, do they
play a role, from an Oracle standpoint?
Coekaerts: Open systems play an important
role in our strategy, and our work with Linux
is a hallmark of this strategy. Over the years,
Oracle and our customers have learned a lot
about running Oracle on Linux in the enterprise. This knowledge and the opportunity
to dramatically reduce IT infrastructure
costs are the catalysts behind our decision
to provide front-line technical support for
the Linux operating system, both Red Hat
Advanced Server and UnitedLinux, in addition to Oracle products.
www.LinuxWorld.com
55
LWM: Is there any way to actually quantify
Oracle’s commitment to Linux, for the
benefit of LWM readers?
Coekaerts: More than one million Linuxrelated downloads have already been
downloaded from our developer network,
Oracle Technology Network (OTN), and
that number continues to grow. More than
4,000 independent software vendors (ISVs)
are using Oracle products on Linux, and
550 ISVs have certified to run their applications on Oracle9i Database on Linux.
LWM: What do you think the primary
reasons are for the explosive popularity
of Linux?
Coekaerts: I think that there are many
forces behind it but, for me, three primary
reasons stand out the most.
First, the cost savings. Linux is a lessexpensive alternative to other operating
systems. Yes, this is obvious, but worth stating. Since Linux is free, the cost of implementation drops significantly. Second,
Linux runs on lower-cost, nonproprietary
hardware solutions, so you can deploy on
low-cost commodity hardware. Third, Linux
is open source, so dependence on a single
OS vendor is replaced with greater innovation, freely shared. As with any new, lowcost, nonproprietary solution, it gets
cheaper over time.
LWM: And how do these advantages
translate for Oracle customers?
Coekaerts: Our customers benefit from
running Linux in many ways. Everyone
knows Linux costs less and – thanks in part
to Oracle – it’s faster and more reliable than
A B O UT
TH E
I NTE R V I E W E R
Jeremy Geelan, editorial director of
SYS-CON Media, speaks, writes, and broadcasts
about the current state of Internet technology,
and about the strategies appropriate to
the unrelenting convergence of business,
i-technology, and the future.
[email protected]
PREMIER 2003
INTERVIEW
ever before. My team has experienced this
firsthand. We run Linux internally at Oracle,
which allows us to test and prototype our
software on Linux well in advance of new
releases, thus ensuring reliability. In addition, my team can develop innovative features for the operating system and immediately share those with the Linux kernel
community.
LWM: So in other words, you eat in your
own kitchen?
Coekaerts: That’s right. By running parts of
our own business on Linux, we make our
own infrastructure more efficient and less
expensive. There are several Linux-based
pilots and operational systems: for example, Oracle Outsourcing runs a large part of
wide; the Oracle E-Business Suite GSI on
Linux is five times cheaper and three times
faster than conventional Unix/RISC.
Looking more closely at Linux inside
Oracle worldwide, we run more than 700
mid-tier Linux servers, including most of
Oracle University, the Oracle e-mail system,
the Oracle Web site, Oracle’s ERP/CRM
application middle tiers, and the Oracle
File System. In fact, our own development
organization uses hundreds of Linux
servers, and Oracle even runs its demonstration environment – where performance
is critical – on Linux. By the end of Oracle’s
fiscal year (June 2003), we plan to have
100% of our mid-tier servers on Linux.
Finally, more than 1,000 developers at
Oracle use Linux as their development
The nice thing about Linux from Oracle’s
point of view is that we can prototype OS
feature enhancements together with Oracle
database enhancements in-house. This
allows us to quickly determine if some new
idea is feasible to implement or not, and if
so, we can create a possible reference
implementation for other vendors to pick
up, or even show other OS partners how it
will benefit them as well.
Oracle is actively supporting the Linux
open source community by contributing
source code for products such as the
Cluster File System, driving development of
the Linux kernel, and working with the
Linux community to provide higher levels
of security assurance for the operating system. We recently announced with Red Hat
“Oracle is actively supporting the Linux
open source community by contributing
source code for products such as the
Cluster File System, driving development of
the Linux kernel, and working with the
Linux community to provide higher levels of
security assurance for the operating system”
their business on Linux. And we recently
converted our application demo systems –
consisting of several hundred servers – to
Red Hat Advanced Server; these demo systems are used by our global sales organization to give demonstrations of our products
to prospects, customers, and partners.
We’ve discovered that Linux on low-cost,
commodity hardware is a proven technology for mission-critical apps such as Oracle
E-Business Suite and Oracle9i Database
with Real Application Clusters. In fact, we
run Oracle E-Business Suite on a
Linux/Intel middle tier. This Global Single
Instance (GSI) in our Austin Data Center
provides mission-critical applications to
more than 40,000 Oracle employees world-
environment. This shows our commitment
to Linux because running our own production systems on it means that we trust and
are serious about Linux.
PREMIER 2003
56
LWM: How about Oracle’s Linux Kernel
contributions?
Coekaerts: My group works very closely with
Red Hat and UnitedLinux to test and optimize
Linux. For example, we collaborated to create
a core set of enhancements in the areas of
performance, reliability, clustering, and manageability in order to enable Linux to support
our customers’ enterprise-class deployments.
We believe that our work with Red Hat and
UnitedLinux to enhance the Linux kernel will
benefit all Linux distributions.
an intent to submit Red Hat Linux
Advanced Server for a Common Criteria
(ISO 15408) evaluation at Evaluation
Assurance Level (EAL) 2. This evaluation is
expected to enable security-conscious customers in both the public and private sectors to procure an evaluated Linux operating system upon which they can run enterprise applications.
LWM: Is there much debugging and Quality
Assurance (QA) happening at Oracle?
Coekaerts: A lot. We run heavy stress testing on Linux kernels, from production kernels to the new 2.5 development tree, and
provide feedback to the community on
peformance characteristics – and of course
www.LinuxWorld.com
INTERVIEW
fix bugs where we find them. When we first
started to work with the Linux vendors to
get Linux enterprise-ready, we had a set of
features that included asynchronous IO,
big pages support, reducing lock contention in IO drivers, and so on. We helped
with the development and debugging of
these features and shared our expertise in
userland libraries or testcases (e.g., Async
IO userland library with test tools) when
available.
For fun, we even made Firewire driver
changes to allow for shared-disk devices
and fixed bugs in bus reset handling on
Firewire. This is useful to Oracle users
because it offers an easy and inexpensive
solution for creating a shared-disk setup. A
simple thing like this allows people to
install and use our database clustering
technology, Oracle9i Real Application
Clusters, in a test and demo environment.
In addition, it helps them understand the
features and power behind our database
clustering technology without having to
purchase expensive equipment first.
LWM: Does any one project come to mind
as being of special significance?
Coekaerts: The most significant project we
started last year was to build a Cluster File
System for Linux. This makes management
of a clustered database much simpler
because the file system is easier to work
with than raw disks. We’re also looking at
Infiniband implementations. And, in keeping with the open source approach, all of
this will of course be open sourced.
result, Oracle customers on Red Hat
Advanced Server or UnitedLinux get
improved response and faster resolution of
critical issues. As a single support organization, we ensure the highest level of support and availability to our joint customers.
Any customer running Oracle products
on Red Hat or UnitedLinux should turn to
us for support if they have an issue that
prevents the smooth operation of their
Oracle implementation. We’ll diagnose the
issue and work with the OS partner for
those cases where the operating system is
suspected of causing the issue. For those
issues of a mission-critical nature, Oracle
will provide a fix to the customer regardless
of the source – whether it’s an Oracle, Red
Hat, or UnitedLinux issue. And for additional support issues, Oracle will collaborate with the Linux partner so that the customer issue is resolved jointly. All this is
done seamlessly for the customer without
them having to get involved. It’s important
to note, however, that Oracle customers
looking to benefit from this front-line support must have a support agreement in
place with the Linux distribution.
LWM: How about tech support?
Coekaerts: One of the great things about
our commitment to Linux is our direct,
front-line technical support for the Linux
operating system. We offer this support for
Oracle customers running Red Hat Linux
Advanced Server and UnitedLinux, which
includes Conectiva Linux Enterprise
Edition, SCO Linux Server 4.0, SuSE Linux
Enterprise Server 8, and Turbolinux
Enterprise Server 8.
For DBAs, an elegant bug-free implementation for clusters has been a hurdle,
and that’s now been removed. Perhaps the
next-biggest hurdle until now has been
technical support. We not only certify and
support our applications on these Linux
distributions, we also support the Linux
operating system itself. This is incredibly
significant because Oracle, working closely
with Red Hat and UnitedLinux, is a single
point of contact for customer support. As a
LWM: How exactly is Oracle making Linux
“unbreakable”?
Coekaerts: For 25 years, the Oracle brand
has been synonymous with enterprise
excellence and our commitment is continuing to grow with “Unbreakable Linux,”
which offers a unique combination of innovative technologies – like a modern open
source operating system and database clustering technology that dramatically reduces
the cost of computing while achieving the
highest levels of performance, reliability,
and security. We are unique in that no other
company in the world provides all your
enterprise software and full technical support on Linux.
In fact, we also offer thousands of compatible Linux-based solutions from partners. In conjunction with Dell and HP we
deliver easy access to high-performance
servers that are ready to run Oracle9i
Database technology out-of-the-box, allowing customers to deploy high-performance,
enterprise-class solutions on the lowestcost hardware and operating system infrastructure available today.
Furthering our commitment to Linux,
Oracle recently launched the Unbreakable
Linux Partner Initiative, which gives financial, technical, and marketing incentives to
ISVs delivering applications on Oracle’s
www.LinuxWorld.com
57
Unbreakable Linux software infrastructure.
ISVs that join the initiative through the
Oracle Partner Network get technical and
support resources from my team and
Oracle’s support organization to help them
build their applications.
Only Oracle has its complete infrastructure and applications product lines available on Linux, and strategic partnerships
with Red Hat and UnitedLinux. Together,
Red Hat and UnitedLinux serve more than
95% of the Linux OS server market worldwide. Oracle customers everywhere can
now take advantage of our front-line support for the Linux operating system.
LWM: Developers, network administrators,
and database administrators all have
high hopes for Linux, which continues
to be the fastest-growing enterprise
computing environment.What do you
see as the most likely future for Linux?
Coekaerts: One of the most important
growth areas for Linux today is scalability.
In the future, Linux will scale beyond 8
CPUs and we will begin to see 16- to 30way systems with up to 64GB of RAM, not
to mention greater support for a larger
number of disks. We’ll need to prove that
Linux provides scalability beyond 8 CPUs
and runs well on large-scale NUMA systems, 16- to 32-way systems with 64GB or
more of RAM. And finally, Linux will need
to support many thousands of disks and
provide features for better network and IO
failover.
LWM: So what’s coming in the future from
Oracle?
Coekaerts: In general, clustering and cluster
management is an area where Linux still
needs improvement, and this is one area
where Oracle can contribute our expertise.
You’ll also see us concentrating on delivering
functionality that Linux still lacks (that other
OSs already have), as well as new technologies. And we will continue to work on improving the kernel functionality in an open and
collaborative development environment.
In short, stay tuned for even greater
Linux things from Oracle and from my
group! We have cutting-edge technology,
and there are many more technical
improvements that we can contribute to
the Linux OS that no one has yet solved. We
look forward to continuing our close collaboration with partners such as Red Hat
and UnitedLinux to bring these technical
improvements to the masses.
LINUXWORLD MAGAZINE WWW.LINUXWORLD.COM
PREMIER 2003
SECURITY
Taking the Cost
Out of Firewalls
It pays to know your Linux
BY
With about $1,000 and knowledge of Linux and networking principles, you can
R A M
S A M U D R A L A
Ram Samudrala is a principal investigator
(assistant professor) at the University of
Washington. His work has led to several
publications in peer-reviewed journals and
freely copiable software for molecular and
systems modeling (which are being used on
high-performance Linux-based computing
clusters that he manges). He released an
album with the pseudonym Twisted Helices,
with the complete album being published
online free of any intellectual property
restrictions. He is also the author of the
Free Music Philosophy and other texts on
(and against!) intellectual property,
which have been referenced in Forbes,
HotWired, and The New York Times.
[email protected]
The operating system running on the
firewall is Linux, and we use the KRUD distribution, version 8.0. The system is
installed like any other Linux system, but
all Internet-based services are turned off.
Linux supports firewalling through its netfilter/iptables subsystem. It will basically let
you do anything a commercial firewall can
do, and then some, including the functionality of packet filtering (stateless or stateful), all
different kinds of NAT (Network Address
Translation), and packet mangling. It is
extremely powerful, but cumbersome to use.
There are packages that provide a cleaner interface to the iptables. One such pack-
age that we use is Shorewall, which lets you
manipulate the firewall rules using simple
configuration files. Our setup is such that
each of the gigabit ethernet cards is
assigned to three zones: the zone that compromises the external Internet (“net”), the
demilitarized zone (“DMZ”), and the local
network (“loc”). Using Shorewall, we can
specify how traffic is to be routed across the
different zones (see Figure 1).
Specifically, we allow all connections
from machines in the local zone to the net
zone. We allow Web and mail access to our
Web/mail server(s) located in the demilitarized zone (DMZ); for this reason, all
machines in the DMZ are completely mirrored since Web and mail servers, even the
most up-to-date versions, could have
potential security holes. Depending on
your level of paranoia, you can set up the
firewall such that you allow access to the
firewall only from a console, or from a single host in the local zone.
We allow only secure logins, using
OpenSSH, from a selected list of trusted
hosts in the net zone to a dedicated gateway machine (located in the local zone).
The secure logins have to pass a one-time
password screen based on OPIE, as well as
a permanent password screen, to be able
to log in to the gateway machine. The combination of OpenSSH and OPIE for authentication is handled using Linux-PAM.
The two-password system is to address
the issue of keyloggers who may record a
user’s permanent password (which is possible even over a secure connection). Onetime passwords get around this problem,
but they are not enough since users have
a tendency to store their list of one-time
passwords on their computers, and a
computer could be stolen/compromised.
Thus the only way to gain access to our
local network from the Internet is by knowing the list of one-time passwords, and the
PREMIER 2003
58
www.LinuxWorld.com
have a firewall that provides freedom, flexibility, and optimal security. In this article,
Ram Samudrala shares his experience in creating a cost-effective firewall.
The Motivation
or almost two years, I dealt
with a situation where I had
access to a gigabit ethernet
connection to the Internet,
but I couldn’t harness it since
I was behind a commercial
firewall that only supported 100Mbps.
Upgrading would have required thousands
of dollars, which, especially in this economy, seemed wasteful. My solution was to
create a Linux-based gigabit ethernet firewall that will do the same thing. The beauty
of this setup was not only that I could put
together the hardware for less than $1,000,
but since the software is freely copiable,
there are no restrictions on the numbers of
users and licenses.
It’s clear that gigabit ethernet over copper is going to be the next step in network-
F
A B O UT
TH E
A UTH O R
ing. Even if you don’t have a gigabit ethernet connection to the Internet, it’s not too
expensive to acquire one. It’s also clear that
one of the most logical ways to protect
yourself from unwanted attack is through
the use of a firewall. However, commercial
firewall products utilizing gigabit ethernet
are prohibitively expensive.
The Setup
Hardware Configuration
The machine I purchased for a firewall is
a nice 4U rackmount with an AMD
Palamino 1700+ CPU, a MSI KT3 Ultra2
KT333 MS-6380E motherboard, a small
hard disk, some memory, and three Intel
Pro/1000T Gigabit Server ethernet cards. All
the hardware cost less than $1,000. The
main thing to note here is that any computer with gigabit ethernet cards should do,
assuming that its components work well
with Linux (in most cases, they should).
Software Configuration
rs
velope
e
D
:
N
ATT
SECURITY
P
U
P
E
SoTthe mike
permanent password for an authorized user, and making the connection from a list of trusted hosts. The passphrase for the onetime passwords is randomly generated for each user (i.e., the users
don’t have a choice as to the passphrase), which is then used to
generate a list of one-time passwords that a user keeps. The list can
be reset at the whim of the user, with a new random passphrase
being used to create a new list. A script to do this is available at
(www.ram.org/computing/linux/firewall/otpgen.tgz).
t
and be...
om
Go t/odeveloper.sys-con.c
http:/
!
D
R
A
HE
Calling Sleek Geeks
Everywhere!
The Bottom Line
The Minuses...
The downside of such a firewall is that you do need to know your
Linux, and be extremely familiar with networking principles. Even
though the Shorewall packages simplify management, for optimal security it helps to be familiar with the netfilter subsystem. If your system
administrator is familiar with Linux, then this shouldn’t be a problem.
Make sure you have your finger on
the pulse of i-Technology...bookmark
http://developer.sys-con.com today.
i-Technology
News
i-Technology
Views
i-Technology
Th
e
(n Inte
et rn
zo et
ne
)
Comment
i-Technology
© COPYRIGHT 2003,
SYS-CON MEDIA
WWW.SYS-CON.COM
(D
MZ
Lo
)
(D
MZ
ca
Debate
LWM Advertiser Index
l
)
Advertising Partner
Web Site URL
Phone #
Page #
BASIS INTERNATIONAL / OPEN SYSTEMS
WWW.BASIS.COM / WWW.OSMCORP.COM
BLACKHAT
WWW.BLACKHAT.COM
916 853 8555
65
COMDEX
WWW.COMDEX.COM
650 578 6900
89
FREE SOFTWARE FOUNDATION
WWW.GNUPRESS.ORG
617 542 5942
27
HP
WWW.HP.COM/LINUX
888 HPLINUX
C4
ISAVIX
WWW.ISAVIX.COM
866 472 8849
33
LINUXWORLD CONF. & EXPO
WWW.LINUXWORLDEXPO.COM
LINUXWORLD MAGAZINE
WWW.LINUXWORLD.COM
ORACLE
WWW.ORACLE.COM/LINUX
PERVASIVE SOFTWARE
WWW.PERVASIVE.COM/LINUX8
800 287 4383
3
PROMICRO SYSTEMS
WWW.PROMICRO.COM
866 646 4276
8
RACKSAVER
HTTP://OPTERON.RACKSAVER.COM
888 942 3800
21
VERITAS
WWW.VERITAS.COM
15
XIMIAN
WWW.XIMIAN.COM/INFORMATION/MGMT3
C3
6
Allow secure access with both one time and permanent passwords
Allow only mail and web access
Allow only mail and DNS access
FIGURE 1
ROUTING TRAFFIC ACROSS ZONES
And the Pluses...
The amount of flexibility greatly outweighs the Shorewall learning curve, not to mention the cost of creation and maintenance.
Another singular advantage over a commercial product is that it’s
easy to upgrade the hardware and software at whim.
The bottom line is that security is best achieved by a thorough
understanding of networking principles and exploits. A Linuxbased firewall gives you the freedom, flexibility, and the opportunity to achieve security in an optimal and economical manner.
Resources
•
•
•
•
•
•
KRUD: http://tummy.com/krud
netfilter: www.netfilter.org
Shorewall: www.shorewall.net
OpenSSH: www.openssh.com
OPIE: www.inner.net/opie
Linux-PAM: www.kernel.org/pub/linux/libs/pam
888 303 5282
77
C2
General Conditions: The Publisher reserves the right to refuse any advertising not meeting the standards that are set to protect the high editorial quality of. All advertising is subject to approval by the Publisher. The Publisher assumes no liability for any costs or damages incurred if for any reason the Publisher fails to publish an advertisement. In no event shall the Publisher be liable for any costs or damages in excess of the cost of the advertisement as a result of a mistake in the advertisement or for
any other reason. The Advertiser is fully responsible for all financial liability and terms of the contract executed by the agents or agencies who are acting on behalf of the
Advertiser. Conditions set in this document (except the rates) are subject to change by the Publisher without notice. No conditions other than those set forth in this “General
Conditions Document” shall be binding upon the Publisher. Advertisers (and their agencies) are fully responsible for the content of their advertisements printed in
ColdFusion Developer’s Journal. Advertisements are to be printed at the discretion of the Publisher. This discretion includes the positioning of the advertisement, except
for “preferred positions” described in the rate table. Cancellations and changes to advertisements must be made in writing before the closing date. “Publisher” in this
“General Conditions Document” refers to SYS-CON Publications, Inc.This index is provided as an additional service to our readers. The publisher does not assume any
liability for errors or omissions This index is provided as an additional service to our readers. The publisher does not assume any liability for errors or omissions.
LINUXWORLD MAGAZINE WWW.LINUXWORLD.COM
www.LinuxWorld.com
43
59
PREMIER 2003
FEATURE
Linux
Virtual
Private
Networking
Fundamentals
Choosing the right
solution for your network
PREMIER 2003
60
www.LinuxWorld.com
FEATURE
BY J.C. UTTER AND JOSH SNYDER
As virtual private networks (VPNs) become the industry standard, more options
become available. This article takes a look at what’s out there, including the pros and
cons of each solution, to help you decide what’s best for your network.
irtual private networks have
become the industry standard for secure encrypted
networking over the
Internet. Most IT departments have either deployed
VPNs, or intensified their focus on the
deployment of VPNs, as a solution to the
high cost of connecting remote and home
offices to the corporate network.
In parallel with the IT industry’s adoption of VPNs, Linux has emerged as a powerful, high-performance, low-cost network
operating system that can be used in a wide
range of applications including network
firewalls, routers, and servers. Linux is inexpensive to license, and it leverages inexpensive PC hardware. Because of its low cost
and high reliability, Linux is one of the most
popular VPN platforms for commercial VPN
products, as well as for IT departments
capable of building their own VPN solutions.
To make an educated decision about
VPN deployment, it is important to know
about the current state of Linux VPN software, and how these technologies can work
for your organization.
V
device uses protocol-based communications to establish a connection to another
PC or network device that is also connected
to the Internet. This virtual connection or
route is called a “tunnel.” All network traffic
destined for the remote computer or network device is transmitted through this
tunnel. The traffic that passes through the
tunnel is automatically encrypted by the
transmitting device, and decrypted by the
receiving device, which provides the security that makes a VPN “private” in contrast to
an unencrypted Internet connection.
Remote Access Services (RAS)
vs Network Infrastructure
If you don’t already know the answer,
the first, most obvious question is, “What is
a VPN?” A VPN is a virtual private network
that allows two or more computers or networks to communicate securely across an
unsecured network. This means you can
use a VPN to interconnect two private corporate networks securely using the
Internet. With this approach, the Internet
can be used to connect remote offices in a
way that is much less expensive than leasing private data circuits to connect the
same remote sites.
All VPNs fundamentally work in the
same way. First, a PC or similar network
device is connected to the Internet. This
VPNs are used in two major application
areas: RAS (Remote Access Services) and
network infrastructure. RAS applications
for VPNs focus on providing access to corporate networks for mobile users via the
Internet, while infrastructure VPNs focus
on creating permanent private connections
between different networks using the
Internet.
The most significant benefit of using a
VPN for RAS applications is cost savings.
Traditional RAS solutions require the installation of expensive RAS hardware, modem
banks, and phone lines inside the corporate
network. When a mobile user connects
from a new location, he or she uses the
same dial-up phone number to connect to
the corporate RAS. These dial-up RAS connections are normally made over long distance telephone lines, which gives a corporate RAS the additional incremental cost of
the associated long distance charges for
each minute of network use (see Figure 1).
The corporate RAS is a relatively expensive access solution when you consider the
VPN alternative. With a VPN access solution, you need only an Internet connection
for your mobile PC on one end, and a VPN
server or appliance that is connected to
both the Internet and the corporate net-
www.LinuxWorld.com
61
VPN Primer
work on the other end. The one-time and
recurring costs of modem banks and telephone lines that exist in the corporate RAS
world are eliminated.
In most VPN RAS solutions, the mobile
user pays for Internet services through a
national ISP that can provide local dial-up
access throughout the country. This makes
it possible to replace the variable long distance charges of the corporate RAS with the
cost of a flat-rate Internet dial-up account.
In adition, users of a VPN RAS can take
advantage of any Internet access technology, including high-speed broadband. This is
a significant benefit when compared to a
corporate RAS that’s limited to dial-up
speeds (see Figure 2).
VPNs are also commonly used in network infrastructure. In contrast with the
mobile user’s need to connect from different locations over time, a VPN implemented within the network infrastructure is a
permanent, embedded network feature.
The VPN is transparent to the end user, and
doesn’t require end-user configuration or
authentication (see Figure 3).
PPTP VPNs Using
Poptop for Linux
The most popular VPN software for RAS
applications under Linux is Poptop, which
is based on the PPTP protocol developed
primarily by Microsoft. Poptop is easy to set
up, and has very low hardware requirements when the number of users remains
small.
As an RAS solution, Poptop’s greatest
strength is the widespread availability of
the necessary client software. Microsoft has
A B O UT
TH E
A UTH O R S
J.C. Utter is a founder and the president
of ImageStream Internet Solutions. He
has been writing technical articles for
industry publications for over a decade.
[email protected]
Josh Snyder is a veteran engineer who joined
the ImageStream engineering team in 1996.
Josh currently specializes in Linux networking
applications and VPN technology.
[email protected]
PREMIER 2003
FEATURE
included a PPTP VPN client with every version of Windows since Windows 98. In general, this means that users will not need to
install additional software to access a
Poptop VPN.
On the downside, Poptop suffers from
relatively weak security, which is characteristic of all PPTP-based VPNs. Although
newer authentication methods have fixed
many of the early problems with PPTP,
most security experts agree that PPTP
should not be used to access private networks that require a high level of security.
The management of the Poptop VPN
client base can also present problems. All
passwords and user names are stored in an
unencrypted text file under Linux. If you
don’t mind editing this file directly to make
changes to user names and passwords, the
PPTP approach may offer an acceptable
solution. But Poptop’s limited security provisions would be a serious stumbling block
to any organization that requires a high
level of network security. Although many
Linux users have been using Poptop for
years, it is losing favor to newer, more
secure VPN technologies.
Corporate LAN
LAN Hub or Switch
Remote PC
Corporate RAS
Telephone Service
FIGURE 1
CORPORATE RAS
Corporate LAN
The
Internet
Internet Service
Remote PC
FIGURE 2
PREMIER 2003
Router
REMOTE ACCESS USING A VPN
Internet Service
IPsec VPNs Using FreeS/WAN
for Linux
IPsec (Internet Protocol Security) is one
of the rising stars in the world of high-security VPN protocols. IPsec is an open standard that is supported by many different
VPN vendors. IPsec is a very flexible protocol that lends itself to deployment in all
types of VPN applications, and it is equally
suited to providing the foundation for RAS
and infrastructure solutions.
FreeS/WAN is a Linux-based implementation of the IPsec protocol. FreeS/WAN is
quite flexible, and can be used to create
VPN connections with a wide range of
hardware and software including Linux
routers and servers, Cisco routers, and
Windows workstations. But this flexibility
comes with a steep learning curve.
The complex FreeS/WAN configuration
files are difficult to understand and configure. To configure FreeS/WAN properly, you
must first determine which traffic you want
to forward over the VPN. In even the simplest applications, this can require the configuration of at least four tunnels, which
contributes to system complexity.
FreeS/WAN also bypasses the normal IP
routing facilities under Linux. This makes it
impossible to use FreeS/WAN with dynamic routing protocols such as BGP or OSPF to
provide dynamic fail-over solutions.
LAN Hub or Switch
Corporate LAN B
Corporate LAN A
The
Internet
LAN Hub or Switch
LAN Hub or Switch
Router
FIGURE 3
Router
INFRASTRUCTURE VPN
If you or your staff guru can wade
through the challenge of using FreeS/WAN,
the benefits are considerable. FreeS/WAN is
compatible with most IPsec implementations, and it can provide high-speed VPN
services with modest hardware requirements. FreeS/WAN is a very secure VPN
featuring 168-bit 3DES encryption, and
many security experts view FreeS/WAN as
the most secure VPN solution available
today for Linux.
Infrastructure VPNs Using CIPE
for Linux
CIPE is a lesser-known VPN application
for Linux that strives to be an easy-to-use,
high-security VPN solution. CIPE can be
62
used to provide infrastructure VPN solutions using Linux, Windows 2000, and
Windows XP.
Under Linux, CIPE configuration is
managed using a simple text file. CIPE
works by creating a VPN device that functions like a standard device under Linux.
Because a CIPE tunnel works just like any
other standard Linux device, it is possible
to use CIPE in conjunction with dynamic
routing protocols and other routing tools.
Only one device interface is required to
create a CIPE VPN. This greatly reduces the
complexity of VPN configuration when compared to FreeS/WAN. And because CIPE is
not designed to support RAS solutions, there
is little need to make significant changes to
www.LinuxWorld.com
FEATURE
the software configuration over time. As a
result, the relatively static configuration of
an infrastructure VPN using CIPE generally
mitigates the disadvantages of a system that
relies on simple text file configuration.
VPN Solutions Using
ImageStream Routers
If you don’t have the expertise to build
your own Linux VPN box, or if you would
prefer to deploy a fully tested, commercially
supported Linux VPN product, there are a
number of manufacturers that can supply
complete hardware and software solutions.
In this case, we will look at using routers
from ImageStream for infrastructure VPN
deployment.
ImageStream manufactures a wide
range of routers that support leased WAN
circuits from T1 through OC12, as well as
10, 100, and 1000Mb Ethernet connections.
To support VPN applications, ImageStream
routers provide fully tested versions of
FreeS/WAN and CIPE.
Infrastructure VPNs are commonly
deployed on a network router. The router is
an ideal device for the deployment of an
infrastructure VPN, because it is one of the
few network devices that performs rule-based
packet forwarding, and can make decisions
about where and how to forward packets.
In an infrastructure VPN, the
ImageStream router would be configured to
use either FreeS/WAN or CIPE, and the
router on the other end of the tunnel would
be configured similarly. When both routers
are connected to the Internet, and both are
properly configured, the devices connected
to each remote network will be able to
exchange network data as if they were all
connected to the same network. Although
the Internet is used to transfer data
between the sites, the data is encrypted to
provide a high level of security and privacy.
VPN solutions. All of Cyberguard’s dedicated
VPN appliances support user authentication
from a central site. Cyberguard’s flagship
product is capable of supporting over 2Gbps
of encrypted throughput. Dedicated VPN
products like this can be deployed at any
time, and they work seamlessly with routers
like those from ImageStream to provide network security for WAN and LAN traffic.
Choosing the right Linux VPN solution
for your network will depend on your
unique requirements. Poptop may be a
good choice for VPN RAS applications that
require readily available Windows support
with moderate security. At the same time,
Poptop is less secure than the alternatives,
and should not be used if a network break-
“No matter which Linux VPN
solution you choose, it’s good
to have different choices”
Linux VPN Conclusions
There are times when an enterpriseclass VPN application will require enough
encrypted data throughput that only a dedicated VPN appliance will do the job.
Similarly, there are times when the secure
management of dozens or hundreds of
users will require a commercial VPN solution that is designed to manage and track a
large number of authenticated users. In
these situations, a dedicated VPN solution
will provide the best results.
Cyberguard is an example of a Linux VPN
appliance manufacturer that offers high-end
There are many popular VPN software
solutions for Linux including Poptop,
FreeS/WAN, and CIPE. Each offers a different mix of security and ease-of-use, as well
as different levels of support for RAS and
infrastructure VPNs.
Poptop leverages the PPTP protocol. Its
strengths include compatibility with existing Microsoft Windows VPN client software,
and ease-of-use in RAS applications. The
main drawback of using Poptop is its moderate level of security, which by most standards would remove Poptop from serious
consideration in mission-critical networks
that require bullet-proof security.
FreeS/WAN, with its strong support for
both RAS and infrastructure VPNs, is the
most powerful and flexible VPN solution for
Linux. FreeS/WAN strengths include wide
compatibility among all IPsec compatible
VPN devices, strong security, and the highest level of flexibility available in a Linux
VPN solution. To its detriment, FreeS/WAN
bypasses the standard packet-forwarding
system under Linux, which precludes the
use of many standard Linux routing applications. In addition, FreeS/WAN is a serious
challenge to understand and configure,
which is the current price that must be paid
to deploy the most flexible and compatible
Linux VPN.
CIPE is the lesser-known VPN software
for Linux that combines ease-of-use with a
high level of security for infrastructure
applications. CIPE is not designed for
deployment in RAS applications, but it is
the easiest VPN solution available for highly
secure infrastructure VPNs.
www.LinuxWorld.com
63
Solutions Using Dedicated VPN
Appliances
Which VPN?
in would represent a significant risk to the
organizational mission.
If you are looking for a highly secure
VPN RAS solution, or if you are specifically
looking for IPsec compatibility in a VPN
RAS, FreeS/WAN is clearly the best choice.
Despite its complexity, FreeS/WAN provides the most flexible VPN solution for
Linux, with highly secure support for both
RAS and infrastructure VPNs.
For infrastructure VPNs, CIPE may be
the best choice because it is easy to configure and it provides a high level of security.
CIPE also supports standard Linux routing
applications, which can be a “make or
break” issue with some deployments.
No matter which Linux VPN solution
you choose, it’s good to have different
choices. As each VPN software package
places a different emphasis on security,
ease-of-use, flexibility, and compatibility, IT
professionals reap the benefits of being
able to choose the VPN technology most
ideally suited to the application. With
Linux, you also have the option to build
your own VPN solution, or to purchase
commercially supported products that are
guaranteed to work. In any case, your VPN
deployment will benefit from the security
and stability that Linux brings to every
application in which it’s deployed.
Resources
• Poptop: www.poptop.org
• FreeS/WAN: www.freeswan.org
• CIPE:
http://sites.inka.de/bigred/devel/cipe.html
• Cyberguard: www.cyberguard.com
LINUXWORLD MAGAZINE WWW.LINUXWORLD.COM
PREMIER 2003
INDUSTRY INSIGHT
You’ve Come a
Long Way, Unix
Reflections on the rich history of Unix
Sometimes the irony is so sharp you can cut deli meat with it. As we settle in for
a long hot summer and a fall of legal skirmishes between SCO and the rest of the
known Linux universe in regards to the patents and other intellectual property surrounding Unix, there’s a certain karmic reckoning to be had in the fact that the very
first application that Unix was put to was to assist the Bell Labs Patent department
in preparing patent applications.
In the dim days of 1970s, when a
Digital PDP-11 was the state of the art
in minicomputing for a mere $65,000,
Unix was just taking its first baby steps
at Bell Labs. Dennis Ritchie and Ken
Thompson couldn’t have dreamt that
this attempt to produce an interactive timesharing system would someday become the
lingua franca of server-based computing.
The early days of Unix at Bell are full of
landmark events. The development of the C
programming language. The concept and
implementation of pipes. The first file system, inodes and all. It was also at this time,
in 1976, that the University of California at
Berkeley (UCB) began to participate in Unix
development, culminating in the development of 4.2BSD. Meanwhile Bell continued
to refine Unix, eventually releasing System
6 and System 7. It was on a Tandy 6000,
running System 7 (technically Xenix), that I
first really began to play with Unix.
In the 1980s, Unix began to be a real
player in the computer industry. The 800pound gorilla was, of course, the VMS operating system running on DEC’s VAX minicomputers, but a small rebel company
called Sun Microsystems was making head-
I
James Turner, senior editor at LinuxWorld
Magazine, is president of Black Bear Software,
as well as director of software development for
Benefit Systems, Inc.
[email protected]
way selling a variant of Berkeley Unix they
called SunOS (later Solaris). Also, companies
such as HP and Apollo were offering systems
running their own varieties of Unix. And Bell
(now reconstituted as AT&T) was selling a
System 5, running on platforms like the 3B2.
But for all its promise, Unix had problems. For one thing, there was little in the
way of portability in programs. Binary compatibility was nonexistent, and even recompilation could be an adventure (anyone old
enough to remember being asked if your
machine was big-endian or little-endian?).
And Unix could be as expensive as any of
the other traditional operating systems.
Into the fray stepped Richard Stallman
and the Free Software Foundation. Eagar to
provide a not-for-profit version of the Unix
operating system, they first needed to build
the tools to build the tools, things like a C
compiler and parser generator to replace
the proprietary versions (we know these
tools today as gcc and bison/yacc, among
others). And while the FSF toiled away on
their OS, a funny thing happened. People
started noticing that the FSF versions of the
PREMIER 2003
64
A B O UT
TH E
A UTH O R
BY
J A M E S
TU R N E R
Unix tools were often better than the commercial versions, and free! For example,
Sun charged $10,000 for their C compiler,
but gcc worked just as well. But as years
dragged on with no OS in sight from the
FSF, the commercial implementations continued to be the only game in town outside
VMS and the upstart called Windows.
It would fall to an unassuming
Scandinavian, not the FSF, to change the
Unix world forever. No one reading this
magazine needs to hear the story of how
Linus Torvalds started working on an open
source Unix kernel as a personal project,
and ended up spawning the most widely
adopted non-Microsoft operating system in
the world. But it’s worthwhile to note what
made Linux so special. For one thing, it
could run on low-cost Intel-based PCs, the
same kind that people bought to run
Windows. That meant you didn’t need to
spend a fortune on hardware if you didn’t
want to. Also, even across different hardware platforms (say an IBM 3090 and a Dell
laptop), the source code remained compatible. And inside the same platform, even
different vendor releases like Red Hat and
SuSe could run each other’s programs.
The other breakthrough was making it open
source, which meant that the people most
motivated to fix problems and add new features
(the people encountering the bugs and needing
the features) were empowered to do so. If you
had a critical problem, you didn’t need to wait
for a vendor to decide it was important enough
to fix. You could fix it yourself.
Today, Unix (both in proprietary implementations such as Solaris and open versions
such as Linux and FreeBSD) is the 800-pound
gorilla of the server market, big enough to
make Microsoft scramble for market share in
Europe, and big enough to make companies
like SCO try to grab a piece of it. Truly, a long
way from two Bell engineers scrounging for a
computer to whip up a new operating system.
LINUXWORLD MAGAZINE WWW.LINUXWORLD.COM
www.LinuxWorld.com
LICENSING
Show Me
the License
BY
M I KE
O L S O N
Buying open source software at your company?
Make sure you’ve got the right license...
If the software you’re considering is an operating system, like Linux, then the
Mike Olson, one of the original authors of
Berkeley DB, is a technology industry veteran
with more than 20 years of experience in
engineering, marketing, sales, and business
management. Mike was named president and
CEO of Sleepycat in 2001 after serving as vice
president of sales and marketing. Prior to
Sleepycat, he served in technical and business
management positions at database vendors
Britton Lee, Illustra, and Informix. Mike holds
BA and MA degrees in computer science from
the University of California at Berkeley.
[email protected]
Don’t get me wrong. The GPL is a good
thing. But there are no examples of profitable GPL-only software development
companies. Profits are a company’s oxygen.
You don’t want to bet your company’s success on a vendor who follows a business model on
life support.
The exceptions are companies such as mine,
Sleepycat, that have innovated on the GPL and offer
dual-use software licenses.
MySQL and Trolltech are
two others. We’re all profitable and growing. I think
the license makes the difference.
Under a dual-use license,
software is still available to
customers with a GPL-like software license.
However, these licenses also give customers
a choice to pay for a commercial license
that is less restrictive than the GPL.
Basically, it allows customers to use open
source software in closed, proprietary products.
For example, Trolltech customer IBM
wanted to use Trolltech’s Qt libraries (a
toolkit for faster development of graphical
user interfaces). IBM engineers didn’t have
the authority to share the source code with
their customers. But Trolltech’s commercial
license gave IBM engineers the freedom to
develop and distribute applications without
opening the source code. Unlike the GPL
version of Trolltech’s product, the commercial license version didn’t require the distribution of the source code.
Sleepycat customer Cisco Systems wanted a quick way to provide name and
address lookup in its high-performance
network router products. Cisco wanted to
use Sleepycat’s Berkeley DB product, but
wanted to protect the intellectual property
of their networking products. Cisco paid a
fee to license a version of
Sleepycat’s Berkeley DB that
wasn’t restricted by the GPL.
Cox Communications, one
of the largest cable network
companies in the U.S., chose
to implement the commercial version of the MySQL
RDBMS to avoid the legal
restrictions of the GPL and to
get the support and warranty
of the commercial version.
Dual-use licenses give
customers the freedom to
choose if and how they distribute the source code. The licenses also
help to create stable software companies
with profitable business models.
Berkeley DB, MySQL, and Qt did not start
with their current dual-use licenses. The
licenses, like the software, evolved through
an analysis of both customer feedback and
company balance sheets. Though Sleepycat,
MySQL, and Trolltech arrived at roughly the
same licensing model, the companies came
at the problem from different directions.
Trolltech was an early pioneer of dualuse licenses. While their commercial license
stayed the same, their noncommercial-use
license evolved over time to meet cus-
PREMIER 2003
66
www.LinuxWorld.com
GNU Public License (GPL) is good for your business. If it’s an application or a software ingredient, then the GPL may be bad for your business.
ere’s why. While Linux
operating system vendors
such as Red Hat and SuSE
benefit from the GPL,
application vendors do not.
Red Hat will be able to provide businesses with Linux software and
support for years to come. Even if they go
out of business, there are literally thousands of developers, as well as every major
IT company in the world, ready and willing
to support your GPL software. Most GPL’ed
applications, on the other hand, have very
small developer communities outside the
companies that support them. Any organization buying application software under
the GPL risks losing vendor support if the
company fails. Be prepared and understand the risk. The business model has to
work.
H
A B O UT
TH E
A UTH O R
LICENSING
tomers needs. “We changed the free edition
license from binary only to QPL, and then
finally to the GPL,” said Haavard Nord, CEO
of Trolltech. “Our current dual license gives
Trolltech customers maximum flexibility
while preserving a strong and profitable
software development business model.”
Berkeley DB was originally available
from UC Berkeley under the popular open
source Berkeley Software Distribution (BSD)
license. When we decided to form a business around Berkeley DB, we looked at the
BSD license closely. The BSD license would
give our customers flexibility. It would allow
them to freely embed Berkeley DB in hardware or software products and distribute
their product without restriction. However,
the BSD license would also allow our customers or any developer to take our code
and create their own products without our
permission or payment. We would create
our own competition. We decided to begin
the business with a dual-license strategy.
MySQL started with a commercial
license. According to their CEO, Marten
Mickos, “MySQL moved to the GPL in the
summer of 2000 to help MySQL gain wide
DR. MIGRATION
adoption. At the same time, we introduced a
dual license strategy, which has been great
for business.”
Haavard, Marten, and I recognize that our
businesses need a license like the GPL. It’s
good for our businesses. Our products and
our customers benefit from this type of
license. A license like the GPL brings two
things: it helps our products gain wide adoption and it makes it easier to manage a consistent, unified code base by forcing any changes
to be open source and available to us.
MySQL has more than 4 million active
database deployments. Qt has deployments
in the tens of millions. We estimate that
Berkeley DB has over 200 million deployments. In all cases, that’s a lot of people
using our software. A wide user base means
the product is tested by more people, which
leads to stable products with good performance. A wide user base also means
lower training costs for our customers.
Their developers are familiar with our APIs
and other programming approaches.
GPL-like licenses also help to maintain
product consistency by preventing closed,
proprietary branches. We call this phenom-
LINUXWORLD MAGAZINE WWW.LINUXWORLD.COM
It’s truly impressive how much you can do in this OS without
making any changes to your existing computing environment. It is
an excellent way for you to get a taste of Linux for no more investment than your time. In my tests I dropped the CD into my CD
drive and rebooted on three different x86 systems. In every test
KNOPPIX recognized the hardware on my systems and booted in
about one minute. Additionally, I was able to save and edit files on
my hard drive and in one case repair a system that no longer functioned properly.
Figure 3 shows the KNOPPIX operating system running Open
Office, Konqueror (as a Web browser), Konqueror (as a file browser), KMail (a mail client), and GAIM (Instant Messenger). The
machine used for the demo is a 425MHz AMD K6-2 processor with
64MB of RAM. Notice the hard drive icons on the desktop. These
hard drive partitions are both damaged, but KNOPPIX still booted
making it possible to retrieve critical files.
—continued from page 31
lection of applications is a good representative sample of those that
would be available to you free of charge when you start to utilize
Linux as a desktop computing system.
• Konqueror file and Web browser: This very functional browser is
as close to a Linux equivalent of Microsoft Explorer as there is; it
works as a system file browser and as a Web browser. Additionally,
its ability to anti-alias fonts makes the look as smooth and rich as
any Web browser on the market, and better than most.
• Mozilla Web browser: KNOPPIX 3.1 includes Mozilla 1.0. I selected Mozilla from the Internet Apps menu and browsed to some
sites. In contrast to Konqueror, it doesn’t have anti-aliased text.
• OpenOffice.org: The OpenOffice.org source code initially
includes the technology that Sun Microsystems has been developing for future versions of their StarOffice software, an alternative to Microsoft Office.
• K Office: An open source office suite comparable to Microsoft Office.
• X Multimedia System (xmms): A popular multimedia software
package developed for Unix operating systems running X11, it can
play back MP3, AVI, MPEGs, and many other multimedia formats.
• GNU Image Manipulation Program (GIMP): A fully featured graphic editor that rivals that of the Adobe family of graphical editors.
• Network connectivity tools: Internet connection software kppp (an
Internet dialer), pppoeconf (DSL), and isdn-config.
• Utilities for data recovery and system repairs: Even some for
other operating systems’ networks, and security analysis tools
for network administrators.
www.LinuxWorld.com
enon forking, and it’s always bad news for
customers because it creates many different
versions of essentially the same product.
To understand the problem this creates
for customers, let’s take a look at what happened to Unix. There are many different
versions of Unix and most are similar. Each
version of Unix has small, proprietary
enhancements that vendors added to create product differentiation. Solaris, AIX,
HP-UX, SCO, and BSD are not binary compatible and do not share a common management framework. Customers are forced
to spend money to maintain different
applications on different operating systems.
The Linux kernel is released under the
GPL and unlike the Unix kernel, there is
only one mainstream version of the Linux
kernel. There is also only one popular version of Berkeley DB and Qt.
Dual-use licenses may appear more
confusing at first. However, this new type of
licensing can bring your business more
benefits than any single license can. Before
buying your next piece of open source software, check the license.
Are You Ready to Migrate?
It’s understandable that you may not be loading Linux on every
desktop in your organization tomorrow. However, good IT managers
would be remiss in their responsibilities if they weren’t at least doing
the appropriate research into viable alternatives to their existing
infrastructure. I also agree that the jury is still out on the long-term
future of Linux; it’s much less popular than Microsoft. However, early
adopters of the technology may well find that they are regarded as
visionaries and applauded for improving their computing environments while contributing to their organizations’ bottom line.
LINUXWORLD MAGAZINE WWW.LINUXWORLD.COM
67
PREMIER 2003
FIRST LOOK
Introducing the
Linux 2.6 Kernel
Technical improvements will accelerate adoption
The Linux 2.6 kernel is expected to be released this summer, bringing not only a
huge improvement in performance but also big cost savings to the many enterprises
ready to migrate from Unix.
Dave Fuller brings more than 25 years of
data center technical and marketing experience to his current position leading the technical marketing group at OSDL, where he participates in both the Linux kernel stabilization
project and the Data Center Linux working
group. Prior to OSDL, Dave led IT activities at
a start-up focused on Web commerce. At
Sequent Computer Systems, he played key
roles in technical services and oversaw technical sales support for the company’s AsiaPacific and Latin American operations.
[email protected]
A fast and deep entry into the market
would be a distinct change from what
happened with Linux
2.4, when adoption
took longer than the
industry anticipated.
This time around,
however, the development community,
including OSDL, has
tested the kernel so extensively that we believe adoption will
come much, much faster.
There are eight reasons why CIOs
will decide to upgrade to a Linux distribution based on 2.6: seven related to performance and the eighth, and critical, factor
being cost. At OSDL, we divided the key 2.6
kernel feature improvements into seven
categories: performance, scalability, availability, clustering, I/O, management, and
serviceability. We found that Linux systems
based on the 2.6 kernel will scale better on
bigger machines. This provides the opportunity to replace more proprietary Unix
servers and to consolidate workloads on
bigger Linux systems. But it’s not just the
technical features; the clincher is the cost
savings that these features will make possible for large organizations.
Businesses can save big money by
implementing the new Linux kernel on
Intel architecture–based servers. Amazon’s
move from Solaris to Linux on HP
NetServer systems helped Amazon slash its
PREMIER 2003
68
lready the subject of
intense scrutiny, this new
kernel will be the first
major revamp of the Linux
kernel in two years. We at
Open Source Development
Labs (OSDL) have worked with Linux developers and together completed more than
4,000 tests on publicly available development versions of this kernel.
In recent months, we have run the
development kernel, known as 2.5, in our
production environment with servers,
achieving more than 30 days of continuous
uptime. The 2.5 kernel will transition into
2.6, and OSDL is committed to its rapid
adoption in the market. (OSDL is a global
consortium backed by Computer
Associates, Fujitsu, Hitachi, HP, IBM, Intel,
NEC, and other major vendors.)
A
A B O UT
TH E
A UTH O R
BY
D AV E
F U L L E R
technology capital budget more than 25%
in the first year alone. There’s more: businesses can achieve lower training costs, and
additional savings can be found as Unix
technical staff can easily port their skills,
procedures, and even many applications to
Linux.
To borrow an insight
from Clayton
Christensen’s book,
The Innovator’s
Dilemma
(HarperBusiness,
2000), Linux is a disruptive technology. The
new kernel is going to
allow Linux to pass
Christensen’s “good enough”
test. This means that many
organizations are going to begin
moving their core data center operations over to Linux. It gets the job done for
a lot less money. As proprietary architectures yield their performance advantage to
Linux, Linux becomes “good enough” for
most workloads.
Scalability
“Does Linux scale?” is often the first
question an IT manager will ask when evaluating whether Linux can replace an enterprise Unix server. Our tests indicate that
the Linux 2.6 kernel will scale much better
than the 2.4 kernel. Most of the development of the 2.4 kernel was done on singleprocessor systems with some testing on
dual-processor and larger systems. The
larger 8- and 16-way machines are supported, but the 2.4 kernel isn’t really aimed
at those system sizes. With the 2.6 kernel,
performance is dramatically improved on
large machines.
www.LinuxWorld.com
FIRST LOOK
What Is the Kernel?
The Linux kernel is the core of a Linux system. It is only a small part of the large number of
files that are installed on a server’s hardware. Programs like Web servers, databases, application
servers, mail servers, compilers, text editors, image editors, and word processors are not part of
the Linux kernel. The kernel controls access to system resources such as
• CPU
• RAM
• Monitor, keyboard, mouse
• Disk drives, CD-ROM drives
• Tape drives, printers, and other peripherals and ports
• Network access
There are two types of Linux kernels, development and production (or stable). Development
kernels end in an odd number (e.g., 2.3 or 2.5). Production kernels end in even numbers (e.g.,
2.4 or 2.6).
This numbering scheme divides Linux users into two categories. The first category consists
of developers and testers, who use the odd-numbered kernels, which are changing and may be
unstable. The second category consists of production users, who use even-numbered kernels,
which change as little as possible.
Although there will be some settling of the fine points of kernel feature implementation and
a deferral of features that aren’t ready for production, a look at the 2.5 kernel will give a fairly
good view of what the 2.6 kernel will become.
As part of OSDL’s charter we provide
outside developers access to enterpriseclass machines. Testing on multiprocessor
machines is a vital part of the Linux development process and has resulted in an
improved scheduler, kernel native threading, and overall refinement of the locking
granularity.
We also did a lot of testing of these larger machines with databases, which are a
classic resource-intensive, business-critical workload. OSDL provided the
Database Test Suite, a fair-use implementation of Transaction Processing
Performance Council (TPC) benchmarks.
These database performance test results
comparing the Linux 2.4 kernel to the
Linux 2.5 kernel are freely available from
OSDL at www.osdl.org/projects/performance. The source code for the tests is also
available for developers.
Stability
“Is Linux stable on larger systems?” is
probably the second most frequently asked
question. OSDL put a lot of time and
resources into testing the Linux 2.5 kernel
through the Linux Stabilization Project. A
description of the tests and results is available at www.osdl.org/projects/26lnxstblztn/results. Based on these tests and our
www.LinuxWorld.com
experience with the 2.5 kernel, we expect
that the Linux 2.6 kernel will be more stable
than the Linux 2.4 kernel was when it was
released.
There is a companion project to test
scalability in a repeatable scientific environment. OSDL’s Scalable Test Platform
(STP) and Patch Lifecycle Manager (PLM)
provide the Linux development community
with an open, easy-to-use resource for testing custom kernels. STP works as the testing engine. PLM makes it easy to manage
developers’ patches against stock kernels.
With a consistent set of hardware and test
suites, developers can test new features in a
controlled environment.
Planning for the Future
Because of the improvements in scalability, stability, performance, and availability in the kernel, Linux has reached
the level where it can replace more expensive Unix servers. IT managers need to
evaluate Linux suitability for their data
centers based on the features it will have
at the time of deployment. The rapid
development of Linux adds some challenges to plans to adopt it. IT managers
need to become familiar with the
improvements to the 2.6 kernel, determine suitability for their enterprise, and
69
insist on these features when preparing
Request for Proposals (RFPs) or making a
purchase.
The Linux 2.6 kernel will support more
hardware platforms, bringing businesses
savings in reduced management costs
through a reduction in the number of operating systems under management. Instead
of a variety of Unix versions, businesses can
standardize on Linux on a range of hardware architectures. Most of Linux runs on
industry-standard Intel architecture
servers, available from almost every vendor,
including Dell, HP, IBM, and NEC. Linux
also runs on mainframes from IBM and
Fujitsu, PowerPC-based servers from IBM,
and Itanium-based servers from HP.
When IT managers plan for the future,
they should keep in mind that Linux server
use is growing and Unix server use is
shrinking. According to industry research
firm Gartner, hardware vendors shipped
over 425,000 servers with Linux last year, up
from 286,823 in 2001. During the same time
period, shipments of Unix machines fell
9%. Due to technical improvements in the
2.6 kernel, we anticipate that this trend will
accelerate. Many more companies will follow Amazon’s early lead and realize significant cost savings by migrating from Unix to
Intel architecture hardware.
With the release of the new kernel,
OSDL is refocusing much of its work on
end-user Global 2000 corporations. We’re
interested in learning more about your
plans to use Linux. What challenges
remain before you are prepared for production deployment? With classic disruptive technologies, much like the original
personal computer, we know that adoption of “good enough” technology accelerates in new and surprising ways. Tell us
what your plans are for Linux. We invite
your organization to participate with
OSDL in making Linux ready for your
enterprise.
For More Information
Learn more by visiting www.osdl.org, the
OSDL site. Here you’ll find information on
Carrier Grade Linux, Data Center Linux,
OSDL Database Test Suite, Linux
Stabilization Project, Scalability Test
Platform, Patch Lifecycle Manager, and
much more.
LINUXWORLD MAGAZINE WWW.LINUXWORLD.COM
PREMIER 2003
INTERVIEW
Taking
Geek
of
Out
Linux
the
A B O UT
M I C H A E L
R O B E RT S O N
Michael L. Robertson is the founder and chief
executive officer of Lindows.com, a consumer
software company that creates choice in the
marketplace. Robertson served as chief executive officer and chairman of the board at
MP3.com (www.mp3.com) since March 1998.
As the mastermind of MP3.com, Robertson
established the largest collection
of digital music in the world, amassing more
than 1 million downloadable MP3 files.
Robertson also spearheaded change in
corporate business music services and put
the power of CD creation in the artists’
hands by offering a host of support
technologies and services.
If you’re looking for a David and Goliath story, you don’t
Lindows violates Microsoft’s trademark on the Windows name.
need to look any further than Michael Robertson, CEO of
We had a chance to talk to Michael about the future of Linux
Lindows.com. As the first major player trying to sell Linux
on the desktop, the struggle to de-geekify the operating sys-
desktop computers in a retail environment, he’s felt the full
tem, and what it’s like to go up against the largest software
wrath of Microsoft’s fury, including a lawsuit claiming that
company in the world.
PREMIER 2003
70
www.LinuxWorld.com
INTERVIEW
INTERVIEWED BY JAMES TURNER
LWM: A lot of companies seem to be hiding
the fact that they’re basing their products
on Linux – for example, set top boxes. Is this
part of your strategy?
Michael Robertson: If you look at our 4.0
version, our instant messenger is Gnome
based, and it’s Gaim. Our office suite is
StarOffice. Our browser is Mozilla. But
rather than drown the user with all these
crazy terms and names, we say “Hey, the
instant messenger is really neat because
you can connect to more than one network
at a time. Hey, the browser’s really super
because the fonts look great and you can
suppress popups.” We’re focusing on the
features, not the technical history. This is an
approach that the Linux community really
hasn’t seen yet, and we probably take a little
extra heat because of that. People think that
we’re slighting the Mozilla team or the Gaim
team because when we talk about the
instant messenger, we talk about the features, not that it’s written by the Gaim guys.
Linux to the masses, and right now it’s an elitist product because you need too much technical knowledge to get up to speed.
James Turner is president of Black Bear Software
as well as the director of software development
for Benefit Systems, Inc., and senior editor
of LWM. James has written for Wired,
Christian Science Monitor, and other
publications and is working on his third
book on open source development.
[email protected]
LWM: Do you think that Linux still has an
“only for geeks” reputation that hurts it?
Robertson: Oh sure, absolutely. Look, the features we focus on are boring and nonsexy to
the technical crowd. For example, our
research found that new users often get lost
using Linux because different programs end
up dropping them in different places when
they do open or save commands. And they
end up with files all over their hard disk that
they can no longer find, that are buried in
/usr/sbin. To technical people, that’s a silly
sort of issue to bring up, but it’s the kind of
thing we focus on a lot. The Linux community says, “Ah, that’s for babies. Just teach ’em
how to use the find command and move on.”
And we’re saying, “No, no. What we have to
do is recompile hundred of programs to normalize them so they all use /MyDocuments.”
So when someone says open, or someone
says save, it always goes to the same spot.
Those are simple things that are really discounted by the Linux community, but in our
minds they’re key to making this a mass-market movement. We’re trying to bring desktop
LWM: What has been your experience in
selling Linux to a broad retail chain?
Robertson: We’re constantly learning. For
example, in 4.0, the first time you run it a
beautiful multimedia demo comes up automatically and says “Welcome to desktop
Linux, here’s what the icons on the desktop
do, here are some basic functions,” things
like that. Because even though the changes
are relatively minor for those coming from
an XP environment or a Mac OS 10 environment, there are enough of them that users
get a little distraught when they first sit
down. So we’ve gotten smarter and smarter
about what’s needed to take it to a wider
audience.
We’ve been selling computers, both
online and through mail order. And we’ve
been using this as sort of a test bed to learn
about users – learn where they have support
issues and learn where we can do a better
job. Where we’re going this summer is into
retail, in a big way. You’re going to be able to
walk into major retailers and see computers
on the shelves with desktop Linux preinstalled. That’s really where Linux needs to go
to reach the masses. So we’ve used our
online experience and our mail-order experience; we do all our own technical support,
so when someone calls up and says “I’m
stuck, it didn’t work like I thought it would,”
we’re taking note of that. We’re getting
smarter and making a more polished product that better suits the mass market.
We really believe that our 4.0 release is
ready for the mass market. There are all
sorts of consumer-friendly changes that
aren’t technically sexy, like normalizing file
paths, embedded tutorials in Flash, instructional videos all throughout the OS. And
there are even more substantial features,
like when somebody plugs in a Flash drive
or a USB hard drive or CD-ROM, it pops up
on the desktop. That’s never happened
before in desktop Linux.
www.LinuxWorld.com
71
PREMIER 2003
A talk
with
Michael
Robertson,
CEO of
Lindows.com
A B O UT
TH E
I NTE R V I E W E R
INTERVIEW
LWM: Making it more plug-and-play?
Robertson: Absolutely. When someone
plugs in a wireless card or even a USB wireless adapter, it shows up on the desktop
ready to use, ready to configure and connect them to the network. So there are substantial features we’re bringing to the market in an effort to close the gap between
Linux and XP.
LWM: So the words “recompile the kernel”
should never enter the user’s vocabulary.
Robertson: Exactly. In fact, we don’t want
them to hear the word kernel. We want it to
be, “You click here for your browser, you
click here for your IM, and if you want
more software, click on the Click and Run
icon and go get it.”
We look at it this way. 30% of the
servers running today are Linux based.
People are choosing Linux because it’s
affordable, powerful, and stable. All those
same features are now available on the
desktop side, so you’re going to see, over
the next few years, that same 30% on the
desktop.
LWM: One of the most persistent knocks
against Linux is that the desktop applications still aren’t there.When do you think
that major players like Intuit and Adobe
will start porting to Linux?
Robertson: I don’t think you need to have
those folks to bring Linux to the masses. I
think a year ago, that was a very valid
point, that the software wasn’t there. But
that’s no longer true. Yes, there are certain
holes, but the majority of the larger holes
have been filled with very capable products. So you talk about Intuit – hey, we’d
love to have Quicken on desktop Linux. We
don’t. But we do have a product called
Money Dance, which is very capable and
does all the core functions, like online
banking. So there are products, be they
commercial or open source, that are filling
the gaps. I think that complaint was a valid
I’m confident
that desktop
Linux will have
a 30%-plus
market share
One of the features we’re unveiling with
4.0 is a one-click major version upgrade.
We’re taking users from version 3.0 to version 4.0 with one click of their mouse. This
isn’t a 3.0 to 3.1–type upgrade with a couple
of security patches; this is a full upgrade
with a new kernel, new video drivers, you
name it. New browser, new instant messenger, new e-mail client, everything. And that
happens with one click.
PREMIER 2003
Robertson: First of all, it’s important to
assess where things are today. If you have
a Microsoft product, it doesn’t mean you
get to call Microsoft. You have to pay
Microsoft if you want to call them and talk
to them. The point here is that there’s no
free support from Microsoft; in fact, if you
want to call Microsoft there’s no one to
call.
The interesting dynamic here is that if
you buy our office suite, which happens to
be StarOffice, you actually get free telephone support in 24 languages, which you
don’t get if you buy Microsoft Office. So the
ironic twist here is that the new kids on the
block, the StarOffices of the world, have
said, “We have to provide better support
than Microsoft to be able to win customers
over.” There’s an interesting flip here, that
you can get free support from a Linuxbased software developer, be it the OS or
the application, often as part of the basic
license, without having to engage in any
service contract. If you do need additional
support beyond that, of course, there are
lots of organizations that you can pay to get
that. And because a lot of the software is
open source, you’re not beholden to any
one company who can charge you whatever they want. Bottom line, there’s better
support options for desktop Linux out of
the box today.
LWM: Some recent reports have indicated
that while Linux has a lower deployment
cost than Windows, it may have higher support costs.
Robertson: That's propaganda from
Microsoft. When you commission a study,
pay them enough money and they’ll come
up with any conclusion you want. Let’s
look at the numbers. Microsoft makes 1
billion dollars of profit per month selling
two products, the OS and the office suite.
Now Microsoft can come up with all the
studies they want saying they’re cheaper
than the alternative, but it’s complete nonsense.
LWM: For a medium- to large-size company contemplating a transition to Linux, one
of their concerns is going to be,“Who is our
IT support safety net?”
LWM: For an enterprise, what would be the
advantages to moving to a desktop Linux
strategy?
Robertson: Cost. Cost is the number one
reason. You can expect to spend oneeighth of the cost of a Microsoft PC for a
similarly equipped desktop Linux PC running Lindows OS. The second advantage is
much easier maintenance and support.
And I say that because they never have to
deal with serial numbers, activation codes,
72
www.LinuxWorld.com
complaint maybe 12 or 18 months ago, but
I don’t think it’s a valid complaint anymore.
INTERVIEW
Putting Lindows to the Test
product databases; they never need to deal
with any of that because most of our products are flat-fee licenses. That’s the
accounting, logistical side of things. There’s
also the technical side of things; if you were
here, I could show you how I can set up a
new computer, click one button, and install
14 programs that we use as a standard distribution here at Lindows.com. You can’t do
that on Microsoft, right? Set up your computer, click one button, and say “OK, you’re
ready to go.” There are dramatic upfront
savings, and then on the technical front and
logistical front, additional savings and
advantages for desktop Linux.
LWM: Microsoft is allegedly engaging in a
“kill Linux at any price” strategy.
Robertson: Every major company that has
partnered with Lindows.com has received a
phone call from Microsoft, and that phone
call has tried to extort, entice, or terrorize
that person into not working with desktop
Linux, specifically with Lindows.com. I’m
glad this is finally coming to light, it’s not
just in Asia, it’s all over the world. Listen, if
you’re making a billion dollars of profit
every month, you have a lot of money to
throw around to kill any potential competitor, and that’s what they do.
One of the things that’s so incredible is
that Linux is making such strides without
having major corporate backing. And that
should send a message to everyone out there:
“Microsoft, you can fight it all you want, but
you’re trying to push back the tide.”
Lindows desktop
I
ntrigued by the claims that Lindows was
simple to install and use, we tried it ourselves. Because the 4.0 release is not yet
available, we conducted the test using version
3.0. To make things a bit tougher, the test was
conducted on a Toshiba Satellite 1805-S204.
Because notebooks are notoriously difficult to
install Linux on, we thought it would add a little challenge to the test.
To say that the install was quick and easy
was an understatement. When the install CD
was placed in the drive and the laptop booted,
the installer led us through the entire process
in less than 10 minutes. Take that, Windows
XP. When the laptop was rebooted, the system
started up with a friendly series of help screens,
eventually depositing us at the desktop with
almost everything working. Although the
installer hadn’t configured the wireless network
card in the PCMCIA slot, it was a matter of seconds to configure it using the network wizard.
For comparison, it took two days, several kernel
rebuilds, and the installation of several auxilary
packages to get it working under Red Hat 9.0.
The only thing that didn’t work out of the
box was the audio subsystem, which is evidently not supported for this laptop under Lindows
yet. It is available in Red Hat 9.0, and we’ll
have to see if the new 4.0 release of Lindows
handles it. Installing additional packages
through Lindows’ “Click and Run” system was
indeed fast and easy.
LindowsOS connecting to Microsoft
Windows machines over a network.
Sun StarOffice 6.0 can view and edit Microsoft
Excel, Word, and PowerPoint documents –
and save them in their native format.
Conclusion: Lindows does what it promises,
offers a fast and bulletproof install of Linux
with a user-friendly interface.
LWM: Where do you see Lindows.com in five
years?
Robertson: I’m confident that desktop Linux
will have a 30%-plus market share. Here’s
why: pick any industry in the world, I don’t
care, look around your office. Whether
there’s a pair of shoes in the corner or a
Pepsi on your desk, there’s always room for
a low-cost provider. That goes for any industry except for software, except for the OS.
And that’s going to change. Linux is going to
be Southwest Airlines of IT. They may not
have the majority of the business, but they
have a significant piece of the business.
Where do I hope we’ll be? I hope we’ll be the
leader in securing that 30% market share. I
think the impact of desktop Linux in five
years will not be measured just in the market share that Linux has, but in structural
cost changes that Microsoft is going to be
compelled to do to blunt the impact of
desktop Linux on their business.
LINUXWORLD MAGAZINE WWW.LINUXWORLD.COM
www.LinuxWorld.com
73
PREMIER 2003
BUSINESS APPS
Ensuring Availability of
Applications on Linux
The right solution for your business
You’re taking the plunge – moving your business applications to Linux to join
BY
B O B
W I L L I A M S O N
have correctly identified your business
availability needs.
those who have already realized significant cost savings by deploying commodity
servers and an open source operating environment. You have one lingering doubt:
Will you get the same level of application availability in your new $50,000 environment that you enjoy in your existing $500,000 environment? Reasonable concern.
After all, you get what you pay for. Or do you?
n the past, the cost and complexity of
high availability (HA) solutions made
economic sense only for elite business
networks and for systems running
high-end mission-critical applications.
The building of highly available and
protected systems required purchasing specialized hardware and implementing proprietary interfaces. Those who could not
afford such a solution tolerated a certain
amount of system downtime.
I
The Cost of Downtime
Today’s businesses and customers
require HA solutions across the board, at an
affordable price. A global business needs
24-hour access to information 365 days a
year. In an Internet service model, organizations must anticipate customers arriving
at their Web site and business partners
interacting with their systems at any hour
of any day. For many businesses the words
“regular business hours” have no meaning.
The cost of downtime, whether
unplanned or scheduled, can have substantial negative revenue impact – in terms of
immediately lost business and productivity,
as well as the subsequent effect of a potential loss of customer loyalty and confidence
(see Table 1).
What does one hour of critical system
downtime cost your business? Can you
afford this loss? In today’s Web-enabled
economy, customers who can’t access a
Web site or service they desire are only a
click away from a competitor!
High Availability Clustering
as a Solution
Bob Williamson, vice president of engineering
at SteelEye Technology, has over 20 years of
experience in the design and development of
high availability solutions on Linux, Windows,
and Unix platforms. Bob is a frequent contributor to industry journals and is a regular speaker at trade shows and conferences worldwide.
[email protected]
There is a solution. By combining commodity Intel servers with Linux and HA
clustering solutions, businesses can achieve
between 99.99% and 99.999% uptime for
business-critical applications at a fraction
of the cost historically associated with proprietary RISC-based systems. Thus, you can
plan on between just 8 and 55 minutes of
downtime, for both planned and
unplanned outages, for an entire year. And
this is for everything – from your mail server to your business-critical financial management or manufacturing systems.
There are a number of HA solutions
available for Linux. Choosing one that
meets your business objectives is simple if
you know a few key points about HA and
PREMIER 2003
74
A B O UT
TH E
A UTH O R
What Level of Availability Is
Right for My Business?
To understand the HA needs of your
business, use the following questions to do
a self-assessment:
• Among my applications and services,
which can I least afford to have unavailable to users and customers?
• For each of these, what is the actual
monetary cost associated with each
hour of downtime?
• To protect against this loss, what am I
willing to spend?
• How long would it take me to get the
most critical business functions operational following a disaster hitting my
data center?
• Should I invest in an HA solution that
enables me to resume business operations in minutes rather than days following some catastrophic event?
With this data on hand, you can identify
your availability needs and make more
informed decisions regarding the investment your business requires to ensure the
uptime that your customers and business
partners demand.
Selecting the Most Appropriate
High Availability Solution
The Availability Equation, Trestore =
Tdetect + Trecover, illustrates how the total
time required to restore an application to
usability is equal to the time it takes to
detect that an application is experiencing a
problem plus the time needed to perform
some recovery action. This equation introduces the key concepts of HA clustering:
problem detection and subsequent recovery. In essence, HA solutions monitor the
health of business application components
www.LinuxWorld.com
BUSINESS APPS
and, upon detection of problems, take
actions to restore them to service.
Because the objective of deploying an
HA solution is to minimize downtime,
working to reduce detection and recovery
times is key among the tasks of the solution
that you choose to deploy. Since today’s
applications are in fact combinations of
multiple technologies, as you survey the
options available, be certain to understand
the technology used to detect and recover
from all outage types including server, storage network, application, and database.
Each has a direct impact upon service
restoration times.
Local Detection and Recovery
One technology factor that is critical to
providing the fastest possible restoration
time is the ability to perform “local detection and recovery.”
In a basic clustering solution, a number
of servers are connected together and configured such that one or more servers can
take over the operations of another in the
event of a server failure. The server nodes
in the cluster continuously send small data
packets, often called heartbeat signals, to
each other to indicate “I’m Alive.” In simple
clustered environments, when one server
stops generating heartbeats other cluster
members assume that this server is down
and begin the process of taking over
responsibility for that server’s domain of
operation. This approach is adequate for
detecting failure at a gross server level.
However, in the case of problems that do
not cause the interruption of heartbeat sig-
nals, server-level detection is not just inadequate, it can actually magnify the extent
and impact of an outage. For example, if
Apache processes hang, the server may still
send heartbeats even though the Web server subsystem has ceased to perform the
system’s primary function. Rather than
restart just the Apache subsystem on the
same or a different server, a basic serverlevel clustering solution would restart the
entire software stack of the failed server on
a back-up server, thereby causing interruption to other users of the server as well as
extending the time to recover.
Advanced clustering solutions provide a
broad range of additional mechanisms to
detect problems at a more granular level
and enable recovery actions to be tailored
to specific problems. Using local detection
and recovery, advanced clustering solutions
deploy health monitoring agents within the
individual cluster servers to monitor individual system components such as a file
system, database, user-level application, IP
address, etc. These agents use heuristics
specific to the system component being
monitored so that they can predict and
detect operational issues and then take
whatever recovery action is most appropriate. Often, the most efficient recovery
method is to stop and restart the problem
subsystem on the same server. This is
much faster and has far less impact, and it’s
therefore a less costly recovery method
than migrating all application components
to a standby server. By detecting failures at
a more granular level than simple serverlevel heartbeats, and by enabling recovery
...................................................................................................
Business .....................................................................Operation
Average Cost per
Hour of Downtime
Communications: ...............................................Converged Services
$10.0 million
Financial: ......................................................Brokerage Operations
$6.45 million
Financial: ........................................Credit Card/Sales Authorization
$2.6 million
Corporate Infrastructure:..........................................................ERP
$780,000
Media: ......................................................................Pay Per View
$150,000
Transportation: .....................................................Airline Ticketing
$89,500
Media: ...............................................................Event Ticket Sales
$69,000
TABLE 1
THE COST OF DOWNTIME
SOURCE: GARTNER, DATAQUEST, AND OTHERS
www.LinuxWorld.com
75
within the same physical server, the time
required to restore an application to user
availability is greatly reduced. Make certain
that the HA solution you deploy can support local detection and recovery.
Scalability and Flexibility
There are a number of additional criteria against which you should measure any
HA solution. The ability of the solution to
scale and flex as your business needs
change is key.
Within the world of HA clustering there
are many dimensions of scalability and
flexibility.
For example, two methods exist for making your business data available to all nodes
in an HA cluster: shared storage and data
replication. Each is appropriate for certain
environments, but how do you decide which
is right for you? As important as deciding
this is ensuring that the solution you choose
can support both shared storage and replication configurations – so that regardless of
how your business needs evolve, the most
appropriate storage configuration can
always be deployed and the option to make
any application highly available remains
always open.
All HA solutions support shared storage
configurations where the data needed by
clustered applications resides on either
directly attached SCSI or fiber-attached
storage devices. All nodes in the cluster can
access the storage device and as the cluster
software migrates applications between
servers during recovery, data paths
between servers and the storage device are
automatically reconfigured. While a shared
storage configuration may be the correct
choice for a number of deployments, there
are some considerations that will make it
less than ideal for others.
Primary among these is the expense of
purchasing, deploying, and maintaining a
shared storage configuration. With prices
ranging from several thousand to several
hundred thousand dollars, small to medium-sized businesses as well as branch and
departmental organizations may find
shared storage to be cost prohibitive.
An alternative is to make use of data
replication technology so that any data
required by the application being protected
is stored in the internal disks of all systems
within the cluster. All writes of data to the
primary disk of the system actively running
PREMIER 2003
Level of Protection
BUSINESS APPS
Two Node
Data Replication
LAN
2 to 4 Node
Failover
SCSI LAN
n Node
Failover Fiber
Channel SAN
Disaster
Recovery Cluster
Replication WAN
Breadth of Capability
FIGURE 1
One-to-Many Clustering –
Granular Flexibility
SPECTRUM OF CLUSTER CONFIGURATION
the application are replicated to the disks of
systems acting as standby nodes. This way,
if the standby node should need to take
over for the primary system, all required
data is available locally. The cost and complexity of shared storage is eliminated while
still allowing for full HA.
In addition to cost, another factor in
deciding whether to deploy a shared storage or a data replication cluster is the geographical distance between the nodes.
Both SCSI and fiber have distance limitations that for practical purposes limit the
placement of nodes within the cluster to a
LAN environment. If you’re deploying a
cluster between two locations across a
WAN to provide disaster recovery protection for one of your sites, then you will
make use of data replication to mirror
your business data between the two facilities.
So, data replication technology plays
two roles: it enables you to deploy an HA
cluster at a lower price point and it supports the building of a stretch cluster across
geographies for disaster recovery purposes.
Be certain that the HA clustering solution
you choose supports data replication clusters as well as conventional shared storage.
With both data replication and shared storage configurations available, you can
decide where among the clustering
schemas shown in Figure 1 you should
enter the HA world. By choosing a solution
that can accommodate all deployment scenarios, you ensure that as your needs
change, you can deploy the best solution
for your environment.
Another scalability factor to be considered is the number of nodes that can be
supported in a cluster. Entry-level HA solutions limit you to a single two-node cluster,
typically in active-passive mode. While this
does provide a level of increased availability
by the addition of a standby server, it can
still leave you exposed to application downtime.
PREMIER 2003
Active-active in a two-plus server HA
cluster environment thereby offers the
important advantage of not requiring an
idle, standby server for every active cluster
member. The ability to fully exploit the
resources of every server in an HA cluster
simultaneously provides greater protection
and increased return on investment in
valuable server resources.
The Value of Active-Active
Configuration
In a two-node cluster configuration, if
one server is down for any reason, then the
single remaining server becomes a single
point of failure. However, by deploying
three or more nodes clustered together, you
not only gain the ability to provide higher
levels of protection, but you can also build
configurations that are highly scalable. Two
examples of such cluster configurations are
commonly referred to as Many-to-One and
One-to-Many.
In a One-to-Many configuration, the
domain of responsibility of the failed server
is divided among a number of other servers
in the cluster. In addition to enhancing
overall availability by distributing points of
failure, this approach of splitting a primary
server’s responsibilities in combination
with active-active configuration offers significant economic benefits that further
marginalize the cost of HA.
This is because the ability to failover individual services in active-active mode to multiple servers eliminates the requirement for a
potentially large and therefore more costly
server to be provisioned purely for the purposes of providing backup in the event of failure.
Many-to-One Clustering – Increasing ROI
In a Many-to-One configuration, a single
standby server backs up a number of active
servers (see Figure 2). If any one of the
active servers should fail, the standby node
will take over its operation. However, if a
second active node should fail, that server’s
workload would then also become the
responsibility of the single backup server,
thereby requiring it to be able to work in an
active-active mode.
FIGURE 2
MANY-TO-ONE CONFIGURATION
76
Summary
Deploying business-critical applications
on Linux makes tremendous economic
sense and establishes an economic model
that supports the business case for HA
solutions across a much broader range of
business systems than could be justified for
proprietary technical environments.
This ability to reduce costs while
enabling organizations to build out their IT
infrastructures is a key factor accelerating
the adoption of Linux.
In making the decision as to which HA
clustering solution you should deploy, the
first step is to understand your business HA
needs. Once your current requirements are
determined, it is vital to understand that
these requirements will most likely change
over time. Your selection criteria therefore
will ideally incorporate the ability to evolve
and make changes without requiring technology reinvestment or incurring disruption to users and customers caused by the
need to reengineer to your environment.
Occasionally, basic solutions can suffice.
But given the reality of “you get what you
pay for” it is better still to explore the full
range of technical possibilities and make
your selection based upon meeting current
requirements while providing flexibility for
the future.
LINUXWORLD MAGAZINE WWW.LINUXWORLD.COM
www.LinuxWorld.com
www.LinuxWorld.com
The Leading Magazine
for Enterprise and IT
Management
LinuxWorld
Magazine
Regular features
include:
Advice on Linux Infrastructure
Detailed Software Reviews
There is no escaping the penetration of Linux into the corporate world. Traditional models are being
turned on their head as the open-for-everyone Linux bandwagon rolls forward.
Linux is an operating system that is traditionally held in the highest esteem by the hardcore or geek
from the “if it’s broke, then fix it yourself” attitude.
Hardware Advice
$
Latest News That Matters
boardroom.
Yet until now, no title has existed that explicitly addresses this new hunger for information from
REGULAR ANNUAL COVER PRICE $71.76
YOU PAY ONLY
Recruiting/Certification Advice
Major corporations including IBM, Oracle, Sun, and Dell have all committed significant resources and
money to ensure their strategy for the future involves Linux. Linux has arrived at the
OFF!
Migration Advice
CEO Guest Editorials
developers of the world. With its roots firmly seeded in the open-source model, Linux is very much born
SAVE 30%
Case Studies
the corporate arena. LinuxWorld Magazine is aimed squarely at providing this group with the knowledge
and background necessary to make decisions to utilize the Linux operating system.
Look for all the strategic information required to better inform the community on how powerful an alternative Linux can be. LinuxWorld Magazine does not
feature low-level code snippets but focuses instead on the higher logistical level, providing advice on hardware, to software, through to the recruiting of trained
personnel required to successfully deploy a Linux-based solution. Each month presents a different focus, allowing a detailed analysis of all the components that
99
49
12 ISSUES/YR
*OFFER SUBJECT TO CHANGE WITHOUT NOTICE
SUBSCRIBE
TODAY!
WWW.SYS-CON.COM
OR CALL
1-888-303-5282
make up the greater Linux landscape.
FOR ADVERTISING INFORMATION:
CALL 201 802.3020 OR
VISIT WWW.SYS-CON.COM
LINUXWORLD® IS THE REGISTERED TRADEMARK OF INTERNATIONAL DATA GROUP, INC.
SYS-CON IS USING THE MARK PURSUANT TO A LICENSE AGREEMENT FROM IDG
The World’s Leading i-Technology Publisher
INTERVIEW
Who
Owns
?
Unix
An
exclusive
interview
with
esr
A B O UT
E R I C
S.
R AYM O N D
Eric S. Raymond is an observer-participant
anthropologist in the Internet hacker culture.
His research has helped explain the decentralized open source model of software development that has proven so effective in the evolution of the Internet. His own software projects include one of the Internet's most widely
used e-mail transport programs.
PREMIER 2003
78
www.LinuxWorld.com
INTERVIEW
I NTE R V I E W E D
BY
KE V I N
B E D E L L
Eric Raymond has the unique ability to focus on low-level technical details while
at the same time tracking the highest-level technology trends. His book The Cathedral
This is also an attempt to send a powerful message to potential future litigants: it’s
not safe to mess with the open source community because we can bite back.
and the Bazaar is both a great history of early Linux development and a great introduction to the workings and the culture of the open source community. Eric (who is
often referred to simply as ‘esr’) has been associated with the Unix community for 20
years. He’s contributed code to different versions of Unix, spoken frequently as an
open source advocate, and has a new book coming out – The Art of Unix Programming.
Eric is president and cofounder of the Open Source Initiative (OSI).
n response to the SCO lawsuit, Eric
(with consultant Rob Landley) wrote
the “OSI Position Paper on the SCOvs.-IBM Complaint.” This position
paper addresses in detail SCO’s
claims of intellectual property ownership over Linux. The paper has been
widely read and is considered by many to
be the best analysis of the topic available.
In short, the paper addresses the question,
“Who owns Unix?”.
LWM was able to catch up with Eric on
the day of the Novell announcement that
SCO did not own the patents or copyrights
to Unix.
I
LWM: In a nutshell, what exactly is SCO
trying to do?
esr: What they were trying to do, I think,
was shake IBM down for a payoff or a buyout offer. That has blown up in their face,
especially now that Novell has made a public statement that all but accuses SCO of
lying about the disposition of the IP. But
now they have to play this losing hand out
to the end – because admitting that they
knew they didn’t have a real case to begin
with might land their management in jail
for fraud and harassment.
LWM: So tell me about the position paper
you developed.Why did you and Rob
Landley write it?
esr: I was trying to do two things really.
www.LinuxWorld.com
One, I was trying to give IBM ammunition.
Two, I knew the open source community
would have to respond to SCO’s attack
sooner or later, and that it would be better
if it was sooner – before SCO’s propaganda
(if any) had time to take hold.
But part of why I was upset didn’t have
anything to do with Linux. I’m actually an
old Unix developer – back to 1982. I wasn’t
one of the original developers of Unix
(though I’ve contributed code to Linux and
the BSD Unixes), but I know those guys and
they know me. The SCO complaint was
insulting. It was SCO claiming that they
owned all the code that we wrote – and
then using that claim to harm Linux.
LWM: What’s happening with your “No
Secrets” effort?
esr: I’m trying to prove that the proprietary
Unix vendors don’t have any trade secrets.
Right now I have enough people willing to
sign affidavits about having uncontrolled
read access to Unix source code that I can
show there’s been a pervasive failure to
enforce even the minimum level of nondisclosure required to maintain trade secrecy.
Thousands of people who have seen the
Unix source code were never under nondisclosure. This is the kind of evidence that
destroys trade-secrecy status.
If SCO continues, I’ll get enough signed
affidavits to prove that they have no trade
secrets.
79
LWM: And what is IBM’s position on all
this?
esr: You’ll have to ask IBM that. I’m their
ally in this, not their spokesperson.
LWM: For readers who may be unfamiliar
with your work in this area, can you share
some of your background with open source
and Linux?
esr: I wrote the foundational paper on open
source development, ran the meeting
where the term “open source” was invented, and have been one of the community’s
principal ambassadors to the rest of the
world for the last five years. I am the president of the Open Source Initiative, one of
the community’s two leading advocacy
organizations.
LWM: What is the position of the Open
Source Initiative on this issue?
esr: We believe SCO’s claims are utterly without merit. In much of their complaint they
seem to be, plainly and simply, lying through
their teeth. We have published a detailed
rebuttal at www.opensource.org/sco-vsibm.html. It looks even stronger than it did
in light of Novell publicly announcing that
they, not SCO, own the Unix patents.
LWM: So, who owns Unix?
esr: Legally, it’s very unclear. Novell holds
the patents. The OpenGroup owns the
trademark. The copyrights are in some
A B O UT
TH E
I NTE R V I E W E R
Kevin Bedell is editor-in-chief of LinuxWorld
Magazine. With a degree in engineering as well
as an MBA and years of experience as a
developer, architect, team lead, and department
manager, Kevin has seen all sides of this puzzle.
He recently authored a book on Jakarta Struts
for SAMS Publishing and is working on a
book on Apache Axis for O’Reilly.
[email protected]
PREMIER 2003
INTERVIEW
weird limbo – first Novell came out and
said they owned them, but SCO now claims
to own them under the terms of Caldera’s
deal with Novell and Novell is keeping
mum. The one thing we do know is that the
transfer of the copyrights (if any) was never
recorded with the U.S. Patent and
Trademark Office. That has interesting legal
implications, and may be the reason SCO
hasn’t come out and made an explicit copyright-infringement claim in the lawsuit.
Ethically, OSI’s position is that Unix
belongs to the distributed development
community that wrote it. SCO’s threats broke
the tacit understanding that kept us from
asserting this for 30 years. It used to be that
we agreed not to fuss over the fact that AT&T
or Unix Systems Labs or Novell or SCO were
claiming to own the code as long as they
agreed not to fuss over the fact that every
senior Unix developer had a technically illicit
copy of the source code in his hip pocket.
(http://biz.yahoo.com/prnews/030528/law05
9_1.html) basically admitted they’ve got no
grounds to sue anybody but IBM.
SCO have since changed their minds,
but I think this is just bluster. Furthermore,
the various lawyers I’ve talked with agree
that it’s just bluster. When you think you
have a strong case in court, you don’t fight
it in the media. SCO would scare me worse
of they weren’t huffing and puffing.
LWM: If you were a manager in a company
considering using Linux for a first project,
would this lawsuit impact your decision to
give Linux a try?
esr: Not at all. Ignoring the occasional FUD
storm is part of the job.
LWM: In your book The Cathedral and the
Bazaar you describe the Linux development
process as being like a bazaar, where all
kinds of people with all kinds of interests
“Legally, it now appears
that Novell still owns Unix.
They have the patents,
and they’re claiming to hold
the copyrights as well”
Everybody took code from everybody.
AT&T used Berkeley and Xenix code and
got called on it during a 1993 lawsuit. Truth
is, the rights picture is so tangled that
nobody’s theory of ownership would stand
close scrutiny of the source code’s history.
The law of intellectual property doesn’t
handle this kind of situation well. The equitable thing to do would be to just give up,
throw it open, and admit it belongs to the
hackers.
LWM: What do you see as the potential
downside risk for companies using Linux?
Will SCO try to sue everybody?
esr: The risk dropped to zero last May 28 with
Novell’s announcements. SCO’s response
are developing different pieces. Is Linux
development still that way? How has it
changed?
esr: If it has changed, it has changed by
becoming more conscious and better
organized. I played a part in that by giving
people language with which to reflect on
what they’re doing.
LWM: What do you think will happen with
this suit? Any idea how long it might be before
it becomes clear what’s going to happen?
esr: They can’t win, not in front of a judge
with any brain cells operating – and the
word on His Honor Dale Kimball is that he’s
a sharp guy. Timeframe? Who knows. These
things can drag on for years.
LWM: How can the Linux community
ensure that Linux stays free of IP claims in
the future? Can there be a process instituted that ensures this doesn’t happen again?
esr: See my “No Secrets” page for an example of what network activism can do
(www.catb.org/~esr). I’ve collected nearly
100 responses, with at least 40 people willing to sign affidavits. I think we can prove
that there are no trade secrets in Linux. I
think we can use the same methods to turn
up prior art in patents cases.
LWM: Switching gears a bit, in the IBM -vSCO analysis on the OSI Web site (www.open
source.org/sco-vs-ibm.html), you referred to
a “seismic shift” occuring right now in the
software industry. Can you explain what
you meant?
esr: I already have. Readers should go to
www.opensource.org/sco-vsibm.html#seismic
for the story.
LWM: Will all applications eventually be
open sourced? Which kinds might not?
esr: I don’t think it will be all – there are
economic circumstances in which closed
source makes sense, though they’re not
common. I think “most” is a fairly safe bet,
though. I’ve discussed this at length in my
paper “The Magic Cauldron.”
LWM: What will the software industry look
like in five years?
esr: A lot like the legal profession does now,
I think. Independent software firms will be
like law firms, partnership organizations of
professionals. Other programmers will
work in-house at corporations the way that
corporate lawyers do now. Programmers in
general will be operating from a common
open source base; secrecy will be a feature
mainly of legacy software.
Regarding outsourcing and offshore
development – one thing you can’t outsource is getting inside a customer’s mind.
You can’t move face-to-face, person-toperson communications and design offshore. You can outsource cookie-cutter
code, but I predict a lot of companies are
going to discover they’re paying for large
portions of code that don’t match their
requirements.
One of the things we know is that the
most effective ways of writing software
involve a series of interactions – a succession of prototypes – using continuous feedback. You can’t do that if your customer’s in
Teaneck, New Jersey, and your developers
are in Bangalore.
LINUXWORLD MAGAZINE WWW.LINUXWORLD.COM
PREMIER 2003
80
www.LinuxWorld.com
International Web Services Conference & Expo
Web Services Edgeg
SEPT. 30 -- OCT.2, 2003
3rd Annual
• Take in tutorials
covering .NET &
Web services
• Listen to
success stories
ER
REG ISTY!
TODA -3058
• Evaluate case
studies & best
practices
02
ge
01-8
CALL 2s-con.com/ed
d
• Experience
hands-on labs
y
an
www.ster by September 5th
Regis
2003 WEST
Santa Clara, California
A U G U S T
SAVE
Up
To
$200
KEYNOTE SPEAKERS
Vermeulen
Magee
Litwack
CTO
VP, Oracle 9i
Senior VP
Schmidt
VP, Systems Integration
Education Sponsors:
Event Sponsors:
Owned and Produced by:
SPECIAL INSERT: WEB SERVICES EDGE 2003
DELIVERING .NET,
NET JAVA
JAVA, MAC OS XX, AND XML TECHNOLOGIES
Media Sponsors:
2
0
0
3
www.WBT2.com
43
SPECIAL INSERT: WEB SERVICES EDGE 2003
SEPT.30 ---OCT.2,2003
Santa Clara Convention Center
FEATURES & ATTRACTIONS
3 Days Packed with Education and Training
Keynotes & Panel Discussions from Industry Leaders
60 Hard-hitting and Informative Seminars
FREE Web Services Workshop Presented by Oracle
FREE .NET Tutorial with Microsoft’s Russ’ Tool Shed
Java University Certification Training
Industry-Leading Certification Programs
FREE IBM Web Services Tutorial
“Birds of a Feather” Discussions
Round Table Discussions
Opening Day Welcome Reception
SAMS Meet the Authors Hot Topics Lounge
ore
Compelling Case Studies & Best Practices
m
For
Hands-On Labs
Featured Product Demonstrations
Exhibit Floor featuring more than 40 companies
and hundreds of products
Real-time SYS-CON Radio Interviews
CEO
CTO
Software Developer
CIO
Software Engineer
IT Director
44
Development Manager
Project Manager
isit
v
tion com
a
.
rm
info -con
ys call
s
.
ww or
w
WHO
SHOULD
ATTEND
9
6
0
3
2
0
8
201
Application Developer
Technical Director
Analyst/Programmer
IT Manager
Technical Architect
Team Leader
Java and Java-based marks are trademarks or registered trademarks of Sun Microsystems, Inc., in the United States and other countries. SYS-CON Publications,
www.WBT2.com
A Inc.,
Uis G U S Software
T
2 Consultant
0 0 3
independent of Sun Microsystems, Inc. All brand and product names used on these pages are trade names, service marks or trademarks of their respective companies.
Allan Vermeulen
John Magee
David Litwack
John Schmidt
CTO, Amazon.com
Sept. 30 10:00 a.m.
“Web Services Foundations”
Allan Vermeulen, CTO and vice president at Amazon.com, directly oversees
the Platform Technologies group. This
group is responsible for guiding
Amazon.com's technology architecture,
including building and acquiring foundational components. Prior to his move
to Amazon.com, Vermeulen was CTO
and vice president of development at
Rogue Wave Software. He holds a PhD
in systems design engineering from the
University of Waterloo.
Vice President,
Oracle9i Application Server, Oracle
Oct. 1 10:00 a.m.
“J2EE Development on the Grid”
John Magee is vice president of Oracle9i
Application Server and Oracle9i Developer
Suite at Oracle. Mr. Magee has over 14 years
of experience in the enterprise software
industry and has held positions in product
development, product management, and
product marketing. In his current role, he
manages technical product marketing for
Oracle’s application server and development
tools products, and is responsible for evangelizing Oracle technology initiatives around
J2EE, XML, and Web services.
Senior Vice President,Web
Application Development
Products, Novell
Sept. 30 2:00 p.m.
“Business Integration
and IT” Keynote Panel
David A. Litwack is senior vice president of
Web Application Development Products,
responsible for the development and
advancement of Novellís secure Web services strategy. Mr. Litwack assumed his current
position in July 2002 following Novellís
acquisition of SilverStream Software, a company for which Litwack had served as president and CEO since 1997.
Leader of Systems Integration
and Middleware, Best Buy Co.
Sept. 30 2:00 p.m.
“Business Integration
and IT” Keynote Panel
John Schmidt is the chairman of the
Methodology Committee for the EAI
Industry Consortium and leader of systems integration and middleware at Best
Buy Co., a leading specialty retailer of
consumer electronics, personal computers, entertainment software, and appliances.
Jon Bosak
Dave Chappell
Distinguished Engineer, Sun
Microsystems
Jon Bosak organized and led the
W3C working group that created
the XML specification and then
served for two years as chair of
the W3C XML Coordination
Group. At Sun, where he holds
the title of Distinguished
Engineer, Mr. Bosak
sponsors projects intended to
advance XML technology. He is
currently chair of the Universal
Business Language (UBL)
Technical Committee of OASIS.
VP, Chief Technology Evangelist,
Sonic Software
Dave Chappell is the vice president and chief technology evangelist for Sonic Software. He has
more than 18 years of industry
experience building software
tools and infrastructure for
application developers, spanning
all aspects of R&D, sales, marketing, and support services. Dave
has also been published in
numerous technical journals,
and is currently writing a series
of contributed articles for Java
Developer’s Journal.
Hotel & Travel
Reserve Your Hotel Room Now
At The Westin Santa Clara!
The Official Conference Hotel of
Web Services Edge West 2003
The Westin Santa Clara
5101 Great America Parkway
Santa Clara, CA 95054
Arrangements have been made with the
Westin Santa Clara, which is conveniently located at The Santa Clara
Convention Center. Specially reduced
rates have been secured at this luxury,
full-service hotel.
Single Occupancy Room: $165.00
Double Occupancy Room: $165.00
SPECIAL
DISCOUNTS
AVAILABLE
A U G U
All rooms are quoted exclusive of applicable state and local taxes which are
currently 9.5% as well as the California
State Tourism Tax of 0.045%. The above
rates are group rates and are available
for Web Services Edge 2003 delegates,
over the show dates of September 28 –
October 3, 2003, only.
To learn more about The Westin Santa
Clara you can contact the hotel directly
or you can make your reservations by
calling Expo Travel International at
(800) 829-2281 or (201) 444-0060
(direct). Fax reservations to (201) 4440062. Credit card information is
required to guarantee reservations and
expedite confirmation. Confirmations
will be mailed directly from the hotel,
Anne Thomas
Manes
Research Director, Burton Group
Anne Thomas Manes is a research
director at Burton Group, a
research, consulting, and advisory
firm. Anne leads research
for the Application Platform
Strategies service. Named one of
NetworkWorld's “50 Most Powerful
People in Networking” in 2002, and
one of Enterprise Systems Journal's
“Power 100 IT Leaders” in 2001,
Anne is a renowned technologist in
the Web services space. Anne participates in standards development
at W3C and OASIS.
2
0
0
3
President, JBoss
Marc Fleury, PhD, is chief technical officer for Telkel, Inc. He is
the leader of the JBoss project
(www.jboss.org), which is an
open source EJB server. Marc is
based out of Silicon Valley and
founded the project upon leaving Sun Microsystems. He was
one of the main developers
behind JBoss 1.0 and 2.0. Marc
is the “keeper” of the project. He
founded the Jboss Group, a
company regrouping the elite
developers of Jboss to consult
around Jboss.
To make online reservations:
Hotel Arrangements Are Easier
Than Ever! You have your choice –
contact the hotel directly or call us.
The Official Conference travel agent,
Expo Travel International.
www.expotravel.com by September 12,
2003.
Official Conference Travel Agent:
time permitting. All changes and cancellations should be made directly through
Expo Travel International.
Reservations received after September
12, 2003, will be accepted on a spaceavailable basis only, at the special rate,
if available.
Contact Information:
The Westin Santa Clara Reservations:
Tel: 408 986-0700
Fax: 408 980-3990
Take advantage of the Early Bird and Preregistration values available right now, or
save even more with a group of 5 or more. For special group discounts contact
Michael Lynch at [email protected], or by phone at (201) 802-3058.
S T
Marc Fleury
SPECIAL INSERT: WEB SERVICES EDGE 2003
KEYNOTES & HIGHLIGHTED SPEAKERS
Expo Travel International
Toll Free: (800) 829-2281
Tel: (201) 444-0060
Fax reservations to (201) 444-0062
Driving Directions to Westin Santa
Clara from San Jose Airport:
Highway 101 North. Exit at Great
America Parkway/Bowers. Turn Right
onto Great America Parkway; hotel is
about 1.5 miles down on the right side.
PRODUCED BY
www.WBT2.com
45
TUESDAY, SEPTEMBER 30
JAVA
.NET
REGISTRATION
9:00AM – 9:50AM
The Next Phase in Evolution of J2EE
10:00AM – 10:50AM
Keynote - “Web Services Foundations” - Allen Vermeulen, CTO and Vice President, Amazon.com
11:00AM – 6:00PM
EXPO OPEN
2:00PM – 2:50PM
Keynote Panel Discussion - Business Integration and i-Technology
3:00PM – 3:50PM
Ant Applied in “Real World”
Web Services
Smart Devices in the Enterprise
Developing Applications
with SWT
Using the Mobile Internet Toolkit
Web Services Orchestration
4:00PM – 4:50PM
Introduction to ROTOR
ID, Please. The Case for Giving Web
Services an Identity
5:00PM
OPENING NIGHT RECEPTION
8:00AM – 4:00PM
REGISTRATION
Using WSE 2.0
9:00 AM – 9:50AM
Building Interoperable Web Services Using
WS-I Basic Profile
Morning Keynote - “J2EE Development on the Grid” - John Magee, Vice President, Oracle9i, Oracle
11:00AM – 4:00PM
EXPO OPEN
2:00PM – 2:50PM
Keynote Panel Discussion - Interoperability: Is Web Services Delivering?
JUnit: Testing Your Java with JUnit
Using Portable .NET
WS-BPEL
JDK1.5: The Tiger
ASP.NET with Mono
UDDI: Dead or Alive?
Squeezing Java
Using WSE with IBM’s Web Services Tool Kit
Web Services Choreography, Management, and
Security - Can They Dance Together?
Success Story: Eiffel, .NET, and Design by
Contract for the Financial Industry
Strategies for Securing Web Services
.NET IDE’s
Web Services Progress Report
Windows SharePoint Services
The Seven Habits of Highly Effective
Enterprise Service Buses (ESBs)
3:00PM – 3:50PM
4:00PM – 4:50PM
8:00AM – 4:00PM
REGISTRATION
Leveraging AOP in JBoss
9:00 AM – 9:50AM
THURSDAY, OCTOBER 2
Web Services Management
10:00AM – 10:50AM
5:00PM – 6:00PM
10:00AM – 10:50AM
11:00AM – 11:50AM
Technical Keynote
Apache Axis
12:00PM
LUNCH
1:00PM – 1:50PM
Meeting the Challenges of J2ME
Development
2:00PM – 2:50PM
Keynote Panel Discussion - Summit on Web Services Standards
3:00PM – 3:50PM
4:00PM – 5:00PM
46
WEB SERVICES
8:00AM – 4:00PM
Empowering Java and RSS for Blogging
WEDNESDAY, OCTOBER 1
SPECIAL INSERT: WEB SERVICES EDGE 2003
Conference at-a-Glance
www.WBT2.com
Simplifying J2EE Applications
BizTalk 2004
See www.sys-con.com for more information
Integrating Java + .NET
See www.sys-con.com for more information
See www.sys-con.com for more information
REGISTER BY SEPTEMBER 5th — SAVE
UP TO 2$200
A U G U S T
0 0 3
Introduction to Xforms
MAC OS X
Introducing OS X
(Panther) What's New?
Workshop
FREE Web Services
presented by
October 1, 2003
Securing Your XML and
Web Services Infrastructure
UBL - The Universal Business
Language
Standards-Based Enterprise
Middleware Using XML/Web
Services
Programming Rich User
Interfaces Using Cocoa
Quick Applications
Using AppleScript
Java and OS X: A Perfect Marriage
SHARPEN
YOUR
SKILLS,
DEVELOP
YOUR
CAREER
Web services? You’ve read all the ins and outs
about it. You think you have the concepts
pretty well figured out. Now you are not sure
where and how to start developing your first
Web service. Get the answer at this free Web
services workshop offered by Oracle as part of
its Oracle Developer Days roadshow!
Oracle’s workshop is specifically designed to get
you started with your first Web service project,
with a combination of presentations and
hands-on labs that take you deep into the
technology and let you put in action what
you’ve learned. Oracle’s experts will be available
throughout the workshop to answer all your
questions and assist you while you are going
through the labs.
The workshop gives tips and techniques on how best to develop and deploy
Web services and addresses topics such as RPC and Document Style Web
services, static and dynamic invocation, stateless Web services and more.
The second part of the workshop is dedicated to the new J2EE API for Web
services available as part of J2EE 1.4.
XML and Enterprise
Architecture: Technology
Trends
Enterprise Java and OS X
Using XML Schemas
Effectively in WSDL Design
Developing Web Services Using WebObjects
Canonical Documents for
Your Business: Design
Strategies
Cocoa, Carbon, Java: Application Frameworks
for OS X (When to Use What)
XML and the Fortune 500
Securing OS X Applications
XML at Work in ‘Fortune
500’ Companies
Xserve: Ease of OS X
and Power of Unix
Going through the hands-on labs at your own pace, you will learn how to
publish a Java class as a J2EE stateless or stateful Web service, publish a session EJB as a J2EE Web service, and publish a J2EE Web service using JAX-RPC.
Space is LIMITED to the first 100 attendees. Register now for this FREE
workshop. Computers will be provided by the Oracle Developer Days team
with all the necessary software, so there’s no need to bring your own computer.
SPECIAL INSERT: WEB SERVICES EDGE 2003
XML
AGENDA
7:30-8:00 am – Registration
8:00-9:00 am – Session #1 – Best Practices for Web Services Development &
Deployment
9:00-10:00 am – Lab #1 – Publish a Java Class as a J2EE Stateless or Stateful
Web Service
10:00-10:50 am – John Magee, VP, Oracle – Keynote (BREAK)
11:00 am-12:00 pm – Expo Floor Time
12:00-1:00 pm – Session #2 (WORKING LUNCH) – J2EE APIs for Web Services
1:00-2:00 pm – Lab #2- Publish a Session EJB as a J2EE Web Service
2:00-2:30 pm – Expo Floor Time (BREAK)
2:30-3:00 pm – Lab #3- Publish a J2EE Web Service Using JAX-RPC
PRESENTERS
XML Schema Best Practices
OS X for the Unix Developer
See www.sys-con.com for
more information
Introducing Quartz: 2D
Graphics for Apple
See www.sys-con.com for
more information
See www.sys-con.com for
more information
Arun Srinivasan, Director of Product Management, Java Tools,
Oracle
Rob Clark, Director of Product Management, J2EE, Oracle
Mike Lehmann, Product Manager, Web Services, Oracle9iAS and Oracle9i
JDeveloper, Oracle
FREE Oracle Tutorial when you register for a VIP Pass
Guarantee your seat when you register for a Full Conference Pass
Register Online at
www.sys-con.com/edge
PROGRAM SUBJECT TO CHANGE
www.sys-con.com/edge
• 201-802-3058
2 0 0 3
A U G U S T
www.WBT2.com
47
SPECIAL INSERT: WEB SERVICES EDGE 2003
48
REGISTRATION FORM
CONFERENCE: Sept. 30 – Oct. 2, 2003 EXPO: Sept. 30 – Oct. 1, 2003
Santa Clara Convention Center • Santa Clara, CA
THREE WAYS TO REGISTER FOR CONFERENCE
1) On the Web: Credit Cards or “Bill Me.” Please make checks payable to SYS-CON Events.
2) By Fax: Credit Cards or “Bill Me” 201-782-9651
3) By Mail: 135 Chestnut Ridge Road, Montvale, New Jersey 07645, Attention: Registration
Please note: Registrations are not confirmed until payment is received.
Please complete sections 1, 2, 3 and 4
1
YOUR INFORMATION (Please Print)
Mr.
Ms.
First Name ________________________________Last Name __________________________________________
B. Business/Industry
Title __________________________________________________________________________________________
❑ Computer Software
❑ Computer Hardware and
Electronics
❑ Computer Networking &
Telecommunications
❑ Internet/Web/E-commerce
❑ Consulting & Systems Integrator
❑ Financial Services
❑ Manufacturing
❑ Wholesale/Retail/Distribution
❑ Transportation
❑ Travel/Hospitality
Company ______________________________________________________________________________________
Street ________________________________________________________________________________________
Mail Stop ______________________________________________________________________________________
City __________________________________________________________________________________________
State________________________________Zip ____________________Country __________________________
Phone ________________________________________________________________________________________
Fax ____________________________________________E-Mail ________________________________________
2
4
A. Your Job Title
❑ CTO, CIO, VP, Chief Architect
❑ Software Development Director/Manager/Evangelist
❑ IT Director/Manager
❑ Project Manager/Project Leader/Group Leader
❑ Software Architect/Systems Analyst
❑ Application Programmer/Evangelist
❑ Database Administrator/Programmer
❑ Software Developer/Systems Integrator/Consultant
❑ Web Programmer
❑ CEO/COO/President/Chairman/Owner/Partner
❑ VP/Director/Manager Marketing, Sales
❑ VP/Director/Manager of Product Development
❑ General Division Manager/Department Manager
❑ Other (please specify)____________________________
PAYMENT METHOD:
(Payment in full due with registration)
Check #_______________________________________ Amount of Check $ ______________
Visa
MasterCard
American Express
Discover
Name on card_________________________________________________________________
Card #______________________________________________
Exp. Date______________
Signature_____________________________________________________________________
Billing Address (if different from mailing address)
_______________________________________________________________________
3
PLEASE INDICATE
YOUR CONFERENCE CHOICE
❑
Total Registration fee $____________
By 9/5/03
GP Gold Passport Good for all three days of the .NET,
$1,295.00
Web Services, XML, Java, and Mac OS X Tracks, including
preferred seating for the Oracle, IBM and Microsoft Russ’
Toolshed Tutorials, Keynotes, Panel Discussions, and your
choice of One Sun Microsystems Java UniversitySM Class
Select one: ❑ Architecting Web Services Using J2EE (Oct. 1)
❑ Java 2 Platform: Architect Certification Fast Path (Oct. 2)
Before 9/26/03
Onsite
$1,395.00
$1,495.00
3D Three Day Conference
(Does not include Sun Java Education)
$1,195.00
$1,295.00
$1,395.00
❑
2D Two Day Conference (Does not include Sun Java
$1095.00
Education) (select any two days: ❑ Tue. ❑ Wed. ❑ Thurs.)
$1,195.00
$1,295.00
❑
1D One Day Conference (Does not include Sun Java™ Education) $595.00
(select any one day: ❑ Tue. ❑ Wed. ❑ Thurs.)
$595.00
$695.00
❑
JU1 Sun Java™ University Class
$695.00
Select one:
❑ Architecting Web Services Using J2EE (Oct. 1)
❑ Java 2 Platform: Architect Certification Fast Path (Oct. 2 )
$695.00
$795.00
❑
JU2 Sun Java University Class
$1,195.00
Attend both Architecting Web Services Using J2EE (Oct. 1)
and Java 2 Platform: Architect Certification Fast Path (Oct. 2)
$1,295.00
$1,395.00
❑
VIP PASS
FREE
Good for access to the Exhibit Floor, Keynotes and Panel
Discussions, Product Demonstrations, and your choice of
(Select one): ❑ Microsoft Russ' Tool Shed (Sept. 30)
❑ How to Develop, Deploy, and Manage Web
Services Using IBM Tools (Sept. 30)
❑ Web Services Workshop presented by Oracle (Oct. 1)
FREE
$50.00
❑
EO Expo Only
FREE
FREE
$50.00
CANCELLATIONS,
SUBSTITUTIONS, REFUNDS
Fax written request to SYS-CON Registration
201-782-9651. Requests for refunds received
prior to August 29, 2003, will be honored, less a
10% handling charge; requests received after
August 29, 2003, and before September 12,
10,000 or more
5,000 – 9,999
1,000 – 4,999
500 – 999
100 – 499
100 or less
Location
01 ❑
02 ❑
03 ❑
04 ❑
05 ❑
06 ❑
Company
01 ❑
02 ❑
03 ❑
04 ❑
05 ❑
06 ❑
D. Please indicate the value of communications and
computer products and services that you recommend,
buy, specify, or approve over the course of one year:
❑
❑
❑
❑
$10 million or more
$1 million – $9.9 million
$500,000 – $999,999
$100,000 – $499,999
❑ $10,000 – $99,999
❑ Less than $10,000
❑ Don’t know
E. What is your company’s gross annual revenue?
❑
❑
❑
❑
$10 billion or more
$1 billion – $9.9 billion
$100 million – $999 million
$10 million – $99.9 million
❑ $1 million – $9.9 million
❑ Less than $1 million
❑ Don’t know
F. Do you recommend, specify, evaluate, approve or purchase wireless products or services for your organization?
01 ❑ Yes
02 ❑ No
❑
If you require special assistance covered
under the Americans with Disabilities Act,
please call 201-802-3058 by
www.WBT2.com
September 16, 2003.
Government/Military/Aerospace
Health Care/Medical
Insurance/Legal
Education
Utilities
Architecture/Construction/Real
Estate
❑ Agriculture
❑ Nonprofit/Religious
❑ Other (please specify)
_______________________
C. Total number of employees at your location and
entire organization (check all that apply):
Check or Money Order Enclosed (Registration confirmed upon receipt of payment)
Charge my
❑
❑
❑
❑
❑
❑
G. Which of the following products, services, and/or technologies do you currently approve, specify or recommend
the purchase of?
❑ Application Servers
❑ Web Servers
❑ Server Side Hardware
❑ Client Side Hardware
❑ Wireless Device Hardware
❑ Databases
❑ Java IDEs
❑ Class Libraries
❑ Software Testing Tools
❑ Web Testing Tools
❑ Modeling Tools
❑ Team Development Tools
❑ Installation Tools
❑ Frameworks
❑ Database Access Tools / JDBC Devices
❑ Application Integration Tools
❑ Enterprise Development Tool Suites
❑ Messaging Tools
❑ Reporting Tools
❑ Debugging Tools
❑ Virtual Machines
❑ Wireless Development Tools
❑ XML Tools
❑ Web Services Development Toolkits
❑ Professional Training Services
❑ Other [Please Specify]
___________________________________________________
SYS-CON Events, Inc., and SYS-CON Media make no warranties
regarding content, speakers, or attendance. The opinions of speakers,
exhibitors, and sponsors do not reflect the opinion of SYS-CON Events
and SYS-CON Media and no endorsement of speakers, exhibitors,
companies, products, or sponsors is implied.
Speakers, sessions, and schedule are subject to
2003, will be honored less a 20% handling
change without prior notice.
charge. No requests for refunds will be honored
after September 12, 2003. Requests for substituNo solicitation by anyone other than
tions must be made in writing prior to
official exhibitors, sponsors or marketing
September 26, 2003. No one under 18 is
Such behavior is
permitted to attend. No warranties areA
madeU G Upartners
S Tis permitted.
2 0
0 3
cause for expulsion without refund.
regarding the content of sessions or materials.
X WINDOWS
Cross-Platform
Integration with
X Windows
Creating a transparent mixed environment for users
Change is scary. If you tell a user that you’re going to wipe his hard disk and
BY
H E R M A N
V E R K A D E
Herman Verkade is a UK-based independent
consultant who specializes in the management
of large-scale heterogeneous environments.
Over the past 22 years he has worked
mostly with financial institutions in the
UK, the U.S., and continental Europe.
[email protected]
with access to applications running on
both platforms simultaneously.
I decided to investigate whether the
same would be possible with Windows and
Linux. The goal was to leave the users’ PCs
still running Windows, but give them access
to applications running on a remote Linux
machine using X Windows. Linux GUI
applications are all based around X
Windows. When the graphical environment
starts on a Linux machine, an X server is
started, serving the keyboard, mouse, and
screen to X client applications. The clients
communicate with the server over pipes, or
a TCP/IP connection to the local host, with
a protocol called X11.
X11 is also suitable to run over a network connection to/from another host.
Client applications look at the DISPLAY
environment variable to find the X server
that they need to display to. Many programs also accept a –display commandline qualifier to redirect X11 to another X
server. X11 is a platform-independent protocol, so the X server can just as easily run
on a machine with an operating system
that is different from that on the client. I
set out to run applications on a Linux
machine with an X connection back to a
Windows PC.
The client applications are there, and
need no modification, so the quest was on
for an X server for Windows. There are a
number of commercial packages on the
market that achieve this. I looked for a port
of the open source X system (XFree86), but
found that it would only work with Cygwin,
which is a complete Unix-like environment
for Windows. That seemed somewhat complex, so I tried the commercial packages
first.
I got evaluation copies of X-SecurePro
from Lab-Tam, and Exceed from
Hummingbird. The latter is much better
known, but is also far more expensive. Both
packages provide an X server and a variety
of other Unix-like tools such as NFS, telnet,
and so on. Both also provide a GUI starter
program that will connect to a remote
machine using rsh, rexec, or telnet and execute a command to start an application
that connects back to the Windows PC for
its X server.
The X server in both products can be
run in two modes: full-screen or multiwindow. In full-screen mode, a single large
window is displayed on the Windows PC,
which is an entire desktop in which the X
client applications will create their windows. This is great to run an entire Linux
desktop under Windows, but this wasn’t
what I was looking for for my mixed environment. In multiwindow mode, each X
client application is displayed in its own
window, with a standard Windows title bar
with the normal Windows buttons on it. For
a mixed environment this is what’s
required.
For my tests, I wanted to run a standard
xterm window, the GNOME Terminal,
www.LinuxWorld.com
87
PREMIER 2003
install Linux, he is going to be scared witless. No matter how good the new operating system is, and no matter how much preparation you put into it, your user is
going to be scared of the change. So, why not first give him access to a few Linux
applications without actually installing Linux on his machine?
here are various ways to give your
user community access to Linux
applications, without wiping the
hard disks of their PCs. The most
commonly used ones are to give a
user a second PC which runs
Linux, to install a dual-boot environment
with Windows and Linux, or to install Linux
into a virtual PC environment such as
VMware. But none of these methods provide a smooth and transparent mixed environment because the user will need to
explicitly switch between the Windows and
Linux environments.
Back in the old days, I managed mixed
VMS and Unix environments. Although
these two are very different platforms, both
supported X Windows. Using the network
capabilities of X, I was always able to create
transparent mixed environments, where
users would have only one workstation, but
T
A B O UT
TH E
A UTH O R
X WINDOWS
OpenOffice.org, and Evolution. I found neither of the X packages working satisfactorily out of the box. xterm worked without
problems, as this is a very basic X11 program that does not require any unusual
fonts or extensions. The GNOME Terminal
was not so good. The terminal window was
displayed using a font that was too small,
making it very difficult to read, and the
menu items were badly rendered, making it
all very ugly (see Figure 1). OpenOffice.org
and Evolution were treated with some double-spaced font that takes up so much
space that it becomes completely unusable
(see Figure 2).
FIGURE 1
UNTIDY FONT RENDERING USING
COMMERCIAL X SERVER PACKAGES
To be fair to these products, it’s very
likely that these problems can be resolved.
X11 is a base protocol for getting requests
and responses over the network from a
client to a server and vice versa. To display
a string of text on the screen, the X client
simply requests the string to be displayed
with certain font parameters in a certain
position on the screen. The X server then
looks for an appropriate font file and ren-
ders the text for display on the screen. In
addition, many extensions have been created, mainly for graphics-intense applications, aimed at reducing the bandwidth
usage of X and offloading complex actions
from the client to the X server. But for this
all to work, there needs to be a match
between what the X client requires and
what the X server has to offer. In my case
the right fonts were not supplied with the X
server, and the applications also complained about certain extension modules
not being available in the server. If you can
find the fonts and the required extension
DLLs, then both products can probably be
made to work in the scenario described
above.
But as this was a no-budget project to
see how easy (or difficult) it was, I couldn’t
afford the time to look into these. Instead, I
decided to try the XFree86 Cygwin port.
Cygwin is a Unix-like environment for
Windows that consists of a DLL that implements most Unix system calls and maps
them to existing Windows API calls, and a
set of tools and commands ported within
this environment. With Cygwin it is possible to take Unix/Linux source code, compile it on Windows against the Cygwin DLL,
and then run it as Windows applications.
Some of the tools ported in this manner by
Cygnus are the gcc compiler and the
XFree86 system, as well as various shells
and shell commands.
All Cygwin modules are installed with a
single installer. The setup program is downloadable over the Web. When started it asks
which packages you want to download
and/or install. XFree86 is simply one of the
options available from this setup program.
It took a wee while to download the
packages, but they were untarred in no
time, and my system was ready to go. There
is no need to configure X as is required on
Linux. There is no need to select a graphics
driver and such, as XFree86 on Windows
simply works with the generic Windows
Graphics API. Therefore it uses whatever
graphics card driver is installed for
Windows itself. Older versions of
XFree86/Cygwin supported only full-screen
mode, but earlier this year an option was
added to support multiwindow mode.
The X server is started by a batch file called
startxwin.bat. As an entire Unix-like environment (based on GNU), Cygwin also provides a
bash shell and a good set of Unix commands.
The default version of startxwin.bat makes
use of this and also starts an xterm with a
bash shell running locally. If you want to run
Unix shell scripts on Windows, then Cygwin is
also useful just for that.
Next, I telneted to a Linux machine and
typed:
xterm –display eno:0 &
(‘eno’ is the name of my Windows desktop
machine). First, I got an “access denied”
message. The default security in XFree86
does not allow remote applications to display on the server. A simple
xhost +
FIGURE 2
in the locally running bash shell fixed that.
The xhost program adds entries for remote
machines to the allowed list, and the “+”
simply allows everything under the sun.
Not a good setting for a production environment, but for my testing it was sufficient.
Back to the xterm command, and now a
beautiful xterm appeared on my screen
with a bash shell under Linux. Next was the
GNOME Terminal application. No problems at all with this X server, as the correct
fonts were used, making it look exactly the
same as it does on Linux. Of course this is
not much of a surprise because the applications on the Linux machine were expect-
DOUBLE-SPACED FONTS DO NOT LEAVE A LOT OF SPACE IN EACH WINDOW
PREMIER 2003
88
www.LinuxWorld.com
X WINDOWS
FIGURE 3
A FULLY INTEGRATED WINDOWS DESKTOP, WITH FILE MANAGER, A BASH SHELL IN AN XTERM RUNNING LOCALLY,
AND A PERFECTLY DISPLAYED INSTANCE OF EVOLUTION, WHICH IS RUNNING REMOTELY ON A LINUX MACHINE
Client vs Server
Newcomers to X11 often get confused by the fact
that the concept of “client and server” appears to be the
wrong way round. In fact, it is not. Let me explain.
The concept of client-server technology is shown in
a very basic diagram (see Figure 4). The yellow box on
the left is a server process, running on one machine,
serving a resource to a number of client processes running on the computers on the right. I’ve shown three
computers running a total of four client processes, two
red ones and two blue ones.
In the case of database client-server technology, the
computer on the left is a server-class computer with
Server
Client
large amounts of disk space and probably hardware
Computer
Computers
RAID, which provides a database resource to applicaFIGURE 4 CLIENT-SERVER TECHNOLOGY
tions running on the machines on the right, which are
most often workstations or PCs. The database server on the left serves its database to the client
applications on the right. In this picture the user will usually sit at the machines on the right.
In the case of X11, the computer on the left is again running the server process, but the resources
served are a keyboard, a mouse, and one or more screens. It serves these resources to client applications
running on the computers on the right. The concept of client and server is the same, but the nature of
the resource being served now means that the user sits at the computer on the left. The X server runs on
a machine with keyboard, mouse, and screen(s), such as a workstation or PC (or even a diskless thin
client), while the X client applications run on other machines on the network, which may be other PCs,
or server-class machines without graphics capability, or even blade servers.
The designations of “client” and “server” remain the same in that client applications make use
of a shared resource provided by a server process. It is still a case of multiple clients accessing a
single server. The difference is that the user sits on the “other end” of the client-server division,
because it is the keyboard, mouse, and screen that are the served resource.
ing to run against an XFree86 server and all
the required fonts and the extension module are available in the Windows port.
I then set out to run OpenOffice.org and
Evolution. As far as graphics were concerned
both ran fine, but I found that not all windows were appearing on my Windows
machine. After a bit of investigation I figured
out that if I started Evolution from my telnet
session using the –display command-line
parameter, then some of the windows were
still appearing on the remote machine where
the program was running. Evolution starts a
number of subprocesses, and the display
parameter was not passed on to these.
However, when running Evolution from my
remote xterm window everything worked fine.
When you run xterm with the –display parameter, a bash shell is started inside it, and the DISPLAY environment variable is set to point to the
server and screen specified on the command
line. Evolution looks at this and connects to the
right server. All its subprocesses inherit the variable and now also display to the same screen.
Using XFree86/Cygwin I am able to create an environment in which I can run local
Windows applications and remote Linux
applications that all display in their own
window on the PC (see Figure 3). That part
of the transparency is achieved quite easily.
The only missing bit is a simple tool to start
a remote application, as provided by the
commercial packages. Using telnet and
xterms is not quite the mechanism I want
to give to users. I’ll need to do a bit more
searching on the Net for this, or if that fails
I’ll write one and publish it under the GPL.
Once that is achieved, I will be able to
give users access to Linux applications to
let them see for themselves how beautifully
they work. Once they are used to those, I
can start thinking about giving them the
full Linux operating system on their desktop machines. By then, they will be familiar
with the applications and the change to a
complete open source environment will be
a lot less scary.
References
• The XFree86 Project: www.xfree86.org
• Cygwin/XFree86:
http://cygwin.com/xfree
• X11: www.x.org
• Hummingbird Exceed: www.humming
bird.com
• Lab-Tam X-SecurePro: www.labtaminc.com
LINUXWORLD MAGAZINE WWW.LINUXWORLD.COM
PREMIER 2003
90
www.LinuxWorld.com
A LIMITED TIME SAVINGS OFFER FROM SYS-CON Media
SUBSCRIBE TODAY
TO MULTIPLE MAGAZINES
AND SAVE UP TO $400 AND
RECEIVE UP TO 3 FREE CDs!
RECEIVE
YOUR DIGITAL
EDITION
ACCESS CODE
INSTANTLY
WITH YOUR PAID
SUBSCRIPTIONS
3-Pack
Pick any 3 of our
magazines and save
up to $27500
Pay only $175 for a
1 year subscription
plus a FREE CD
• 2 Year – $299.00
• Canada/Mexico – $245.00
• International – $315.00
6-Pack
Pick any 6 of our
•Choose the Multi-Pack you want to order by checking
to it below. •Check the number of years you want to
TO next
order. •Indicate your location by checking either U.S.,
or International. •Then choose which
ORDER Canada/Mexico
magazines you want to include with your Multi-Pack order.
■ Linux Business & Technology
U.S. - Two Years (24) Cover: $143
U.S. - One Year (12) Cover: $72
Can/Mex - Two Years (24) $168
Can/Mex - One Year (12) $84
Int’l - Two Years (24) $216
Int’l - One Year (12) $108
Save: $63 + FREE $198 CD
Save: $32
Save: $48 + FREE $198 CD
Save: $4
Save: $40 + FREE $198 CD
Save: $8
You Pay: $89 /
You Pay: $49.99 /
You Pay: $119.99 /
You Pay: $79.99 /
You Pay: $176 /
You Pay: $99.99 /
Save: $55 + FREE $198 CD
Save: $22
Save: $48 + FREE $198 CD
Save: $4
Save: $40 + FREE $198 CD
Save: $8
U.S. - Two Years (24) Cover: $360
U.S. - One Year (12) Cover: $180
Can/Mex - Two Years (24) $360
Can/Mex - One Year (12) $180
Int’l - Two Years (24) $360
Int’l - One Year (12) $180
You Pay: $169.99 /
You Pay: $149 /
You Pay: $179.99 /
You Pay: $169 /
You Pay: $189.99 /
You Pay: $179 /
Save: $190 + FREE $198 CD
Save: $31
Save: $180 + FREE $198 CD
Save: $11
Save: $170 + FREE $198 CD
Save: $1
U.S. - Two Years (24) Cover: $216
U.S. - One Year (12) Cover: $108
Can/Mex - Two Years (24) $240
Can/Mex - One Year (12) $120
Int’l - Two Years (24) $264
Int’l - One Year (12) $132
You Pay: $129 /
You Pay: $89.99 /
You Pay: $159.99 /
You Pay: $99.99 /
You Pay: $189 /
You Pay: $129.99 /
Save: $87 + FREE $198 CD
Save: $18
Save: $80 + FREE $198 CD
Save: $20
Save: $75 + FREE $198 CD
Save: $2
■ Wireless Business & Technology
You Pay: $99.99 /
You Pay: $69.99 /
You Pay: $129 /
You Pay: $89.99 /
You Pay: $170 /
You Pay: $99.99 /
Save: $68 + FREE $198 CD
Save: $14
Save: $63 + FREE $198 CD
Save: $6
Save: $46 + FREE $198 CD
Save: $8
U.S. - Two Years (24) Cover: $168 You Pay: $99.99 /
U.S. - One Year (12) Cover: $84 You Pay: $69.99 /
Can/Mex - Two Years (24) $192 You Pay: $129 /
Can/Mex - One Year (12) $96
You Pay: $89.99 /
You Pay: $170 /
Int’l - Two Years (24) $216
You Pay: $99.99 /
Int’l - One Year (12) $108
Save: $68 + FREE $198 CD
Save: $14
Save: $63 + FREE $198 CD
Save: $6
Save: $46 + FREE $198 CD
Save: $8
■ .NET Developer’s Journal
U.S. - Two Years (24) Cover: $144
U.S. - One Year (12) Cover: $72
Can/Mex - Two Years (24) $192
Can/Mex - One Year (12) $96
Int’l - Two Years (24) $216
Int’l - One Year (12) $108
You Pay: $89 /
You Pay: $49.99 /
You Pay: $139 /
You Pay: $79.99 /
You Pay: $170 /
You Pay: $99.99 /
Save: $55 + FREE $198 CD
Save: $22
Save: $53 + FREE $198 CD
Save: $16
Save: $46 + FREE $198 CD
Save: $8
■ WebSphere Developer’s Journal
■ XML-Journal
U.S. - Two Years (24) Cover: $168
U.S. - One Year (12) Cover: $84
Can/Mex - Two Years (24) $192
Can/Mex - One Year (12) $96
Int’l - Two Years (24) $216
Int’l - One Year (12) $108
■ U.S. ■ Can/Mex ■ Intl.
■ U.S. ■ Can/Mex ■ Intl.
■ U.S. ■ Can/Mex ■ Intl.
■ ColdFusion Developer’s Journal
■ Web Services Journal
U.S.- Two Years (24) Cover: $168
U.S. - One Year (12) Cover: $84
Can/Mex - Two Years (24) $192
Can/Mex - One Year (12) $96
Int’l - Two Years (24) $216
Int’l - One Year (12) $108
■ 1YR ■ 2YR
■ 1YR ■ 2YR
■ 1YR ■ 2YR
■ WebLogic Developer’s Journal
You Pay: $79.99 /
You Pay: $39.99 /
You Pay: $119.99 /
You Pay: $79.99 /
You Pay: $176 /
You Pay: $99.99 /
■ Java Developer’s Journal
U.S. - Two Years (24) Cover: $144
U.S. - One Year (12) Cover: $72
Can/Mex - Two Years (24) $168
Can/Mex - One Year (12) $84
Int’l - Two Years (24) $216
Int’l - One Year (12) $108
Pick a 3-Pack, a 6-Pack or a 9-Pack
■ 3-Pack
■ 6-Pack
■ 9-Pack
U.S. - Two Years (24) Cover: $360
U.S. - One Year (12) Cover: $180
Can/Mex - Two Years (24) $360
Can/Mex - One Year (12) $180
Int’l - Two Years (24) $360
Int’l - One Year (12) $180
You Pay: $169.99 /
You Pay: $149 /
You Pay: $179.99 /
You Pay: $169 /
You Pay: $189.99 /
You Pay: $179 /
Save: $190 + FREE $198 CD
Save: $31
Save: $180 + FREE $198 CD
Save: $11
Save: $170 + FREE $198 CD
Save: $1
■ PowerBuilder Developer’s Journal
You Pay: $99.99 /
You Pay: $69.99 /
You Pay: $129 /
You Pay: $89.99 /
You Pay: $170 /
You Pay: $99.99 /
Save: $68 + FREE $198 CD
Save: $14
Save: $63 + FREE $198 CD
Save: $6
Save: $46 + FREE $198 CD
Save: $8
U.S. - Two Years (24) Cover: $360
U.S. - One Year (12) Cover: $180
Can/Mex - Two Years (24) $360
Can/Mex - One Year (12) $180
Int’l - Two Years (24) $360
Int’l - One Year (12) $180
You Pay: $169.99 /
You Pay: $149 /
You Pay: $179.99 /
You Pay: $169 /
You Pay: $189.99 /
You Pay: $179 /
Save: $190 + FREE $198 CD
Save: $31
Save: $180 + FREE $198 CD
Save: $11
Save: $170 + FREE $198 CD
Save: $1
magazines and save
up to $35000
Pay only $395 for a
1 year subscription
plus 2 FREE CDs
• 2 Year – $669.00
• Canada/Mexico – $555.00
• International – $710.00
9-Pack
Pick 9 of our
magazines and save
up to $40000
Pay only $495 for a
1 year subscription
plus 3 FREE CDs
• 2 Year – $839.00
• Canada/Mexico – $695.00
• International – $890.00
OFFER SUBJECT TO CHANGE WITHOUT NOTICE
Subscribe Online Today www.sys-con.com/2001/sub.cfm
www.LinuxWorld.com
91
PREMIER 2003
LUGs
Linux
User
Groups
For more information go to www.linux.org/groups
United States
Big Bear City, CA
Big Bear Linux User Group
http://www.weak.org/buug
San Diego, CA
San Diego Linux Users Group
http://www.sdlug.org
Cerritos, CA
Cerritos Linux User Group
http://www.cerritoslug.org
San Diego County, CA
Linux System Administrators
http://www.LxSA.org
Chico, CA
Chico State Linux User's Group
http://cslug.ecst.csuchico.edu
San Francisco, CA
Bay Area Linux Users Group
http://www.balug.org
Mobile, AL
South Alabama Linux User Group
http://www.salug.org
Davis, CA
Linux User Group of Davis
http://www.lugod.org
Montgomery, AL
Montgomery Area Linux Users
http://www.malu.org
Eureka, CA
HUMLUG
http://humlug.org
San Francisco, CA
San Francisco PC Users Group
Linux SIG
http://www.sfpcug.org/sig/linux.html
Alaska
Fremont, CA
East Bay Linux User Group
http://www.eblug.org
Alabama
Birmingham, AL
Birmingham Area Linux Users
http://deepfog.net
Huntsville, AL
Linux Users of North Alabama
http://luna.huntsville.al.us
Alaska
Alaska Linux Users Group
http://www.aklug.org
Fairbanks, AK
University of Alaska Fairbanks Linux
User's Group
http://linux0.cs.uaf.edu
Juneau, AK
Juneau Linux Users Group
http://juneau-lug.org
Arizona
Flagstaff, AZ
Linux Users of Northern Arizona
http://luna.flagstaff.az.us
Phoenix, AZ
Phoenix Linux User Group
http://plug.phoenix.az.us
Prescott, AZ
Linux Users Group of Yavapai
http://www.lugy.net
Sierra Vista, AZ
Cochise Linux Users Group
http://www.cochiselinux.org
Fullerton, CA
Orange County Linux User Group
http://www.oclug.org
Los Angeles, CA
Linux Users Los Angeles
http://www.lula.org
Los Angeles, CA
Los Angeles Linux User Groups
http://www.lalugs.org
Los Angeles, CA
University of Southern California
Linux Users Group
http://sclug.usc.edu
Mission Viejo, CA
South Orange County Linux Users
Group
http://www.soclug.org
Monterey, CA
Monterey Peninsula Linux User's
Group
http://mplug.psychogeek.net
Tucson, AZ
Tucson Free Unix Group
http://tfug.org
North Hills, CA
San Fernando Valley Linux User
Group
http://sfvlug.org
Yuma, AZ
Yuma Linux User Group
http://ylug.linuxorbit.com
Palmdale, CA
Antelope Valley Linux Users Group
http://www.avlug.org
Arkansas
Conway, AR
Central Arkansas Linux Users
Group
http://www.carlug.org
Little Rock, AR
Little Rock Linux Users Group
http://www.lrlug.org
California
Berkeley, CA
Berkeley Unix User Group
http://www.weak.org/buug
Berkeley, CA
Cal Berkeley Linux Users Group
http://www-callug.cs.berkeley.edu
Palm Springs Area, CA
Coachella Valley Linux Users
Group
http://www.cvlug.org
Boulder, CO
Boulder Linux Users Group
http://lug.boulder.co.us
Colorado Springs, CO
Pikes Peak Linux Users Group
http://pplug.org
Denver, CO
Colorado Linux Users &
Enthusiasts
http://clue.denver.co.us
Fort Collins, CO
Northern Colorado Linux Users
Group
http://www.nclug.org
San Francisco, CA
U.S.S. Augusta Ada
http://trek.starshine.org
Connecticut
San Jose, CA
San Jose State University Linux
Users Group
http://sjsulug.engr.sjsu.edu
New Haven, CT
Southern Connecticut Open
Source User Group
http://www.scosug.org
San Jose, CA
Silicon Valley Linux User Group
http://www.svlug.org
New London, CT
*
Eastern Connecticut Linux User
Group
http://www.eclug.net
San Luis Obispo, CA
Cal Poly Linux Users Group
http://www.lug.calpoly.edu
North Haven, CT
*
Southern CT Open Source User
Group
http://www.scosug.org
Santa Barbara, CA
Santa Barbara Linux User Group
http://sblug.borg-cube.com
Norwich, CT
Eastern Connecticut Linux Users
Group (ECLUG)
http://www.clintonpublic.org/eclug/i
ndex.html
Santa Clarita, CA
Santa Clarita Valley Linux User
Group
http://www.scvlug.org
Delaware
Santa Cruz, CA
Santa Cruz Linux User Group
http://linus.got.net
Dover, DE
Lower Delaware Linux Users Group
http://www2.delawaremicro.com
Santa Cruz, CA
Santa Cruz Microsoft Alternative
User Group
http://www.scruz.org
New Castle, DE
New Castle Linux Users Group
http://www.jjsheeran.com/LUG.html
Santa Monica, CA
Santa Monica Linux User Group
http://oceanpark.com/lug
Newark, DE
LUG @ The University of
Delaware
http://www.lug.udel.edu
Santa Ynez Valley, CA
Santa Ynez Linux Users Group
http://www.rentatek.com/SYLUG
District of Columbia
Manassas, VA
Linux User’s Group of Manassas
http://www.tux.org/lugman
Stockton/Modesto, CA
Central Valley Area Linux
Enthusiasts
http://www.cvale.org
Pasadena, CA
San Gabriel Valley Linux Users
Group
http://www.sgvlug.org
Sonoma County, CA
North Bay Linux Users Group
http://nblug.org
Redlands, CA
LUGIE
http://www.rdfoerster.com/LUGIE
Torrance, CA
Lilax
http://www.lilax.org
Roseville, CA
Roseville Linux Users Group
http://www.rosevillelug.org
Van Nuys, CA
The Linux Labs User Group
http://www.thelinuxlabs.org
Sacramento, CA
Sacramento Area Linux Users Group
http://wwww.saclug.org
Berkeley, CA
Berkeley Unix User Group
http://www.weak.org/buug
PREMIER 2003
Colorado
N. Potomac, MD
DCLUG--Washington DC
Metro Area Linux User
http://dclug.tux.org
Bethesda Maryland, VA
Washington DC Linux User Group
http://www.tux.org/dclug
Florida
Broward, FL
Florida Linux User Xchange
http://www.flux.org
Cape Coral, FL
Southwest Florida Linux Users Group
http://www.swfglug.org
92
Central Florida, FL
Linux Enthusiasts And
Professionals, Inc.
http://www.leap-cf.org
Daytona Beach, FL
Daytona Beach Network Users
Group
http://www.dabnug.org
Florida, FL
Ardella Baptist Church, FL
Your Linux User Group (YourLUG)
http://www.yourlug.org
Fort Lauderdale, FL
Florida Linux User Xchange
http://www.flux.org
Fort Walton Beach, FL
Emerald Coast Linux Users Group
http://www.eclug.org
Gainesville, FL
Florida Linux Users - FLU
http://www.linuxusers.org
Jacksonville, FL
Jacksonville Linux Users Group
http://www.jaxlug.org
Lakeland, FL
YourLug
http://www.yourlug.org
Melbourne, FL
Melbourne Linux User Group
http://www.mlinux.org
Miami, FL
Miami Linux Users Group
http://www.mialug.org
Orlando, FL
Linux Enthusiasts and
Professionals (LEAP) of Central
Florida
http://www.leap-cf.org
Orlando, FL
University of Central Florida Linux
User Group
http://pegasus.cc.ucf.edu/~linux
Pensacola, FL
Pensacola Linux User Group
http://www.pcolalug.org
Tampa Bay, FL
Suncoast Linux Users Group
http://www.suncoastlug.org
Columbus, GA
Chattachoochee
Area Open Source
http://chaos706.org
Dublin, GA
Dublin Georgia Linux Users
Group
http://members.tripod.com/~carrere/linux
Loganville, GA
LawLUG
http://www.lawlug.com
Hawaii
Hilo, HI
Big Island Linux Users Group
http://cs.uhh.hawaii.edu/BILUG
Honolulu, HI
Linux & Unix Advocates & Users
http://luau.hi.net
Honolulu, HI
Linux Business Network Users
Group
http://linuxnetworks.org/
Honolulu, HI
Mid-Pacific Linux Users Group
http://www.mplug.org
Idaho
West Palm Beach, FL
Pensacola Linux User Group
http://www.pbclug.org
Coeur d'Alene, ID
North Idaho Linux User Group
http://www.nilug.org
Georgia
Idaho Falls, ID
Linux in Idaho Falls
http://www.linif.org
Athens, GA
University of Georgia Linux User
Group
http://www.uga.edu/~chugalug
Mountain Home AFB, ID
Mountain Home Linux User Group
http://mhlug.linuxorbit.com
Atlanta, GA
Atlanta Linux Enthusiasts
http://www.ale.org
Pocatello, ID
Idaho State University Linux Users
Group
http://inconnu.isu.edu/index.shtml
Atlanta, GA
Linux Users Group at Emory
http://luge.cc.emory.edu
Rockland, ID
American Falls /Rockland Linux
User Group
http://arlug.dcdi.net
Atlanta, GA
Linux Users Group at Georgia
Tech
http://www.lugatgt.org
Twin Falls, ID
Magic Valley Linux Users Group
http://www.magiclug.org
www.LinuxWorld.com
LUGs
Kansas
Massachusetts
Manhattan, KS
K-SLUG
http://www.k-slug.org
Amherst, MA
Hampshire College LUG
http://bork.hampshire.edu/~hclug
Missouri/Kansas, KS
Kansas Unix & Linux Users
Association
http://www.kulua.org
Amherst, MA
Western Massachusetts LinuxUnix User's Group
http://www.wemalu.org
Newton, KS
Newton Linux Users Group
http://www.geocities.com/SiliconVal
ley/Code/2768
Boston, MA
Boston Linux & Unix
http://www.blu.org
Mississippi
Danvers, MA
Saint John's Prep LUG
http://www.sjp-lug.tk
Jackson, MS
Linux Users Group of Jackson
http://lugoj.org/index.php
Mansfield, MA
SE Massachusetts Linux Users
Group
http://www.semalug.org
Lafayette-Oxford-University, MS
Lafayette-Oxford-University Linux
Users Group
http://loulug.cs.olemiss.edu
Carson City, NV
Carson Douglas Linux Users
Group
http://kearneylug.org
Worcester, MA
Clark University linux users Group
http://linux.clarku.edu
Mississippi, MS
South Mississippi Linux Users
Group
http://www.smlug.org
Las Vegas, NV
Las Vegas Linux User Group
http://lvlug.org
Wichita, KS
Air Capital Linux Users Group
http://www.aclug.org
Kentucky
Bowling Green, KY
Western Kentucky University Linux
Users Group
http://linux.wku.edu
Indiana
Evansville, IN
University of Southern Indiana
LUG
http://linux.usi.edu
Fort Wayne, IN
Three Rivers Linux Group
http://members.tripod.com/fwlug/fw
lug.html
Gary to Laporte, IN
Northwest Indiana Linux User
Grou
http://www.nwilug.org
Goshen, IN
GLUG
http://www.goshenlug.org
Illinois
Chicago, IL
ChicagoLand Linux Users Group
http://clug.chicago.il.us
Indianapolis, IN
Central Indiana Linux Users Group
http://www.cinlug.org
Chicago, IL
Enterprise Computing Professionals
Association, US
http://www.encompassUS.org
Indianapolis, IN
Indianapolis Linux User
Consortium
http://www.inluc.org
Chicago, IL
Illinois Institute of Technology Linux
Users Group
http://host61.grad.iit.edu/lug
North-Central Indiana, IN
ChugaLugIN
http://www.angelfire.com/in2/chuga
lugin
Des Plaines, IL
ULTRA (at Oakton Community
College)
http://student.oakton.edu/ultra
Fairview Heights, IL
Southern Illinois Linux Users
Group
http://www.silug.org
Galesburg, IL
Linux Users' Group Galesburg
Area
http://www.lugga.org
O'Fallon, IL
Southern Illinois Linux Users
Group - Metro East
http://www.silug.org
Palatine, IL
NorthWest Chicagoland Linux User
Group (NWCLUG)
http://nwclug.harpercollege.edu/htt
pd/html/index.html
Quad Cities, IL
QCLUG
http://www.qclug.org
Rock River, IL
Rock River Linux User Group
http://linux.rockriver.net
Springfield, IL
Linux Users of Central Illinois
http://www.luci.org
New Albany, IN
Indiana University Southeast Linux
User Group
http://www.iuslug.org
South Bend, IN
Michiana Linux Users Group
http://www.mlug.org
South Bend, IN
Notre Dame Linux Users Group
http://www.ndlug.nd.edu
Terre Haute, IN
Rose-Hulman Users of Linux
http://www.rosehulman.edu/Users/groups/RHUL/H
TML/index.html
West Lafayette, IN
Purdue University Linux Users
Group
http://expert.cc.purdue.edu/~plug
Iowa
Ames, IA
Ames Area Free Unix Group on
Information Technology
http://www.aafugit.org
Cedar Falls, IA
CedarLUG
http://www.cedarlug.org
Cedar Rapids, IA
Eastern Iowa Linux User groups
http://www.crlug.org
Des Moines, IA
Central Iowa Linux Users Group
http://www.cialug.org
www.LinuxWorld.com
Lexington, KY
Lexington Professional Linux
Users Group
http://lplug.org
Worcester, MA
Worcester Linux Users Group
http://www.wlug.org
Louisville, KY
S+LUG, Louisville
http://www.maysville-linux-usersgroup.com
Michigan
Ann Arbor, MI
The Washtenaw Linux User Group
http://www.lugwash.org
Maysville, KY
Maysville Linux Users Group
http://www.slug.louisville.edu
Big Rapids, MI
Ferris State University Linux Users
Group
http://galileo.tucker-usa.com/~lug
Louisiana
Detroit, MI
Metro Detroit Linux Users Group
http://www.mdlug.org
Baton Rouge, LA
Baton Rouge Linux User Group
http://www.brlug.net
Flint, MI
Genesee County Linux Users
Group
http://www.gclug.org
New Orleans, LA
New Orleans Linux User Group
http://www.nolug.org
Lake Charles, LA
Lake Charles Linux Users Group
www.lclinux.org
Grand Traverse, MI
Grand Traverse Linux Users Group
http://www.gtlug.org
Shreveport, LA
Shreveport - Bossier Linux Users
Group
http://www.sblug.org
Kalamazoo, MI
Kalamazoo Linux User Group
http://www.kalamazoolinux.org
Maine
Kentwood, MI
Grand Rapids Linux Users Group
http://grlug.org/zope/grlug
Westbrook, ME
MeLUG South
http://south.melug.org
Lansing, MI
Greater Lansing Linux Users
Group
http://www.gllug.org
Maryland
Muskegon, MI
Muskegon Area Linux Users Group
http://www.malug.org
Annapolis, MD
Annapolis LUG
http://linuxlovers.dhs.org
Traverse City, MI
Grand Traverse Linux Users Group
http://www.gtlug.org
Baltimore, MD
Baltimore Linux Users Group
http://www.BaltoLUG.org
University of Michigan, MI
UMLUG
http://www.umich.edu/~umlug
Blue Ridge, MD
Blue Ridge Area Linux Enthusiasts
http://www.brale.org
Minnesota
College Park, MD
Linux Web Linux User Group
http://www.linuxweb.org
Duluth, MN
Twin Ports Linux Users Group
http://linux.trapped-under-ice.com
Columbia, MD
Columbia Area Linux Users Group
http://www.calug.com
Mankato, MN
MSU, Mankato Linux User Group
http://krypton.mnsu.edu/~msulug
Glen Burnie, MD
Glen Burnie Linux User Group
http://gblug.linuxorbit.com
Macalester College, MN
Mac LUG
http://maclug.dhs.org
Minneapolis, MN
Twin Cities Linux Users Group
http://www.mn-linux.org
Laurel, MD
Laurel-Beltsville Linux User Group
http://laurellinux.org
Leonardtown, MD
The Penguin Club
http://free.prohosting.com/~lugsm
Moorhead, MN
Fargo Moorhead LUG
http://fmlug.org
Silver Spring
Montgomery Blair Linux Users
Group
http://mblug.mbhs.edu
Northfield, MN
Northfield Linux Users Group
http://norlug.org
93
Duluth, MN
Twin Ports Linux Users Group
http://linux.trapped-under-ice.com
Rochester, MN
K-lug
http://k-lug.org
University of Minnesota, MN
Twin Cities Linux Users Group
http://www.mn-linux.org
Nebraska
Kearney, NE
Kearney Linux User Group
http://kearneylug.org
Lincoln, NE
OLUG
http://www.olug.org
Lincoln, NE
Star City Linux User Group
http://linux.dbw.org
Omaha, NE
OLUG
http://www.olug.org
Nevada
Reno, NV
Reno Linux User Group
http://www.rlug.org
Mississippi State, MS
BullyLUG
http://www.bullylug.org
Tupelo, MS
Linux Users of North Mississippi
http://www.linuxgod.net
Missouri
Blue Springs, MO
Blue Springs Linux Users Group
http://bslug.solve.net
Columbia, MO
Mizzou Linux Users Group
http://www.mlug.missouri.edu
East-Central Missouri, MO
East-central Missouri Linux Users
Group
http://www.mo-biz.com/~linuxusr
New Hampshire
Concord, NH
CentraLUG
http://www.centralug.org
Nashua, NH
Greater New Hampshire Linux
User's Group
http://www.gnhlug.org
New Jersey
Bellmawr, NJ
South Jersey Linux Users Group
http://sjlinux.org
Branchburg, NJ
New Jersey Linux User Group
http://www.njlug.org
Hazelwood, MO
Hazelwood Linux Users Group
http://www.sluug.org/~hzlug
Cherry Hill, NJ
Cherry Hill Linux Users Group
http://www.chlug.org/home.php
Independence, MO
Independence Linux Users Group
http://www.ilug.org
Hamilton, NJ
Hamilton Linux User Group
http://www.hamlug.org
Kansas City, MO
Kansas City Linux User Group
http://www.kclug.org
Highland Park, NJ
Rutgers University Student Linux
User Group
http://ruslug.rutgers.edu
Missouri/Kansas, MO
Kansas Unix & Linux Users
Association
http://www.kulua.org
Newark, NJ
RUNLUG Rutgers University
Newark: Linux Users Group
http://penguin.rutgers.edu
Springfield, MO
Ozarks Linux Users Group
http://www.ozlug.org
New Brunswick, NJ
Rutgers University Student Linux
Users Group
http://ruslug.rutgers.edu
Springfield, MO
Southern Missouri Linux Users
Club
http://www.smluc.org
Passaic County, NJ
Passaic County Linux Users Group
http://devplug.org
St. Louis, MO
Missouri Open Source Linux Users
Group
http://www.moslug.org
St. Louis, MO
St. Louis Linux Users Group
http://www.stllinux.org
St. Charles, MO
St. Charles Linux Users Group
http://www.sluug.org/~cfit/stclug
Montana
Bozeman, MT
BozemanLUG
http://www.bozemanlug.org
Billings, MT
Yellowstone Valley Linux Users
Group
http://lug.cotcomsol.com
Princeton, NJ
Linux Users Group/In Princeton
http://lugip.princeton.edu
Princeton, NJ
LUG/IP
http://www.lugip.org
Princeton, NJ
Princeton PC Users Group
http://www.ppcug-nj.org/sigs/linux
Ridgewood/Hawthorne, NJ
New Jersey Sleepless Linux User
Group
http://www.njslug.org
Scotch Plains, NJ
LUNICS
http://www.acgnj.org
Voorhees, NJ
SLUG
http://slug.happyduck.org
—continued on next page
PREMIER 2003
LUGs
New Mexico
North Carolina
Albuquerque, NM
New Mexico Linux User Group
http://www.nmlug.org
Asheville, NC
Western North Carolina Linux
Users Group
http://www.wnclug.org
Gallup, NM
Gal-lug
http://gallug.org
Las Cruces, NM
Mesilla Valley LUG
http://www.zianet.com/mvlug
Rio Rancho, NM
DIALUG
http://www.linuxlots.com/~dialug
New York
Briarwood, NY
Briarwood Linux User Group
http://www.geocities.com/bwlug
Brooklyn, NY
New York Linux Users Group
http://www.nylug.org/home/index.shtml
Buffalo, NY
Niagara Frontier Linux Users
Group
http://www.nflug.org
Buffalo, NY
University at Buffalo Linux Users
Group
http://ublug.freehosting.net
Capital District Region of NY
CDLUG - Capital Disctrict Linux
Users Group
http://cdlug.net
Farmingdale, NY
Long Island Linux User Group
http://www.lilug.org
Johnson City, NY
Southern Tier of New York Linux
User Group
http://www.stnylug.org
Long Island, NY
Long Island Linux Users Group
http://lilug.org
Marist College, NY
Mid-Hudson Valley Linux Users
Group
http://mhvlug.org
New York City, NY
Linux User Group of New York
http://www.luny.org
New York City, NY
New York Linux Scene
http://www.nylxs.com
Boone, NC
Appalachian Linux Users Group
http://lug.appstate.edu
Burlington, NC
Piedmont Linux User Group
http://www.netpath.net/linux
Charlotte, NC
CharLug
http://charlug.org
Durham, NC
Duke University Linux User Group
http://www.duke.edu/web/dulug
Greensboro, NC
LUG @ GTCC
http://home.triad.rr.com/gtcclug
Mayodan, NC
The Rockingham County Linux
Users
http://rock.lug.net
Morganton, NC
Foothills Linux Users & Enthusiasts
http://www.hci.net/~flue
New Bern, NC
New Bern Linux Users Group
http://www4.coastalnet.com/nblug
Raleigh, NC
Linux Users Group at North
Carolina State University
http://www.linux.ncsu.edu/lug
Shelby, NC
Shelby Linux Users Group
http://www.swoopee.com/lug
Wake Forest University, NC
Piedmont Linux Users Group
http://ricardo.ecn.wfu.edu/~plug
North Dakota
Fargo-Moorhead, ND
Fargo-Moorhead Linux User Group
http://fmlug.org
Ohio
Plattsburgh, NY
Plattsburgh Linux Users Group
http://lug.cf-media.com
Akron, OH
Akron Linux Users Group
http://alug.adg.org
Poughkeepsie, NY
Mid-Hudson Valley Linux Users
Group
http://mhvlug.org
Bowling Green, OH
Bowling Green Student Linux
Users Group
http://alug.adg.org
Rensselaer, NY
Capital District Linux Users Group
http://cdlug.net
Akron, OH
Akron Linux Users Group
http://www.bgslug.org
Salamanca, NY
LUG.SWNY.net
http://swny.net/lug
Stony Brook, NY
Linux Users Group @ Stony Brook
http://www.ic.sunysb.edu/clubs/lugsb
Syracuse, NY
Syracuse Linux Users Group
http://syrlug.org
Syracuse, NY
Syracuse University Linux User
Group
http://slugs.syr.edu
Stony Brook, NY
Linux Users' Group @ Stony Brook
http://www.sinc.sunysb.edu/Clubs/lugsb
Tappan, NY
Westchester Linux Users Group
http://www.linuxpcug.org
Philadelphia, PA
Drexel University GNU/Linux Users
Group
http://www.duglug.org
Mansfield, OH
North Central Ohio LUG
http://www.ncolug.org
North Canton, OH
Canton Linux Enthusiasts
http://cantonlinux.org
Oberlin, OH
Oberlin Linux User Group
http://www.oberlin.edu/~olug
Oxford, OH
The Miami Unix Collective
http://www.muc.muohio.edu
Toledo, OH
Toledo Area Linux Users Group
http://www.talug.org
Oklahoma
Norman, OK
Norman UNIX Liberation League
http://www.ou.edu/student/null
Canton, OH
Canton Linux Enthusiasts
http://linux.ifip.net
Cincinnati, OH
Cincinnati Linux Users Group
http://www.clug.org
Cleveland , OH
Case Western Reserve University
Linux Users Group
http://cwrulug.cwru.edu
Cleveland, OH
Cleveland Linux User Group
http://cleveland.lug.net
Oklahoma City, OK
OKC PCUG Linux SIG
http://LinuxSIG.org
PREMIER 2003
Puerto Rico
Austin, TX
Austin Linux Group
http://www.austinlug.org
Puerto Rico
Linux Puerto Rico
http://www.linux-pr.com
Austin, TX
Central Texas Linux User Group
http://www.ctlug.org
Rhode Island
Beaumont, TX
SouthEast Texas Linux Users
Group
http://www.setxlug.org
Greenville, SC
Upstate Carolina Linux Users
Group
http://www.smwc.com/linux
Ashland, OR
Rogue Penguins Linux Users
Group
http://www.rplug.org
Rock Hill, SC
Winthrop University Linux Users'
Group
http://feynman.winthrop.edu/winulug
Corvallis, OR
The Mid Willamette Valley Linux
User Group
http://mwvlug.org
South Dakota
Eugene, OR
Eugene Linux Users Group
http://www.euglug.org
Black Hills, SD
Black Hills Linux User Group
http://www.geocities.com/bhlug/bhl
ughome
Eugene, OR
Open Source Users Group at the
University of Oregon
http://cs.uoregon.edu/open
Rapid City, SD
Black Hills Linux User Group
http://www.geocities.com/bhlug/bhl
ughome
Portland, OR
BizNix
http://www.biznix.org
Sioux Falls, SD
Siouxland Linux Users Group
http://www.kopland.org/forums
Portland, OR
Portland Linux User Group
http://www.pdxlinux.org
Tennessee
Tillamook, OR
Tillamook Linux User Group
http://www.geocities.com/elflakosr
Chattanooga, TN
Chugalug
http://www.chugalug.org
Clarksville, TN
Clarksville Linux Users Group
http://www.cllug.org
Pennsylvania
Altoona, PA
Altoona Linux Users Group
http://www.altoonalug.org
Knoxville, TN
Knoxville Linux Users Group
http://www.utklug.org
Bethlehem, PA
Lehigh Valley Linux Users Group
http://thelinuxlink.net/lvlinux
McMinnville, TN
McMinnville Linux and Unix Users
Group
http://www.utklug.org
Central Pennsylvania, PA
Central Pennsylvania Linux User
Group
http://www.pa.net/cplug
Memphis, TN
Group Of Linux Users in Memphis
http://www.cllug.org
Doylestown, PA
Bucks County Linux Users Group
http://www.bclug.org
Harrisburg, PA
Harrisburg Unix Users Group
http://www.huug.org
Austin, TX
ACC-LUG
http://www.geocities.com/aibanhamano/Opensource/acc.html
South Carolina
Oregon
Columbus, OH
Central Ohio Linux User Group
http://www.colug.net
Pittsburgh, PA
Western Pennsylvania Linux
Users' Group
http://www.wplug.org
Rhode Island, RI
Ocean State Linux Users
http://www.rilinux.org
Tulsa, OK
TCS Linux SIG
http://tulsa.sourceforge.net
Gettysburg, PA
GB-LUG
http://gblug.mine.nu
Amarillo, TX
Amarillo Linux Users Group
http://www.alug.org
Providence, RI
Rhode Island Linux Users Group
http://www.rilug.com
Oklahoma City, OK
Oklahoma City Forum
http://www.okcforum.org
Cleveland,, OH
North East Ohio Newbie Linux
Users Group
http://www.neonlug.org
Philadelphia, PA
Philadelphia Area Linux User
Group
http://www.nothinbut.net/~plug
Providence, RI
Rhode Island Free Unix Group
http://www.rifug.org
Research Triangle Park, NC
Triangle Linux Users Group
http://www.trilug.org
New York City, NY
New York Linux Users' Group
http://www.nylug.org
Rochester, NY
Linux Users Group of Rochester
http://www.lugor.org
Lancaster, PA
Lancaster Co. Linux Users Group
http://www.lancaster-linux.org
Dayton, OH
Dayton Microcomputer Association
Linux Special User Group
http://www.dma.org/linuxsig
Nashville, TN
Nashville Linux Users Group
http://www.nlug.org
94
Brownsville, TX
Brownsville LUG
http://unix.utb.edu/~blug
Corpus Christi, TX
Corpus Christi Linux Users Group
http://www.cclug.org
Dallas, TX
North Texas Linux User Group
http://www.ntlug.org
Fort Worth, TX
Fort Worth Linux Users Groups
http://www.fwlug.org
Galveston, TX
Coastal Area of Texas Linux Users
Group
http://www.catlug.org
Hillcrest, TX
Heart of Texas Linux User Group
(HOTLUG)
http://www.hotlug.com
Killeen, TX
Killeen-Fort Hood Area LUG
http://members.aol.com/killeenlug/
index.html
Vermont
Burlington, VT
Small Linux Users Group of
Vermont
http://www.slug-vt.org
Midland, TX
Permian Basin Linux Users Group
http://www.pblug.org
Virginia
Nacogdoches/Lufkin, TX
Unix Users of Deep East Texas
http://www.uudet.org
Arlington, VA
Yorktown High School Linux Users'
Group
http://yhslug.tux.org
Texarkana, TX
Texarkana Area Linux Users Group
http://kroushl.freeshell.org/talug/ind
ex.php
Blacksburg, VA
Virginia Tech Linux Users' Group
http://www.vtluug.org
Waco, TX
Heart O' Texas Linux User Group
http://hotlug.org
Chantilly, VA
Northern Virginia Linux Users'
Group
http://novalug.tux.org
Charlottesville, VA
Charlottesville Unix Users Group
http://www.chuug.org
Utah
Green River, UT
Green River Linux Users Group
http://www.greenriverutah.com/lug.shtml
Logan, UT
The Free Software and GNU/Linux
Club
http://linux.usu.edu
Ogden, UT
Ogden Area Linux User Group
http://www.oalug.com
Provo, UT
BYU Unix Users Group
http://uug.clubs.byu.edu
Fairfax, VA
Fairfax Linux User Group
http://www.dhankhar.com/servlet/fo
rum/listforums
Falls Church, VA
Linux User's Group of Northern
Virginia
http://www.tux.org/novalug
Richmond, VA
Richmond VA Linux Users Group
http://www.rivalug.org
Salem, VA
Roanoke Valley GNU/Linux User
Group
http://www.rvglug.org
Texas
Provo, UT
Provo Linux User Group
http://www.plug.org
Staunton, VA
Shenendoah Vallery Linux Users
Group
http://www.xerosystems.com
Abilene, TX
West Texas Linux Users Group
http://www.wtlug.org
Salt Lake City, UT
Salt Lake Linux Users Group
http://www.sllug.org
Tidewater, VA
Tidewater Unix User Group
http://www.twuug.org
www.LinuxWorld.com
LUGs
Nanaimo
Nanaimo Linux Users Group
http://www.nanlug.org
Peterborough
Peterborough Linux User Group
http://www.plugintolinux.org
Nelson
Kootenay Area UNIX Group
http://kaug.netidea.com
Toronto
Toronto Linux Users Group
http://tlug.ss.org
Penticton
South Okanagan Linux Users
Group
http://www.solug.org
Wingham
Midwestern Ontario Linux Users
Group
http://www.molug.org
Prince Rupert
North Coast Linux User Group
http://www.citytel.net/~gnielsen/linu
x2.html
Quebec
Gatineau
Linux-Outaouais
http://www.linux-gatineau.org
Valley Internet Providers
South Okanagan Linux Users
Group
http://www.solug.org
Montreal
Linux-Québec
http://www.linux-quebec.org
Vancouver
Vancouver Linux Users Group
http://www.linux.bc.ca
Montreal
Montreal Linux User Group
http://www.skalir.net
Victoria
Victoria Linux Users Group
http://www.vlug.org
Montreal
Montreal Regional Linux Users
Group
http://www.mrlug.org
Manitoba
Winnipeg
Manitoba UNIX User Group
http://www.muug.mb.ca
West Virginia
Morgantown, WV
Morgantown Area Linux and Free
Software Community
http://www.morlug.org
Parkersburg, WV
Mid-Ohio Valley Linux Users
Group
http://www.movlug.com
Potomac Region, WV
PotLUG
http://www.geocities.com/potlug
Washington
Bellevue, WA
Tacoma Linux User Group
http://www.taclug.org
Bellingham, WA
Bellingham Linux Users Group
http://www.blug.org
Kingston, WA
Kitsap Penninsula Linux Users
Group
http://www.kplug.org
Olympia, WA
Olympia Linux Users Group
http://chuckwest.org/olug
Seattle, WA
Greater Seattle Linux Users
http://www.gslug.org
Seattle, WA
Linux User Group at University of
Washington
http://students.washington.edu/
linuxug
Silverdale, WA
Kitsap Penninsula Linux Users
Group
http://www.kplug.org
Spokane, WA
Spokane Linux User Group
http://www.spokanelinux.com
Tacoma, WA
Tacoma Linux User Group
http://www.taclug.org
Wisconsin
La Crosse, WI
La Crosse Linux Users Group
http://www.lclug.com
Madison, WI
Madison Linux Users Group
http://www.madisonlinux.org
Milwaukee, WI
Milwaukee Linux Users Group
http://www.mlug.net
Waukesha, WI
Waukesha-Area Linux User Group
http://www.digitalsimplicity.com/walug
Trois-Rivières
Linux Trois-Rivières
http://linuxtr.ampr.org
Winnipeg
Prairie Linux User Group
http://www.openfarm.org
Saskatchewan
Winnipeg
Winnipeg PC User Group Linux
Forum
http://www.wpcusrgrp.org/~sig/Linu
x/
New Brunswick
Moncton
Moncton Linux Users Group
http://monctonlug.sourceforge.net
Newfoundland
Corner Brook
Western Newfoundland Linux
Users Group
http://www.cornet.nf.ca/lug
Yukon Territory
Mexico City
Mexico Linux User Group
http://www.linux.org.mx
Yukon Territory
Yukon Linux Users Group
http://users.yknet.yk.ca/linux
Villahermosa
GULTab: Grupo de Usuarios Linux
de Tabasco
http://linuxtabasco.tripod.com
Mexico
Chihuahua
Nationwide
See site for more details
GLUCH
http://www.gluch.org.mx
Aguascalientes
Grupo de Usuarios de Linux en
Aguascalientes Mexico
http://www.geocities.com/gpolinagsmex
Distrito Federal
See site for more details
Grupo de Usuarios de Linux
Mexico
http://www.cofradia.org
Atizapan de Zaragoza
Grupo de Usuarios Linux ITESMCEM
http://linux.cem.itesm.mx
Ecatepec
GULFI
http://www.fib.unam.mx/gulfi
Chihuahua
Grupo Linux Chihuahua
http://www.gluch.org.mx
Ciudad Juarez
Grupo Software Libre Ciudad
Juarez
http://mx.groups.yahoo.com/group/
GSLCJ
Colima
UNICO
http://usuarios.lycos.es/linuxcolima
Mexico
See site for more details
Grupo de Usuarios Linux ITESM
CEM
http://linux.cem.itesm.mx
Nayarit
See site for more details
Grupo Nayarit de Usuarios de Linux
http://www.gnul.org
Hermosillo
Grupo de usuarios de Linux del
Pitic
http://www.gulp.org.mx
Regina
Linux Operating System Users of
Regina
http://www.losurs.org
Hermosillo, Guaymas, Obregon
ANCrae.ORG
http://www.ancrae.org
Saskatoon
Saskatoon Linux Group
http://www.slg.org
Iguala
Grupo de Usuarios de Linux del
Estado de Guerrero
http://guerrero.linux.org.mx
SIAST Wascana Campus
Linux/Open Source Users of
Regina, Sask.
http://www.losurs.org
Mexico City
GUL Grupo de Usuarios de Linux
UPIICSA
http://linux.librosyarte.com.mx
Nuevo Leon
See site for more details
Grupo de Usuarios de GNU/Linux
de Monterrey
http://www.gnulinux.org.mx
Puebla
See site for more details
Grupo de Usuarios de Linux en
Puebla
http://www.linuxpuebla.org
About LUGs
St. John's
St. John's Linux Users Group
http://www.slug.nf.net
In order for the Linux movement to continue to flourish, the
St. John's
St. John's Linux Users Group
http://www.cs.mun.ca/~slug/
proliferation and success of local LUGs is an absolute requirement.
Nova Scotia
Because of the unique status of Linux, the local LUG must provide
Canada
Halifax
Nova Scotia Linux Users Group
http://www.nslug.ns.ca
some of the same functions that a “regional office” provides for large
Alberta
Ontario
computer corporations like IBM, Microsoft, or Sun. LUGs can and must
Calgary
Calgary Linux Users Group
http://calgary.linux.ca
Gravenhurst and Sudbury
Northern Ontario Linux Users
Group
http://www.freewebs.com/nolug
train, support, and educate Linux users, coordinate Linux
Lethbridge
Lethbridge LUG
http://llug.linux.ab.ca
Wetaskiwin
The Wetaskiwin Users Group
http://www3.telus.net/WetaskiwinLUG
British Columbia
as a liaison to local media outlets like newspapers and television.
Kingston
Kingston Linux Users Group
http://www.klug.on.ca
Kitchener
KWLUG
http://www.kwlug.org
Tri-Cities, WA
Tri-Cities Linux User Group
http://www.3clug.org
Duncan
Cowichan Valley Linux Users
Group
http://www.cowlug.org
London
Western Linux User Group
http://www.westernlug.org
Vancouver, WA
VWLUG
http://www.basichelp.com/linux
Kamloops
KamLUG
http://lug.kamloops.net
Ottawa
Ottawa Canada Linux Users Group
http://www.oclug.on.ca
Whidbey Island, WA
Whidbey LUG
http://www.wlug.net
Kelowna
Kelowna Linux User Group
http://oklug.hwy97.com
Owen Sound
Bruce-Grey Linux Users Group
http://bglug.8m.com
www.LinuxWorld.com
consultants, advocate Linux as a computing solution, and even serve
Hamilton
Hamilton Linux User Group
http://hlug.mohawkc.on.ca
If your group isn’t included in our list,
please e-mail [email protected]
SOURCE HTTP://WWW.LINUX.ORG/GROUPS
95
PREMIER 2003
As Linux is moving in everywhere within enterprise computing – in embedded
solutions, on the desktop, in distributed applications, and on mainframes –
NEWS
Linus Urges Enterprise Users of
Linux: ‘Get Started Bug-Testing
on the 2.6test Beta Release’
The Linux community has begun the
race to get 2.6 ready as a production kernel, and in a meeting room below the main
floor of the Mandalay Bay Convention
Center in Las Vegas last month,
LinuxWorld Magazine was present to see
Linux history being both made and discussed.
On the podium were gathered not just
Linus Torvalds, fresh from releasing on July
13 a test release of the new 2.6 kernel –
officially called “2.6test” – but also a handful of the most influential open source collaborators in the world, such as the chairman of VA Software Larry Augustin, the
director of Linux International Jon “maddog” Hall, and the CTO of SuSE Linux AG
Juergen Geck.
The topic of the session was “The Future
Linux: 2.6 and Beyond” and Torvalds was
naturally called upon to open the discussion, which he did by giving a brief explanation of 2.6test.
“What I released on Sunday is a first
beta test,” he said. “Called 2.5 while it was a
development kernel, as it has been for the
last two years, it’s now – as everyone here
knows – called 2.6.”
“The biggest changes most people in
the enterprise will notice,” Torvalds
added, “will be the huge increases in scalability. There are great improvements too
to the desktop experience,” – which is
incidentally how Torvalds uses the kernel.
“When you have a desktop that does a
lot of things at the same time but you don’t
even notice as a user that the machine is
doing a lot of things at the same time,
that’s ideal. Maybe it slows down, but it
remains very smooth and you don’t even
notice.”
Then Torvalds made the most important
point of all, directing it at the business
community.
“I would say to people who already use
Linux, including companies: if you don’t
put this new release through its paces and
test it for bugs, the problems that you’ll see
in the release kernel will come as a nasty
surprise to you, because this is going to be
the next production kernel.
“So have your MIS people see what the
PREMIER 2003
the Linux Business Week News Desk brings you all the latest developments.
new kernel does for you under your load,”
he advised, “and if there are any issues let
us know and we’ll fix it for you.”
Asked whether the 2.6 kernel offers
expanded hardware support (e.g., for USB),
Torvalds said that all the USB development
has always been done under 2.5 (the development kernel), including support for a lot
of host controllers and support for external
devices.
“Developers are working on drivers, testing them,” he said. “We’ve even back-ported these drivers to the old stable kernels,
e.g., 2.5.”
LinuxWorld Magazine will, of course,
keep you posted on progress on the new
kernel.
Linux Competency Center Opens
Its Doors in New York City
Sybase has strengthened its ties to Linux
by opening a new “Linux Competency
Center” in New York City and announcing
that it is expanding its alliance with Red
Hat.
Sybase’s entire global Linux professional
services practice will now have this center
as its central reference point, with its NYC
location sure to fuel speculation that what
Sybase wants above all
is to snag the financial
services firms as they
migrate to Linux, which one by one – following Merrill Lynch’s lead – they seem certain to do as they seek to lower the total cost
LWM Meets Sam Greenblatt...
Computer Associates’ “Mr. Linux” –
Passionate Mixer of Oil and Water
Meeting for any length of time with the man tapped by farsighted Computer Associates CEO
Sanjay Kumar to act as the Islandia, New York-based company’s open-source pathfinder and
visionary is an experience that few people recently have been able to fully appreciate…and
even fewer to achieve.
Every hour of Greenblatt’s day and every day of his week is consumed – that is, for once,
not too extreme a word – with Linux. Because CA, uniquely in Greenblatt’s view, is that rara
avis, a commercial software business that has realized that open source innovation isn’t just an
interesting adjunct to the commercial paradigm: it is going to be the undoing of every major
player today who remains in (what he would view as) denial.
“People familiar with the dynamics of commercialized computing ask me how many developers will support such-and-such a Linux solution, and I tell them, four hundred thousand – but I
can’t put a name to a single one of them!
“For business leaders used to even a major Linux company like Red Hat, say, having just
two hundred or so developers, this leads to a certain amount of consternation,” Greenblatt
reports, with a wry smile.
This, he believes, is a good indicator of the gulf that exists between what he habitually
refers to as “the community” (Greenblatt’s shorthand for the worldwide open source community) and the mainstream business world. But it’s a bridge across which the mainstreamers are
suddenly almost falling over themselves to rush. “Linux was just ‘discovered’ this spring,”
Greenblatt says. “It’s as if we’re all suddenly rock stars,” he adds, astonishedly.
But it isn’t in reality astonishing to him. After all, Greenblatt has personally helped bring
Linux to exactly this climax. Fired by the “rush,” the sheer exhilaration and pride he felt when
he one day saw his own code, in his most active programming days, being used in a high-profile commercial context by a national retail bank chain, Sam Greenblatt vowed to do his utmost
– whenever the opportunity presented itself – to expand the overall number of talented developers who could experience such a rush. Open source innovation being unleashed in the world
of real-world business is a vision that still excites him just as much today as it did when he
accepted Sanjay Kumar’s invitation to head up, for CA, what is today formally called the Linux
Technology Group.
As CA’s senior vice president and chief architect, Greenblatt has built a tight-knit, devoted
team within CA. Such are the persuasive powers of CA’s “Mr. Linux” that, for example, at a special
96
www.LinuxWorld.com
AROUND
THE
of ownership of their information management assets.
The Linux Competency Center will
include expert technical resources and
financial services specialists. “It also houses
the capacity to test and troubleshoot
Sybase products – from database to mobile
and business intelligence applications – on
Linux,” Dr. Raj Nathan, senior vice president and general manager of the company’s
Infrastructure Platform Group, tells LWM.
Nathan explains the center is going to
be offering on-site support, and will
include a range of hardware and software
platforms from Dell, Egenera, HewlettPackard, IBM, Intel, Red Hat, and Sun. As
the first vendor to deliver an enterpriseclass RDBMS on Linux, back in 1999,
LINUXWORLD
Sybase is well placed to extend its partnership with Red Hat, too: henceforth Sybase
is to be a Red Hat Premier ISV Partner.
Sybase and Red Hat will also be working
together in the future on engineering development, training, and support, and the two
companies will exchange technology
roadmaps in order to coordinate activities.
‘Layaway Linux’ Makes Its Debut
in the Marketplace
Take IBM’s WebSphere Internet infrastructure software, stir in Linux, and add
IBM’s own advanced Power4 microprocessor – widely acknowledged to be at least a
generation ahead of competing chips – and
what you have is the single software/hardware package that Big Blue believes can
CA World session last month called “The Future
of Linux: 2.6 and Beyond,” he was able to
muster on stage not just Linus Torvalds and
Jon “maddog” Hall, president of Linux
International, but also Larry Augustin, president and CEO of VA Software, the Sunnyvale,
California-based company he founded in 1993
as a Ph.D. student in electrical engineering at
Stanford University, and also the CTO of SuSE
Linux AG, Juergen Geck. Quite a lineup.
Augustin is, like Greenblatt, a walking
testimony to the potency of collaborative
software development. He was the visionary
SAM GREENBLATT
behind SourceForge.net, the largest open
SVP AND CHIEF
source development site on the Internet. Like
ARCHITECT
Hall and Torvalds, he most likely has one or
COMPUTER ASSOCIATES
two reservations about the chalk-and-cheese,
INTERNATIONAL
oil-and-water mixture that CA’s Linux
Technology Group is championing.
Aside from this session, CA World had no fewer than 104 other sessions devoted to Linux,
from “Intelligent Consolidation: Reducing Your Total Cost of Ownership Today” to “Using IT
Resource Management Products on Linux.” All types of Linux implementation were discussed –
embedded, desktop, distributed, and mainframe.
Linux is a building to the construction of which more than 400,000 developers have brought a
stone. It is a collective endeavor that, in its next phase, is 100% certain, so far as Greenblatt and his
colleagues are concerned, to become the operating platform of first resort for business, leveraged by
Global 1000 corporations, leading ISVs, and major platform providers on a completely worldwide basis.
Linux is the product of open innovation, and it is to the successful meshing of the open-innovation model with the making of an honest profit by adding value that Greenblatt will be addressing all his considerable talents over the next 10 to 15 years – which is approximately how long it
will take, he feels, to see the demise of each and every existing software giant…with the sole
exception of forward-looking companies that, like CA, embrace the open-innovation model here
and now.
www.LinuxWorld.com
97
NEWS
and will help companies improve IT performance while simultaneously containing
costs. IBM has announced that its marketleading WebSphere Application Server will
now support IBM eServer pSeries and
iSeries machines running both Linux and
the Power4 microprocessor.
“This new packaging of a Linux-based
application server is further evidence of
how quickly the market for Linux solutions
is maturing,” says LinuxWorld Magazine
editor-in-chief Kevin Bedell. “It is similar to
Microsoft’s decision 10
years ago to bundle
Word, PowerPoint, and
Excel into an ‘Office
Suite’ – it looks like IBM is taking the logical
next step in making Linux even easier for
companies to adopt and deploy.”
IBM has also announced that the
WebSphere software will be included in a
new offering from IBM Global Financing
that will allow qualified U.S./Canadian customers to defer payments until January
2004 at no charge, or to choose special low
financing rates. “Layaway Linux” makes its
debut, in other words. The program applies
to all IBM Software products that are purchased on a one-time charge basis.
Contracts in the U.S. must be signed by
September 30, and in Canada by September
15.
“The new WebSphere software advances
IBM’s distinction as the only company that
can support customers’ use of Linux across
every major server platform,” Tom Inman,
vice president, IBM WebSphere Foundation
and Tools, tells LWM.
Whereas Microsoft Windows applications (as Inman didn’t say – but might as
well have said) can only run on Intel-based
servers. The marketplace, as it always does,
will decide.
‘Choice in Linux Distros Is
Healthy,’ Linux Experts Agree
One question on everybody’s mind
when they are thinking about Linux and
how it will fit into the enterprise mold is
whether the number of known distributions – believed to have reached approximately 130 – is helping or hurting Linux. A
handful of the Linux world’s most influential activists recently gave their viewpoints
on that issue at CA World in Las Vegas.
LinuxWorld Magazine was there.
PREMIER 2003
NEWS
Juergen Geck, CTO of SuSE Linux AG,
agreed that the question of whether Linux
was likely to fragment, until there are 50 flavors of Linux like there were 20 to 30 flavors
of Unix, is a very common one. “My take on
the issue,” he said, “is that it won’t happen
though because SuSE, for example, doesn’t
own Linux, neither does Red Hat. Whereas
Solaris exists because Sun Microsystems
tries to produce a best of breed.
“SuSE doesn’t benefit from deviating
from 2.6,” he added. “And that’s true for all
the different distro vendors.”
Jon “maddog” Hall, one of the key luminaries who has helped Linux as an OS to
the considerable heights it has already
reached today, offered a slightly different
perspective by drawing attention to the
existence of LSB, the Linux Standard Base.
“With 150 different Linux distros all made
from the same kernel and the same libraries,
what’s needed is that you have to say which
ones you are going to guarantee. So the
Linux Standard Base was an attempt to create a standard for every single architecture.”
It was in 1997 that some of the member
companies in Linux International, he
explained, saw that type of a problem, the
AROUND
THE
divergence of different distros. “So LI formed
the Free Standards Group to create standards
for each architecture and help binary compatibility. It recognizes that there can be
innovation underneath a particular standard.
The Linux Standard Base has done a very
good job of specifying a standard that can
then be innovated underneath of. It continues to grow and emerge, expanding the coverage, and as time goes on I hope that hardware will eventually say, for example, ‘needs
Intel LSB compatible 2.5 or higher’ on it.”
Linus Torvalds offered a refreshingly
quirky take on the issue, maintaining the
spirit of pioneering that has of course made
Linux what it is. “I am a huge believer in the
idea that Linux competes within itself,” he
said. “That keeps everyone honest. A lot of
these 130 distros are a little oddball – some
are only used by Bob and his 5 friends. But
that’s OK because sometimes Bob did
something right and his 5 friends become
50. Then 5,000, and so on.
“Clearly 130 distros is not practical for a
middleware vendor,” Torvalds concluded,
“so in that sense what everyone does is just
to ignore most of them, and end up with just
a few things. Even with the top 2 or 3, mind
Linux – the Poster Boy of ‘Open Innovation’
In the Spring 2003 issue of the MIT Sloan Management Review, an assistant professor at Harvard
Business School in Boston, Henry W. Chesbrough, wrote an article entitled “The Era of Open
Innovation” in which he asks the sweeping question: Is innovation dead?
His answer – that, actually, innovation is alive and well – makes mention of recent advances in the
life sciences, including revolutionary breakthroughs in genomics and cloning. But he also brings open
source software into the picture, by explaining the sea of change in the way companies generate ideas
and bring them to market, which he characterizes as a shift from a model of what he calls “closed
innovation” in which enterprises generate their own ideas, then develop, manufacture, market, distribute, and service those ideas to a new model, that of “open innovation.”
As in many other industries, in the world of software development the internally oriented, centralized approach to R&D is becoming obsolete and instead useful knowledge is widely disseminated.
New ideas must therefore be used with alacrity or they will be lost. The role of R&D extends far
beyond the boundaries of the enterprise and companies must now harness outside ideas, such as
those of the open source Linux community, to advance their own businesses
while leveraging their internal ideas outside their current operations.
That fundamental change, says Chesbrough, offers novel ways to create
value – along with new opportunities to claim portions of that value.
He has written a book in an attempt to provide a fuller description of
the open innovation model, Open Innovation: The New Imperative for Creating
and Profiting from Technology (Harvard Business Press). We suspect at
LinuxWorld Magazine that it must be on many shelves in key technology
strategists’ offices at companies such as IBM, HP, Oracle, Computer
Associates, and the like.
PREMIER 2003
98
LINUXWORLD
you, folks working in the enterprise space
find it confusing to have a choice. I always
believe ultimately that we should think of it
as being like politics. Choice in operating
systems is kind of confusing. But it is better
to have choice than not to have choice.”
How Far Can Linux Go?
LWM Asks the Experts…
Linux has come far, but how much further can it go, will it go, might it go? Is there
a “glass ceiling” to its reach?
Linus Torvalds, Open Source
Development Lab Fellow: “As to whether
there’s a ‘glass ceiling’ so far as Linux is concerned, a barrier consisting
of particular applications
that companies require and
that Linux can’t supply, I
used to think there was. I
used to think that operating
systems only worked well for
technical applications. But we passed that
point so long ago with Linux that I no
longer think there’s a glass ceiling. There
may be a practical ceiling, where you have
apps with social purpose needs. The point
of OS is to have people come together.”
Sam Greenblatt, SVP and Chief Architect,
Computer Associates International: “If there
is a limit, we haven’t seen it yet. When I see
Linux running both a
PlayStation and an automobile, and on some of the
largest institutions in the
world like Shell Oil, I don’t
know where it’s going to end.
There’s no ceiling, and no
floor either. We now have Linux on cellphones as well as Linux on six of the top ten
largest supercomputers on Earth. Success
breeds success, and Linux breeds Linux.”
Michael Evans, VP Channel Sales &
Development, Red Hat: “I have a friend who
is CTO of a tech company and his job
involves talking to large
business customers on a
daily basis. Twelve months
ago he would ‘pitch’ Linux,
because that was an objective of the company. Now he
is still doing the same thing,
but the first question he is being asked now,
before he even thinks of pitching anyone, is
‘What is your Linux story? How can you
help us get to Linux faster?’”
www.LinuxWorld.com
That’s why Ximian®
created Red Carpet™ Enterprise™,
the secure and centralized solution for enterprise
software management you deploy completely behind
your corporate firewall. It slashes your company's total
cost of ownership by automating software updating
and version control for Linux servers and desktops.
Use it with leading Linux distributions like Red Hat,
SuSE, Mandrake, Debian and more.
Red Carpet Enterprise will change the
way you look at Linux.
Learn more. Get your free copy of
"Linux Software Management 2003" at
www.ximian.com/information/mgmt3
Ximian is a registered trademark and Red Carpet and Enterprise
are trademarks of Ximian, Inc. © 2003 All rights reserved.
Enabling
Enabling Enterprise
Enterprise Linux
Linux
the Linux solution for all sizes
Linux solutions that reduce IT complexity,
Linux —
powering the growth
of your business.
Call 1-888-hplinux
to speak with an HP Linux specialist
now, or visit www.hp.com/linux.
increase agility, and deliver security all
backed by 24x7 HP support services.
Whatever your IT needs and size, HP has
a Linux solution customized to your needs.