Redmondmag.com

Transcription

Redmondmag.com
1107red_Cover.v7
10/16/07
10:00 AM
Page 1
Foley: Microsoft Spreading Itself Too Thin? 80
NOVEMBER 2007
REDMONDMAG.COM
The
Greene-ing
of VMware
Diane Greene leads
virtualization
into a new era. 40
7
25274 867 27
1
11 >
NOVEMBER • $5.95
2007 ASBPE
Award Winner
Best Editorial
Best Feature
+
Beta Man Gives ‘Katmai’ a Thumbs Up
How Big Is Your Carbon Footprint?
14
64
The Top 5 Tricks for Word and PowerPoint
49
Project3
8/13/07
10:12 AM
Page 1
Project3
8/13/07
10:13 AM
Page 2
1107red_TOC2.v7
10/16/07
3:49 PM
Page 2
Redmond
2007 Winner for Best Single Issue
Computers/Software, Training
& Program Development/Trade
The Independent Voice of the Microsoft IT Community
Contents
N O V E M B E R 2 007
REDMOND REPORT
COV E R STO RY
To
Virtualization
and Beyond
VMware’s Diane Greene is on a quest to make
server virtualization ubiquitous.
11
12 Marathon Offers
Low-Cost Fault
Tolerance Solution
14 Beta Man
SQL Server 2008: ‘Katmai’
Page 40
F E AT U R E S
Longhorn’s Terminal
Services: The
Server Manager
Page 49
49 Top 5 Tricks for Word
and PowerPoint
These flagship Office 2007 apps have
some interesting new functions, if you
know where to look.
59
Unix: The 64-Bit
Gold Standard
Page 59
6
Many say it will be years before
64-bit Windows becomes a
serious challenger.
64 Manage Your
Carbon Footprint
COLUMNS
Barney’s Rubble:
Doug Barney
Super PCs Deserve a
Super OS
Page 64
The growing importance of energy
efficiency gives IT a leadership role in
the enterprise.
REVIEWS
Product Reviews
19 LinkScanner Pro Keeps Your Computer Safe
Track computer exploits and learn how they work through LinkScanner Pro and the
Exploit Prevention Labs Web site.
Reader Review
21 Outlook 2007 Gets Mixed Reviews
While most readers like Microsoft’s latest e-mail client, some say it’s still not
ready for prime time.
Redmond Roundup
29 Automating the Desktop
Making your job easier, one tool at a time.
16 Mr. Roboto:
Jeffery Hicks
Power Up Your
GPO Management
70 Windows Insider:
Greg Shields
VM Within a VM
74 Security Advisor:
Joern Wettern
The Weakest Link
80 Foley on Microsoft:
Mary Jo Foley
Spreading Itself Too Thin?
A L S O I N T H I S I S S U E 4 Redmondmag.com | 8 [email protected] | 78 Ad and Editorial Indexes
COVER PHOTO BY RYAN NOTCH
Project5
10/4/07
9:41 AM
Page 1
1107red_OnlineTOC_4.v3
10/16/07
10:33 AM
Page 4
Redmondmag.com
NOVEMBER 2007
RedDevNews.com
Q&A: Programming in
the Multi-Core Age
W
hen it comes to multi-core processing, Intel Corp.’s
James Reinders
James Reinders says the time to move is now: “My
analogy is, if you thought someone might be coming over to your house but
you weren’t sure, would you pick it up and clean it up a little bit? Well, if you
had a serial processor, you would wait until the doorbell rang to clean your
house up. And you’d hang a little sign on the front door that says ‘Please wait,
I’m cleaning the house up.’”
Read more of Reinders’ perspective (including tips and tools for a smooth
transition) in this RDN Q&A. FindIT code: RDNQRein
You can also catch up with RDN’s past Q&As, including luminaries like
John A. Zachman, C. Wayne Ratliff, Anders Hejlsberg, Dan Bricklin and
many others. FindIT code: RDN Q&A
Redmondmag.com Special Report
Storage Management
in the New Millenium
T
here’s more (and cheaper) options for storage every day. But there’s
also more to store—and more risk if something goes wrong.
Experts say there’s nothing more important when creating a new storage
architecture than planning. “It’s about prioritization more than anything,”
comments Jason Buffington, senior technical product manager at
Microsoft’s Windows Storage Solutions Division.
See what else Buffington and the other storage gurus we interviewed
have to say about the future of IT storage in this Redmondmag.com special
report. FindIT code: StorMil
REDMONDMAG.COM RESOURCES
Resources
Enter FindIT Code
>> Daily News
>> E-Mail Newsletters
>> Free PDFs and Webcasts
>> Subscribe/Renew
>> Your Turn Editor Queries
News
Newsletters
TechLibrary
Subscribe
YourTurn
Questions with ...
Paul Marsala
Listen to Michael
Domingo’s interview with
Paul Marsala of Peer
Software on Redmond Radio.
FindIT code: PeerRadio
What shortcomings of DFS
Paul Marsala
should admins be aware of?
DFS lacks a central feature important
for collaboration: file locking. Also, DFS
replication typically works on a single
threaded, “pull” process, so sync tasks
can “queue” up and create a backlog—
another time delay.
What’s the biggest misconception
admins have about file replication?
That it’s easy. Introduce real-time
replication and multiply a bunch of
processes across an enterprise and what
may have seemed simple no longer is.
Your company says to “Think Enterprise.
Act Peer.” Explain.
Many people think peer and enterprise
are mutually exclusive. Every relationship
between any computer is, when you boil
it down, a peer relationship. Our goal is
to dispel the misguided notion that peer
file management solutions aren’t
“enterprise grade.”
What are
FindIT codes?
Throughout Redmond, you’ll
discover some stories contain FindIT
codes. Key in those codes at
Redmondmag.com to quickly
access expanded content. FindIT
codes are not case sensitive.
Redmondmag.com • RCPmag.com • RedDevNews.com • VisualStudioMagazine.com
MCPmag.com • CertCities.com • TCPmag.com • ENTmag.com • RedmondEvents.com • ADTmag.com • ESJ.com
4 | November 2007 | Redmond | Redmondmag.com |
Project2
7/16/07
9:58 AM
Page 1
Access Begins with Identity
Two-Factor Authentication.
Built for Windows.
Secure Computing®’s SafeWord® two-factor authentication lets you successfully
identify, control, and verify network user access for both remote and internal
connections. SafeWord is designed for Microsoft Windows environments to
provide secure one-time passcodes for secure network and application login.
“SafeWord is just about the
easiest product to manage in
this group, particularly for
Microsoft-based servers.”
– SC Magazine Group Test,
Two-Factor Authentication, 9/06
Introducing SafeWord MobilePass
Convenient and Secure Authentication
SafeWord MobilePass® generates one-time
• Prove user identity for VPNs, Citrix,
Webmail, and Outlook Web Access
passcodes right on your favorite mobile phone,
including BlackBerry, Palm, Windows Mobile,
• Designed for Windows environments with tight
integration with Microsoft Active Directory
and J2ME-enabled devices.
• Range of token form factors to meet your needs
• Tokens never expire!
To learn more or to request a FREE trial, visit:
www.securecomputing.com/goto/sw
or call Secure Computing at 1-800-379-4944
Web Gateway Security • Messaging Gateway Security • Network Gateway Security • Identity and Access Management
Regain control of your
IM and e-mail messages,
inbound and outbound.
Protect your organization
against evolving Web 2.0 threats.
Deploy future-proof firewalls for
the unpredictable internet.
Create a remote access
environment you can trust.
your trusted source
for enterprise security™
©2007 Secure Computing Corporation. All Rights reserved. All trademarks and logos are the property of their respective owners.
1107red_Rubble6.v7
10/16/07
3:41 PM
Page 6
Barney’sRubble
by Doug Barney
Redmond
THE INDEPENDENT VOICE OF THE MICROSOFT IT COMMUNITY
R E D M O N D M AG .CO M
N OV E M B E R 2 0 07
Super PCs Deserve a Super OS
■
VO L . 1 3
■
N O. 1 1
Editor in Chief Doug Barney
Editor Ed Scannell
Executive Editor, Features Lafe Low
Executive Editor, Reviews Peter Varhol
Managing Editor Wendy Gonchar
F
or decades Moore’s law stood and the density of
transistors doubled every two years—just like Gordon
predicted 30 years ago.
But even as we regularly doubled our
transistor counts, the chips remained
based on a monolithic, single microprocessor model.
Now the hardware geniuses are
adding some
pretty wild twists.
We all know
about multi-core
processors (an
area where AMD
has been nicely
assertive). By
2015, Intel says it
could have processors boasting hundreds of cores.
The graphics
chipmakers are
doing even wilder work. NVIDIA
recently announced a new line of Tesla
boards (I’m not sure if these are named
after the bad ’80s hair band or the inventor of the AC/DC current) that come
with as many as 128 parallel processors.
My annoyance is overshadowing my
excitement. Software historically has been
able to sap the strength of the fastest new
chips. But let’s face it. Much of this software was bloatware doing things we
never asked it to do in the first place.
Now hardware is firmly in the lead.
Even the cycle-sucking combo of
Windows and Office will have a hard
time stressing an AMD quad-core,
Tesla-equipped PC.
Unfortunately, my last point is purely
theoretical. Right now, Windows is
designed mostly to exploit our old style
of processing. To truly exploit PC-style
supercomputing, brush up on your C
programming skills. Many of these sys-
tems are built for scientists and engineers who don’t mind getting down and
dirty with code.
Microsoft can
solve this problem,
but it involves
changing the very
way software is
written against
Windows. First it
has to get over its
fear of 64-bit and
go nuts supporting
state-of-the-art
processors. And not
just Opterons and
What would
Athlons and ItaniCray say?
ums (remember
that one?), but the
Power6 processor,
which can now boast the world’s fastest
microprocessor and drives the fastest
server and supercomputer as well.
Microsoft, especially Microsoft
Research, is working on these problems.
These efforts seem way more aimed at
specialized applications, rather than
transforming the fundamental way
Windows works with back-end hardware.
However, there are companies built to
solve this. Google recently bought
PeakStream (perhaps to optimize its
own server farms). While I don’t see
Google apps as a threat to Redmond, if
it can promote a PeakStream API to
developers, our old friend Windows
could be very much under siege.
Whether Google or Microsoft take the
plunge, either way we may eventually be
able to reinvent what PCs are capable of!
What kind of computer power are you
jonesin’ for? Let us all know by writing
[email protected]. —
6 | November 2007 | Redmond | Redmondmag.com |
Associate Managing Editor Katrina Carrasco
Editor, Redmondmag.com Becky Nagel
Online News Editor Keith Ward
Associate Editor, Web Gladys Rama
Contributing Editors Mary Jo Foley
Jeffery Hicks
Greg Shields
Joern Wettern
Art Director Brad Zerbel
Senior Graphic Designer Alan Tao
President Henry Allain
VP, Publishing Matt N. Morollo
VP, Editorial Director Doug Barney
VP, Conferences Tim G. Smith
Director, Marketing Michele Imgrund
Executive Editor, Michael Domingo
New Media
Executive Editor, Becky Nagel
Web Initiatives
Director, Rita Zurcher
Web Development
Senior Marketing Tracy S. Cook
Manager
Marketing Programs Videssa Djucich
Manager
President & CEO Neal Vitale
CFO Richard Vitale
Executive VP Michael J. Valenti
Managing Director, Dick Blouin
Events
VP, Financial William H. Burgin
Planning & Analysis
VP, Finance & Christopher M. Coates
Administration
VP, Audience Marketing Abraham M. Langer
& Web Operations
VP, Erik Lindgren
Information Technology
VP, Print & Mary Ann Paniccia
Online Production
Chairman of the Board Jeffrey S. Klein
Reaching the Staff
Editors can be reached via e-mail, fax, telephone or mail.
A list of editors and contact information is available at
Redmondmag.com.
E-mail: E-mail is routed to individuals’ desktops. Please use the
following form: [email protected].
Do not include a middle name or middle initials.
Telephone: The switchboard is open weekdays 8:30 a.m.
to 5:30 p.m. Pacific Time. After 5:30 p.m. you’ll be directed
to individual extensions.
Irvine Office 949-265-1520; Fax 949-265-1528
Framingham Office 508-875-6644; Fax 508-875-6633
Corporate Office 818-734-1520; Fax 818-734-1528
The opinions expressed within the articles and other contents
herein do not necessarily express those of the publisher.
PHOTO ILLUSTRATION BY ALAN TAO
Project2
7/16/07
2:18 PM
A
nyone who has given birth to an Exchange
network knows it can get sick and needs
some nursing to stay healthy. In fact, 72%
of Exchange Administrators surveyed* have
“experienced” an Exchange disaster (feels
like the flu)—usually from improper feeding
and care.
Like many databases, constant adding and
deleting can corrupt an Exchange data file
so it eventually turns sour. Replicating,
archiving and backing up the data doesn’t
stop the stink—it just stores it. You’ve
got to…
Fix the Problem
You may have tried the free utilities to fix
Exchange. While they help, they are too
tedious, time consuming and lightweight to
keep your Exchange baby healthy. You’ve
tried the milk, now try some meat!
Prevent Hiccups
GOexchange removes errors, warnings and
inconsistencies within the database—before
major corruption makes the database fail.
“GOexchange corrected 2,264 errors
and 26 warnings.”
Paul Ramos, Director IT
In addition to fixing the database,
GOexchange removes sluggishness and
improves performance by re-indexing and
defragmenting the database to permanently
remove white space and deleted items. The
end result is increased performance and
stability with a compact efficient database
that’s 31 to 55% smaller! Combine this
with archiving and the database is up to 91%
smaller—making it much quicker to backup.
“..our information stores were reduced
“Without routine maintenance,
decreasing performance,
increased warnings and
errors accumulate and
database fragmentation
transpires, leading to
Exchange disasters.”
Created By
Run, Don’t Crawl
Pamper Yourself with GOexchange by 45-50%.”
It’s time to try GOexchange, from Lucid8,
the #1 best-selling automated disaster
prevention and optimization software for
Microsoft Exchange 5.5, 2000, 2003 and
2007. As the mother of all Exchange tools,
GOexchange helps prevent disasters, repair
problems, improves performance, and
saves you a lot of time.
!
ER
LL
SE
Tired of Nursing
Your Exchange
Server?
ST
BE
#1
...
Page 1
Dale Huitt, Systems Lead
Automated Babysitter
First, GOexchange is easy to setup and use.
Twenty minutes—that’s all it takes to get
your server up and running. Just schedule it,
and walk away!
The software notifies the users, validates
the database, runs the backup, conducts
a comprehensive system analysis and
diagnostics, logs the errors, and notifies you
if it discovers a “stop” error—then it repairs
and defragments the database, generates a
thorough report and schedules the next event.
You can do some of this work yourself, but
why waste time doing repetitive maintenance,
when GOexchange can do it for you—faster
and more effectively than doing it by hand.
Solutions Inspiring Confidence
“Life before GOexchange…was
an absolute nightmare, late nights,
long weekends and upset users.”
Marty Grogan, CTO
Stop The Crying
Why not call now, or visit our resource
site and learn how to reduce the risk, and
avoid the pain. Protect your exchange data,
maximize performance, and spend a weekend
at home—instead of babysitting Exchange.
Special Offer
• Free Software for analysis of your
Exchange server!
• Free White Paper—“Basic Feeding
of Your Exchange Server.”
• Free Essential Guide to Exchange
Preventative Maintenance
Go to: www.Lucid8.com/GoRED
Call 425.456.8477
E-mail: [email protected]
Copyright © 2007 Lucid8. All rights reserved. Microsoft® Exchange Server is a registered trademark of Microsoft® Corporation. All other trademarks are the property of their respective owners. * Refers to Survey conducted by Lucid8. See press release for more details.
1107red_Letters8.v4
10/16/07
10:39 AM
Page 8
[email protected]
Not at Home with Windows Home Server
Regarding Mary Jo Foley’s August 2007 column (“Microsoft’s
iPhone?”) I’m really curious where Microsoft thinks they’re
going with Windows Home Server (WHS). I mean, do they really
think they’re going to enable everything in ASUS gear for less
than $200? I’m pretty sure they aren’t going to be able to do that.
So, what do they bring to the table? Maybe digital rights
management (DRM) and proprietary formats. This sounds more
like something they would sell to content providers rather than
content users (who certainly don’t want DRM, as they obviously
don’t care about proprietary formats yet). Maybe it’s another run
at the “set-top box”?
I suppose they could sell this on the
basis that it’s a home server for people
that don’t know much about networking. My ASUS box was pretty simple
to set up, but I also know to change
the default SSID and enable encryption on my wireless router, so that puts
me way ahead technically of most people. (I have a friend whose exact words
were “I have wireless?” Yes, and it’s
wide open and unencrypted.) Maybe
this is being targeted.
Still, someone is going to have to
know where to plug the cable. I guess
my point is, if you know about the concept of servers, you will be beyond
WHS from the get-go. Just buy a NAS
and be done with it.
Hans Fairchild
Paso Robles, Calif.
I enjoyed Foley’s article about WHS. I
have a question, though, with Windows
Server 2003 and the like: You create a
domain and then on the desktop PC
you go into the Control Panel, click on
“System” and then “Computer Name”
to add the PC to the domain. However,
Windows XP Home Edition and
Windows Vista Home Standard and
Home Premium don’t have the ability
to connect to a domain. My question
is: How would one connect to WHS?
Do you have to have XP Professional
or a version of Vista other than the
Home versions?
If so, I can’t see a home user spending
the money to upgrade their desktops
and then buying WHS. Perhaps WHS
has an upgrade that you run on the
Home versions to give them the ability
to connect to WHS.
Can you imagine the uproar from
users of any of the Windows Home
versions should they buy WHS only to
find out that they can’t use it because
their version of Windows won’t conNeil Ragone
nect to it?
Titusville, Fla.
Hot Debate over Certs
One more thought about the value of a
cert [see “Redmond’s Top 10 Hot Certs
for 2008” (September 2007)]:
There’s a huge spectrum of
topics to consider when
trying to become a
valuable developer.
What do you focus
on first? Certs can
provide a useful syllabus for organizing
and directing your selfstudy as well as a barometer
for judging progress. Leverage the
“Skills Being Measured” section from
8 | November 2007 | Redmond | Redmondmag.com |
the Preparation Guide for each
Microsoft cert by using it to keep track
of the vast amount of vocab, notes and
code that you’ll gather while studying.
Properly harvested, these breadcrumbs
can then be presented to potential new
employers as real and detailed evidence
of what you have done and can do.
Greg Pugh
Research Triangle Park, N.C.
Where’s VMware Certified Professional
(VCP)? You’re telling me—with all the
talk about virtualization—that VCP isn’t
even listed? While I understand that this
magazine is Microsoft-centric, if you’re
going to include CCNP then you should
also include VCP. Like it or not,
VMware is here to stay and Microsoft
has no comparable product to VMware
Doug Smith
Infrastructure 3—yet.
Upstate New York
As for Microsoft Certs,
you missed some that
are hard to get and very
valuable: the Microsoft
Dynamics Certifications
for Dynamics GP and
Dynamics CRM or
Dynamics AX.
Curt Spanburgh
San Diego, Calif.
Project3
8/6/07
4:16 PM
Page 1
MULTIPLY MOBILE SECURITY
AND MAXIMIZE CONFIDENCE.
INTRODUCING NEW INTEL® CENTRINO® PRO PROCESSOR TECHNOLOGY.
Deploy security upgrades to notebooks remotely, even if they’re powered off.* Automatically isolate an
infected notebook before it infects other devices. With 64-bit capable Intel Centrino Pro processor technology,
powered by the Intel® Core™2 Duo processor, you multiply your power to manage your systems.
Learn more about why great business computing starts with Intel inside. Visit intel.com/centrinopro
*Intel® Active Management Technology requires the platform to have an enabled chipset with connection to a power source and corporate network. Capabilities may be limited on battery power, hibernating or
powered off. Learn more at intel.com/technology/manage/iamt/ ©2007 Intel Corporation. Intel, the Intel logo, Intel. Leap ahead., Intel. Leap ahead. Logo, Intel Centrino, Centrino, Intel Core and Core Inside are trademarks
of Intel Corporation in the United States and other countries.
Project5
10/8/07
11:07 AM
Page 1
:067&/&7&34&&/"3&1035%05)*4#&'03&
%&':5)&-"840'3&1035*/(
1VUOFXQPXFSJOUIFIBOETPGCVTJOFTTVTFST
&NQPXFSUIFNUPNBLFNVMUJQMFEFDJTJPOTGSPNPOF
SFQPSUSVOUIFJSPXO²XIBUJG³TDFOBSJPTBOEHFUNPSF
SFQPSUWJFXTJOTUBOUMZ4PZPVµSFGSFFGSPNXSJUJOH
OVNFSPVTSFQPSUTBOEVQEBUFT±UBTLTUIBUDBOIBWF
SFBMJNQBDUPOZPVSEFQBSUNFOUµTQSPEVDUJWJUZ
1VUOFXQPXFSJOZPVSPXOIBOET8SJUFSFQPSUTXJUI
TUVOOJOHOFXWJTVBMTMJLFFNCFEEFEWJEFPBOE
FOSJDIFEHSBQIJDT$SFBUFDPNQFMMJOHBOEFOHBHJOH
JOUFSBDUJWFFYQFSJFODFTGSPNBOZEBUBBOZXIFSF
%JTDPWFSUIFOFXMBXTPGSFQPSUJOHGSPN$SZTUBM3FQPSUT±UIFUSVTUFEJOEVTUSZTUBOEBSE
7JTJUCVTJOFTTPCKFDUTDPNEFGZUIFMBXTPSDBMM
$PQZSJHIU‰#VTJOFTT0CKFDUT4""MMSJHIUTSFTFSWFE
1107red_RedReport11-14.v5
10/16/07
10:41 AM
Page 11
RedmondReport
Longhorn’s Terminal Services:
The Server Manager
Simplifying the installation and configuration of Windows Server 2008.
By Greg Shields
This is the second installment of a five-part
series by contributing editor Greg Shields,
which takes a close look at Microsoft’s
upcoming Windows Server 2008 operating
system, commonly referred to as Longhorn.
This installment examines the new capabilities of Terminal Services.
If you’ve played with Windows Server
2008 at all, you’ve likely noticed its new
Server Manager. Although a little complicated to get used to, where Server
Manager shines is in its centralization of
much of the installation and initial configuration of Server 2008 services.
Server Manager is brought up on the
initial logon by an administrator or by
right-clicking Computer and choosing
Manage. If you’re used to the old Computer Manager screen you’ve seen since
the Windows of old, this one will strike
you in how different it really is. To
enable Terminal Services, you need to
first right-click the top Server Manager
node and select Add Role.
Server 2008 does a much better job
than previous versions of Windows in
terms of componentizing the various
Citrix Published Apps
in Terminal Services
The Drive to
Longhorn
port that role. Often, a Role requires
one or more Role Services as dependencies before it can be installed. Each
Role also has a number of Features that
can augment that role. For our example, we see the following:
• Role: Terminal Services
• Role Services: Terminal Services,
TS Licensing, TS Session Broker,
TS Gateway and TS Web Access
• Features: TS RemoteApp Manager
In order to enable a minimal installation of Terminal Services, you’ll need to
enable the Terminal Services Role and
Role Service as well as the TS Licensing Role Service. If you want to manage
remote applications, you’ll need to
enable the TS RemoteApp Manager.
It sounds complicated, but the engine
does a relatively good job of telling you
which components must be installed for
the Role to function as you want.
TS RemoteApp adds the ability to publish a specific application to
your users. Combined with TS Web Access, you’ll see that this new
functionality is Server 2008’s killer feature.
Windows services you would normally
install onto a server. If you don’t enable
the service, the bits aren’t there. This
helps reduce the attack surface of the
server and increases its security profile.
Services are now broken down into
Roles, Role Services and Features, with
Roles generally encompassing “what
you want the server to do” and Role
Services being the processes that sup-
Once the initial installation is complete, Server Manager will contain our
old friends Terminal Services Manager
and Terminal Services Configuration,
as well as the new menu item TS
RemoteApp Manager. Unlike previous
versions of Windows, where we had to
go to multiple places to manage our Terminal Server configuration, nearly all of
it’s done now within this single interface.
For years one of the biggest draws to the
Citrix platform has been its ability to
securely publish not only Windows
desktops, but seamless Windows applications as well. Now with Server 2008,
you get that functionality in the box and
for no extra charge.
TS RemoteApp adds the ability to
publish a specific application to your
users. Combined with the TS Web
Access functionality that we’ll talk
about in the final part of this series,
you’ll see that this new functionality is
Server 2008’s killer feature. If anything,
this alone may drive your upgrade to
Server 2008 faster than any other.
What is TS RemoteApp? Add the
Terminal Server role to your Server
2008 system, then the TS RemoteApp
Manager Feature. You’ll see a new configuration window in Server Manager
that gives you the ability to identify the
initial executable for common applications and then create RemoteApps from
them. From this configuration screen,
you can publish those applications to a
Web page using TS Web Access. This
means your users need only go to their
Web Access Web page to get all of their
applications and they’ll appear like
they’re running locally. The result looks
more-or-less exactly like Citrix’s implementation of Seamless Windows.
To create a new RemoteApp, simply
right-click on the TS RemoteApp Manager and choose Add RemoteApps. All
installed applications on your system
that can be enumerated via WMI will be
displayed for you to select. If your application isn’t listed, you can click the
Browse button to select an application
or customize an existing one with execution switches. Click Finish to complete.
| Redmondmag.com | Redmond | November 2007 | 11
1107red_RedReport11-14.v5
10/16/07
10:41 AM
Page 12
RedmondReport
Once the application is created, there
are four ways to deploy that application
to users. First, as discussed above, you
can publish that app through TS Web
Access. You can also create and deploy
an .RDP file or install it via an .MSI
file. Lastly, you can associate a filename extension with a RemoteApp.
Interestingly enough, the GUI for the
RDC currently doesn’t support connecting to a RemoteApp unless you
double-click a pre-generated .RDP file.
But, using a combination of the mechanisms above, you can deploy applications behind the scenes to your users
and centralize your application support
back on your Terminal Servers.
the same interface for printer properties
they’ve always seen with their local
driver. In fact, the UI used to configure
that printer is actually run from the
client machine. Clicking print creates
an XPS print job on the server that is
pushed down to the client.
Now, obviously there are going to be
some environments where this isn’t the
optimum configuration. If the print
server is close in network proximity to
the Terminal Server instead of the
client, then that job will need to tra-
verse the network twice. Citrix has a
built-in mechanism for configuring
local printing on the Citrix server for
these sorts of scenarios. But for most
configurations, the printer is usually
located right next to the client and away
from the Terminal Server. So, most of
us will appreciate this new feature. —
Greg Shields ([email protected]),
MCSE: Security, CCEA, is a principal consultant for 3t Systems (www.3tsystems.com)
in Denver, Colo.
Easy Print Is Easy
Marathon Offers Low-Cost
Fault Tolerance Solution
No matter how users traditionally got
their applications, printing and printer
drivers have long been the bane of
Terminal Services administrators. The
pain of keeping the right drivers on the
right servers—while hoping and praying
that none of them would cause the
dreaded blue screen of death—has kept
many an admin awake at night. With
previous versions of Terminal Services, it
was critical that the device driver on the
server matched the one installed on the
client. With driver names all over the
place, ensuring that one-to-one mapping
was correct often ended up in failure.
With Windows Vista and Server 2008,
a big portion of this pain goes away. In
Server 2008’s Terminal Services, the
administrator no longer needs to install
drivers onto the Terminal Server. This
functionality works due to the incorporation of the new XPS print path built
into Vista. That print path, combined
with the ability to redirect the printer
device down to the client, means that
the user can utilize their local print
drivers to print to remote printers.
Because the XPS print path is available
by default on every Vista client, print
jobs can be redirected with a maximum
amount of confidence.
What does this look like to the client?
When a client uses Vista to connect to a
Server 2008 Terminal Server and clicks
to view their print properties, they’ll see
By Peter Varhol
n a unique combination of fault tolerant computing and virtualization,
Littleton, Mass.-based Marathon
Technologies Corp. has developed a
low-cost fault tolerant solution that utilizes standard hardware while supporting virtualized servers. The company’s
technology stretches a virtualization
layer across two identical servers running Windows Server. This layer takes
any interaction with the OS or its application and duplicates it across the two
servers. Also, server processors run in
lockstep with each other, thereby
returning identical results simultaneously. If one server fails at any point,
the results from the second server are
used alone.
Marathon owns several patents on
the technology behind enabling the
processors on separate servers to
execute in lockstep. Think about it: If
one of the servers goes down, not a
single processor cycle is lost. Most
fault tolerant solutions work by doubling up on system hardware, but are
unable to maintain accuracy down to
the level of a single processor cycle in
the event of a failure.
This is impressive, but it’s not where
the virtualization comes in. At the
recent VMworld conference, Marathon
won the Best of VMworld Award for
I
12 | November 2007 | Redmond | Redmondmag.com |
New Technology. This technology,
called everRun for XenSource’s
XenEnterprise v4, provides the ability
to do the same level of fault tolerance
not across two physical servers, but
across two separate virtual machines
(VMs). Those VMs run on two separate servers, so that if one fails, the VM
running on the second physical server
provides the same processor cycle
accuracy for the running applications.
This also works for multiple VMs
running on one physical server, paired
with identical VMs running on another
physical server, or the collection of
paired VMs that can be running on
several different servers. Marathon’s
everRun requires a dedicated gigabit
Ethernet connection between the two
servers and a guaranteed 10ms
response time across the connection.
This means that the physical servers
can be geographically separate.
Marathon officials say the longest distance between servers in a customer
deployment is about 100 miles.
Perhaps the best news is that
Microsoft considers those paired identical Windows Server installations,
executing in lockstep, to be a single
Windows Server license. The Windows
Server installation is actually the same
instance, duplicated across separate
physical boxes.
Project3
4/16/07
2:56 PM
Page 1
1107red_RedReport11-14.v5
10/16/07
10:41 AM
Page 14
RedmondReport
BetaMan
By Peter Varhol
SQL Server 2008: ‘Katmai’
Another step on the road to integrated
data and applications.
I
n 1912, Katmai, an active volcano on
the Alaska Peninsula, imploded over
a period of three days in the most
violent eruption of the 20th century. In
the process it lost its peaks as they subsided into the void left by escaping lava,
and had a large lake form in its caldera.
This is a rather unusual legacy for
Microsoft to use as a code-name for its
upcoming SQL Server 2008, which is
available as a beta download.
Key Improvements
Microsoft lists four areas of improvement and enhancement for SQL Server
2008: mission-critical platform, dynamic
development, beyond relational data and
pervasive business insight. It was a bit
difficult for me in a brief test to look at
how Katmai may be a mission-critical
platform—especially in beta form—but
I did take a closer look at development
and data management.
It doesn’t do a lot of good to touch on
SQL Server without talking about what
it does for developers, so I also installed
the Visual Studio 2008 beta.
One technology enabled by the use
of the .NET Framework 2.0 is the
ADO.NET Entity Framework. This
Framework enables developers to
work with logical data entities that
have a meaning within the context
of the application, instead of accessing
data directly with database tables
and columns.
Language Integrated Query (LINQ)
also fits in here. The new LINQ extensions to the .NET Framework and languages extend Visual C# and Visual
Basic .NET to support a SQL-like
query syntax natively. You write your
query directly into your code, using
data access constructs. It does away
with the need to write SQL directly in
the application code.
And, of course, you have the whole
.NET Framework to work with here.
That supports the ADO.NET Entity
Framework, but also enables you to
write .NET code on the database
server. While it’s not yet a substitute for
T-SQL for triggers or stored procedures, it does provide a level of flexibility in integrating applications and data
not available with other databases.
SQL Server 2008 enables
developers to work with
and manage any type of data
in their apps, from traditional
data types to advanced
geospatial data.
To Relational and Beyond
Most database management systems
have to deal with more than textual and
numerical data arranged in rows and
tables. They have to be able to organize, store and retrieve geographical
data, music clips, videos and all the part
and parcel that make up business and
personal life.
SQL Server 2008 enables developers
to work with and manage any type of
data in their apps, from traditional data
types to advanced geospatial data. The
new FILESTREAM data type allows
large binary data to be stored directly in
an NTFS file system while letting the
data remain an integral part of the database and maintaining transactional con-
14 | November 2007 | Redmond | Redmondmag.com |
sistency. The database also enables
applications to model tree structures in
a more efficient way.
Despite all of the improvements for
developers, perhaps the most farreaching improvement surrounds data
protection. SQL Server 2008 enables
encryption of an entire database, data
files and log files, without the need for
application changes. This feature alone
helps it in its goal of being a trusted
platform for mission-critical applications and data storage.
SQL Server 2008 offers support for
occasionally connected applications by
using a synchronization mechanism
that enables synchronization across
applications, data stores and data types.
It lets you create occasionally connected
applications using Visual Studio by way
of new synchronization services in
ADO.NET and offline designers in
Visual Studio. It also provides support
for change tracking, so that there’s no
surprise when a data store is modified
when a disconnected application
re-accesses the database.
It’s unlikely that Katmai will be an
implosion on the scale of the volcanic
eruption of almost a hundred years
ago. In fact, it shouldn’t be an implosion at all. SQL Server 2008 should
see ready adoption as a replacement
for earlier versions of SQL Server, as
well as more gradual use for new
database installations in applications
that require data encryption and
nontraditional data-management
along with support for occasionally
connected applications. —
Peter Varhol ([email protected])
is Redmond’s executive editor of reviews.
Project4
10/15/07
2:32 PM
Page 1
defeating witches.
easy.
defeating worms.
easier.
1. Boil, bubble, toil, and trouble.
Witches are big with brews. Why not
make one of your own to use against
them? Sure, eye of newt is tough to
find at the local market, but it’s
probably available online.
1. Implement Microsoft Forefront.
®
2. Melt the Witch.
You’ve seen the film so you know the big ending. A bucket of water,
poured directly Witchward, causes her to steam, melt, and dissolve into
a puddle on the floor. Lure her to the watercooler and you’re done.
TM
Forefront makes defending your systems easier. It’s a
simple-to-use, integrated family of client, server, and
edge security products (such as ISA Server 2006)
that helps you stay ahead of your security threats
more easily than ever.
For case studies, free trials, demos, and all the latest
moves, visit easyeasier.com
3. Fight magic with magic.
With a wand of your own—
say a pointer—you can create
some magic of your own.
Before you know it, you’ll be
turning Witches into toads.
4. Insult the Witch.
Witches, despite their warty
exteriors, are quite sensitive.
So asking “Hey, Witch—is that
your nose or a green banana?”
can be devastating.
5. Steal her broom.
Nearly every Witch has a magic
broom, and if you can get it away
from her she’s basically grounded.
And, with a little practice, you can
cut your commute in half.
1107red_Roboto16.v5
10/16/07
10:42 AM
Page 16
Mr. Roboto
Automation for the Harried Administrator | by Jeffery Hicks
Power Up Your GPO Management
G
roup Policy management can be a full time job.
Group Policy Management Console (GPMC) no
doubt made your life much easier, especially if you
had a scripting background. You could create scripts to
leverage the GPMC object model. “Advanced VBScript for
Windows Administrators” (which I cowrote with Mr. Roboto emeritus Don
Jones) has a chapter devoted to that topic.
While GPMC is great, the release of
PowerShell gives a few more options.
The “GPO Guy,” Darren Mar-Elia, has
just released two free PowerShell
cmdlets: Get-SDMGpo and NewSDMGpo. You can download these
cmdlets from GPOGuy.com. Be sure to
read the online instructions carefully.
The first cmdlet lets you retrieve a
Group Policy Object (GPO):
PS C:\> get-sdmgpo "default
domain policy"
DisplayName
: Default
Domain Policy
Path
:
cn={31B2F340-016D-11D2-945F00C04FB984F9},cn=policies,cn=
system…
ID
: {31B2F340016D-11D2-945F-00C04FB984F9}
DomainName
:
company.local
CreationTime
: 7/28/2006
10:11:18 PM
ModificationTime
:
7/29/2006 11:17:24 AM
UserDSVersionNumber
:1
ComputerDSVersionNumber : 3
UserSysvolVersionNumber : 1
ComputerSysvolVersionNumber : 3
As you can see, there’s some useful
information here. You just can’t do
much in terms of configuring individual
Group Policy settings with this cmdlet.
This cmdlet also requires that you
install the GPMC so it can take advantage of the GPMC object model. This
means you can use it for tasks like
backing up, copying, enabling or disabling user or computer nodes, and
creating reports:
PS C:\> new-variable -name html value 1 -option Constant
PS C:\> $gpo= get-sdmgpo
"Default Domain Policy"
PS C:\> $gpo.GenerateReport
ToFile($html,"c:\DefaultDomain
.htm")
In this example, I first define a constant—$html. I’ll use this in the
GenerateReportToFile() method on
the third line. The method requires a
report type and destination file.
Because the cmdlet returns objects, I
can take advantage of the pipeline. For
example, suppose I want find all my
GPOs where the user node is disabled.
I would use an expression like this:
PS C:\> get-sdmgpo * | Where
{$_.IsUserEnabled() -eq $false } |
select Displayname
Or here’s how I might find all GPOs
modified since Aug. 1, 2007:
PS C:\> get-sdmgpo * | Where
{$_.ModificationTime -ge
'08/01/2007' } | select Display
name,ModificationTime
The New-SDMGpo cmdlet creates a
GPO “shell.” You can do basic GPO
tasks like disabling the computer configuration node or setting security. To
16 | November 2007 | Redmond | Redmondmag.com |
really manage GPOs in PowerShell
though, you’ll need a copy of the
GPExpert Scripting Toolkit. This
toolkit consists of a rather complex
cmdlet called Get-SDMgpobject.
The Get-SDMgpobject cmdlet lets
you automate individual setting management within Group Policy. You can
use Get-SDMgpobject to get access to
any setting within GPO in Active
Directory or local GPO on any network computer. Even if you don’t have
AD, you can use this tool to manage
local Group Policy settings.
I don’t have space to show you everything you might accomplish with this
cmdlet. The Scripting Toolkit has a
great help file with many examples.
The more you work with it, the more
you’ll find it a valuable addition to
your toolbox, especially if you spend a
lot of time creating, modifying and
managing GPOs.
The GPExpert Scripting Toolkit is a
commercial product, developed by
Darren Mar-Elia and offered through
SDM Software Inc. You can register
for a demo at www.sdmsoftware.com.
The software is licensed per user at
what I think is an extremely reasonable price, so even a small-to-midsize
shop will find it affordable.
Using this product in conjunction
with free Group Policy cmdlets will
add some real power to your Group
Policy management. —
Jeffery Hicks ([email protected]),
MCSE, MCSA and Microsoft PowerShell
MVP, is a scripting guru for Sapien
Technologies. Jeffery is a 16-year IT
veteran who has authored and co-authored
books, courseware and training videos on
administrative scripting. His latest book is
“WSH and VBScript Core: TFM”
(Sapien Press, 2007).
Project2
4/24/07
4:43 PM
Page 1
Project2
10/16/07
12:47 PM
Page 1
Build your website now for success
in the New Year!
$50 *
OFF!
At 1&1, we offer affordable
web hosting plans for every
customer and budget. Set
goals for your business next
year and let our website
solutions help you achieve
them.
First Year
Yahoo!
Sign up today and improve
your business with 1&1.
BUSINESS
STANDARD
PREMIUM
3
1
$1.99 /year with purchase
Included Domains
Web Space
250 GB
10 GB
200 GB
2,500 GB
400 GB
2,000 GB
2,500 IMAP or POP3
500 POP3
2,000 POP3
2 GB
Unlimited
10 MB
Extra charge applies
Website Builder
18 Pages
Freeware
Flash Site Builder
18 Pages
–
–
Photo Gallery
Monthly Transfer Volume
E-mail Accounts
Mailbox Size
Search Engine Submission
Don´t wait! These
specials are only
valid through 2007!
DOMAINS
NS
only
.biz 2
$
99
RSS Feed Creator
–
$4.99 /month
Ad-free Blog
Freeware
Map & Driving Directions
Dynamic Web Content
–
–
Web Statistics
E-mail Newsletter Tool
$10 /month
$3.99 /month
In2site Live Dialogue
Chat Channels
–
–
Form Builder
1&1 Marketing Center
Premium Software Suite
–
–
–
24/7 Toll-free Phone,
E-mail
24/7 Toll-free Phone,
E-mail
90-Day Money Back
Guarantee
Support
Fir st Year*
ENTERPRISE SERVERS
ERVERS
$20 0
999
Price Per Month
$
SPECIAL OFFER
FOR 1 YEAR
$50 off*
TOTAL/YEAR
OFF!
6988
$
88
88
119
$
**
Go Daddy
1995
$
1496
$
first 2 months
$
–
–
–
–
–
24/7 Phone, E-mail
1499
$
10% off
22942 $16188
We offer a variety off hos
hosting packages
and servers to fit your needs and budget.
Fir st Yea r
© 2007 1&1 Internet, Inc. All rights reserved. Visit 1and1.com for full promotional offer details. *Offer valid for Business Package only, 12 month minimum contract
term required. **Offer valid for Enterprise I and II packages only. 12 month minimum contract term required. Discounts taken monthly through the duration of the
contract. Offers valid 11/2/2007 through 12/31/2007. Prices based on comparable Linux web hosting package prices, effective 10/1/2007. Product and program
specifications, availability, and pricing subject to change without notice. All other trademarks are the property of their respective owners.
Call
1.877.go1and1
Visit us now
US311_203x273_28L.indd 1
1and1.com
08.10.2007 13:29:53 Uhr
1107red_ProdRev19-20.v5
10/16/07
3:50 PM
Page 19
ProductReviews
LinkScanner Pro Keeps Your Computer Safe
Track computer exploits and learn how they work through LinkScanner Pro and
the Exploit Prevention Labs Web site.
By Peter Varhol
I have a firewall on my network, and my
IP address is a non-routable Class C
address that’s handed out by my DHCP
server. The Windows Firewall is also
turned on. I use an e-mail filter on my
POP3 server and Outlook 2007 scans for
junk and malicious e-mail. I have ongoing
subscriptions to Norton AntiVirus, and
my virus definitions are always up-to-date.
In other words, I do everything a reasonable person would do in order to
LinkScanner Pro 2.6.5
Starts at $19.95 per copy
Exploit Prevention Labs | www.explabs.com
keep their systems and network clean.
However, I still get adware, unwanted
cookies, bogus e-mails and even an occasional virus. Part of this occurs because of
the large number of Web pages I scan
through on a regular basis. Another part
comes from the variety of applications
The LinkScanner Pro console is a
marvel of information packed into a
small space. Through separate tabs at the
top of the form, I can completely control
how and where my computer goes once
it leaves the safe confines of its physical
case. Finding different types of information, as well as configuring the software,
can be done with the click of a tab.
Working with
LinkScanner Pro
Figure 1. LinkScanner Pro’s console displays all running processes and highlights
those that are actively transferring data.
RedmondRating
Installation 20%
9.0
Features 20%
8.0
Ease of Use 20%
9.0
Administration 20%
9.0
Documentation 20%
7.0
Overall Rating
8.4
Key:
1:
Virtually inoperable or nonexistent
5:
Average, performs adequately
10: Exceptional
that I use and review; many of these
applications need access to the network
and even the Internet to work properly.
But since I’ve been running Exploit
Prevention Labs’ LinkScanner Pro, I’m
now fully aware of every process that’s
actively sending and receiving data
across the network, sites and exploits
blocked, and what sites might be dangerous. I’m warned of the hazards of
visiting various Web pages, and why
they might be hazardous.
One of the product’s key features
enables you to scan a site ahead of time
to determine if it’s safe, and immediately
advance a browser to that page if there’s
no problem. If there is a potential or
real problem, it will not automatically
go to the page, but it will tell you what
the issue is so that you can make the
determination yourself. You can do this
from the LinkScanner Pro console, or
through integration with your Web
browser (Internet Explorer, Firefox and
Opera are supported). Even if you don’t
use this feature, LinkScanner Pro will
slide up an unobtrusive window if it
detects an issue with a Web page or
other questionable contact with your
PC, telling you why you should be wary.
The feature I enjoyed most was the tab
that displayed all running processes and
highlighted them whenever they sent or
received data across the network. Even
though I do technical work with computers, I don’t know what some of the
processes are that Microsoft displays in
the Task Manager. It seems entirely possible to slip one process among many
that’s stealing data or doing unauthorized communication with the Internet.
| Redmondmag.com | Redmond | November 2007 | 19
1107red_ProdRev19-20.v5
10/16/07
3:50 PM
Page 20
ProductReviews
This running process tab is great for
looking at processes that communicate
with the network, including when they
are doing so and how many bytes they
are sending and receiving. It’s given me
an excuse to look up some of the
processes that are running to determine
if they’re really supposed to be on my
system, and what I should do about
them if they’re not. The LinkScanner
Pro software doesn’t provide all of that
information, but it does give enough
for me to be careful in my research.
Another tab shows exploits prevented
and sites blocked. The “exploits prevented” information includes the type
of exploit, where it came from, the originating IP address and the port it came
in on. If you need further explanation of
what those potential exploits are, simply
click on an exploit’s name and it will
provide you with a brief description of
that issue. Need more? You also have a
link to a more detailed explanation from
the company Web site.
Building a Community
As you might imagine, collecting information on exploits from Web sites and
other sources is a long, complex and
never-ending job. Exploit Prevention
Labs attempts to leverage the resources
of its user community to assist with this
process. As a part of the product installation, users are invited to join the
Community Intelligence Network, a
way of sending information on exploits
and sites that host exploits to a centralized database, accessible to anyone.
The company also provides several
resources on its Web site for understanding new exploit techniques and
what to do about them. Exploit Prevention Labs CTO Roger Thompson pens
a blog that provides a quick and easy
way to understand and deal with various
exploits. And the company also publishes
monthly assessments on new exploits
and how they work. Further, the
Knowledge Base of exploits makes for
fascinating reading.
LinkScanner Pro is better suited for a
more technical audience, rather than for
the average business PC user. It’s difficult
for someone who doesn’t pay a lot of
attention to what happens on their computer to understand what an “Invisible
IFrame launcher” is, for example, which
is one of the potential exploits cited on
my list. The sort of information provided
by LinkScanner Pro and Exploit Prevention Labs is more meaningful to someone who takes an interest in what’s
happening on their computer and why.
But even people who use computers
only because they have a job to do will
also benefit from LinkScanner Pro—
not because of the information it provides, but because of the warnings and
blocking of exploits. You don’t have to
be a rocket scientist to take advantage
of these features without necessarily
understanding what they mean. —
Peter Varhol ([email protected])
is Redmond’s executive editor, reviews.
ONLINE DEGREES IN TECHNOLOGY
Use your
IT CERTIFICATIONS
to accelerate your
DEGREE ONLINE.
Microsoft, Sun, Oracle, Cisco, Comp TIA, SAS, PMI, GIAC or (ISC)2 certifications
could waive up to 25% of your fully accredited bachelor’s degree.
Call us today at
1-800-219-6689
or visit us online at
www.wgu.edu/rdm
Here’s what you can get from the online degree programs offered at
Western Governors University:
: Flexible ONLINE learning
: Up to 9 certifications built in at no extra cost
: Programs in Networks, Databases, Security, Software and
IT Management
1107red_ReaderRev21-26.v11
10/16/07
3:31 PM
Page 21
ReaderReview
Your turn to sound off on the latest Microsoft products
Outlook 2007 Gets Mixed Reviews
While most readers like Microsoft’s latest e-mail client, some say it’s still not
ready for prime time.
By Joanne Cummings
For the most part, Outlook 2007 is a
solid update to a familiar workhorse.
That’s the general sentiment of readers
who have used the new version. Of all
the Office 2007 applications, Outlook
has changed the least in terms of user
interface. There’s still the familiar File,
Edit and View menu options, not the
ribbon interface that’s a hallmark of the
other Office 2007 apps.
That lack of change is a good thing for
most. Whereas the other Office apps
require a significant investment of time
and training, Outlook is fairly straight-
Microsoft Outlook 2007
Bundled with Office 2007: Office Small Business, $449;
Office Professional $499
Microsoft Corp. | 800-426-9400 | www.microsoft.com
you use hotmail, it already knows the
servers to enter and add for your
account, so it’s pretty easy,” he says.
Still, others have had problems
deploying Outlook 2007 in a corporate
setting. “You can’t apply [Group Policy
Objects] the same way you could in the
past,” says Frank Callanan, co-owner of
Webletechs, a consultancy in Carmel,
N.Y. “You can’t apply GPOs individually
The overlay feature is nice in that I can overlay any
calendar on top of any other ... and come up with a
block of time when everybody is free much faster.
Teresa Rader, Administrative Assistant to the Director of IT,
Development and Engineering, Liberty University
forward. “Overall, there’s not a huge difference from an end user standpoint, and
I think that’s a good thing,” says Mike
Roeser, IT administrator at the University of Tennessee in Chattanooga, Tenn.
Outlook is fairly easy to get up and
running as well, say readers, especially
with its improved auto account setup
features. “When you configure Outlook 2007, it actually pulls in configuration settings based on your login
information to Active Directory,” says
John Sullivan, director of IT for Major
League Soccer and Soccer United
Marketing in New York. “That helps
our desktop guys because it saves them
a couple of minutes on each desktop.
It’s basically two clicks to get Outlook
set up at that point.”
Auto account also works well for hotmail and other well-known services. “If
based on users anymore.” Callanan uses
Outlook 2007 with Vista, but says most
of his clients run it on XP.
Others can’t seem to get Outlook
deployed at all. Bob Milhaus, a contract IT service desk analyst at the
American Bankers Association in
Washington, D.C., says that ever since
he deployed Outlook on his XP
machine, it’s been one headache after
another. “It’s slow, it’s unstable, and it
has a tendency to crash,” he says. “I
wouldn’t recommend it quite yet.”
Justin Carlson, director of IT at
Maryland Office Interiors Inc., an
office furniture dealer in Baltimore, had
a similar story specific to Outlook’s new
instant search. “When you install
instant search for Outlook 2007, it’s a
performance drag. And if you’re a network administrator and want to install
the Exchange tools, it completely
breaks and won’t work,” he says. “Here
I am, the guy trying to kick the tires,
and I can’t test the search functionality.
That didn’t make me very happy.”
New and Indeed Improved
A few of Outlook 2007’s new features
make the move worth the effort, say
most readers. Among those are the
ability to preview attachments, perform fast e-mail searches, the new ToDo Bar, and its enhanced mobile and
calendaring capabilities.
Previews are big in Outlook 2007,
much as they are in the other new
Office apps. Readers say this greatly
improves efficiency. “I constantly have
people sending me Excel spreadsheets
with quotes for my budget,” Sullivan
says. “It’s not something I need to edit;
I just need to see a couple of numbers.
Using the preview feature, I don’t have
to launch another application.”
It also bolsters security. “With preview, you no longer open up your system to different viruses,” Callanan says.
“Now, it’s in a protected area until
you’ve had a chance to see what exactly
has been sent to you.”
Others say the feature that convinced
them to make the upgrade to 2007 is
instant search. “The search capabilities
built into Outlook are incredible,” says
Todd Bailey, systems administrator at
Aplicare Inc., a pharmaceutical company
in Meriden, Conn. “It saves you an
immeasurable amount of time every
day, especially when you’re dealing
with unusually large mailboxes. If I
Continued on page 24
| Redmondmag.com | Redmond | November 2007 | 21
Project5
10/15/07
2:39 PM
Page 1
ADVERTORIAL
Unified Communications
The Business Value of Unifying Communications
o help create business value for an
enterprise, employees must be able to
effectively communicate and be
responsive to customers. Employees
need to collaborate with other members of
their teams, hierarchical chains of
command and partners. They need to be
able to quickly scan all voice mail, e-mail
and fax messages in their Office Outlook
mailbox, sorting them by date, sender or
urgency with the “arrange by” function.
When voice messages and faxes are filed
with e-mail messages, users stay more
organized and dramatically reduce
the time they spend managing their
messages. Users can see their voice
messages at a glance and no longer have to
manage them in a sequential manner, giving them
greater opportunity to focus on priorities. What’s
more, their ability to act on priorities by knowing
who is available and being able to communicate
with them regardless of communication mode or
device is extremely beneficial.
By helping employees communicate, share, interact,
influence, direct and arrive at decisions, business
collaboration becomes a core element of the value
chain. Key characteristics for successful business
collaboration include:
• The ability to remain connected and maximize
availability
• The tools to participate in multiple teams and
create impromptu conferences and meetings
• Easy multimedia access to the flow of information
• The ability to seamlessly shift between different
communication modes and media
Users drowning in messages—voice,
e-mail, fax—and trying to manage
them using multiple messaging
inter-faces will find the integrated
approach of Avaya and Microsoft
extremely liberating. Users needing
to reach out and connect realtime will find their ability to
do so greatly enhanced.
Our previous article titled “Extend the
Value of Microsoft Office Applications
with Avaya Unified Communications” at
Redmondmag.com/showcase/avaya
highlighted the Unified Communications
products that both Avaya and Microsoft
have released to provide an
integrated communication platform.
This month’s article titled “The
Business Value of Unifying
Communications” provides insight to
the following:
• Infrastructure Optimization
• Embracing the Converged
Communications Trend
• Return on Investment
Infrastructure Optimization
Avaya Unified Communications for Microsoft environments brings together the best of two worlds, by
combining application-based collaboration and
messaging systems with traditional and enhanced
telephony services. While this solution presents an
awesome opportunity to enhance the way
we communicate, there are underlying
dependencies that have to be configured and tweaked to provide such a
platform. IT decision makers must
work with and link their company’s
technicians who service telephony
and voice networks with their
applications teams, as these
two completely different
worlds collaborate for the
first time. What happens to
these existing systems and
how do organizations
combine a new team of
converged communications experts together to
optimize a network so it can leverage a Unified
Communications platform?
Embracing the Converged
Communications Trend
Unifying Communications requires a convergence on
many fronts including systems, applications,
Project5
10/15/07
2:40 PM
Page 2
consulting staff/expertise, and most importantly, a
mind-shift change for business users. Users may be
accustomed to picking up a phone to communicate
but still correspond separately with Instant
Messaging and E-Mail applications. The challenge
of introducing a converged communications solution
to a sometimes very stubborn host of business users
is the primary obstacle standing in the way of
counting a UC deployment a success. How do you
ensure that your deployment is a success?
Unified Communications ROI
holders by increasing their efficiency and
effectiveness. Key Unified Communications
elements that enable these gains include
desktop telephony, mobility, conferencing,
video, messaging and business communications consulting. These solutions can enable
employess to improve customer interactions,
increase productivity, enhance collaboration,
mitigate risk and lower costs. Utilizing the
Avaya Business Value Analysis Tool (Sample
Figure 1), makes it easy to determine the potential
ROI you can gain by unifying your communications.
How much money can your business save?
Download the full article titled, “The Business Value
of Unifying Communications” at Redmondmag.com/
showcase/avaya/go, to get the full insight and
answers to the topics and questions presented above.
About Avaya
FIGURE 1: Sample Data for Demonstration Purposes Only
Avaya Unified Communications for Microsoft
Environments helps organizations be more productive
and improve service to their customers and stake-
Avaya delivers Intelligent Communications solutions
that help companies transform their businesses
to achieve market-place advantage. More than
1 million businesses worldwide, including more
than 90 percent of the FORTUNE 500®, use Avaya
solutions for IP Telephony, Unified Communications,
Contact Centers and Communications Enabled
Business Processes. Avaya Global Services provides
comprehensive service and support for companies,
small to large. For more information about Avaya
visit www.avaya.com.
© 2007 Avaya Inc. All Rights Reserved
For the full Avaya article, go to Redmondmag.com/showcase/avaya/go
1107red_ReaderRev21-26.v11
10/16/07
3:31 PM
Page 24
ReaderReview
Continued from page 21
was recommending that someone go
from 2003 to 2007 and they’re in a
business enterprise environment, that
would be the number one reason to
switch—for that search capability.”
Bailey says the search is very fast, especially when paired with Vista’s indexing
function. In fact, it starts returning
search results even before he finishes
typing a query. “Literally, as you type, it
gives you results,” Bailey says.
Sullivan agrees that the new search
function is a huge improvement. “Most
of the people here have 4GB or 5GB of
archive folders, and going back and
finding a press release from two or
three years ago is something they need
to do on a daily basis,” Sullivan says. “So
this is definitely a big improvement over
XP and Office 2003 with regard to
indexing and searching. It literally takes
just seconds now with Vista and 2007.”
Search also works fairly well on XP.
One caveat for XP users, though: they
first need to download and install a program called Windows Desktop Search.
“If you have Windows XP and you don’t
install Windows Desktop Search, you’re
definitely not going to get the same
experience as you would using Vista,”
Bailey says. “Once you install it, you get
close to the same speed and experience.”
That could be the problem for some
readers who are less than enamored
with the new search features. For example, Milhaus eventually removed
Windows Desktop Search because it
kept crashing Outlook. Carlson says the
search capability is far less impressive
than a third-party search tool he used
with Outlook 2003 called LookOut.
Incidentally, Microsoft bought LookOut and that’s the technology upon
which it based its current search function. “They stripped it down. It doesn’t
work as well, it doesn’t index your entire
Outlook database, and it’s slow,” Carlson
says of LookOut in its new incarnation.
“You can tweak it to make it actually look
at your entire account, but that’s annoying. I can’t get visibility into my data.”
Carlson says he has tried Google
Desktop search, but cautions that the
Outlook 2007 Wish List
A
lthough Outlook 2007 sports a bevy of upgrades, there are
four features readers would have really liked to see in the
newest version of Microsoft’s e-mail client:
1. Integrated training: Most say the current tutorials and training
options aren’t up to the task of getting users comfortable with
Outlook 2007. “One feature I’d like to see either online or within
the system itself is some kind of self-tutorial training,” says Greg
Art, director of product development at Aplicare Inc. in Meriden,
Conn. “How do I do X? How do I assign a task to somebody and
how do I track it—those kinds of things. What are my options for
views? It would be really nice to have a really simple tutorial that
people could go to and easily understand.”
2. Domain blocking: Most readers are happy with the improved
junk-mail filters within Outlook 2007, but say one feature is missing. “When you’re in your inbox, and you right-click on an e-mail,
the options for junk mail are there but they don’t allow you to
block the domain,” says John Sullivan, director of IT for Major
League Soccer and Soccer United Marketing. “From there, you can
only block the sender ... I’d prefer to be able to block a domain
right from the e-mail.”
3. Easier public folders: “In both versions, it’s not easy for the
average user to jump over to see public folders,” says Todd Bailey,
systems administrator at Aplicare. “And that’s not necessarily just
2007, because they did it in 2003. You have to actually change
your view to the folderless view and then scroll down and expand
and this and that, rather than just adding it to one of the main buttons they already have. It’s not very intuitive.”
4. One more calendar view: Although most agree the calendars in
Outlook 2007 are greatly improved, readers say there is one feature missing. “If you’re in a month view, it only shows a limited
number of events each day, maybe four or five total,” Bailey says.
“The only way to see more events is to click on the small arrow
pointing down, and then it changes the view and goes to the single
day view. That makes it more difficult because then you have to
jump back to the month view that you typically use. It would be
better if that day popped up as a separate window temporarily and
went away when you took your mouse away from it.”
—J.C.
Google tool and Microsoft’s Windows
Desktop Search don’t play well together
and end up crashing your system. Now,
he uses a different third-party tool
from Copernic Inc. to handle searches.
“In my opinion, Microsoft search for
Outlook is completely deficient and
inadequate,” he says.
Facelift for Calendars
Beyond search, Outlook’s next most
popular improvement is the new calendaring functionality, especially the abil-
24 | November 2007 | Redmond | Redmondmag.com |
ity to overlay two calendars to see conflicts and optimal meeting times.
“We have a public calendar where we
post different events, when people are
going on vacation, product launches,
anything like that,” Bailey says. “I like
the fact that you can have two calendars
side by side, but there’s also a feature
where you can actually put the two calendars on top of each other.”
Teresa Rader, administrative assistant
to the director of IT development and
engineering at Liberty University in
1107red_ReaderRev21-26.v11
10/16/07
3:31 PM
Page 25
ReaderReview
Lynchburg, Va., agrees. “I have my personal calendar, I have three meeting
room calendars, and I have access to
other people’s calendars so that I can
see where they are if someone comes
looking for them,” she says. “The overlay feature is nice in that I can overlay
any calendar on top of any other. You
can overlay all the calendars and come
up with a block of time when everybody is free much faster.”
You can now drag-and-drop e-mails
directly into calendars, which readers say
is a big time-saver. “That’s a neat feature
because you can take an e-mail [and]
rather than going into the calendar,
clicking new meeting and so on, you can
just take the e-mail and drag it right into
the calendar,” Sullivan says. “Then it
pops up with the contents of the e-mail
and you can see exactly what it is.”
It’s also easier to share calendars in
2007. “Sharing a calendar is easier and
more intuitive now,” Roeser says. “You
can now send the calendar via e-mail,
When you configure Outlook 2007, it actually
pulls in configuration settings based on ... Active
Directory. It’s basically two clicks to get Outlook set
up at that point.
John Sullivan, Director of IT, MLS and Soccer United Marketing
and that’s not something you could do
as easily in 2003.”
To-Do Bar Works Well
Another of Outlook 2007’s new features
is the To-Do Bar, which runs down the
right side of the screen in the inbox
view. It shows a small monthly calendar,
upcoming appointments and a task list.
It’s designed to let users be more productive by letting them see and handle
several tasks from one main view.
“It gives you a snapshot look of everything you have going on with regards
to calendar tasks and contacts, recent
e-mails and all that,” Sullivan says. He
notes that with previous versions of
Outlook, he had to buy a third-party
tool to achieve the same functionality.
“So 2007 has let me eliminate a software package,” he says. “I only had five
or six people using it, but we don’t need
it anymore because of the To-Do Bar.”
Bailey agrees that the To-Do bar is a
big help. “That’s nice to be able to see
that information without having to go to
the calendar,” he says. “It’s a time-saver.”
Going Mobile
Callanan says the biggest change he’s
noticed since moving himself and some
of his clients to 2007 is that mobile users
1107red_ReaderRev21-26.v11
10/16/07
3:31 PM
Page 26
ReaderReview
Mixed Opinions
The search capabilities built into Outlook are
incredible. It saves you an immeasurable amount of
time every day, especially when you’re dealing with
unusually large mailboxes.
Todd Bailey, Systems Administrator, Aplicare Inc.
are far happier. “They’re the ones who
tend to complain the most because they
need access to things all the time,” he
says. “And everything’s easier in 2007.”
Microsoft significantly upgraded the
synchronization tools in Outlook 2007
to make the process more seamless.
“The upgrade has been solid, and everybody I’ve dealt with has had no issues
keeping things synchronized between
devices, laptops and portables or a desktop and a portable,” Callanan says. “I
don’t see the issues we had in the past
trying to set up synchs either through all
the different wizards or the third-party
applications to do it. It just works now.”
Mobile users also see a speed increase.
“It definitely cuts down on the time it
takes for an e-mail to clear and be able
to be viewed on a mobile device,” he
says. “It used to be that e-mail came in
and your virus scanner would have to
hit it, and then your spam blocker
would hit it, and by the time it loaded,
three or four minutes had gone by.
That’s not the case anymore. Now, as
soon as Outlook loads, it’s done everything. Everything pops up and it does
everything on the fly, so you don’t need
to wait for a second or even third application to kick in and do something
before you view e-mail.”
Overall, most readers seem happy with
the new Outlook. “Normally, you see
people complaining about upgrades,
but I haven’t noticed that with Outlook
2007,” Callanan says. “Everyone seems
fairly comfortable and I haven’t heard
any real complaints.”
Others who have struggled to get
the new Outlook up and running have
a different opinion. “I use Outlook
2007 every day, but I’m seriously
thinking of using something else
now,” Milhaus says. “Either that or the
next computer I buy will be a Mac,
because I will not personally go to
Vista. Or I will just switch my computer over to Linux, and go with Evolution [for e-mail]. I just don’t think
Outlook and Office 2007 are ready for
prime time.” —
Joanne Cummings (jcummings@
redmondmag.com) is a freelance technology
journalist based in Massachusetts.
Use your IT CERTIFICATIONS to accelerate your DEGREE ONLINE.
Microsoft, Sun, Oracle, Cisco, Comp TIA, SAS, PMI,
GIAC or (ISC)2 certifications could waive up to
25% of your fully accredited bachelor’s degree with:
Ñ Flexible ONLINE learning
Ñ Up to 9 certifications built in at no extra cost
Ñ Programs in Networks, Databases, Security and Software
ONLINE DEGREES IN TECHNOLOGY
Call us today at
1-800-219-6689
or visit us online at
www.wgu.edu/rdm
Project2
8/14/07
10:04 AM
Page 1
No IPs... No Network…
No Business.
Choose BlueCat’s Award-Winning appliances for Business Continuity,
Disaster Recovery and IP Network Management.
ADONIS 250
DNS CACHING
ADONIS 750
DNS/DHCP
ADONIS 500
DHCP
ADONIS 1000
DNS/DHCP
PROTEUS 2150
IPAM APPLIANCE
PROTEUS 500
IPAM APPLIA 0
NCE
Project3
4/16/07
1:38 PM
Page 1
Consolidate
Windows Servers
Now!
Proven Server Virtualization
• Blazing Fast
Bare Metal Performance
for Windows Guests
• Multi-Server Management
• Seamless Upgrade Path
• Powerful Administrator Console
• Easy Installation and Deployment
• Fully Supported
Download
XenExpress
for free!
Plus, get
a free t-Shirt
when you
refer three friends!
Purchase the Server Consolidation
Solution Bundle!
Pre-Installed XenEnterprise with
IBM System x servers
Learn more at
www.xensource.com/ibm
www.xensource.com/redmond
1107red_Roundup29-38.v7
10/16/07
3:26 PM
Page 29
RedmondRoundup
Automating the Desktop
Making your job easier, one tool at a time.
By Peter Varhol
Your company may be growing, but the
IT group isn’t. There are double the
number of desktop systems at your
facility than there were five years ago,
as well as a proliferation of notebooks,
BlackBerries and other edge-computing
devices. You’ve just added a dozen new
application and file servers, and are
planning on more in the next six
months. Yet you have the same team
you did before that growth spurt.
You’ve cut some corners, and are using
some tools for automated patch distribution and password resets, but really
haven’t looked into other ways of
improving your processes.
It gets worse. There are more tasks to
do, as well as more systems on which to
do them. Security, patching and application maintenance are just a few of the
tasks that require more time today. You
have to make the hardware last longer,
which means periodically cleaning up
the systems because they became too
cluttered with extraneous utilities and
files. It would have saved you a great
deal of effort if you could completely
lock down the systems, but management insists that open access is required
for business reasons.
If you’re on the help desk, in desktop
support, or are required to roll out new
applications and patches and perform
regular maintenance on applications
and systems, you’re looking for ways to
work smarter. How can you perform
the variety of everyday tasks in a way
that lets you take on additional work,
and additional desktops, with little or
no increase in resources?
I looked at several tools that make it
possible to automate processes and
tasks on desktop systems. These tools
are more complementary than competitive in that they perform different
InThisRoundup
Privilege Manager 3.0
Pricing starts at $30 per desktop
BeyondTrust Corp. | 603-610-4250 | www.beyondtrust.com
ActiveBatch
$8,000; includes unlimited deployment of the UI, one training
credit and one year of Version Upgrade Protection
Advanced Systems Concepts Inc. | 800-229-2724 | www.advsyscon.com
Desktop Authority
$410 for a one-admin license with one year of support
ScriptLogic Corp. | 561-886-2420 | www.scriptlogic.com
RedmondRating
Privilege
Manager 3.0
Active
Batch
Desktop
Authority
9.0
Installation: 20%
7.0
7.0
Features: 20%
9.0
9.0
9.0
Ease of use: 20%
9.0
8.0
9.0
Administration: 20%
9.0
8.0
9.0
Documentation: 20%
8.0
8.0
8.0
Overall Rating
8.8
8.0
8.8
Key:
1: Virtually inoperable or nonexistent | 5: Average, performs adequately | 10: Exceptional
actions. Used separately, they can help
with specific tasks that are highly
time-consuming. Taken together, they
can put a serious dent in your day-today workload.
BeyondTrust
Privilege Manager
Security, access control and data protection remain among the biggest consumers of administrator time. They
are important considerations; an
increasing number of enterprises are
locking down user desktops and limiting them to running as standard users.
But when you do that, you can suffer a
significant loss of functionality from
applications. Some application features
may not work without higher privilege
levels; other applications may not
work at all.
BeyondTrust Privilege Manager
keeps all of the applications in the
enterprise—and all of their features—
accessible to the users who need them.
Its goal is to establish a least-privilege
policy for all users and all applications
on the network, and elevate that privilege automatically only when required
by the application being used and the
work being performed.
You install Privilege Manager on any
system on the network, using an
account that has the ability to set and
maintain policies. Privilege Manager is
implemented as a true Group Policy
| Redmondmag.com | Redmond | November 2007 | 29
1107red_Roundup29-38.v7
10/16/07
3:26 PM
Page 30
RedmondRoundup
tures and flexibility it provides are
essential as enterprises navigate the
transition to Windows Vista over the
next several years. In particular, any
enterprise with a number of custom
applications is probably having a great
deal of difficulty implementing its
security and access policies, as custom
software is notorious for requiring
admin privileges to use. As enterprises
continue to press access-restriction
policies, it might be very difficult to do
without in the future.
Advanced Systems
Concepts ActiveBatch
Figure 1. The Privilege Manager Group Policy Object Editor enables an admin to finetune group privileges to provide required access without granting too many privileges.
extension, and allows administrators to
attach permission levels to applications.
All you have to do is specify the application and which security groups
should be added to and/or removed
from the process token when the application is launched.
I created and set a test user as a standard user on my network, and launched
an application that I knew required
administrator privileges to execute
some parts of it. Sure enough, the
application warned me that as a standard user I wouldn’t have access to
some features. Through trial and error,
I identified a couple of features that
wouldn’t work. I went back to Privilege
Manager, identified that application and
raised its privilege level to Administrator, then I went back and launched the
application. I received no warning, and
was able to run the features of the application that were previously inaccessible.
The process of configuring Privilege
Manager and having complete access to
all application features took less than 10
minutes, even though I was working
without reference to instructions.
In another case, an application wouldn’t
launch at all for a standard user, displaying a message saying that privileges
were not sufficient. Once again, launching Privilege Manager, changing the
test user’s privilege level for that application, and starting the application up
once again—successfully, this time—
took only a few minutes.
The software has a default set of
applications and settings to get you
started in cases where the privilege
needs are known and the application is
a popular one. It also provides for
reporting on applications accessed and
used, as well as what security levels
were required. Admins can use its
reports to get a better idea of the need
for different levels of access for enterprise applications.
Privilege Manager offers a great deal
of flexibility in setting privileges for
users, applications and even application
components. As long as it’s manipulating a policy that uses tokens, it can
adjust the tokens easily. It’s not a sexy
application by any means, but it can be
essential in keeping a locked-down
environment for security and access
reasons, while also enabling users to do
legitimate work with applications
they’re authorized to use.
I saw very little downside to
Privilege Manager. Arguably, the fea-
30 | November 2007 | Redmond | Redmondmag.com |
An important part of automating the
desktop is the ability to execute tasks
across large numbers of systems. While
the scripts typically run from the server,
they can perform actions on individual
desktops that provide an automated way
of accomplishing repetitive tasks.
ActiveBatch addresses the problem of
automating those sequences of repetitive tasks across the desktops. The key
to ActiveBatch is workflow. The product focuses on accomplishing sequences
of processing that complete a complex
task or set of tasks that can be broken
down into a discrete series of steps.
I had some difficulty setting up the
database necessary as a precondition to
installing ActiveBatch. Rather than
Continued on page 35
Figure 2. ActiveBatch lets you set a trigger
so that if an event or sequence of events
occurs, you can execute a specific response.
Project2
10/1/07
9:09 AM
Page 1
“Hey, where’d all the servers go?”
Customer Success #18,328
Once you have seen the dramatic cost savings,
increased utilization, and reduced power & cooling
requirements made possible with virtualization,
you will understand why 20,000 VMware customers
worldwide have a success story to tell.
What will your story be?
Create your own success story.
Get your FREE VMware Virtualization Kit, including an analyst report.
Get a kit now at www.vmware.com/go/save
VMware, Inc. 3401 Hillview Avenue Palo Alto CA 94304 USA Tel 650-427-5000 Fax 650-427-5001
© 2007 VMware, Inc. All rights reserved. Protected by one or more of U.S. Patent Nos. 6,397,242, 6,496,847, 6,704,925, 6,711,672, 6,725,289, 6,735,601, 6,785,886, 6,789,156, 6,795,966, 6,880,022, 6,961,941, 6,961,806, 6,944,699, 7,069,413; 7,082,598 and 7,089,377; patents pending.
VMware, the VMware “boxes” logo and design, Virtual SMP and VMotion are registered trademarks or trademarks of VMware, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies.
Project6
9/14/07
10:54 AM
Page 1
Access Data
Anywhere Anytime
SIXTY-FOUR BITS QUALITY
SQL Server is an ideal
application to run on 64bit Dell PowerEdge
servers powered by
multi-core AMD Opteron
processors. Running SQL
Server 2005 on x64
servers can provide high
performance, and breaks
32-bit memory and I/O
barriers, increasing the
capability of each database server. The Direct
Connect Architecture of
AMD Opteron processors
provides fast memory
and I/O access avoiding
traditional bottlenecks
inherent in legacy frontside bus x86 architectures, offering highthroughput responsiveness and scalability for
your applications. That is
power!
With SQL Server 2005,
you’ll be able to do more
with your data. With its
integrated SQL Server
Reporting Services, SQL
2005 gives you real-time
access to business intelligence, the intelligence
that can help make a difference for your organization. You’ll be able to analyze data warehouses,
generate a report and
deliver it to the right people, at the right time, letting them make the right
business decisions. Dell
PowerEdge servers powered by multi-core AMD
Opteron processors allow
you the flexibility of running the database and
analysis on the same
server, giving your users
the reports they demand
when they need them.
Now that is access to
data anywhere and anytime!
LOW TCO
Dell PowerEdge servers
running AMD Opteron
processor technology
offers a power efficient
platform for consolidating
your database servers
with SQL Server 2005.
Consolidation can help
reduce software licensing
fees while allowing you to
serve more concurrent
users and provide a high
transaction throughput
per database server. A
large number of databases can be consolidated
into a single SQL instance
gaining you the same
benefits as when you
consolidate multiple
instances onto a single
physical server. This can
help lower your energy
bills and better utilize
your datacenter’s floor
space. Dell and AMD can
make it possible to run a
greener database!
Aboutt thee authorss
Danielle Ruest (MVP in Virtualization) and Nelson Ruest (MCSE, MCT, MVP)
are multiple book authors focusing on systems design, administration,
and management. They run a consulting company that concentrates on
IT infrastructure architecture, change and configuration management.
You can reach them at [email protected]. www.reso-net.com
SECURE
Data security is one of
the most important
aspects of any database
architecture and SQL
Server 2005 is outstanding in this regard. SQL
Server now has a
reduced attack surface
by letting you install only
the components you
require on each database
server. SQL Server 2005
installations are now
secure by default and
implement the principle of
least privilege in each
aspect of their design.
And, when running on
multi-core AMD Opteron
processors, your Dell
PowerEdge database
servers can take advantage of Enhanced Virus
Protection* (EVP), which
can help protect against
viruses, worms and malicious attacks, all to help
ensure the integrity of
your database servers.
EFFICIENT
Today, IT Managers must
build an efficient datacenter. With your database servers now running on 64-bit Dell
PowerEdge hardware,
efficiency is what you’ll
get, especially from
AMD64 technology. The
AMD Opteron processor
is designed to enable 64bit computing while
remaining compatible
with the vast x86 software still in production,
and allows you to migrate
seamlessly to 64-bit
computing and multi-core
technology when you are
ready. This means you
can have access to
improved system efficiency and application performance for both multitasking and multi-threaded applications without
changing the processor
footprint.
www.dell.com/amd
A
A
e
t
4-
e
re
e
n-
-
Project6
9/14/07
11:04 AM
Page 2
With the release of SQL Server 2005, Microsoft has produced its most mature database application. It’s
no wonder with improvements in security, manageability, availability and scalability, Microsoft has enhanced this database
engine from a powerful data management tool to an enterprise-class data storage and manipulation system. Databases can
now span multiple terabytes. Data manipulation capabilities support better decision making through advanced analytics,
more sophisticated reporting tools and extensive data mining capabilities. With these new tools, administration and
application development has never been easier. As an IT professional, you should look to SQL Server 2005 for database
consolidation, running fewer but more powerful servers with larger databases. Today Dell offers great technology to run these
consolidated systems on the Dell PowerEdgeTM servers powered by multi-core AMD OpteronTM processors. These enterprise
class servers systems will provide the ideal platform for SQL Server 2005 and the next generation of SQL Server coming in
2008. Use the following nine reasons to justify your move to SQL Server 2005 on Dell PowerEdge running AMD OpteronTM
processor technology.
RELIABLE
SQL Server 2005 delivers high
performance. In fact, Dell
migrated to SQL Server 2005,
which powers www.dell.com,
and experienced a performance enhancement over SQL
2000. SQL Server 2005 has
been optimized for high availability clustering to provide continuous access to your data.
And, with its new data mirroring
capabilities, SQL Server 2005
can help ensure business continuity as well as automate a
number of the lengthy manual
processes associated with
replication and log shipping.
Running this solution on Dell
PowerEdge servers with
AMD64 technology gives you
confidence, because both are
known for providing enterprise
class solutions that are
compatible, reliable, stable, and
supported by world-class
ecosystems.
VIRTUALIZE
More than moving to a consolidation of SQL Server instances,
Dell PowerEdge servers running
multi-core AMD Opteron
processors allow you to virtualize your installations of SQL
Server 2005. Virtualization provides the best of all worlds: run
64-bit host operating systems
and either 32 or 64-bit guests.
This can give you greater compatibility for existing applications and greater growth capabilities for new ones. And, with
the changes Microsoft made in
SQL Server 2005 licensing, virtualizing SQL Server is a winning proposition on all fronts.
You’ll gain simplified operations,
improved utilization and costeffective scaling.
EXTENSIBLE
Database usage grows with
time; every administrator knows
this all to well. Dell PowerEdge
servers running multi-core AMD
Opteron processor with Direct
Connect Architecture enable
you to easily transition to multicore technology at your pace
without sacrificing current performance and IT investments. In
addition, Dell and AMD provide
a simple upgrade path to quadcore AMD Opteron processors.
You can double your processing power in your Dell
PowerEdge servers. And the
good news is, you can run
these AMD quad-core processor based servers with the
same power as before with
dual-core processors! Now
that’s extensible!
REACT NOW!
Evaluate your options today!
Multi-core AMD Opteron
processor-based Dell
PowerEdge servers offer excellent value. Now you can help
future-proof and build on your
investment. Whether you’re
planning to move to SQL Server
2005 or preparing for SQL
Server 2008 or whether you’re
just buying new servers with a
look to the future, find out
which AMD Opteron processorbased servers Dell offers.
Check them out at
www.dell.com/amd. Want to
learn more? Look up “How Dell
Does It”, a new whitepaper on
its own move to SQL Server
2005 at www.dell.com/sql.
About Dell
Dell Inc. (NASDAQ: DELL) listens to customers and delivers innovative technology and services they trust and value. Uniquely enabled by its direct business model, Dell is a leading global
systems and services company and No. 34 on the Fortune 500. For more information, visit www.dell.com, or to communicate directly with Dell via a variety of online channels, go to
www.dell.com/conversations. To get Dell news direct, visit www.dell.com/RSS.
©2007 All Rights Reserved. Advanced Micro Devices, Inc. All rights reserved. AMD, the AMD Arrow logo, AMD Opteron, and combinations thereof are trademarks of Advanced Micro Devices,
Inc. Microsoft and Windows are registered trademarks of Microsoft Corporation in the U.S. and/or other jurisdictions. Linux is a registered trademark of Linus Torvalds. Other names are for
informational purposes only and may be trademarks of their respective owners.
References:
* Enhanced Virus Protection (EVP) is only enabled by certain operating systems, including the current versions of the Microsoft® Windows®, Linux®, Solaris, and BSD Unix operating systems.
After properly installing the appropriate operating system release, users must enable the protection of their applications and associated files from buffer overrun attacks. Consult your OS
documentation for information on enabling EVP. Contact your application software vendor for information regarding use of the application in conjunction with EVP. AMD strongly recommends
that users continue to include third-party antivirus software as part of their security strategy.
Project1
8/14/07
9:10 AM
Page 1
A DV E R TO R I A L
Four Critical Elements That Determine Disaster Recovery Success
Every minute of every day, somewhere around the world,
there is an extremely frustrated systems administrator futilely
attempting to recover a failed server without the benefit of a
tool designed expressly for this purpose. Without one, a
recovery can take anywhere from two hours to two days,
and cost thousands of dollars. Many organizations are
simply unaware that there is an inexpensive solution to
remedy this problem.
There are numerous products that help eliminate computer
downtime by offering fail-over and redundancy. However, the
important issue is that those products do not help once a
machine becomes unbootable. The quickest and easiest
method of restoring a failed Windows server or workstation is
by implementing an image-based disaster recovery (DR)
solution like UltraBac Software’s UBDR Gold.
With UBDR Gold, live snapshots can be periodically stored
on the network for easy disaster recovery retrieval—simply
boot the dead machine and restore the operating system
partition in as little as five minutes. UBDR Gold may also be
used for provisioning, roll-back or any other need that might
require a quick restore or creation of a server.
The Four Critical Elements:
1.
2.
3.
4.
Product Reliability
Support
Features and Functions
Ease-of-Use
For a DR tool to be of benefit, it must be extremely reliable in
both taking the snapshot and in its ability to boot and recover
the image successfully. In today’s market, this means not only
restoring an OS to the same machine, but also being able to
recover it to a totally different hardware configuration. A
quality product should also provide the ability to recover a
physical server to a virtual environment.
No matter how fast a disaster recovery product might be,
it will be rendered useless if an insurmountable restore
problem is encountered by an operator during a vital recovery.
Therefore, a critical element is being able to quickly engage a
qualified technical support representative if and when
required. To put this into perspective, UltraBac Software’s
industry leading support hold time is less than five minutes.
Along with reliability and support, a disaster recovery product
must also offer great flexibility to meet the needs of both the
SMB and enterprise markets. UBDR Gold, for instance,
allows users to back up snapshots to any disk or tape target,
along with options for TSM and FTP devices. The program
even offers a fail-over to an alternative device to ensure a
quality backup.
Lastly, ease-of-use can make or break a disaster recovery
attempt. While UBDR Gold is straightforward in its use for
manual recoveries, restores can be 100 percent automated so
an operator need only insert a CD or USB key and initiate a
boot. Remote DR operations may even be performed via
centralized management.
About UltraBac Software:
In its 25 years of business, UltraBac Software has earned the
reputation for providing reliable, fast, and innovative backup
and recovery software to organizations of all sizes. Visit
www.ultrabac.com to receive an evaluation copy of UltraBac
and UBDR Gold.
BACK U P AN D DI SASTE R R EC OVE RY SOF T WAR E FOR P EOP LE W HO M EAN B US I N E S S
>
W W W. U LT R A B AC . C O M
1107red_Roundup29-38.v7
10/16/07
3:26 PM
Page 35
RedmondRoundup
Is Hardware the Answer?
hile you might normally think of software
box. In addition, you can package up software and
tools in automating desktop management
prepare it for installation, monitor license compliand maintenance, sometimes it makes sense to
ance, obtain patch status and more things than I
think about hardware. If plugging in a hardware
can name. The agent communicates back to the
box for management agrees with you, take a close KBOX and to your dashboard as often as you’d
look at the KACE KBOX solution. The KBOX is a 1U like; the default is every two hours.
rack-mountable, server-type system running FreeBSD that helps
KBOX
automate a number of different
$9,500 for a 100-node license
areas, including help desk, deskKACE Networks Inc. | 877-6468-3663 | www.kace.com
top hardware- and softwaremanagement, system monitoring
and a host of other tasks.
The amazing thing is the
Setting up the KBOX is easy,
amount of information you have
especially with a sales engineerat your disposal. Can’t lock down
guided Web conference that
your desktops but concerned
KACE provides to all customers.
about unlicensed software?
The shipping box also includes a
Check. Have no way of determinlarge sheet, a la Dell, with siming if all of your systems are upplified instructions on setting up
to-date with patches? Check.
and configuring the KBOX and
Need to know the versions of all
dispersing agents to the local
installed software to make sure
systems. Once you configure the
everyone is compatible? Check.
Figure A. KBOX provides help-desk funcKBOX through its Unix display
While not strictly a desktop
tionality that lets admins track and correct
and hook it up to your network, issues without visiting every system.
solution, the KBOX does have
you can bring up its Web intercertain things going for it. First,
face and have an amazing number of tools at
the cost is fixed and not dependent upon the
your disposal.
number of desktops. Second, it helps to automate
Logging in as administrator, you can deploy
a large variety of tasks, rather than just one or
KBOX agents to any number of systems on the
two. Its Web interface provides a nice dashboard
network, either manually, one system at a time or
for you to obtain, monitor and change just about
automatically based on an IP address range. The
any desktop configuration. Lastly, it’s easy. There’s
agent runs as a service on Windows PCs. Once
no reason why KBOX can’t be on your network,
you have an agent installed, you can get a cominstalling agents on the desktops, in less than 30
plete hardware and software inventory of that
minutes after you open the box.
—P.V.
W
Continued from page 30
offering an integrated MSDE install like
Desktop Authority, it required a new or
existing SQL Server installation available before installing the software. It
couldn’t connect to my existing implementation (SQL Server 2005 Developer
Edition), so I had to recreate a database
connection for it to work with.
ActiveBatch lets you accomplish a variety of different things, including support
for Active Directory and Windows security, the ability to perform SQL queries
and search for the presence of specific
files, and the ability to schedule script
execution and run in a resource-
constricted environment. Virtually any
server or desktop task can be scripted
and run automatically. The upshot is
that you have to write the scripts to do
the automation, but once written, they
should require little or no change.
Its scripts employ variables in a hierarchical structure that allow scriptwriters
to easily pass information between
scripts. This means you can string scripts
together to perform a series of activities
while keeping them separate for flexibility or maintenance purposes.
ActiveBatch lets you compare specific
changes and approvals for each revision
level of a process or script to a previous
or baseline change. In doing so, it identifies and documents what has changed.
This provides both a change log for
administrators seeking to find out what
has changed and why, and an audit
facility for reporting on changes for
compliance purposes.
One of the things I really liked about
ActiveBatch is the ability to design reasonably complex and complete scripts
without having to actually write code. It
also provides you with a set of library
functions that script typical tasks, often
requiring only very minor changes to
work in unique environments.
Continued on page 38
| Redmondmag.com | Redmond | November 2007 | 35
Project3
10/16/07
12:55 PM
Page 1
ADVERTORIAL
A New Recovery Strategy
for Always On Business
D
riven by a combination of regulatory mandates, highly visible
disasters and outage events, and
common sense dictates of
always-on business operations,
business continuity planning has suddenly
become a “front office” issue. Now, senior
management is seeking information on what
disaster prevention and disaster recovery
capabilities are in place and whether they are
up to the task of supporting the continuation
of mission critical business processes within
recovery time targets.
A key problem is that your disaster recovery
plan, as it currently stands, is “old school.” If it
wasn’t written 30 years ago, chances are that
it still borrows heavily from the best practices
playbook that held sway when IT lived inside
of a glass house.
But times have changed.
Distributed computing has changed the
playing field. Critical information assets are
hosted on everything from big iron arrays to
laptop hard drives. Business applications are
no longer hosted in a central mainframe; many
are multi-tier client/server builds that are
about as stable as a Jenga block tower.
Hardware no longer plays by the rules
established by one dominant mainframe
operating system vendor. Storage vendors are
differentiating their wares by adding a lot of
complex “value-add” software to proprietary
array controllers and there are as many disk
mirroring and tape backup processes in play as
there are vendors.
And now, the new CIO is embracing server
clustering or server virtualization in a big way.
Digging deeper, you realize that your current
recovery strategy is bifurcated—with half of
your business recovery processes aimed at
server failover, the other half at data replication. You need tools that will enable you to
integrate all of the processes that you have in
place for server and network failover and for
storage recovery and data protection.
Business application vendors say they have
the tools you need, but they don’t. Server
vendors and virtualization software houses
are also talking the talk, but not walking the
walk. Storage hardware vendors have tools,
too—but only if you allow yourself to be
locked in to their gear exclusively.
Basically, you confront what seems like the
world’s meanest task: you’ve been handed a
mess and told to bolt on an airtight recovery
strategy.
Project3
10/16/07
12:56 PM
Page 2
New realities require “new school” business
continuity solutions. To start, you need to
adjust your focus from platform-centric
recovery to business process-centric recovery.
You need a toolset that will enable you to
recover all of the infrastructure components
supporting that process. Seamlessly. Holistically.
define scenarios for failing over your mission
critical business operations to an alternate
location—whether at a service provider’s hot
site facility or a recovery center of your own.
CA XOsoft WANsync can help you to monitor
replication and backup processes and, if you
elect to use their Assured
Recovery option, can
enable you to test failover
infrastructure… from your
desktop.
CA XOsoft WANsync can
give you visibility into your
mirroring processes so you
know that the right data
will be available at the right
time in your recovery effort.
Visit ca.com/xosoft
It would help if you had a single pane of glass
where you could develop recovery scenarios
and track and monitor all of the disk mirroring,
tape backup and other aspects of your plan
without dragging personnel off site every
month for testing. Visibility is key: you have
heard war stories about companies that
discovered only after a disaster that their
remote disk mirroring setup wasn’t replicating
all of the data that they thought or that tape
jobs were abending before critical data was
backed up.
All of this needs to be done without adding
personnel or allocating a lot of additional time
to business continuity concerns that takes
away from your real job. Bottom line: you
probably should be considering CA XOsoft
WANsync.
CA XOsoft WANsync provides a convenient
way to consolidate all of the data replication
and backup processes in one place, and to
The first of a three-part
whitepaper on the new
rules of business continuity
and how CA XOsoft
WANsync can help you to
address them is available for download here:
Redmondmag.com/showcase/caxosoft
About Jon Toigo
Jon Toigo is CEO of Toigo Partners
International and founder of the Data
Management Institute. A consultant, author
and analyst, he is focused on discerning the
underlying business value of information technology. He is a 25-year IT veteran who has
worked both as an operative within corporate
IT departments and as a senior consultant
with two international systems integrators.
Toigo has published thousands of articles in
the computer trade press and his blog,
DrunkenData.com, is read by over 180,000
visitors per month.
Toigo has written fourteen books, including
Disaster Recovery Planning: Preparing for the
Unthinkable, which is now in its third edition.
He has assisted over 100 companies in their
business continuity planning efforts.
Redmondmag.com/showcase/caxosoft
1107red_Roundup29-38.v7
10/16/07
3:26 PM
Page 38
RedmondRoundup
Continued from page 35
Overall, if you’re looking for a scripting solution that helps you design and
maintain workflows, ActiveBatch will get
the job done for you. That’s especially
true if you have a mixed server environment, as it supports Windows, Linux,
AIX, Solaris, HP-UX and OpenVMS. If
you’re tired of maintaining dozens of
Perl scripts or shell scripts to automate
parts of your desktop administration,
ActiveBatch can take a lot of pain out of
ScriptLogic’s Desktop Authority does
just that. It automates the day-to-day
tasks that are the most mundane yet
typically take an incredible amount of
manual effort. It focuses on management, inventory, security and support.
Desktop Authority installs automatically onto a desktop system. You can use
an installed or networked SQL Server
installation to hold configuration information, or a local MSDE installation
that the software will install for you.
Figure 3. One of Desktop Authority’s features is collecting and maintaining
inventory on desktop systems scattered across the enterprise.
building workflow scripts and keeping
them up-to-date.
ScriptLogic
Desktop Authority
The bread and butter of desktop
automation includes desktop management, patch deployment, anti-spyware
and interactive, Web-based remote management of individual systems. If you
automate tasks such as these, you’ve
probably taken into account more than
half of the manual effort that you may
spend on individual desktops.
Once installed and once the database is
configured, the software presents a comprehensive console to perform a variety
of activities targeting desktop systems.
For desktop management, Desktop
Authority provides a way to centralize
log-on scripting, group policies and
user profiles across the range of desktops. Further, it enables desktop client
configuration automatically throughout the day. This allows midday configuration updates, configuration of
mobile workers using cached credentials and continual security-policy
38 | November 2007 | Redmond | Redmondmag.com |
enforcement. In addition, you can
deploy MSI-based applications from a
central location via a distributed MSI
repository, letting you perform remote
desktop installs. Of course, it also does
patch distribution in a similar way.
While it’s not the only tool that can do
this, combined with the other desktopmanagement features, it’s as close to a
comprehensive remote deployment
solution as you can get.
How about inventory? That’s the reason for the SQL Server database installation. Desktop Authority uses the
database to check systems and report
against information stored there. You
can take an inventory at regular intervals and match its results against previous inventories. That way you don’t
have to lock down systems, yet you can
monitor license compliance over time.
Desktop Authority uses USB and
external port locking to protect against
data theft and the introduction of malicious software. By implementing a
policy-based lockdown of removable
storage and communication devices, the
product applies a set of restrictions that
thwart the simplest and most common
type of data theft. It also protects
against spyware and provides reporting
and removal.
As the company name implies (the
company was recently acquired by
Quest Software Inc., but is being run as
a separate business unit), you can also
script the features provided to give a
level of customization to how it works.
I didn’t do any scripting in my brief
test, but having it there is always a
comfort when you need it.
I found Desktop Authority to provide
great information and make a number
of activities involving servicing desktops far easier than they could be done
manually. If anything, the sheer number
of features made for complexity; you
should know what you want to do with
it before you embark on an exploration
of its features. It can be difficult to
decide where to begin. —
Peter Varhol ([email protected]) is
Redmond’s executive editor, reviews.
Project19
9/11/07
1:00 PM
Page 1
1107red_F1Greene40-46.v6
10/16/07
10:04 AM
Page 40
President, CEO and
co-founder Diane Greene
is at the center of the swirl
of development activity
at VMware.
40 | November 2007 | Redmond | Redmondmag.com |
1107red_F1Greene40-46.v6
10/16/07
10:04 AM
Page 41
To
Virtualization
and Beyond
By Ed Scannell
VMware’s Diane Greene is on a quest to
Y
make server virtualization ubiquitous.
ou can’t burn much hotter than VMware Inc.
is right now.
Fresh off one of Wall Street’s hottest IPOs of 2007,
VMware has risen from an obscure startup evangelizing
the relatively novel idea of virtualization on x86-based systems back in 1998 to a top-tier software powerhouse that
has made virtualization very much a mainstream technology.
The woman largely responsible for putting VMware in
the spotlight is Diane Greene, a co-founder of the company and its president and CEO since its inception.
Greene has grown VMware’s revenues to $709 million in
2006, a jump of 83 percent over the previous year, largely
on the strength of its Infrastructure 2 suite of software,
which offers tools to mange several different brands of
virtual machines, as well as its ESX Server and Virtual
Server offerings.
While Greene’s company has dominated the x86-based
virtualization market, it no longer has that space to itself.
Microsoft over the past couple of years has made it clear it
very much wants to play and play hard in the virtualization
space. Redmond is putting a lot of marketing and technology
muscle behind its Virtual Server 2005 release, trying to buy
market share with a free version of its Virtual PC 2007 product, and will include a hypervisor technology, called Viridian,
in its upcoming release of Windows Server 2008. Greene figures to increasingly fight the virtualization war on two fronts,
as VMware continues to get growing competition from the
open source community, most notably from XenSource Inc.
(recently acquired by Citrix Systems Inc.).
Prior to co-founding VMware, Greene, 52, held technical
leadership titles at Silicon Graphics Inc., Tandem Computers
and Sybase Inc., and was the CEO of VXtreme. Greene
holds degrees in mechanical engineering, naval architecture
and computer science from the University of Vermont,
PHOTOS BY RYAN NOTCH
Massachusetts Institute of Technology and the University
of California, Berkeley, respectively.
Greene sat down with Redmond magazine Editor Ed
Scannell to talk about some of the reasons for the growing
industry acceptance of virtualization technologies, being
one of the few companies to successfully fend of Microsoft
in a strategically important market, and the prospect of a
thriving third-party market for virtualization.
Redmond: How would you characterize the era
we’re now entering with virtualization technology?
Greene: I would say virtualization has become very much
mainstream. In the late 1960s and early 1970s IBM developed it for mainframes but it kind of died out. The problem
with the x86-based processors has been they were not
designed with virtualization in mind whatsoever. There was
research done at Stanford by some of VMware’s founders
around the idea that virtualization could gain isolation for
mainstream applications. That’s why we founded VMware,
really, to bring that to industry-standard systems. I think we
invented some important modernizations that allowed virtualization to work on industry-standard systems by taking
advantage of the extensive support for distributed computing. When we introduced it, we did so as a way to run
Linux on Windows in order to get a lot of people to start
using it on the desktop. Then, as we started partnering with
the server vendors, IBM in particular, they had some large
servers where the partitioning aspect of virtualization
allowed them to deliver compelling solutions to customers
and so server consolidation took off. It has now moved well
beyond that to where people see the power of virtualization
to the degree it’s causing an entire industry refresh. You can
do all sorts of systems infrastructure functionality in a new
and more powerful way.
| Redmondmag.com | Redmond | November 2007 | 41
1107red_F1Greene40-46.v6
10/16/07
10:04 AM
Page 42
Q&A: Diane Greene
“We estimate that about 90 percent of applications
today belong in virtual machines. Once the final
hardware assist is there from the processor and
peripheral vendors, all applications will run in
virtual machines.”
Diane Greene, Co-Founder, President and CEO, VMware Inc.
How soon before we get to the point where we
have virtualization for everyone?
Virtualization is definitely headed toward ubiquity. At
VMworld [in September] we announced our embedded
hypervisor, the ESX3i, and many of the major x86-based
hardware vendors announced they will ship servers with an
embedded ESX server in them. Anything that’s virtualized
has more flexibility, better utilization, and stronger reliability and security properties. I’d say there’s still some
hardware-assist work to be done. We estimate that about
90 percent of applications today belong in virtual
machines. Once the final hardware assist is there from the
processor and peripheral vendors, all applications will run
in virtual machines. What it gives you is this single way to
manage your software and manage it completely separately
from your hardware.
There’s some industry talk about the eventual
emergence of a complete virtualization system.
What’s your vision for that?
Once you have a comprehensive virtual infrastructure in
place where you buy servers already virtualization-enabled,
where you’re running a VMware infrastructure, then you
can have hot-pluggable machines. So if you’re running out
of capacity you can add servers and through VMware—or
some virtual infrastructure—the system will automatically
detect that you just added new resources and bring them
all online and make them available for applications. With
things like our VMotion technology you can automatically
move running applications around. Or if you want to take
something out of the system to service it, the systems will
automatically move the applications off with no interruptions because you have a fully distributed system infrastructure running. A virtual infrastructure really takes all
your hardware, server storage and network resources and
pulls it all together so you can run it as a single system.
So this idea of hot-pluggable virtualization, how far
away are we from seeing it on a wider-spread basis?
Well it works today and we have many customers running
over 50 percent of their servers with VMware infrastructure. We have some that run it on 100 percent. You’re asking how far away we are from everyone running that sort
of virtualized infrastructure? Well, I tend to be always
42 | November 2007 | Redmond | Redmondmag.com |
optimistic about adoption but it always happens more
slowly than you’d expect. It’ll be sooner rather than later. I
get nervous about making predictions these days because
now they call it ‘forward-looking statements.’
Do you envision a virtualization software stack
emerging around a set of industry standards?
Absolutely. In fact, I think we’re making progress there.
We announced right around VMworld the Open Virtual
Machine Format [OVF] that’s backed by many hardware
vendors and all the virtualization [software] vendors
including Microsoft and XenSource. So right there is a
virtual machine that can be self-describing, managed
and manipulated, and that contains an operating system
and applications. I think this is a big step forward. We
work actively with the DMTF [Distributed Management Task Force Inc.], which is a standards group for
APIs, formats and protocols for virtual-machine management. So in terms of what there will be for a stack,
there’s the core virtualization where the hardware will
just come virtualization-enabled. Then you have a full
virtual infrastructure that takes that virtualization layer
and exposes it to the software in a way that increases the
reliability, availability, security, capacity and utilization.
Then, on top of that, you’ll see vertical solutions like
solutions around desktop posting, virtual desktop infrastructure, or a solution around how to manage, test and
develop through virtualization. What virtualization is
making possible is an ability to truly automate the management of the software.
What’s the biggest obstacle to establishing
meaningful standards in the virtualization market?
There, too, we’re starting to make some really good
progress. Any standards process I’ve ever seen has a slower
pace than the pace of technology innovation just because
it’s bringing together a number of different companies all
moving at a different pace with different priorities.
I’ll be more direct: How big an obstacle is Microsoft
going to be in terms of setting meaningful standards?
Coming out and backing the OVF standard, I thought, was a
big step for them. We hope to do more and more with
Microsoft because it’s what our mutual customers want.
Project2
8/10/07
4:32 PM
Page 1
FOR DATA BREACHES, IDENTITY THEFT,
AND HARBORING SPYWARE AND VIRUSES.
CIOs and IT personnel are at risk of losing vital information and data, and are advised to search for
alternative computing methods. Desktop PCs and laptops are prone to data breaches, hackers, spyware,
viruses, and other crippling problems that can destroy IT infrastructures everywhere.
Devon IT’s line of thin client terminals make data theft virtually impossible. Data is stored and managed
on your enterprise servers and can only be accessed by authorized users.Thin clients provide true PC
experience without the threats of data theft and robbery.
Visit www.devonit.com/wanted or call 1.888.524.9382 for more information,or email [email protected] to receive
FREE White Papers and Case Studies about how thin clients have helped protect companies across the world.
SafeBook Notebook – Where Security
Meets Mobility
• No hard drive, so no sensitive data can be lost
• Runs anywhere, through wireless, Ethernet,
or 3G Broadband connections
• Battery lasts for over 6 hours
• HIPAA Compliant
• Starting at $599
Fanless Thin Client Terminals
•
•
•
•
Centralized management
Increased security
Low total cost of ownership
Starting at $139
www.devonit.com
1107red_F1Greene40-46.v6
10/16/07
10:04 AM
Page 44
Q&A: Diane Greene
History tells us that Microsoft’s inclination will be
to bundle as much virtualization technology into its
operating system as it can. In the past this sort of
strategy has served to wipe out whole categories of
competitors. What is to prevent this from happening
with virtualization software?
There are a number of reasons why we don’t see that happening. First, the last thing you want to do is bundle virtualization with the operating system. That just undermines a lot of
the value. With virtualization you are virtualizing the hardware so you want your hardware to come virtualization-
products. We also focused on making sure everything
works very well with Microsoft’s software stack. So as well
as adding value to our customers, we add value to the
Microsoft stack. The other thing we’ve done well is executed. We’ve consistently brought out major new innovations year in and year out. So the more of our functionality
customers use, the more money and time they save.
Is coopetition with Microsoft getting easier or more
difficult the last three or four years?
There are parts of Microsoft where I think we have pretty
good communication. Certainly I think there’s room for us
to improve our relationship.
In what areas?
“… The last thing you
want to do is bundle
virtualization with the
operating system. That
just undermines a lot
of the value.”
Diane Greene, Co-Founder,
President and CEO, VMware Inc.
enabled. That hardware will run any virtual machine, and
that virtual machine can have any version of any operating
system in it. The application can then choose the optimal
operating system, and you don’t have to choose the application based on what operating system the hardware supports. The other thing is, you don’t want to include an
operating system with a hypervisor because the smaller you
can make a piece of code, the more performance, security,
scalability and reliability it will have. If you can make it reliable and secure you don’t have patching issues to deal with.
I think in the areas of mutually giving our customers
what they want around licensing, and customer support,
there’s more we can do together. I think working jointly
more on open standards, APIs, protocols and formats. I
think we could work more with them around things we
could do with the hypervisors and the operating systems,
how we support their applications like Exchange or SQL
Server. We have large numbers of customers running
these major Microsoft workloads in our virtual machines.
There’s a lot more we can do to help these customers and
to the extent we can do these things together with
Microsoft would be great.
In some cases in the past Microsoft hasn’t been as
forthcoming as it could have been about things like
APIs with ISVs. What’s your experience there?
Customers understand what’s going on and have become
very articulate with Microsoft that they [Microsoft] need
to be more open, and understand that they can’t use arbitrary mechanisms to control the market. I think customers
speaking up are starting to cause some change in how
Microsoft approaches working with ISVs.
What has been your strategic approach to open
source, and to competitors like XenSource?
We’ve always worked extremely well with the Linux community. We developed a paravirtualization interface for how
an operating system could run on a hypervisor, and the
same binary could run both on the raw hardware as well as
on the hypervisor. We contributed that to the open source
community. In fact, that’s pretty much what Ubuntu Linux
is now shipping with. We were pleased with the open
source hypervisor community in that we were able to work
with them and get the OVF standard adopted. I think once
software has been around for years and years and isn’t on a
steep innovation curve, that’s the place for open source.
VMware is one of a handful of companies able to
fend Microsoft off in a strategically important
market. How have you been able to do this?
What’s the next big market opportunity for
VMware in virtualization?
I think it has to do with focusing hard on customer value,
working well with our partners and producing compelling
We have a huge vision of how we can further automate
and basically improve how software is delivered, man-
44 | November 2007 | Redmond | Redmondmag.com |
Project4
7/2/07
2:20 PM
Page 1
SYSTEMS MANAGEMENT
What’s really lurking beneath the surface of solutions from
Microsoft SMS, Altiris
and LANDesk ?
®
®
®
“A KBOX solution can cost as
little as one-quarter of its
software-only rivals.”
—Andi Mann, Senior Analyst,
Enterprise Management Associates
KACE TM helps midsize
COMPETITIVE COST COMPARISON
KBOX
$
Altiris
$
NOTHING TO HIDE HERE.
KBOXTM provides equal or advanced capabilities
and performance—without excessive hidden costs.
enterprises achieve
IT efficiency, productivity and reduce costs. Consider
$
$
KBOX—the leading systems management appliance—
$
LANDesk
$
$
$
$
Microsoft SMS
$
$
$
$
and get all the functionality at a price you can afford.
$
See White Paper for cost assumptions and
details—including a real-world cost comparison.
See for yourself in the FREE White Paper—Best Practices
in Lifecycle Management: Comparing KACE, Altiris,
LANDesk and Microsoft SMS. Get your copy today at
Winner MMS 2007—
Most Innovative Product
www.kace.com/redmond. Or call 888-522-3638 for details.
“KBOX appliances from KACE provide substantially
equivalent—and in some cases superior—capabilities
to Altiris, LANDesk and Microsoft SMS.”
—Andi Mann, Senior Analyst, Enterprise Management Assoc.
KACE and KBOX are trademarks of Kace Networks, Inc.
All other registered trademarks are owned by their
respective companies.
Systems Management. Done.
1107red_F1Greene40-46.v6
10/16/07
10:04 AM
Page 46
Q&A: Diane Greene
aged and maintained. That’s a pretty broad statement but
we have a number of initiatives around increasing the
reliability, the security and the automation of managing
your software.
We’re working with ISVs around the virtual appliances
area and that’s very exciting. It’s a very rich roadmap and
it’s a roadmap where there’s so much opportunity for all
the companies in the tech industry. It’s a big opportunity
because it’s not often you get this sort of refresh cycle
where people are upgrading their hardware and software;
changing the way they manage their software, changing
how they organize their IT because they can now treat the
software in such a uniform way.
enjoy working at VMware and the people here and so we
can bring back the most talented people.
What influence do you think virtualization will
have on IT shops more aggressively adopting
green technologies?
Well, power companies like PG&E [Pacific Gas & Electric
Co.] were the first to launch a program—and now there
are about 20 other power companies in the U.S.—that
actually offers rebates if you virtualize because of the huge
power savings. I was recently talking to one of our partners
who told me that they have a major green program and
they said the most leveraged way to go green in your data
“We’ve estimated that, accumulatively, something
like 7 billion kilowatt hours of power have been
saved with our virtualization software. We estimate
that’s enough to produce all of New England’s power,
heating and cooling for a year.”
Diane Greene, Co-Founder, President and CEO, VMware Inc.
How do you see a larger, vibrant, third-party
application market for virtualization evolving?
There will be explosive growth as all the hardware starts
becoming virtualized with virtualized infrastructure.
Then, there will be lots of solutions getting built. I believe
at VMworld we had almost 200 people exhibiting their
products, so there obviously is a lot of different ways
people are supporting virtualization. There’s a lot of it in
the infrastructure space but there are also solutions
around training, hosting and around software lifecycles.
There are the virtual appliances and software being
distributed in a virtual appliance, too.
How do you find great young talent for what you’re
doing there? Is it easier to attract people now that
virtualization technology is well-known?
Certainly, as we have become more visible, it has been
easier to find high-caliber people. As the impact of virtualization grows, really talented people are more and
more interested. We’ve always been able to attract good
people, but the number of good people we’re able to
attract has really gone up, which is a wonderful thing for
the company.
center is to virtualize. We’ve estimated that, accumulatively,
something like 7 billion kilowatt hours of power have been
saved with our virtualization software. We estimate that’s
enough to produce all of New England’s power, heating
and cooling for a year. It’s very significant and it’s something we here feel really good about.
Any ideas that have come to market from your
competitors that you wish you had thought of first?
There are things people are doing out there that I wish we
had. We have so many more ideas than we can execute on,
but we share them with our partners now because we can’t
get to them all. We’re so immersed in this that we see all
kinds of things to be done. I can’t say I’ve been surprised
by anything anybody has done, but some people are doing
really good things, that’s for sure.
What’s your acquisition strategy for the next
few years?
Do you prefer to recruit more experienced talent or
develop it yourself?
In the case where we’re building something and we don’t
have all the technology pieces and there’s a little startup
that has that technology, we’d look into acquiring them.
Where there are solutions being built around VMware
infrastructure that have strong compatibility with what
we’re doing and that our customers are asking us to give
them, we’d look into the possibilities of acquisition.
We do both. We have a really strong college intern program and so we work very closely with the universities. It’s
great to bring people in as interns and then they come to
Ed Scannell ([email protected]) is the editor of
Redmond magazine.
46 | November 2007 | Redmond | Redmondmag.com |
Project4
10/2/07
10:09 AM
Page 1
Advertisement
SharePoint Superstar Quiz
Are you a SharePoint Admin Superstar?
Take the AvePoint Quiz to find out.
1. A user's document is corrupt and won't open.
Can you restore it quickly, with all the metadata?
A) Yes, I can do a full-fidelity restore of any item.
B) Maybe, but not with all the metadata.
C) Met a what?
2. You have a large amount of data on your production SQL servers
causing major performance issues. What do you do?
A) Archive inactive items off of the servers, knowing they will still
be searchable and accessible from within a SharePoint site.
B) Buy more SQL servers.
C) What's a SQL server?
SCORING:
Total the number of A, B, and C
answers.
If you answered mostly A:
3. Your company is restructuring, and you need to move content
and change the topology of your SharePoint sites. What do you do?
A) Get the list of changes and make the moves – after all,
it's just a point-&-click.
B) Cringe because you don't know any easy way to make these changes.
C) Topology, is that the study of spinning things?
4. Your entire SharePoint content database crashes. What do you do?
A) Make sure that the standby database is up,
and use it to repair the main database.
B) Scramble to fix the problem, and hope you can
somehow get your SharePoint sites back online soon.
C) Hope you can still access the internet to look up job postings.
5. You need to move content from a SharePoint 2003 farm
to a SharePoint 2007 farm. What do you do?
A) Perform a full-fidelity item level migration of the content.
B) Rebuild everything from scratch in the SharePoint 2007 farm.
C) Call the Department of Agriculture.
SharePoint Backup, Archiving, Disaster Recovery,
Content Management and Migration Software
Download Free at www.AvePoint.com | 1.800.661.6588
YOU'RE A SUPERSTAR!
SharePoint admins everywhere look to
you with envy. You realize that there are
many issues you need to worry about
during your SharePoint deployment and
management, but you have the right
tools in place to make sure that you're
TM
covered. You must be running DocAve !
If you answered mostly B:
You've got potential. You realize that
there are issues that need your
attention, but you don't have the calm
coolness that comes from having
everything covered.
Visit WWW.AVEPOINT.COM
to download a copy of DocAve
and to take the next step on your
road to superstardom.
If you answered mostly C:
You're nothing but a poser! You've
barely even heard of SharePoint,
and the only reason you read this is
because you have a strange and
inexplicable addiction to quizzes.
Project4
10/2/07
8:56 AM
Page 1
1107red_F2Top5_49-56.v10
10/16/07
11:32 AM
Top
Page 49
5
s
k
c
i
r
T
t
n
i
o
P
r
e
w
o
P
d
n
a
d
r
o
for W
These flagship
Office 2007 apps
have some
interesting new
functions, if you
know where to look.
By J. Peter Bruzzese
ILLUSTRATIONS BY SCOTT BURROUGHS
ur collective attention span seems to be getting shorter these
days. We don’t have time to hear every minute detail about a
new application. We want to hear “just the facts.” Tell us what’s
new, tell us what’s better, and tell us how it’s going to make our
lives easier or more productive. That’s what “Top 5” lists are all
about. So, in that spirit, here are the top five latest and greatest new features and
functions for the new Microsoft Word
2007 and PowerPoint 2007 apps.
O
1
Word 2007:
Saving Files as
PDF (or XPS)
If you’ve ever had to convert a file to a
PDF, you know how frustrating it can
be if you don’t have the conversion
tool. I’ve been so desperate at times
| Redmondmag.com | Redmond | November 2007 | 49
1107red_F2Top5_49-56.v10
10/16/07
11:32 AM
Page 50
Word & PowerPoint 2007
that I’ve paid online companies to do
it for me. Not anymore.
You have to download an add-on
from Microsoft (go to Microsoft.com
and search for “2007 Microsoft Office
Add-in: Microsoft Save as PDF or
XPS”). Once it’s installed, you’ll see
this option every time you go to save
your documents.
You know what PDF is, but XPS certainly isn’t as well known as a file type.
It’s the new XML Paper Specification
that is an up-and-coming format for
sharing documents. A document converted to XPS maintains its look and
feel with no loss of quality. Your fonts,
formatting and high-quality images
still look the same. XPS is based on an
open standard—viewers are free for all
to download and use. You can even
open XPS documents with IE7. For
more information about viewing and
generating XPS files, check out
http://tinyurl.com/37z3yk.
Figure 1. The Document Inspector strips your document clean of personal
information before you share it with others.
Other Cool Stuff …
In Word
The new ribbon interface—we know many hate the change, but it’s the
future. It looks cool and it’s easy to use once you get the hang of it.
■ You use the Blog Editor for other purposes, so why not blogging, too?
■ The Office 2007 suite has enhanced SmartArt.
■ Themes traverse Office applications to give presentations a unified look.
■ The Contextual spelling checker helps when you spell things correctly,
but use words in the wrong context.
■ Live Previews lets you see what something is going to look like before you
make the final selection and have to use the Undo key if it doesn’t work.
—J.B.
■
2
Word 2007: Document Inspector
Your documents may contain metadata
or other information you might consider private. You don’t want to send
this along when you need to e-mail
your files to a colleague in another
department, branch office or company.
Items like comments, revisions, headers
or footers may contain information
you want to strip from a document
before you send it.
Finding all that hidden data can be
time-consuming and confusing. The
Document Inspector does it in just
moments. Select the Office orb, then
Prepare and then Inspect Document.
You can select or de-select any of the
options (see Figure 1), and then
choose the Inspect button to give
your file a run-through.
3
Word 2007: Full
Screen Reading
Personally, I’m not much of an “onscreen” reader. I prefer a good oldfashioned book or magazine in my
hands. There are many, however, who
spend hours reading documents on
their screens. The new screen-reading
display in Word 2007 is much
improved from Word 2003 when it
was called Reading Layout.
50 | November 2007 | Redmond | Redmondmag.com |
The purpose of Word 2007’s new
display is to make documents more
legible onscreen. It uses ClearType
technology, which provides a
crisper display of text on modern
monitors. Several new fonts are
designed to take advantage of
ClearType technology, such as
Calibri, Cambria, Consolas, Candara,
Corbel and Constantia.
4
Word 2007:
Building Block
Organizer and Quick
Parts Gallery
I remember the days of Word 6.0
macros. Ah, the good old days. Word
2007 gives us better days with the
Building Block Organizer. Sometimes
you don’t want to create an entire
Project5
7/16/07
10:34 AM
Page 1
1107red_F2Top5_49-56.v10
10/16/07
11:32 AM
Page 52
Word & PowerPoint 2007
document template. You just need a
piece, like a header/footer arrange-
ment or a cover page you can use over
and over again.
With Word 2007, you can create
your own “blocks” to add to the
Quick Parts Gallery, which is located
on the Insert ribbon, under the Text
grouping (it’s listed as “Quick Parts”).
You could also select from one of
many pre-configured “blocks” to add
preformatted content (see Figure 2).
Figure 2. The Building Block Organizer gives you a quick way to add
preformatted content.
5
Word 2007:
Built-In
Translation Tools
¿Habla Español? Ni keyi shuo
Zhongwen ma? Do have any idea
what I’m saying?
No worries, because Word 2007
includes built-in translation tools.
The Translate tool and the Translation ScreenTips tool are both located
on the Review ribbon, under the
Proofing group.
These are excellent for those of us
who work with documents in other
languages from time to time. When
you use the Translate tool, the
Research pane will appear. A company
called WorldLingo.com helps with
the translation. Translation ScreenTips operate a bit differently. You
select a language to which you want a
word converted, hold your cursor
over a word and it will bring up a definition for that word.
PowerPoint
1
PowerPoint
2007: The
Selection Pane
Sometimes you’ll end up with a PowerPoint slide so complicated and filled
with so many objects that you can’t see
them all, especially if they’re layered
over one another. If revising the slide
for greater simplicity isn’t an option for
whatever reason, there’s another way to
get the whole slide into view.
The Selection Pane can help you
see your objects by listing them all in
a side panel. You can select them
individually to make them appear.
This pane isn’t easy to find, however,
so it might have gone unnoticed. It’s
located right on the Home ribbon in
the Editing group. Click on the
down arrow next to Select and
choose Selection Pane. By selecting
or deselecting the little “eye” next to
a shape, you can make them appear
or disappear.
52 | November 2007 | Redmond | Redmondmag.com |
2
PowerPoint
2007:
Presenter View
If you frequently use PowerPoint to
give presentations to a large audience
using additional AV equipment, you’re
Project6
No
w
9/4/07
st
Vi
a
Su
1:25 PM
p
r
po
te
Page 1
d
Bringing Your Assets into Focus
Without a comprehensive IT asset management solution in place, you may only be seeing half the
picture. That presents dangers like system downtime from improper upgrades, poor customer service,
overpaying on license fees and inappropriate usage of software/internet by employees.
NetSupport DNA facilitates central management of your enterprise IT assets in a secure, coordinated
and efficient manner. NetSupport DNA is available in a modular format including Hardware and Software Inventory, Alerting and Change History with Software Distribution, Application/Internet Usage
Metering, PC Remote Control and Web-Based Helpdesk. NetSupport DNA provides a flexible solution
that can be operational in under 30 minutes and requires no additional training or certification.
Discover assets. Uncover inefficiencies. Recover costs.
Get the whole picture with NetSupport DNA.
NETSUPPORT
[email protected]
770-205-4456
www.netsupportdna.com
1107red_F2Top5_49-56.v10
10/16/07
11:32 AM
Page 54
Word & PowerPoint 2007
Other Cool Stuff …
In PowerPoint
The zoom slider makes zooming in and out much quicker and easier.
Use Ctrl+G (or Ctrl+Shift+G) to group or ungroup selected items.
■ You can save files as PDF or XPS, just like in Word.
■ There are a couple of new autoshapes and font effects.
■ PowerPoint also has the Inspect Document feature.
■ You can select undo/redo even after you save your file.
—J.B.
■
Figure 3. The Presenter View makes giving the presentation much more fun and
easy to understand.
going to love this feature. I had the
chance to use this feature at Redmond
magazine’s last TechMentor Conference in Orlando when I was speaking
on the subject of Windows Vista and
Office 2007.
Essentially, the Presenter View lets
you display your PowerPoint slides on
another monitor or onto a screen
through a projector. While you’re
doing this, PowerPoint shows you—
the presenter—a view of your notes, a
preview of the current slide and
upcoming slides in your slide deck.
Rather than trying to memorize your
presentation, or work from a side set of
awkward notes, you can enlarge them
so they’re easy to see (see Figure 3).
You can also use the thumbnails to
choose slides out of order if you need
to customize your presentation on the
fly. This is a great feature, because
instead of clicking through five slides
and saying, “You don’t need this one,
or that one,” you can jump right to the
slide you need to make your point. To
turn on Presenter View, go to the Slide
Show ribbon and look for the settings
under the Monitors group.
Master and make changes so your
presentations conformed to a certain
look without having to change each
individual slide. You would just make
changes to the Master Slide and the
entire presentation would have a uniform look.
PowerPoint 2007 still uses a Slide
Master, but it has a section of slide
layouts beneath it as well. In other
words, you have the primary slide format, and beneath that you have a title
slide layout, title and content slide
layout and so on. The individual layouts inherit formatting from the Slide
Master. From there, you can make
additional changes to each layout. To
see these layouts, go to the View ribbon, then the Presentation Views
group and select Slide Master.
Another change you might like
(especially if you’re really into PowerPoint) is the ability to change placeholders within Slide Masters. For
PowerPoint novices, a placeholder is
the message that comes up in your
established section boxes that say
things like “Click to Edit Text.” It can
also be a pre-determined spot for a
chart, table or diagram. To change
placeholders, you need to open the
Slide Master. Then on the Slide Master ribbon, under the Master Layout
group, select the down-arrow next to
Insert Placeholder and you’ll see your
options (see Figure 4, p. 56).
4
3
PowerPoint
2007: Slide
Master Configuration
In previous versions of PowerPoint,
you could always go into the Slide
54 | November 2007 | Redmond | Redmondmag.com |
PowerPoint
2007: MS Graph
Is Gone
You can say goodbye to MS Graph if
you also have Excel 2007 on your
system (which you most likely would
with the Office 2007 suite). You can
add a chart or graph to your presen-
Project2
7/16/07
9:21 AM
Page 1
ZZZUDGPLQFRPUDGPLQ
Š
5$'0,1 VXSHUVRQLF UHPRWH FRQWURO
5$'0,1 LV WKH PRVW VHFXUH DQG UHOLDEOH UHPRWH
FRQWURO VRIWZDUH GHVLJQHG WR PRQLWRU VXSSRUW
RU ZRUN RQ UHPRWH FRPSXWHUV LQ YLUWXDOO\ UHDO WLPH
5$'0,1 KDV SURYHQ WR EH LQFUHGLEO\ IDVW DQG HDV\
WR XVH DSSOLFDWLRQ 5$'0,1 LV D FRPSOHWH UHPRWH
FRQWURO VROXWLRQ WKDW KDV DOO PLVVLRQFULWLFDO IHDWXUHV
:LWK WKH LQYHQWLRQ RI 'LUHFW6FUHHQ7UDQVIHUŒ
7HFKQRORJ\ 5$'0,1 UHPRWH FRQWURO VRIWZDUH GH¿QHV
QHZ VWDQGDUGV LQ WKH LQGXVWU\
6XSHUVRQLF YHKLFOH VSHFL¿FDWLRQV
*HQHUDO FKDUDFWHULVWLFV
3HUIRUPDQFH
0LOLWDU\JUDGH VHFXULW\
6XSHUVRQLF IUDPH SHU VHFRQG VSHHG RQ /$1
IUDPHV SHU VHFRQG RU PRUH RQ PRGHP
3RZHUSODQW 'LUHFW6FUHHQ7UDQVIHU70
:HLJKW 0E
)HUU\ UDQJH XQOLPLWHG
:LQJVSDQ YDULDEOHJHRPHWU\ GHVNWRSVL]HG
)XOO\ 26LQWHJUDWHG 17 VHFXULW\ V\VWHP ZLWK
17/0Y VXSSRUW
,3 ¿OWHU WDEOH WKDW UHVWULFWV UHPRWH DFFHVV WR VSH
FL¿F ,3 DGGUHVVHV DQG QHWZRUNV
6HUYHU SDVVZRUG SURWHFWLRQ
$GYDQFHG ELW $(6 HQFU\SWLRQ IRU DOO VHQGLQJ
DQG UHFHLYLQJ GDWD
$XWKHQWLFDWLRQ EDVHG RQ 'LI¿H+HOOPDQ H[FKDQJH
ZLWK ELW NH\ VL]H
.HUEHURV VXSSRUW
&RGHWHVWLQJ GHIHQVH PHFKDQLVP WKDW SUHYHQWV
WKH SURJUDP¶V FRGH IURP EHLQJ DOWHUHG
6PDUW SURWHFWLRQ IURP SDVVZRUG JXHVVLQJ
,QFRUUHFW 6HUYHU FRQ¿JXUDWLRQV SUHYHQWLRQ
*HQHUDWLRQ RI XQLTXH SULYDWH NH\V IRU HDFK FRQ
QHFWLRQ
7ULYLD
1R FRPSHWLWLRQ LQGXVWU\ EUHDNWKURXJK
9LVWD 26 6XSSRUW
6XSHUVRQLF )36 UDWLR
/RZHVW SURFHVVRU XVH
0LQLPXP WUDI¿F FRQVXPSWLRQ
8OWLPDWH VHFXULW\ VWDQGDUGV
3ULFH UDQJH
$UPDPHQW
6HFXUH YRLFH DQG WH[W FKDW IHDWXUHV
)LOH FDUJR WUDQVIHU
7HOQHW DQG RWKHU XVHIXO WRROV
7\SH 0XOWLUROH 6XSHUVRQLF 5HPRWH &RQWURO
0DQXIDFWXUHU )DPDWHFK
'HVLJQHG E\ 'PLWU\ =QRVNR
0DLGHQ ÀLJKW 0DUFK 9 LQWURGXFHG -XQH 6WDWXV DFWLYH VHUYLFH
1XPEHU EXLOW PLOOLRQV
3ULPDU\ XVHU XSWRGDWH EXVLQHVV DOO RYHU WKH
ZRUOG
8QLW FRVW 86 VTXDGURQ GLVFRXQWV DYDLODEOH
2SHUDWLRQDO KLVWRU\
FRPSDQLHV RI )RUWXQH OLVW ZLWK ZLGH
JHRJUDSKLF VSUHDG
1RUWK $PHULFD
6RXWK $PHULFD
(XURSH
$XVWUDOLD DQG 2FHDQLD
$VLD
$IULFD
7\SLFDO FRPEDW XVH
&RUSRUDWH
6PDOO DQG PHGLXP EXVLQHVV
+HOSGHVN SURYLGHUV
7HOHFRPPXWLQJ
(GXFDWLRQDO
+RPH
‹ )DPDWHFK ,QWHUQDWLRQDO &RUSRUDWLRQ
5DGPLQŠ DQG 5HPRWH $GPLQLVWUDWRU DUH UHJLVWHUHG WUDGHPDUNV RI )DPDWHFK ,QWHUQDWLRQDO &RUS
1107red_F2Top5_49-56.v10
10/16/07
11:32 AM
Page 56
Word & PowerPoint 2007
Statement of Ownership, Management and Circulation
(Required by 39 U.S.C. 3685, United States Postal Service)
1.
2.
3.
4.
5.
6.
Title of Publication: Redmond
Publication No. 1553-7560
Date of Filing: 10/01/07
Frequency of Issue: Monthly
No. of issues published annually: 12
Annual Subscription Price: $39.95, Canada/Mexico $54.95, All other
International $64.95.
7. Mailing address of known office of publication: 9121 Oakdale Ave.,
Ste. 101, Chatsworth, CA 91311.
8. Mailing address of the headquarters of general business offices
of the publisher: Same as above.
9. Name and complete mailing address of Publisher, Editor, and
Managing Editor:
Henry Allain, Publisher, 16261 Laguna Canyon Rd., Ste. 130,
Irvine, CA 92618.
Doug Barney, Editor in Chief, 16261 Laguna Canyon Rd., Ste. 130,
Irvine, CA 92618.
Wendy Gonchar, Managing Editor, 16261 Laguna Canyon Rd.,
Ste. 130, Irvine, CA 92618.
10. Owner (s):
1105 Media, Inc. dba: 101communications LLC, 9121 Oakdale Ave,
Suite 101 Chatsworth, CA 91311. Listing of shareholders in 1105
Media, Inc.
11. Known Bondholders, Mortgagees, and Other Security Holders Owning
or Holding 1 Percent or More of the Total Amount of Bonds,
Mortgages or Other Securities:
Nautic Partners V, L.P., 50 Kennedy Plaza, 12th Flr.,
Providence, RI 02903
Kennedy Plaza Partners III, LLC, 50 Kennedy Plaza, 12th Flr.,
Providence, RI 02903
Alta Communications 1X, L.P., 1X-B, L.P., Assoc., LLC, 200 Clarendon
St, Flr. 51, Boston, MA 02116
12. The tax status for Redmond has not changed during the
preceding 12 months.
13. Publication Title: Redmond
14. Issue date for Circulation Data Below: October 2007
15. Extent & Nature of Circulation:
Average No. Copies
No. Copies of
Each Month
Single Issue
During Preceding
Published Nearest
12 Months
to Filing Date
a. Total Number of Copies
(Net Press Run)
84,839
84,856
b. Legitimate Paid/and or
Requested Distribution
1. Individual Paid/Requested
Mail Subscriptions
Stated on Form 3541
80,352
80,087
2. Copies Requested by Employers for
Distribution to Employees by Name or
Position Stated on PS Form 3541 0
0
3. Sales Through Dealers, Carriers,
Street Vendors, Counter Sales, and
Other Paid or Requested Distribution
Outside USPS®
235
97
4. Requested Copies Distributed by Other
MailClasses Through the USPS 0
0
c. Total Paid and/or
Requested Circulation
80,587
80,184
d. Nonrequested Distribution
Nonrequested Copies Stated
on PS Form 3541
3,074
3,348
1. Nonrequested Copies Distribution
Through the USPS by Other
Classes of Mail
0
0
2. Nonrequested Copies Distribution
Outside the Mail
716
869
e. Total Nonrequested Distribution 3,791
4,217
f. Total Distribution
84,378
84,401
g. Copies not Distributed
462
455
h. Total
84,839
84,856
i. Percent paid and/or
Requested Circulation
95.51%
95.00%
16. Publication of Statement of Ownership for a Requester Publication
is required and will be printed in the November 2007 issue of this
publication.
17. I certify that all information furnished on this form is true and
complete:
Abraham Langer, VP of Audience Marketing and Web Operations
Figure 4. Changing the Slide Master and adding placeholders gives you greater
control over your presentations.
tation in one of two ways. If you
embed and insert the chart into the
presentation, you’ll do the editing in
an Excel 2007 worksheet. The worksheet file is saved with the PowerPoint file, so you won’t need to keep
track of two files. If you already have
a chart in an Excel worksheet, you
can paste the Excel chart into your
presentation and it will link back to
the Excel worksheet.
To see some of these features at work,
just add a new slide to your presentation
and choose the Picture with Caption
layout for that slide. Add your picture
by selecting the icon in the middle, then
selecting the Design ribbon.
From the Themes group, notice
what happens to that picture if you
choose one of the many theme
designs. For example, if you choose
the Opulent theme, the picture looks
like it’s part of a stack. If you choose
the Solstice theme, the picture looks
like it’s attached to the slide with
tape. Each one is a little different and
you can change the pictures even
more with the many picture tools.
Just the Facts
PowerPoint
2007: New and
Improved Effects
We’ll cover the top five greatest new
features and functions of Microsoft
Excel 2007 and Outlook 2007 next
month. If you have any favorite
aspects of Word or PowerPoint that
we didn’t cover here, let us know at
[email protected]. —
The graphic improvements are outstanding, from effects like shadows,
reflection, glow, soft edges, warp,
bevel and 3-D rotation to shapes,
SmartArt graphics, tables, text and
WordArt. There are also picture
styles, recoloring abilities and interesting photo edges.
J. Peter Bruzzese ([email protected]),
MCSE/MCT, is the author of “Tricks
of the Vista Masters” and “Excel 2007
Brilliant PocketBook.” He’s also the
co-founder of ClipTraining.com, which
provides brief training videos for
Microsoft tools and applications.
5
56 | November 2007 | Redmond | Redmondmag.com |
Project7
9/14/07
10:41 AM
Page 1
Advertisement
Pro-Active Solutions for User Account Management
Case Study: Chino Valley Unified School District
Advanced Toolware Delivers Real-Time User Life Cycle
Solutions for Active Directory
The Situation
The day-to-day management of over 34,000
user accounts was growing increasingly
difficult and time-consuming for the Chino
(California) Valley Unified School District.
The management of all user accounts in
Active Directory was an entirely manual
process, creating enormous inefficiencies.
The district lacked any clear standards and
consistency. Third party scripts did nothing
to simplify the situation or help with the
management of accounts in other applications, such as Renaissance Learning, Riverdeep, Orchard, and Easy Grade Pro.
By June 2006, the system had reached a
breaking point. “Because of our constant
growth and limited staffing, we had to find
a solution that would allow us to streamline
and automate our entire user account lifecycle,” said Georges Khairallah, Network
Specialist for the Chino Valley Unified
School District. “That’s when we turned to
Advanced Toolware.”
Out-Of-The-Box Solution
Advanced Toolware immediately identified
the key problems within the IT Department
and identified four specific requirements:
x
x
x
x
Integrate user and directory management with Aeries CS Student Information System and other district applications
Empower users with the ability to
administer Active Directory without
escalating privileges
Allow users to perform complex tasks
without knowledge of advanced scripting or programming
Provide transparent auditing and reporting to verify information with the
Student Information System
“UMRA’s out-of-the-box database connectors saved us valuable
time” Georges Khairallah
Next, Advanced Toolware implemented
User Management Resource Administrator,
their enterprise level software package for
Active Directory, to automatically manage
user accounts across the domain and securely delegate day-to-day administrative
tasks to employees. Automating common
operations to run in the background made
sense for a district as large as Chino Valley.
The ability to integrate the Student Information database with Active Directory and
other applications saved countless hours
each day. The provisioning process, including account creation with all group memberships and home folders, was also fully
automated. As a result, students use the
same user name across all applications. The
User Management Resource Administrator
also ensures that all users are set up correctly the first time and all subsequent updates happen automatically.
Giving faculty and staff the ability to manage users had an immediate impact for the
entire district. Teachers can now solve
problems with student accounts, without
any technical training or administrative
privileges. Problems, such as a forgotten
password and/or locked out user account,
can be quickly solved without involving the
IT department. What used to take hours to
solve, now takes seconds with the click of a
single button.
Instant Return On Investment
Upon implementation, Chino Valley Unified School District immediately realized
enormous gains in productivity. The time
spent creating accounts each year was reduced from weeks to mere minutes. The
process of maintaining student accounts
manually was eliminated, saving hundreds
of hours annually. Technicians now focus
their time and attention on the areas of network management that require their expertise. “User Management Resource Administrator gave us an opportunity to leverage
our creativity,” said Khairallah. “It opened
a big door to creating solutions that we
never thought were possible.”
Chino Valley Unified School District serves
over 33,000 K-12 students. The district is
one of the largest in California and has been
recognized as the highest ranked school
district in San Bernardino County.
Tools4ever Products in
partnership with
Advanced Toolware
Consulting Division
specializes in managing user account information throughout the entire network and
offers software solutions to greatly simplify
user account management. With thousands
of customers worldwide, Tools4ever and
Advanced Toolware are committed to delivering superior products and customer
support.
For additional information contact Tools4ever at
New York: 1-866-482-4414
Seattle: 1-888-770-4242
Or visit us online at:
www.Tools4ever.com/chino
All trademarks and registered trademarks are the property of their respective owners
Project5
10/8/07
11:15 AM
Page 1
Broken
Broken links caused
caused
by
by data
data migrations?
migrations?
• •Migrating
Migratingdata
datadue
due to
to
server
serverupgrades,
upgrades,server
server
consolidations
consolidationsor
or new
new
storage
storageservers?
servers?
LinkFixerPlus
LinkFixerPlus is the first
first application
applicationthat
thatautomatically
automaticallymaintains
maintains
links
links in
in files
files when you move
move or
or rename
renamefiles,
files,folders
foldersorordrives.
drives.
With
With LinkFixerPlus,
LinkFixerPlus, you
you can:
can:
•• Perform
Perform data migrations
migrations of
of Excel,
Excel,Word,
Word,Access,
Access,
PowerPoint,
PowerPoint, AutoCAD,
AutoCAD, HTML,
HTML,PageMaker,
PageMaker,InDesign
InDesign
and
and PDF
PDF files, in batch,
batch, without
withoutcausing
causingbroken
brokenlinks.
links.
• •Folder
Folderreorganizations?
reorganizations?
•• Automatically
Automatically fix broken
broken links
linksin
infiles
filesthat
thathave
havealready
already
been
been moved.
moved.
• •Server
Servername
namechanges?
changes?
•• Generate
Generate broken link
link reports
reportsand
anddetailed
detailedparent
parentand
and
child
child file
file reports.
• •Broken
Brokenlinks?
links?
•• Process
Process thousands of
of files
files in
in one
onerun.
run.
Request
Requestyour
yourfree
free30-day
30-day evaluation
evaluation copy of
LinkFixerPlus
LinkFixerPlusfrom:
from:www.LinkTek.com.
www.LinkTek.com. E-mail
E-mail us
us
[email protected]
[email protected] or
or call
call 727-442-1822.
727-442-1822.
Copyright
Copyright
© 2006
© 2006
LinkTek.
LinkTek.
All rights
All rights
reserved.
reserved.
LinkFixerPlus
LinkFixerPlus
is aistrademark
a trademark
of LinkTek
of LinkTek
Corporation.
Corporation.
Patent
Patent
No.No.
7,032,124.
7,032,124.
All other
All other
products
products
mentioned
mentioned
areare
trademarks
trademarks
of their
of their
respective
respective
holders.
holders.
1107red_F264bit59-62.v7
10/16/07
10:17 AM
Page 59
Unix:
The 64-Bit
Gold Standard
Many say it will be years before 64-bit Windows
becomes a serious challenger.
By Paul Korzeniowski
icrosoft may be the behemoth of the software
industry, dominating lucrative markets like desktop operating systems, productivity applications
and application development tools, but there is
one area where its influence is miniscule, not monstrous.
It still lags behind in high-performance computing.
M
“For compute-intensive applications, medium and large
companies still turn to Oracle running on a Unix server
rather than SQL Server running on a PC server,” says John
Enck, a vice president at Gartner Inc.
An important reason for the continued performance delta
between Unix and Windows is the former’s superior support
ILLUSTRATION BY RALPH VOLTZ
| Redmondmag.com | Redmond | November 2007 | 59
1107red_F264bit59-62.v7
10/16/07
10:17 AM
Page 60
for 64-bit processing. In the Unix market, the migration to
64-bit computing has become routine. On the other hand,
Windows still finds itself in a relatively embryonic stage of
64-bit computing. At the turn of the millennium, Microsoft
made significant investments in this area, but they resulted in
little to no progress. There are a handful of reasons for that.
“Microsoft has been trying to get software vendors to
move to 64-bit computing, but most just haven’t seen a
compelling reason to do that,” says Joe Clabby, president
of market research firm Clabby Analytics.
Despite its lack of progress, Microsoft continues to throw
research and development dollars at the high end of the
computing market. SQL Server has operated with 64-bit
processing for a few years, Vista comes in 32-bit and 64-bit
modes, Exchange and other Windows Server 2007 products were built to run with 64-bit microprocessors, and the
company is requiring that all third-party vendors deliver
64-bit versions of their products in order to gain Microsoft’s
blessing in the future.
While these steps should help Microsoft present a
stronger case to Fortune 500 companies, observers expect
many more years will pass before they rely on Windows for
complex, back-end processing. “It took close to a decade for
Microsoft to move Windows from 16-bit to 32-bit processing, and it looks like that will also be the case with its migration from 32-bit to 64-bit processing,” says Gartner’s Enck.
Performance Matters
In the heart of the data center, where high-performance
applications reside, performance is king. And 64-bit processing flat out delivers more than 32-bit. The difference
centers on how the system manipulates data. In the 32-bit
world, you can place a maximum of 4GB of data in a computer’s internal memory. Placing data in internal memory,
as opposed to reading it from disk, improves performance
because there are fewer input/output read/writes to disk
subsystems. This takes significantly longer than working
directly with the information.
A 64-bit system can work with up to 16TB of internal
memory. Consequently, 64-bit systems address more memory faster and process more data per clock cycle. This
greatly improves complex application performance.
In 2003, Microsoft released its Windows Server 2003
Datacenter Edition. Executives boldly discussed burrowing
their way into the back-end of the data center. “I did
expect faster adoption of 64-bit computing on Windows,”
notes Aaron Foint, Windows systems administrator at
Worcester Polytechnic Institute. “Right now, there are just
not a lot of 64-bit applications available.”
One necessary building block has fallen into place. Many
servers (estimates range as high as 90 percent of all servers
sold since 2006) can indeed run 64-bit applications, even
though most now work with 32-bit operating systems, says
Jason Hermitage, senior product manager at Microsoft.
The crooked path of Microsoft’s 64-bit server strategy
has been a problem, though. Initially, the company crafted
60 | November 2007 | Redmond | Redmondmag.com |
When Will 64-Bit Computing
Arrive at the Desktop?
Like throwing a rock into the middle of the
lake, moving to 64-bit computing starts at the
heart of the data center and gradually ripples
out to the edges of a company’s network. The
first ripple is evident. Hardware vendors have
been delivering 64-bit servers for a few years,
and a select number of applications now take
advantage of that extra processing power.
Now it’s clear that desktop hardware manufacturers are also getting ready for 64-bit processing. “Many desktop systems already come
with 1GB of internal memory,” notes Nathan
Brookwood, principal analyst at market
research firm Insight 64.
Currently, it only costs a company a few hundred dollars to outfit a PC with 4GB of memory.
This is currently 32-bit processing’s upper
threshold. Intense competition is expected to
push memory pricing down and the amount of
memory on these systems up. Therefore, in the
next 12 to 18 months, a growing number of
desktop systems will indeed be able to support 64-bit computing.
Microsoft laid the foundation for its movement to 64-bit computing at the desktop with
Windows Vista, which supports both 32-bit
and 64-bit processing. While the operating
system is 64-bit-ready, few applications
require that much bandwidth. High-end imaging, complex multimedia and financial-analysis
applications are three that will lead the charge
to this migration.
Any migration is yet to appear on the horizon, though. Servers can skirt limitations, like a
lack of device drivers and infrastructure software, because they often operate in a closed
environment, moving information from internal
to external storage. Desktop computers need
all the 64-bit accoutrements to be in place
before they make the switch. So even though
the 64-bit-processing rock has been dropped
in the data center pond, its ripples are still a
long way from reaching the desktop.
—P.K.
Windows XP to run on Intel Corp.’s Itanium microprocessor line as its primary 64-bit platform. That may not have
been the best choice.
“Application developers were unfamiliar with the Itanium
processor,” notes Brian Corcoran, manager of Windows
host development at SAS Institute Inc.’s JMP division.
Compounding that drawback was application compatibility.
The first few 64-bit versions of Windows didn’t seamlessly
support native 32-bit and 64-bit Windows applications.
Project2
8/13/07
10:01 AM
Page 1
1107red_F264bit59-62.v7
10/16/07
10:17 AM
Page 62
Because of this, Microsoft has been moving away from the
Itanium architecture, which has its roots in the Unix market. It has instead focused on x64 microprocessors, which
have a PC microprocessor foundation.
Missing Pieces
Yet another hurdle is that the entire Windows ecosystem
(software, peripherals and device drivers) needs to be
rebuilt to take full advantage of 64-bit processors. For
instance, a 32-bit DLL can’t address memory space larger
than 4GB, which a 64-bit processor does easily. Currently,
64-bit apparel for the Windows world is more of a fig leaf
than a full wardrobe.
Device drivers for hardware peripherals, like scanners and
printers, are hard to find. Few application-development
tools have been rewritten to support 64-bit processing.
Application infrastructure software, like vital anti-virus
software, is also missing.
Because application development is such a chore, only
companies that really need the extra processing power
have taken on the challenge. The first wave of applications
Database management systems (DBMSes) are an area
where 64-bit computing is taking root. If a company can
place an entire database in memory and process a query
without having to read it from a disk, then it can provide
significantly faster results.
In 2006, Gainesville State College (GSC) in Gainesville,
Ga., which has 7,500 students and 750 faculty and staff,
decided to upgrade to the 64-bit version of SQL Server.
After sorting through some pesky problems, like getting its
32-bit applications and 64-bit applications to work harmoniously on the server, the college found that the 64-bit
technology delivered a significant performance boost,
according to Brandon Haag, executive director of IT.
GSC, which relies solely on Microsoft software, has been
testing Exchange Server 2007 and SharePoint Server 2007.
The goal is to have them fully operational by the end of the
year. This rollout represents a few of several steps that
Microsoft is taking to prod its customer base and third-party
supporters to move to 64-bit computing. Starting in 2008,
independent software vendors will need to deliver 64-bit versions of their apps in order to earn Microsoft’s certification.
Skeptics Reign Supreme
“ It took close to a decade for
Microsoft to move Windows from
16-bit to 32-bit processing, and it
looks like that will also be the
case with its migration from
32-bit to 64-bit processing.”
John Enck, Vice President, Gartner Inc.
has included large database-management systems, decisionsupport and business-intelligence systems, medical applications like drug discovery and medical imaging,
computer-aided design and-computer aided engineering,
enterprise resource planning (ERP), customer relationship
management (CRM) and supply chain management
(SCM), video production and gaming-software design.
Cakewalk, which develops desktop music and sound software, is a true pioneer. It moved to 64-bit Windows in
2005. Because its software manipulates multimedia files,
the extra processing power was desirable. Its migration did
present a few challenges, however.
“In theory, moving to 64-bit computing should have
been simple,” says Noel Borthwick, chief technology officer at Cakewalk. “In reality, we ran into a few unexpected
gotchas.” Cakewalk found that many development tools
rely on 32-bit, not 64-bit, algorithms to track code.
Something as simple as inserting a pointer to tell an
application where to locate data became a cumbersome
programming task.
62 | November 2007 | Redmond | Redmondmag.com |
Even with those moves, many remain skeptical of using
Windows to support complex applications. Although
Windows will have 64-bit capabilities, it lacks other needed
features. “Reliability is a key function for high-performance
applications. Users don’t want their systems going down,” says
Nathan Brookwood, principal analyst for market research
firm Insight 64. Unix systems are more resilient than PC
servers because they support features like hot failovers,
where transactions are completed even during an outage.
Personnel requirements are another obstacle. While
there are oodles of Microsoft-certified engineers sitting in
IT department cubicles, the number of them that actually
understand how to deploy and support complex high-end
applications is relatively low. Consequently, Microsoft professionals will need knowledge transfers from more experienced Unix systems administrators. It’s unclear how much
help these individuals may be, however. In some cases, they
may push their enterprises toward Linux alternatives and
away from Windows.
Inertia appears to be still another force working against
Microsoft. “Large companies are extremely cautious with
their key applications,” explains Clabby Analytics’ Clabby.
“They won’t move to a new computing platform unless
something is tried and true and offers them compelling
economic advantages.”
To date, Windows simply hasn’t given them a good reason to make that change. While Microsoft has dominated
many other markets, the back-end of the data center is one
area where the company is now—and will remain for at
least a few more years—a persona non grata. —
Paul Korzeniowski ([email protected]) is a freelance writer
based in Sudbury, Mass. He specializes in technology issues.
Project2
8/13/07
10:06 AM
Page 1
1107red_F2Carbon64-68.v8
10/16/07
3:39 PM
Page 64
Manage
Your
Carbon
Footprint
D
o you know the size of your organization’s carbon footprint? How about
the amount of kilowatts your computers use on a daily basis? If you don’t
know these stats right now, there’s a
good chance you’ll have to in the near future. It’s
good business today, and it’s going to be a big part
of tomorrow’s regulatory environment. Most
importantly, IT will be right at the center.
The European community is much further along
than the United States in terms of integrating ecological considerations into daily life. It’s pursuing
regulation on the ecologically friendly design of
energy-using products (EuPs) through Directive
2005/32/EC. This directive will require manufacturers to calculate the energy used to produce,
transport, sell, use and dispose of almost all prod-
64 | November 2007 | Redmond | Redmondmag.com |
The growing
importance of energy
efficiency gives IT a
leadership role
in the enterprise.
By Peter Varhol
1107red_F2Carbon64-68.v8
10/16/07
3:39 PM
ucts. It will also require manufacturers
to go back to the energy used when
extracting the raw materials needed to
make its product, including all subassemblies and components.
Don’t think you’re immune if you
don’t do business in the European
Union. There are also proposals in
the United States to provide each and
every company with a carbon allocation. Exceeding this allocation will
result in fines and other penalties. You
can also expect a developing market
for trading carbon credits. This is
likely to be at least two years behind
the EuP, but will almost certainly happen eventually. In the near term, California will soon require some
industries to disclose carbon information to implement its statewide cap on
greenhouse gas emissions.
The need for greater understanding
doesn’t stop at carbon emissions.
Because of the tie-in among carbon
emissions, greenhouse gases and global
warming, it gets the most attention
today. However, there’s both good
public relations and good business in
other sustainable practices like conserving electrical power, recycling and
hazardous waste disposal.
There’s not a direct relationship
between carbon footprint and energy
consumption, but it’s close enough for
IT to generally reduce carbon output
by reducing energy use. In New England, for example, much of the power
comes from nuclear plants and Hydro
Quebec. These are both relatively
clean from a carbon standpoint. Power
from renewable sources like hydroelectric plants and wind farms generally
results in little or no carbon footprint.
Other parts of the country obtain
power primarily from coal- or oilburning plants, and have a heavier
carbon component to their power.
Nevertheless, until it becomes possible to more precisely track the carbon
emissions of all of our processes, we’ll
look at energy use as our measuring
stick in determining an enterprise carbon footprint.
The carbon-footprint measurement
also accounts for all processes and
purchases within an organization. If
you buy a new server, you also get the
Page 65
carbon it took to manufacture and
deliver that server. According to a
Gartner Inc. study, the carbon emitted
before you even hook up the computer
can be as much as 80 percent of the
energy used by the system.
So the carbon footprint is the electricity you use but also much more
than that. Carbon emission applies to
the manufacturing processes that use
energy, chemicals or petroleum products for raw materials. While it does
not directly affect IT, you’ll no doubt
have to track and measure the latter
sometime in the future.
The Impact on IT
There are other forces at work in the
carbon debate. Not many of us see carbon emissions in a data center’s daily
the server room with glass walls for all
to see are over. Today it’s far too easy
for even a casual observer to see a data
center covering several acres as a massive energy drain, rather than a symbol
of power and competence.
IT also remains the aggregator of
data for the enterprise. Carbon usage
will be just another collection of data
to manage and report on. Of course, as
those reports grow in importance and
start to become tracked as budget
items, other executives will start asking
IT about ways to improve the performance of their departments. IT in
many organizations will be leading the
charge on energy use in general while
also getting its own house together.
So what’s an IT manager or CIO to
do? You ignore green issues at your
Much of the energy usage accounting
for an enterprise’s carbon footprint
will come from running computers.
activities—certainly not carbon dioxide
from burning fossil fuels. However, we
do see lots of lights on and lots of
servers running. That need for power
to drive data centers has driven some
of the largest tech companies, like
Google Inc. and Amazon.com Inc., to
locate new data centers in areas of the
country where power is both cheap
and plentiful.
It’s incumbent upon IT to take a
leadership role in measuring, monitoring and reducing an organization’s
carbon footprint. Why should this
role fall upon IT? From a defensive
standpoint, IT is an attractive target
for environmental activists and others
driving conservation efforts and
financial savings. It may not be clear
how much power it takes to drive a
manufacturing plant, but you can
make a good estimate of the power
requirements of 5,000 servers.
Because IT has a reputation of being a
clean operation, many would be
unpleasantly surprised by its contribution to greenhouse gasses.
Those in a position to offer objections
see this as well. The days of enclosing
peril. It may not be a priority in your
organization, at least at the moment,
but you should be ready for the time
it does become one. Here’s where you
get started.
Energy Awareness
The first step in establishing a plan to
monitor and manage energy and carbon usage in the enterprise is to
improve overall awareness in energy
use, available technologies and best
practices. Energy awareness among
IT managers varies greatly, according
to a recent study by industry analyst
Forrester Research Inc. Forrester surveyed 124 procurement and operations professionals in enterprise IT
organizations in North America and
Europe. It noted that in general, less
than a quarter of those companies
currently included green considerations in their purchasing decisions.
Awareness may not be universal, but
it’s growing. Forrester found that
around half of the respondents
thought green considerations were
growing in importance, with more
than a quarter saying that it was very
| Redmondmag.com | Redmond | November 2007 | 65
1107red_F2Carbon64-68.v8
10/16/07
3:39 PM
Page 66
Carbon Footprint
important. Still, awareness doesn’t
necessarily translate into action. The
survey also found that only 20 percent
to 30 percent of the respondents factor green considerations into their IT
purchase decisions. “Awareness and
especially action are still in their early
stages. But the growth is there, driven
by both public perception and real
business needs,” says Forrester Senior
Vice President Christopher Mines.
In most cases, European companies
seem to be a few percentage points
ahead of their U.S. counterparts in
both awareness and practice, but the
floor could approach IT for advice on
better utilizing network gear and
data-acquisition devices.
A good deal of that is also the business of IT. The enterprise needs accurate information, trend spotting and
what-if analysis based on data. To
make the entire organization cognizant of the carbon footprint related
to any decision, you may want a carbon charge-back mechanism. For
example, if a group needed a server to
run a specific application, you could
charge the carbon footprint of that
server back to that group. Each
Your goal is to provide a baseline for
measuring and ultimately reducing
your enterprise’s carbon footprint.
general conclusion still holds: As
awareness grows, so too will action.
In discussing energy awareness with
a variety of IT managers and executives, responses tend to mirror those
found in Forrester’s more formal
study. They were all over the map,
ranging from no awareness or interest
to a high level of knowledge and some
action. However, it’s telling that many
didn’t want their names or company
names used. That may be due to insecurity about their own views, or the
views of their organization.
Beyond IT
IT has several roles to play in managing and monitoring the carbon footprint of the enterprise, even in areas
with little IT impact. First, carbon
will likely be tracked and aggregated
by information systems. This is an
enterprise-wide role where data is
gathered, stored and analyzed, with
the results presented to management
for action—a traditional IT function.
Second, much of the energy usage
accounting for an enterprise’s carbon
footprint will come from running
computers. Functional divisions will
look to IT to provide guidance on
how to use desktop PCs and departmental servers in a more energyefficient way. Even the manufacturing
department would have a carbon allocation managed like its budget. This
isn’t so far-fetched, given government
efforts to allocate carbon quotas to
individual companies.
Purchase & Measure
The only way of knowing how much
you can reduce your energy consumption and overall carbon footprint is to
begin measuring the energy you’re
using today. If you see that figure at
all today, it’s likely only as a monthly
electric bill allocated to the fixed costs
of your budget.
You need more information, and getting it can be difficult. Start with your
vendors to get power consumption
stats for servers and other computers,
network equipment, telephone switches
and other electrical hardware. Work
with facilities people to look at power
draw in order to confirm vendor data.
Also, ask vendors to provide a value
that represents the carbon footprint of
the manufacturing process. If they
can’t provide it, look to competitive
vendors for comparative data.
You can use that information to
calculate your carbon footprint. Carbon Footprint Ltd. (www.carbonfootprint.com) provides an online
calculator geared toward personal
carbon use, but the company also
66 | November 2007 | Redmond | Redmondmag.com |
provides commercial services for
businesses. At the very least, it can
give you an idea of the types of energy
use and activities that go into calculating the footprint.
Your goal is to provide a baseline for
measuring and ultimately reducing
your enterprise’s carbon footprint. Of
course, avoiding all carbon emissions
will be almost impossible. In this case,
carbon offsetting plays a vital role. You
can purchase renewable power, such as
wind, hydro or solar, since these don’t
emit carbon into the atmosphere. Odd
as it may seem, you can offset carbon
emissions through activities like planting trees, because they absorb carbon.
Seeking Help
Technology suppliers are putting significant resources into burnishing their
green credentials. Most computer
component vendors have supported
energy efficiency for several years, and
they’re starting to invest in more efficient manufacturing technologies and
business practices.
With energy-efficient products, vendors also offer strategies and best practices for using their products. In part,
they’re leveraging their own experiences as they improve their own operations. They’re also setting up labs to
determine what kinds of configurations
work best in data centers.
Help can also come from software
vendors. According to Paul Rochester,
CEO of asset-management software
vendor PS’Soft, the role of asset management is to “manage the economic
opportunities and consequences of
asset acquisition and use.” That
includes energy use and carbon emissions, he says. In the future, PS’Soft is
looking at including features like a
carbon charge-back mechanism and
analytical tools for managing and
reducing energy use.
Oddly enough, vendors are often
reticent about communicating their
green initiatives with their customers.
In the Forrester survey, only around
one-third of the respondents claimed
to be familiar with their technology
vendors’ green initiatives. Part of that
is driven by a widespread perception
that saving energy is bound to cost
Project1
10/16/07
12:26 PM
Page 1
Don’t Try to Manage
GHG Emissions in a
Vacuum
Total Emissions Management
Reduce complexity, risk and costs by making your carbon management program
part of an integrated and auditable approach to managing all of your emissions data.
Only ESS offers solutions for air, water, waste, fugitive and refrigerant emissions.
ESS is the leading provider of Environmental, Health & Safety and
Crisis Management software for Governance, Risk & Compliance.
®
Learn about EHS Performance Management
Essential software and services for
EHS and Crisis ManagementSM
for Governance, Risk & Compliance.
FREE whitepaper: www.ess-home.com/GHG1
800.289.6116
© 2007 Environmental Support Solutions, Inc.
1107red_F2Carbon64-68.v8
10/16/07
3:39 PM
Page 68
Carbon Footprint
more money. In some cases that’s true,
but in other cases it’s possible to make
a better business case with more
energy-efficient technologies, even if
the initial cost is higher.
Sometimes word on initiatives simply doesn’t reach everyone in the
company. It could be poor communication or a lack of training. You may
have to draw such information out of
your vendor’s sales force. Your preparations for vendor negotiations should
include an energy checklist. Insist on
answers before signing a contract.
A Plan for Action
There are side effects to measuring
and managing carbon use. At a recent
Climate Savers Computing Initiative
press conference, Google declined to
provide hard data about its carbon
usage, despite its public portrayal of
energy conservation. The reason for
Google’s reticence is that, based on
carbon emissions, a competitor could
reverse-engineer the data to determine the number of servers Google is
running. In the highly competitive
search business, this is a closely
guarded secret.
Even if your company’s efforts in
energy efficiency and carbon usage
can’t be fully open for the world to
see, it still represents an important
emerging strategy in IT. We’ve been
trained to think of the electric bill as a
fixed cost essential to keeping the
doors open. If we can influence that
cost through smarter purchases and
better practices, we’re directly saving
money. PS’Soft’s Rochester notes that
the power cost of operating servers
exceeds their depreciation cost, making it a significant ongoing expense.
You’ll provide enormous flexibility
to an enterprise by managing energy
use and carbon footprint—and don’t
discount the public relations benefits.
There are a few smart things you can
do right away. Virtualized servers reduce
the total hardware requirement, which
saves a good chunk of energy immediately. If you’re not rack-mounting then
you’re probably leaving some savings
on the table. Energy Star 4.0, which
went into effect last month, calls for 80
percent-efficient power supplies and
lower idle-wattage ratings than previously required. Dell Inc., for example,
recently released servers, desktops and
notebooks engineered to draw about
one-third less power.
Thinking of energy—and carbon
output—as an asset to be managed is
perhaps the best approach to building
a comprehensive plan. While no
asset-management vendors support
that today, don’t be surprised to see
such features in the near future,
according to Rochester. That means
identify, measure, allocate and manage
on an ongoing basis.
Energy use and carbon emissions also
represent a unique opportunity for IT
to provide leadership for the enterprise
as a whole. That leadership is clear in
an IT-focused enterprise like Google,
but it also applies to any business in
any industry. IT can bring real benefits
to the enterprise that go well beyond
the “keep-the-lights-on” role to which
some shops have been relegated.
To gain traction, sustainable practices must include a sound business
strategy. If you sell a strategy as anything else, you won’t get executive
support and commitment. It looks like
there’s ample potential for real savings, and perhaps even competitive
benefits. Leading-edge organizations
are already in the process of devising
and implementing strategies. Everyone else will have to get on board
once the regulatory requirements
become clearer.
It’s too early to say whether or not a
strategy of tracking and reducing carbon use will substantially improve an
organization’s bottom line or make a
difference in the world in general. One
thing is sure, however: It’s not a fad
that will disappear tomorrow. Thanks
to an almost universal and growing
awareness of environmental issues,
coupled with growing regulatory
requirements, concepts such as carbon
footprint, energy efficiency and other
sustainable programs will almost certainly grow substantially. The role of
IT in support of these factors will also
expand in the coming years.
Peter Varhol ([email protected])
is Redmond’s executive editor, reviews.
Project3
10/17/07
9:37 AM
Page 1
You’ve got
the skills.
You’ve got
the experience.
Now prove it.
You’ve taken classes and backed up the coursework with real-world experience. Now document
your expertise by getting your Certified Business Intelligence Professional (CBIP) credential. This
exam-based certification program tests your knowledge, skills, and experience, providing you
with the most comprehensive and credible certification available in the industry.
Learn how to become a
Certified Business Intelligence Professional.
Visit www.cbipro.com.
CBIP Print Ad_0207.indd 1
2/20/07 2:12:20 PM
1107red_WinInsider70-72.v6
10/16/07
11:40 AM
Page 70
WindowsInsider
by Greg Shields
VM Within a VM
A
training company recently approached me to create
some videos on installing and using VMware’s flagship ESX product. They wanted me to demonstrate
all of the product’s features and functionality, including
ESX’s VMotion capability. That got me thinking about how
useful VMotion is to VMware’s ESX Server product.
Unless you’ve had your head in the
sand for the last few years, you know
that VMotion is VMware’s built-in ability to migrate virtual machines (VMs)
from one host to another without needing to power them down. This “hot
migration” capability is only available
in the high-end, high-cost Enterprise
Edition of ESX Server.
It’s “high-end” because it can migrate
machines without losing a beat. That
means much less downtime for critical
applications. It’s “high-cost” because
you’ll need an expensive Enterprise
license to run the ESX Server. You’ll
also need some form of high-end storage to support VMotion’s shared storage requirements.
VM? Absolutely—and depending on
your desktop’s configuration, it’ll pack
enough performance to help you develop
your virtualization skills right there at
your desktop.
Beefy Workstations
When you’re building a VM-within-aVM environment, you need a powerful
desktop host. After all, that host is running virtual machines that are also running virtual machines. They’ll require
lots of RAM and processor power.
You’ll need a desktop with at least a
dual core that also supports Intel’s Virtualization Technology (VT) processor
extensions or newer versions of AMD’s
equivalent AMD-V extensions. The
A VM within a VM? Absolutely—and depending on your desktop’s
configuration, it’ll pack enough performance to help you develop
your virtualization skills right there at your desktop.
My immediate response to the training company was to tell them about
the hefty hardware I would need to
fully demonstrate the software. It just
wouldn’t be possible on an author’s
budget. Then I started digging around
and discovered some new functionality
in the recently released desktop version of VMware Workstation 6.0.
With just a little tweaking, you can
get Workstation 6.0 to fully support
VMware ESX instances running inside
VMware Workstation. A VM within a
virtualization extensions are a necessity
because they help the processor handle
the workload associated with virtualization more efficiently. Your system
should also have at least 3GB of RAM
to support all the virtual machines you
plan to run.
In order to successfully complete
your VMotion setup, you’ll need at
least four simultaneously running virtual machines. Two of those will be
ESX servers, the third will serve as the
Virtual Center management server,
70 | November 2007 | Redmond | Redmondmag.com |
and you will use the fourth as an
iSCSI target for shared storage
between the hosts.
ESX Server can use SAN-based storage, NFS and iSCSI targets for its
shared storage where VMotion-capable
virtual machines are housed. iSCSI is
an excellent low-cost medium for
shared storage as there are numerous
open source iSCSI tools available on
the Internet.
OpenFiler, which is an easy to use
Linux application, is a good choice.
You can download it from
www.openfiler.com. Once you’ve
installed it within a Linux virtual
machine, use OpenFiler’s Web interface to create a disk partition, a volume group and a volume for the
shared storage. Once you’re done, you
can also use the same interface to
share that volume as an iSCSI target
with your ESX servers.
Recursive VMs
Once you’ve completed the setup
process, you can create a fully functional ESX virtual machine by following these steps (or find them online at
http://tinyurl.com/yuumay):
• Create a new custom virtual
machine. Set its hardware compatibility
to “Workstation 5” and check the box
marked “ESX Server Compatible.”
• Select the Red Hat Linux operating
system, then provide the machine a
name and location.
• Give the virtual machine two virtual processors and around 1024MB
of RAM. The quantity of RAM
assigned to the virtual machine will
depend on the RAM available in the
host system.
• Select the bridged network option
and choose an LSI Logic SCSI adapter
for the virtual machine.
• Create a new virtual SCSI disk.
Make sure it’s large enough to host the
Project4
10/2/07
3:08 PM
Page 1
CLOSE-COUPLED COOLING
Gain thermal efficiency with InRow™ cooling architecture.
Closely coupling the AC with the heat source reduces the
distance cold air must travel (from 50 feet down to 5 feet),
prevents hot exhaust air from mixing with cool air in the
room, and allows more targeted precision cooling.
CONSERVE POWER
Oversized legacy systems
waste power. Benefit from
power efficiency by right-sizing
your infrastructure so that you
pay only for what you need.
CAPACITY MANAGEMENT
Optimize management efficiency with
intelligent, integrated capacity management
software that gives you real-time data on
exactly where to cool and what to power.
$
150,000 THERMAL GUARANTEE
Introducing the Efficient Enterprise™:
more power, more control, more profits
AGAINST HARDWARE DAMAGE TO YOUR SYSTEM
WORLD’S ONLY THERMAL GUARANTEE
Can your legacy system say the same?
Legacy systems work fine for brute-force cooling the entire room,
but skyrocketing energy costs make them fiscally irresponsible and their
fundamentally oversized design makes them incapable of meeting today’s
high-density challenges. Even worse, power and cooling waste may actually
prevent you from purchasing much-needed new IT equipment. Simple problem,
simple solution. Cut your power and cooling costs and use the savings to buy
the IT equipment you need.
According to Gartner Research, 50% of all data centers built before 2002 will
be obsolete by 2008 because of insufficient power and cooling capabilities.
Power and/or cooling issues are now the single largest problem facing data
center managers.
The Efficient Enterprise™ cooling is so predictable,
we guarantee it. Implement an InfraStruXure®
solution with hot air containment and closecoupled cooling and be eligible for our $150,000
Thermal Guarantee™ - the industry’s only heat
defense policy.
CONTAIN THE HEAT
Ensure cooling efficiency by containing the heat
and eliminating expensive temperature crosscontamination. Our Hot Aisle Containment System
reduces operational expenses by as much as 50%
over legacy approaches.
There’s only so much power and money to go around
Your service panel limits the amount of power available. Your budget limits the
amount of money. You have to stretch every bit of both as far as you can.
What you need is the APC Efficient Enterprise™
.
The APC solution offers modular scalability so that you pay only for what you
use; capacity management so that you know where to put your next server;
and dedicated in-row and heat-containment systems that improve cooling
and thermal predictability. An Efficient Enterprise earns you money through
the pre-planned elimination of waste. For example, simply by switching
from room- to row-oriented cooling, you will save, on average, 35% of
your electrical costs.
Our system reimburses you
Whether you’re building a new data center or analyzing the efficiency of
existing systems, your first step is knowing where you stand. Take the online
Enterprise Efficiency Audit to see how you can reap the benefits of a smart,
integrated, efficient system: more power, more control, more profits.
How efficient is your enterprise system?
See exactly where you stand—take our online Enterprise Efficiency Audit today!
Visit www.apc.com/promo Key Code y260x • Call 888.289.APCC x9240 • Fax 401.788.2797
©2007 American Power Conversion Corporation and MGE UPS Systems, Inc. All rights reserved. All APC trademarks are property of APC-MGE.
e-mail: [email protected] • 132 Fairgrounds Road, West Kingston, RI 02892 USA EE2D7EF-US
1107red_WinInsider70-72.v6
10/16/07
11:40 AM
Page 72
WindowsInsider
ESX software and any other hosted virtual machines. It’s usually a good idea
to create these disks as pre-allocated to
ensure the best performance.
• Once you’ve created the virtual
machine, remove it from the VMware
Workstation interface and the favorites
list, and close down that Workstation
instance. This ensures that the system
isn’t using the virtual machine’s files we
need to edit next.
• Open the new virtual machine’s
.VMX file in a text editor and make
sure the following lines are present
for each connected Ethernet adapter.
If there are multiple cards configured
for the ESX instance, there will be
one copy of each of these lines for
each adapter:
ethernet0.present = "TRUE"
ethernet0.virtualDev = "e1000"
ethernet0.connectionType = "bridged"
ethernet0.addressType = "generated"
You’ll need to add the following lines
in the .VMX file for Intel-based CPUs:
monitor_control.restrict_backdoor
= TRUE
monitor_control.vt32 = TRUE
If the processor is AMD-based,
replace the line monitor_control.vt32 =
TRUE with monitor_control.enable_svm
= TRUE.
Reconnect the virtual machine with
the Workstation interface, make sure
the ESX media is in the CD drive and
connected into the virtual machine, and
boot the virtual machine.
Final Steps
This will begin the process of
installing the ESX operating system
into the virtual machine. Once the
installation and subsequent reboot is
complete, you can tell whether the
install was successful if the server
boots to the typical ESX screen.
Repeat the process for the second
ESX server and create the Windows
Server virtual machine for the Virtual
Center server.
Once all components are configured,
connect the ESX servers to the OpenFiler iSCSI data store and create your
VM within a VM.
Although this configuration won’t be
fast enough to run any production virtual machines, it gives you enough
performance to learn the product or
study for certification exams without
consuming valuable server resources.
The VMware online community was
very helpful in bringing this capability
into reality. —
Greg Shields ([email protected]),
MCSE: Security, CCEA, is a principal consultant for 3t Systems (www.3tsystems.com)
in Denver, Colo. A contributing editor to
Redmond magazine and a popular
speaker at TechMentor events, Greg is also
the resident editor for Realtime Publishers’
Windows Server Community,
www.realtime-windowsserver.com,
providing daily commentary and expert
advice for readers.
Project4
10/2/07
10:17 AM
Page 1
NORTHERN STORAGE SUITE FOR NETAPP®
INVOLVE THEM
To collect and store is natural instinct. No matter how sophisticated your SRM tool, it can’t tell important from non-essential data. Only
users can select – and protect – what’s important.
Northern Storage Suite provides the tools for self-managing storage. Shows users what reasonable storage use is and suggests what
can be deleted.
Northern Storage Suite – makes your users a part of the solution.
Now integrating NetApp® technologies, Northern Storage Suite extends storage control to NAS devices – involving users across the enterprise.
Download a fully functional evaluation of
Northern Storage Suite for NetApp here:
www.northern.net/redmond
NORTHERN – MANAGING STORAGE SINCE 1995. TO US IT’S SECOND NATURE.
WWW.NORTHERN.NET / [email protected] / 1.800.881.4950
1107red_SecAdvisor74-76.v4
10/16/07
3:35 PM
Page 74
SecurityAdvisor
by Joern Wettern
The Weakest Link
N
etwork security involves more than just technology.
You can’t ignore the human factor. To increase
your overall network security, you have to work
with your users to foster an environment of mutual trust
and effective education.
The instructor of my first networking
class gave us a lesson completely unrelated to technology. He stressed that a
network administrator is the king of his
network and that a user’s proper role
was to act as a serf who has to bow to
the king and beg for needed services.
You can still find such attitudes today,
but networks in well-run organizations
revolve around the employees’ needs and
on admins who place users at the center
of their thinking. There are good business reasons for doing this, but making
users a top priority in both your planning
and day-to-day administration also helps
make your network more secure.
There’s no better way to illustrate this
than with the following examples. Each
of the tales I’m recounting here actually
happened to a family member or close
friend (the names have been changed to
protect the innocent—or guilty, as the
case may be). Each of them illustrates
how ignoring users can be detrimental
to network security.
Communication
Breakdown
It all started with a phone call from
Fred’s office. Fred and his co-workers
suspected that a virus was spreading
around their network, but they couldn’t
reach the network support team because
they were offsite for training. Would I
be able to give them some advice?
Sure enough, the company was badly
affected by a fast-spreading virus. The
best advice I could give was to turn off
all computers and wait until the support staff got back to the office.
Early the next day, the network
administrators and support personnel
got together for an emergency meeting.
After some immediate damage control
(which included blaming the virus
infection on an outside vendor), they
came up with a plan to get everything
working again. By the end of the day,
It’s fairly obvious that the problem
here was the lack of communication.
Network staff assumed that sending out
a memo would magically ensure that
users stored data only on servers. Some
on the IT staff were probably happy to
have taught users a lesson about complying with policies.
Talking to users and finding out what
they really did would have alerted the
IT department to where data was actually being stored. With this knowledge,
they would have known to warn everyone about the re-imaging or made a
plan for backing up user data.
This entire episode has serious security
implications. After the incident, most
users didn’t trust network admins with
User education about network security is often not relevant to the
audience. It doesn’t give them the information they really need.
they were ready to implement this plan
and mentally prepared themselves for a
long night at the office. After most
employees had left for the night, the IT
staff started moving from computer to
computer and re-imaged each and
every hard disk.
By the morning the virus had been
eradicated and their problem apparently
solved—at least as far as the IT department was concerned. However, everybody else’s problems had just started.
Many in the company naturally had
stored documents on their hard drives.
As they started work that morning, they
discovered that all of those files had
been permanently deleted when the
hard disks were re-imaged. The help
desk got some angry phone calls, but
they simply pointed to a year-old memo
that had advised users to store important
data on a server.
74 | November 2007 | Redmond | Redmondmag.com |
their data. Instead of storing important
files on servers or local hard drives, many
now copy these files to flash drives that
they take home at night. This raises the
risk of confidential data getting lost or
falling into the wrong hands. Even
worse, the mistrust created by this
episode will make it difficult in the future
to get employees to comply with any
security policy, no matter how important.
Beware of Britney
and Paris
When Laura opened her e-mail, the first
item was an urgent message from the
mail administrator who had detected a
sudden increase in incoming virusinfected e-mail. Some of these messages
had subject lines relating to Britney
Spears or Paris Hilton. The mail administrator urged users to be extra careful
and to not open any suspicious e-mails.
Project5
10/8/07
11:19 AM
Page 1
Æ
Get Ready: for Windows Server 2008
Get Ready: for Windows Server 2008
Windows Server 2008 is coming, but are you ready for it? Get
training now that will help you transition your skills to the latest
Windows Server technologies.
Attend this Get Ready: Seminar
This two day, instructor-led training will allow IT professionals
already experienced with Windows Server technologies to
upgrade their skills to Windows Server 2008. The seminar will
teach you the important features and updates on Windows
Server 2008 including:
ï
ï
ï
ï
ï
ï
ï
Centralized Application Access
Branch Office Management
High Availability
Security and Policy Control
Server Management
Server Virtualization
Web and Applications Platform Technologies
Register Now
Get the full course outline, event details and register online at:
www.unitedtraining.com/getready
This 2 day training event is $799 per person (US dollars). For
Redmond Magazine readers only, get a $30 discount by using
RSVP code WS08NA at the time of registration!
This seminar is offered exclusively at United Training partner
locations. United Training is a consortium of the top
independently owned and operated Microsoft Gold Certified
Partners for Learning Solutions.
Get Ready: for Windows Server 2008 now
be ready to take the credit later!
Register at: www.unitedtraining.com/getready
for this exclusive 2 day, instructor-led seminar
coming to these United Training Partner locations:
AZ
Phoenix
12/06-07
CA
Brea
11/19-20
CA
Irvine
11/27-28
CA
Los Angeles
12/13-14
CA
San Diego
11/29-30
CA
San Francisco
11/29-30
CA
San Jose
12/10-11
CO
Denver
11/15-16
CT
East Windsor
12/06-07
DE
Wilmington
11/12-13
IL
Chicago
12/03-04
IL
Oak Brook
11/12-13
MA
Boston
12/06-07
MA
Waltham
12/06-07
MI
Livonia
11/29-30
MO
St. Louis
11/20-21
NC
Raleigh
11/19-20
NH
Londonderry
12/06-07
NJ
Hasbrouck Heights
12/10-11
NJ
Mt. Laurel
11/12-13
NJ
Princeton
11/12-13
OH
Cleveland
11/12-13
OH
Columbus
11/15-16
OH
Mason
12/13-14
12/17-18
11/29-30
12/12-13
12/27-28
OR
Portland
12/06-07
PA
Philadelphia
11/12-13
PA
Wayne
11/12-13
RI
Lincoln
12/06-07
PA
Pittsburgh
11/12-13
12/03-04
TX
Dallas
11/12-13
12/10-11
TX
Houston
11/26-27
12/10-11
TX
San Antonio
12/04-05
VA
Falls Church
11/15-16
VT
Burlington
12/13-14
WA
Seattle
12/04-05
12/11-12
United Training Members: Ameriteach, Babbage & Simmel, Hilton
Computer Strategies, IMG, Interface Technical Training,
KnowledgeWave, Knowlogy Corporation, Max Technical Training,
Momentum, Netdesk Corporation, New Horizons-Raleigh, New
Horizons-Michigan, ONLC Training Centers, Premier Knowledge
Source, Quickstart Intelligence, Riverhead Training, Solartech,
TekFocus, Vortex Data Systems
1107red_SecAdvisor74-76.v4
10/16/07
3:35 PM
Page 76
SecurityAdvisor
This e-mail is a classic example of
how IT staffs often communicate with
the rest of the company and why it’s
ineffective. First, the memo was really
about a problem experienced by the
mail administrators—not the users.
The flood of infected e-mail was causing problems on the mail server, but all
these messages were being stopped by
anti-virus software. The memo caused
employees to worry about something
that wasn’t actually affecting them.
At the same time, the memo didn’t
contain enough information to be useful. There were no guidelines for helping users determine whether or not an
e-mail was “suspicious.” Based on the
memo, the one thing to watch out for
was a subject line referring to Paris or
Britney. The logical conclusion was
that it was safe to open messages with
different subject lines.
Unfortunately, user education about
network security is often not relevant
to the audience. It doesn’t give them
the information they really need. A better approach here would have been an
ongoing effort to educate users on how
to detect and react to potentially dangerous e-mail messages.
Secure Yourself
Susan just attended a training session
on e-mail security. Because the government agency she works for requires
that client communications remain
confidential, her agency implemented a
new solution for sending encrypted
e-mail. Now, whenever Susan sends a
message that contains any confidential
information, she needs to add **secure
to the subject line. The mail server then
encrypts all messages with that subject
line before sending them out.
This mode of encryption has some
basic security flaws. It depends entirely
on users to decide what’s confidential.
It also doesn’t work when a user
mistypes **secure. A good encryption
solution doesn’t rely on user judg-
ment. Instead, good e-mail encryption
implementations use an automated
process on the server to decide
whether or not to encrypt a message.
You can configure the server to make
this decision based on message content
or intended recipient.
While there’s nothing wrong with
empowering employees to encrypt data
they consider important, this should
only be used to augment a process that
enforces encryption when it’s required.
Next month, we’ll look at more security considerations that revolve around
the most variable factor in your network—the users. —
Joern Wettern ([email protected]),
Ph.D., MCSE, MCT, Security+ is the
owner of Wettern Network Solutions, a
consulting and training firm. He’s written
books and developed training courses on a
number of networking and security topics, in
addition to regularly teaching seminars and
speaking at conferences worldwide.
Project4
9/11/07
11:45 AM
Page 1
1107red_Index78.v4
10/18/07
11:03 AM
Page 78
AdvertisingSales
RedmondResources
AD INDEX
Advertiser
Page
1 & 1 Internet Inc.
18
www.1and1.com
Matt Morollo
Advanced Toolware
57
www.adtoolware.com
VP, Publishing
508-532-1418 tel
508-875-6622 fax
[email protected]
American Power Conversion Cor
71
www.apcc.com
AppDev Training
68
www.appdev.com
Avaya Inc.
22, 23
www.avaya.com
AvePoint, Inc.
47
www.avepoint.com
BeyondTrust Corporation
C3
www.beyondtrust.com
West/MidWest
East
URL
BlueCat Networks
27
www.bluecatnetworks.com
Business Objects-A/P
10
www.businessobjects.com
Computer Associates
36, 37
www.ca.com
32, 33
www.dell.com/amd
Devon IT, Inc.
43
www.devonit.com
Digiscope
13
www.lucid8.com
Dan LaBianca
JD Holzgrefe
Director of Advertising,
West/Central
818-674-3417 tel
818-734-1528 fax
[email protected]
Director of Advertising, East
804-752-7800 tel
253-595-1976 fax
[email protected]
Dell-AMD
Diskeeper Corporation
79
www.diskeeper.com
Erik Nielsen
Dorian Software
39
www.doriansoft.com
Enviromental Support Solution
67
www.ess-home.com
Famatech
55
www.famatech.com
IBM Corporation
C2, 1, 3,
www.ibm.com
48, 61, 63
Imanami Corporation
76
Intel Corporation
9
www.intel.com
iTripoli Inc.
17
www.itripoli.com
IT CERTIFICATION &
TRAINING: USA, EUROPE
KACE Networks, Inc.
45
www.kace.com
Linktek Corporation
58
www.linktek.com
Al Tiano
Lucid8
7
www.lucid8.com
Microsoft Corporation
15
www.microsoft.com
NetSupport, Inc.
53
www.netsupport-inc.com
NetOp Tech, Inc.
72
www.netop.com
Network Automation, Inc.
51
www.networkautomation.com
NORTHERN Parklife
73
www.northern.net
PRODUCTION
SAPIEN Technologies, Inc.
25
www.sapien.com
Mary Ann Paniccia
Secure Computing Corporation
5
www.securecomputing.com
SALES STAFF
VP, Print & Online Production
St. Bernard Software
C4
www.stbernard.com
Tanya Egenolf
Serena Barnes
TDWI
69
www.tdwi.com
The Training Camp
77
www.trainingcamp.com
Advertising Sales Associate
760-722-5494 tel
760-722-5495 fax
[email protected]
Production Coordinator
818-734-1520 ext. 164 tel
818-734-1528 fax
[email protected]
UltraBac Software
34
www.ultrabac.com
United Training, Inc.
75
wwwunitedtraining.com
Bruce Halldorson
Western Regional Sales Manager
CA, OR, WA
209-333-2299 tel
209-729-5855 fax
[email protected]
Patrick Cragin
MidWest Regional Sales Manager
303-255-1733 tel
440-851-6859 fax
[email protected]
Danna Vedder
Microsoft Account Manager
253-514-8015 tel
775-514-0350 fax
[email protected]
CORPORATE ADDRESS
1105 Media, Inc.
9121 Oakdale Ave. Ste 101
Chatsworth, CA 91311
www.1105media.com
MEDIA KITS: Direct your Media Kit
requests to Matt Morollo, VP, Publishing,
508-532-1418 (phone), 508-875-6622
(fax), [email protected]
REPRINTS: For all editorial and advertising
reprints of 100 copies or more, and digital
(web-based) reprints, contact PARS
International, Phone (212) 221-9595,
e-mail: [email protected], web:
www.magreprints.com/QuickQuote.asp
LIST RENTAL: To rent this publication’s email or postal mailing list, please contact
our list manager Merit Direct:
Jeff Moriarty
333 Westchester Ave., South Building
White Plains, NY 10604
[email protected]
(518) 608-5066
Redmond (ISSN 1553-7560) is published
monthly by 1105 Media, Inc., 9121 Oakdale
Avenue, Ste. 101, Chatsworth, CA 91311.
Periodicals postage paid at Chatsworth,
CA 91311-9998, and at additional mailing
offices. Complimentary subscriptions are
sent to qualifying subscribers. Annual
subscription rates for non-qualified subscribers are: U.S. $39.95 (U.S. funds);
Eastern Sales Manager
303-862-4625 tel
720-247-9032 fax
[email protected]
Advertising Sales Manager
818-734-1520 ext. 190 tel
818-734-1529 fax
[email protected]
Canada/Mexico $54.95; outside North
America $64.95. Subscription inquiries,
back issue requests, and address
changes: Mail to: Redmond, P.O. Box
2063, Skokie, IL 60076-9699, email
[email protected] or call (866) 2933194 for U.S. & Canada; (847) 763-9560
for International, fax (847) 763-9564.
POSTMASTER: Send address changes to
Redmond, P.O. Box 2063, Skokie, IL
60076-9699. Canada Publications Mail
Agreement No: 40039410. Return Undeliverable Canadian Addresses to Circulation Dept. or DHL Global Mail, 7496 Bath
Rd Unit 2, Mississauga, ON, L4T 1L2.
© Copyright 2007 by 1105 Media, Inc. All
rights reserved. Printed in the U.S.A.
Reproductions in whole or part prohibited
except by written permission. Mail
requests to “Permissions Editor,” c/o REDMOND, 16261 Laguna Canyon Road, Ste.
130, Irvine, CA 92618.
The information in this magazine has not
undergone any formal testing by 1105
Media, Inc. and is distributed without any
warranty expressed or implied. Implementation or use of any information contained
herein is the reader’s sole responsibility.
While the information has been reviewed
for accuracy, there is no guarantee that the
same or similar results may be achieved in
all environments. Technical inaccuracies
may result from printing errors and/or new
developments in the industry.
78 | November 2007 | Redmond | Redmondmag.com |
www.imanami.com
VMware, Inc.
31
www.vmware.com
Western Governors University
20, 26
www.wgu.edu
XenSource, Inc.
28
www.XenSource.com
EDITORIAL INDEX
Company
Page
URL
Advanced Micro Devices Inc.
70
www.amd.com
Advanced System Concepts Inc.
29
www.advsyscon.com
Amazon.com Inc.
65
www.amazon.com
Apple Inc.
26, 80
www.apple.com
BeyondTrust Corp.
29
www.beyondtrust.com
Cakewalk
62
www.cakewalk.com
Citrix Systems Inc.
11, 41
www.citrix.com
Copernic Inc.
24
www.copernic.com
Distributed Management Task
42
www.dmtf.org
Exploit Prevention Labs
19
www.explabs.com
Google Inc.
24, 65,
www.google.com
IBM Corp.
41, 80
www.ibm.com
Intel Corp.
60, 70
www.intel.com
KACE Networks Inc.
35
www.kace.com
Marathon Technologies Corp.
12
www.marathontechnologies.com
OpenFiler
70
www.openfiler.com
Oracle Corp.
59
www.oracle.com
PS’Soft
66
www.pssoft.com
Red Hat Inc.
70, 80
www.redhat.com
ScriptLogic Corp.
29
www.scriptlogic.com
SDM Software Inc.
16
www.sdmsoftware.com
Symantec Corp.
19
www.symantec.com
VMware Inc.
41, 70
www.vmware.com
XenSource Inc.
12, 42
www.xensource.com
This index is provided as a service. The publisher assumes no liability for errors or omissions.
Project4
10/15/07
2:24 PM
Page 1
N EW
REL
EA S
“This is by far the best
defrag product… After
installing Diskeeper 2008
I don’t have to worry about
disk fragmentation ever
again. It does everything
for me invisibly in the
background.”
Jozo Capkun, President
Komoko Services Limited
It’s Smart.
It’s Transparent.
It Will Take Your System From Zero to Sixty—Automatically!
Automatically and invisibly solve disk performance issues—forever
File fragmentation—the splitting of files in tens, hundreds or thousands of pieces—puts the brakes
on system performance. It slows access to a crawl. It causes delayed application launches and slow
boot ups. It can even cause system crashes.
Introducing the first and only completely automatic defragmentation solution. New Diskeeper ® 2008 with
InvisiTasking™ defragments in real-time, invisibly in the background. Intelligently monitors and utilizes
only idle system resources, while users continue to work. And with fragmentation completely eliminated,
your performance flies. Systems are maintained at peak performance and reliability—automatically!
True transparent, background defragmentation, unnoticeable to applications
and users—except, of course, for the newfound performance and reliability.
No scheduling required. Ever. Ever. Ever.
Adaptive technology boosts access to your most commonly-requested files,
beyond defragmentation alone.
Work smarter not harder. Each volume is different. Dynamic intelligence determines
and delivers maximum minute-to-minute benefits with minimal effort.
Advanced defragmentation uniquely designed for high-capacity, high traffic disks.
No room to move? Extreme fragmentation? No problem. New, complete
defragmentation in all conditions—even with less than 1% free space.
Critical system file fragmentation now automatically prevented.
Allows you to leverage VSS data protection and the performance and reliability
of defragmentation.
FREE OFFER
NEW
Try New Diskeeper 2008
Free for 45 Days!
Download at www.diskeeper.com/red2008
Note: Special 45-day trialware is only available at the above link
Volume licensing, government and educational discounts
are available from your favorite reseller. For a free quote visit
www.diskeeper.com/quote9 or call 800-829-6468. Code 4006
© 2007 Diskeeper Corporation. All Rights Reserved. Diskeeper, Maximum System Performance and Reliability—Automatically, InvisiTasking, and the Diskeeper Corporation
logo are either registered trademarks or trademarks owned by Diskeeper Corporation in the United States and/or other countries. All other trademarks and brand names are
the property of their respective owners. Diskeeper Corporation • 7590 N. Glenoaks Blvd. Burbank, CA 91504 • 800-829-6468 • www.diskeeper.com
E
1107red_Foley80.v4
10/16/07
10:20 AM
Page 80
FoleyOnMicrosoft
by Mary Jo Foley
Spreading Itself Too Thin?
T
here’s a thin line between diversification and overcommitment. Has Microsoft strayed too far over
that line? I’ve been mulling over this question a lot
lately. While I understand Microsoft’s desire and need to
seek out The Next Big Thing, I feel the company should
stick closer to its core competencies in its quest.
Consider this: In the span of two weeks
in late September, Microsoft rolled out:
• Halo 3
• A new family of Zune digital
media players
• A new Web search engine
• A consumer health-care service
• Test releases of new Windows Vista
and Windows Server
• Media Center Extenders to allow
streaming of content to TVs and
DVD players
• New software for small-business
phone systems
• An updated version of Office for
Windows Mobile phones
• An update to its adCenter onlineadvertising platform
What exactly is Microsoft these days?
A business software vendor? A development tools shop? A consumer-electronics
company? A services vendor? An advertising company?
Microsoft CEO Steve Ballmer would
no doubt answer all of the above, in
spite of his recent proclamation that,
“‘Brand Microsoft’ should be seen as a
software competence company.”
Head in the Sand
Even with close to 80,000 employees,
though, how can Microsoft possibly do
a stellar job addressing its myriad competitors in specialized markets—ranging
from Red Hat and Nintendo to Google
and Apple? Even IBM, the company to
which Microsoft execs traditionally
point when asked who is Microsoft’s
No.1 competitor, is dabbling in far
fewer markets than Microsoft.
It’s the huge investments in consumer
markets Microsoft has made that I’m
puzzling over the most. Microsoft execs
have done their darndest to justify
Microsoft’s increasing focus on gaming,
Microsoft isn’t good at being
hip or cutting-edge.
consumer electronics, IPTV and other
home-entertainment arenas by claiming that consumer technologies are the
source of most technological innovation these days.
Here’s what Chief Software Architect
Ray Ozzie told attendees at Microsoft’s
annual financial analyst meeting in
late July:
“Something has happened ... over the
period of time that I’ve been in this
industry: Technological innovations first
hit within the corporate data center, and
worked their way outward. Nowadays,
GetMoreOnline
Visit Redmondmag.com to read
more about Microsoft’s current
market focus.
FindIT code: 1107Foley
80 | November 2007 | Redmond | Redmondmag.com |
the most exciting things are happening
in consumer electronics, and the technology innovations really find their way
into IT, as opposed to the other way
around. And I think IBM in general, or
any IT company that lacks that consumer component, is going to be disadvantaged from the perspective of IT.”
I don’t buy this line of reasoning. I
think an equally strong case could be
made for Microsoft sticking to its knitting, but that doesn’t equate to sticking
its corporate head in the sand, either.
Two Steps Behind
Instead of looking to build its own social
networking platform with Windows
Live Spaces or investing hundreds of
millions in Facebook, why not look at
how to best add social networking functionality to Windows, Office, Windows
Live and so on? (Even if the real answer
is antitrust fears.) Instead of building an
iPod competitor from scratch, why not
focus on writing software that would
power offerings from Creative or other
hardware partners that have more
consumer-electronics know-how?
Microsoft isn’t good at being hip or
cutting-edge. Those qualities may be
mostly irrelevant in the business and
software development worlds, but they
aren’t in the consumer space. No matter how much outside talent it brings in
to build up its consumer know-how,
Microsoft is going to be two steps
behind the leaders in these realms for
the foreseeable future.
From my point of view, Microsoft
needs more LINQ and less Soapbox.
Do you agree?
Mary Jo Foley ([email protected])
is editor of the new ZDnet All About
Microsoft blog and has been covering
Microsoft for about two decades.
Project3
4/9/07
4:42 PM
Page 1
User Account Control
for the Enterprise
™
Do you trust your users with Administrative Rights? Windows Vista’s User Account Control
asks users for administrator passwords in order to run many critical applications. Distributing
administrator passwords to end users is not a secure enterprise solution.
Least Privilege Management. BeyondTrust enables enterprises to move beyond the need
to trust users with excess privileges or administrator passwords. Apply the principle of Least
Privilege to all users by securely elevating privileges for authorized applications without end
user input, pop-ups or consent dialogues. Empower network administrators to set centralized
security policy. Built for Windows 2000, XP, Server 2003, and Vista; integrated with Active
Directory and applied through Group Policy.
For a free pilot installation call 1.603.610.4250 or visit www.beyondtrust.com.
Windows and Vista are trademarks of Microsoft Corporation. Other company, product and service names may
be trademarks of their respective owners. © 2007 BeyondTrust Corporation. All rights reserved.
Project4
10/2/07
9:06 AM
Page 1