June 2007
Transcription
June 2007
0607red_Cover.v2 5/11/07 9:59 AM Page 1 PowerShell Provides Power to the People JUNE 2007 REDMONDMAG.COM Taking in Orphanware $5.95 1 25274 867 27 7 JUNE • 05 > What you need to know about its care and feeding. 30 + Vista Gets a New Crop of Deployment Tools 50 Developing Successful Outsourcing Relationships 45 Beta Man: Is Longhorn Beta 3 Worth Migrating To? 15 27 Project2 5/11/07 1:51 PM Page 1 Take a more automated approach to file data management. Brocade File Area Network (FAN) solutions enable you to structure your unstructured file data. Now you can consolidate, migrate, and manage your file data like never before. To get the complete story on how to centralize management of your unstructured file data, download INTRODUCING FILE AREA NETWORKS, a free 250-page eBook from Brocade, at www.brocade.com/bookshelf. © 2007 Brocade Communications Systems, Inc. All Rights Reserved. Brocade is a registered trademark and the B-wing symbol is a trademark of Brocade Communications Systems, Inc. All other names are or may be trademarks or service marks of their respective companies. 0607red_TOC1.v7 5/11/07 10:10 AM Page 1 Redmond 2007 Winner for Best Single Issue Computers/Software, Training & Program Development/Trade The Independent Voice of the Microsoft IT Community Contents J U N E 2 007 COV E R STO RY REDMOND REPORT Please, Sir, May I Have Some More? 9 Microsoft Shines Its Silverlight Ozzie offers a peek at the next-generation Web development tools. Taking in orphanware can be frustrating, but there are steps you can take for its proper care and feeding. Page 30 Page 9 12 The Low Down Attack of the Podcasters F E AT U R E S 45 15 Beta Man Longhorn Beta 3 Drops A Developing Relationship How one software company successfully teamed with an international outsourcer to get its products to market. 50 Deployment Done Right The new crop of deployment tools for Windows Vista is a marked improvement over its predecessors. 52 COLUMNS 4 Page 45 Take No Prisoners 18 Mr. Roboto: Jeffery Hicks Smaller Is Better More Power for PowerShell ImageX is a slick compression tool that can help with Windows Vista deployment, as well as everyday file compression. 61 Barney’s Rubble: Doug Barney 68 Never Again: Steven Fishman Green Mountain Gets the [Share]Point All’s Well that Ends Well Alex Albright Coffee maker deploys Web-based portal to solve data-sharing problems. When Less Protocol Is a Good Thing Page 61 71 Windows Insider: Greg Shields REVIEWS Product Reviews 21 Ready to Rumble IBM’s System x3650 is impressive in both performance and price. 22 Still a Friendly Ghost Whether you’re an enterprise network or a small company, there’s nothing to be scared of with this Ghost. Reader Review 27 The Power of PowerShell Readers have high praise—and high expectations—for Microsoft’s new command-line shell and scripting tool. Isolation Automation Exploration: Part II 75 Security Advisor: Joern Wettern Protect Your Customer Data 80 Foley on Microsoft: Mary Jo Foley Compliance vs. Compatibility A L S O I N T H I S I S S U E 2 Redmondmag.com | 7 [email protected] | 79 Ad and Editorial Indexes COVER IMAGE FROM CORBIS IMAGES 0607red_OnlineTOC_2.v5 5/11/07 10:11 AM Page 2 Redmondmag.com JUNE 2007 ENT In-Depth Microsoft Moves Forward with Messaging W ith all of the effort Microsoft’s putting into messaging and its related products—Exchange Server 2007, Communications Server 2007 and more—it sure appears that the company’s looking for a major boost in this area. “It’s hard to find another area within Microsoft that’s producing products at a pace that can match the messaging and collaboration teams,” writes Redmondmag.com contributor Keith Ward, author of this ENT special report. “[Microsoft] sees a huge potential market for its messaging and collaboration products, like VoIP.” Find out more about Microsoft’s overall messaging strategy. FindIT code: ENTMessage Keith Ward Redmond Report Newsletter Interact with Redmond Editors on Redmond Report T he pages of this magazine aren’t the only place you’ll find Redmond’s editors. In our entertaining Redmond Report newsletter, Doug, Ed, Lafe and Peter dish on the industry’s daily tech news, sharing their take plus soliciting yours for the newsletter’s Mailbag section. You’ll also get the latest breaking news, easy links to onlineonly editorial, chances to enter T-shirt contests and more. Start interacting with Redmond’s editors! Sign up for our newsletters. FindIT code: Newsletter REDMONDMAG.COM RESOURCES Resources Enter FindIT Code >> Daily News >> E-Mail Newsletters >> Free PDFs and Webcasts >> Subscribe/Renew >> Your Turn Editor Queries News Newsletters TechLibrary Subscribe YourTurn Questions with ... Brad Becker Read the full Q&A with Brad Becker, group product manager of Microsoft’s Expression suite, online. FindIT code: QAExpress How does Expression push Brad Becker Microsoft’s Web strategy? Expression exists to help get designers into the game. You can’t just give a graphic tool to a developer and get good design unless that developer happens to be a great designer. How does XAML enhance Silverlight’s value proposition? It’s the reuse of skills. Many .NET developers who want to target the Web don’t want to start from scratch— same with designers. What advantages does Silverlight offer over Flash as a creation platform? No. 1: Quality. Our video story is better than anyone else’s and it’s crossplatform. For individual artists, where the big companies go, there’s work, there’s money and there’s new opportunity to try new things. FACTOID $85,331 Average salary of a consultant that is/works for a Microsoft partner. Source: Redmond Channel Partner 2007 Salary Survey FindITcode: RCP2007Sal Redmondmag.com • RCPmag.com • RedDevNews.com • VisualStudioMagazine.com MCPmag.com • CertCities.com • TCPmag.com • ENTmag.com • TechMentorEvents.com • ADTmag.com • ESJ.com 2 | June 2007 | Redmond | Redmondmag.com | Project12 5/3/07 3:10 PM Page 1 ® Swift. Nimble. Relentless. Can you describe your antivirus software with the same certainty? Just set it and forget it. That’s the beauty and the power of NOD32’s ThreatSense® technology. NOD32 proactively protects against viruses, spyware, rootkits and other malware. And, its high-performance engine won’t slow your system down. Take a free NOD32 30-day test drive. Call 866.499-ESET or download at ESET.com. “Best Antivirus Product of 2006” – AV Comparatives © 2007 ESET. All rights reserved. Trademarks used herein are trademarks or registered trademarks of ESET. Ad code: RM07 0607red_Rubble4.v3 5/11/07 10:16 AM Page 4 Barney’sRubble by Doug Barney Redmond THE INDEPENDENT VOICE OF THE MICROSOFT IT COMMUNITY R E D M O N D M AG .CO M JUNE 2007 Take No Prisoners ■ VO L . 1 3 ■ N O. 6 Editor in Chief Doug Barney Editor Ed Scannell Executive Editor, Features Lafe Low Executive Editor, Reviews Peter Varhol Managing Editor Wendy Gonchar A s a journalist I absolutely love to cover Microsoft. After 30 years, the company has more attitude and spunk than a West Coast rapper—and lots more enemies. This makes great copy, and this kind of tension is what excited me about the PC business when I first started covering it almost exactly 23 years ago. The business was full of personality and competition. And a lowly journalist like me could get within spitting distance of the action. Back then, like now, Microsoft had a personality that would do a professional wrestler proud. I can be blasé about the Microsoft attitude because I don’t buy or sell or use large quantities of its software. If a multi-billion-dollar Microsoft exec puts down Google or open source or Oracle, I’m not really affected—except when I have to write a story or newsletter item about it! But customers are affected. Let’s look at IBM. When IBM, especially Global Services, walks through the door it’s often ready for a freewheeling conversation about your entire shop. Want desktop Linux? Here you go! Want Windows XP or Vista tied to Windows 2003 Servers? We can do that too! While product groups tout their own gear, IBM is no longer terribly religious about software. In contrast, Microsoft asks its customers and partners to take a stand the same way it always has. It wants you to believe in the Microsoft vision where Microsoft products all interoperate first and work with other vendors second. Its “take no prisoners” public statements ram the point home. This is nothing new. Back in the day, Bill Gates always had a few choice words for Lotus, WordPerfect, Borland, Apple and IBM. Associate Managing Editor Katrina Carrasco Editor, Redmondmag.com Becky Nagel Associate Editor, Web Gladys Rama Contributing Editors Mary Jo Foley Jeffery Hicks Greg Shields Joern Wettern Art Director Brad Zerbel Senior Graphic Designer Alan Tao A young Ballmer? President Henry Allain VP, Publishing Matt N. Morollo VP, Editorial Director Doug Barney VP, Conferences Tim G. Smith Director, Marketing Michele Imgrund Executive Editor, Michael Domingo New Media Executive Editor, Becky Nagel Web Initiatives Director, Rita Zurcher Web Development Senior Marketing Tracy S. Cook Manager Marketing Programs Videssa Djucich Manager Steve Ballmer, today’s more visible face of Microsoft, is equally un-shy, making for great press conferences and quotes. But is this good for IT? Do you want to hear that your decision to run Web servers on Apache is wrong, that open source is a cancer and that Microsoft wants to bury Google, from whom you just bought a pallet of enterprise search appliances? As Microsoft ages and matures, I believe it’ll have to act more like IBM, being technology neutral and focusing on solutions rather than the platform. Ultimately, Microsoft can make a lot more money this way. And it can still feel free to develop its own platform(s). After all, IBM didn’t stop making mainframe operating systems, it just stopped being so narrow minded in promoting them. As a selfish journalist, I’m not sure I want Microsoft to act so shiny and happy. It could make Redmond a boring magazine. What about you? Would you sacrifice a bit of spunk and entertainment in return for a bit less software religion? Let me know at [email protected].— 4 | June 2007 | Redmond | Redmondmag.com | President & CEO Neal Vitale CFO Richard Vitale Sr. VP, Michael J. Valenti Human Resources VP, Financial William H. Burgin Planning & Analysis VP, Finance & Christopher M. Coates Administration VP, Audience Marketing Abraham M. Langer & Web Operations VP, Erik Lindgren Information Technology VP, Print & Mary Ann Paniccia Online Production Chairman of the Board Jeffrey S. Klein Reaching the Staff Editors can be reached via e-mail, fax, telephone or mail. A list of editors and contact information is available at Redmondmag.com. E-mail: E-mail is routed to individuals’ desktops. Please use the following form: [email protected]. Do not include a middle name or middle initials. Telephone: The switchboard is open weekdays 8:30 a.m. to 5:30 p.m. Pacific Time. After 5:30 p.m. you’ll be directed to individual extensions. Irvine Office 949-265-1520; Fax 949-265-1528 Framingham Office 508-875-6644; Fax 508-875-6633 Corporate Office 818-734-1520; Fax 818-734-1528 The opinions expressed within the articles and other contents herein do not necessarily express those of the publisher. Project11 5/8/07 11:00 AM Page 1 MULTIPLY VIRTUALIZATION AND MAXIMIZE SERVER HARMONY. THE WORLD’S FIRST QUAD-CORE PROCESSOR FOR MAINSTREAM SERVERS. With four energy-efcient processor cores and Intel® Virtualization Technology, Quad-Core Intel Xeon® Processor 5300 series delivers the most headroom for virtualization on a 2P server.* Now you can maximize system utilization and reduce costs by seamlessly consolidating your server resources, all while getting recordsetting performance. Learn why great business computing starts with Intel inside. Visit intel.com/xeon Project2 5/11/07 12:30 PM Page 1 “Hey, where’d all the servers go?” Customer Success #18,328 Once you have seen the dramatic cost savings, increased utilization, and reduced power & cooling requirements made possible with virtualization, you will understand why 20,000 VMware customers worldwide have a success story to tell. What will your story be? Create your own success story. Get your FREE VMware Virtualization Kit, including an analyst report. Get a kit now at www.vmware.com/go/savenow VMware, Inc. 3145 Porter Drive Palo Alto CA 94304 USA Tel 650-475-5000 Fax 650-475-5001 © 2007 VMware, Inc. All rights reserved. Protected by one or more of U.S. Patent Nos. 6,397,242, 6,496,847, 6,704,925, 6,711,672, 6,725,289, 6,735,601, 6,785,886, 6,789,156, 6,795,966, 6,880,022, 6,961,941, 6,961,806, 6,944,699, 7,069,413; 7,082,598 and 7,089,377; patents pending. VMware, the VMware “boxes” logo and design, Virtual SMP and VMotion are registered trademarks or trademarks of VMware, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. 0607red_Letters7.v5 5/11/07 10:18 AM Page 7 [email protected] Print Lives! Just like the microwave didn’t throw the oven out of the kitchen, the Internet won’t kill print media—but it will considerably reduce its power. I don’t subscribe to a newspaper and have very few printed magazines (including Redmond, of course!). I get all my news Let’s start at the positive end of Doug Barney’s article: I agree with him 50 percent. I enjoy reading tangible items such as newspapers, magazines and books. I can’t force myself to read an eBook to save my life. A majority of the Web sites he mentions (Drudge in par- There will always be books and magazines because some people won’t part from them, but they’ll be the minority. through the Internet, radio and TV (in that order). If I want to read while on the throne, I bring my wireless laptop. There will always be books and magazines because some people won’t part from them, but they’ll be the minority. What I’m worried about is losing our history. Right now I can go to a library and search newspapers from 75 years ago and see the news of that time. What about 75 years from now? Will we be able to browse the Web site of today? Probably not. And he who forgets his history is bound to repeat the Louis Vincent same mistakes ... Ottawa, Ontario, Canada Whaddya Think ?! Send your rants and raves to [email protected]. Please include your first and last name, city and state. If we use it, you’ll be entered into a drawing for a Redmond t-shirt! ticular) do receive their information in the form of print publications. But I have an issue with his stance on bloggers. He refers to them as “amateurs.” Amateurs in regard to what—journalism? Wouldn’t Barney place himself in this category as well? I mean, all he really does is print information that he gathered from printed material given to him by Microsoft and other companies. He also mentions the term “annoying.” Does someone force him to read these blogs? Bloggers are the Internet’s version of journalists. They find information, post information and give opinionated comments on the subject matter. Isn’t this what he’s done by “printing” this article for all to read? He gives an example of Moby’s blog not being “news.” If I read something on a blog—or even a printed publication such as this magazine—I research it. I don’t believe everything I read, whether it comes from bloggers or Redmond. And it’s “news” to me if I didn’t know about it. PHOTO ILLUSTRATION BY ALAN TAO Recently, Redmond Editor in Chief Doug Barney wrote in his Barney’s Rubble column about the battle between print and Web media (“Print Is Dead—Not!” April 2007). You had a lot to say, both in favor of online news and in opposition to it, but you made one thing clear: Print may be facing a new challenger in Web-based media, but it won’t go down without a fight! Here’s a sampling of what your peers had to say: I think it’s shortsighted of him to lump bloggers into the “amateur and annoying” category. That’s a very broad stroke Barney painted. Michael D. Alligood Jacksonville, Fla. I finished reading Doug Barney’s editorial piece on print versus the Web as a news source and I think he’s spot on in his assessment. I prefer the look and feel of the print media. He mentions many of the pet peeves I have with online news but he left out one of the biggest annoyances in my opinion—stupid, online advertisements! With print, I can easily turn the page if I don’t want to read an advertisement. In many articles on the Web they’re placed right smack-dab in the middle of the text. They break up the flow of an article and make it more difficult to comprehend. For crying out loud, does everyone have ads today? Yes, I know that’s how Web sites generate revenue, but [they should] stick the ads on the borders or somewhere where they aren’t so intrusive. Bill O’Reilly Seattle, Wash. I purposefully avoid eReading when possible and print every online admin manual that comes my way. Doesn’t PDF stand for “Print da file?” I enjoyed Barney’s column so much I think I’d like to link it in my blog! Mark Danner … not! Spokane, Wash. | Redmondmag.com | Redmond | June 2007 | 7 Project5 4/30/07 2:56 PM Page 1 Knock out spam at Exchange level! Only $ 1195 for 100 users! DOWNLOAD YOUR FREE TRIAL FROM WWW.GFI.COM/RMM/ Anti-spam for Exchange, anti-phishing and email management Eliminate spam from your mail server with GFI MailEssentials for Exchange/SMTP: Block spam at server level No need to update email clients Bayesian filtering Detects spam based on statistical message analysis Anti-phishing Detects and blocks phishing emails Automatic whitelist management Keep whitelists up-to-date without extra admin User-based spam quarantine Sort spam to users junk mail folders Blacklists scanning Stop mail from blacklisted senders and invalid domains SURBL checking Checks email content against SURBL servers Email header analysis and keyword checking Blocks spam based on message field info and keywords Directory harvesting detection Checks validity of all recipient email addresses in an email Also supports Lotus Notes & SMTP mail servers tel: +1 888 243 4329 | fax: +1 919 379 3402 | email: [email protected] | url: www.gfi.com/rmm/ 0607red_RedReport9-16.v13 5/11/07 10:24 AM Page 9 RedmondReport Microsoft Shines Its Silverlight Ozzie offers a peek at the next-generation Web development tools. By Michael Domingo IX07 was another first for Ray Ozzie. In his keynote speech at Microsoft’s annual Web development conference, the company’s chief software architect addressed a large developer-focused audience for the first time in his current role. Unfortunately, Ozzie’s presentation got something of a mixed reaction, no pun intended. Ozzie’s speech focused on a blend of old and new news including the muchanticipated first beta of Silverlight, the browser plug-in for cobbling together interactive Web-based applications, along with Expression Studio 1.0, Silverlight Streaming and Silverlight’s Common Language Runtime support. But he still wasn’t done. Without missing a beat, Ozzie drew back the curtains on a new technology, along with its obligatory acronym: rich Internet application, or RIA. While the RIA concept has been around for years, Microsoft appears to be gaining some traction with it recently. Company officials believe RIAs encapsulate the idea of pushing the envelope with AJAX and Web applications within the context of what Microsoft is calling its software-plus-services initiative. “To support that rich interaction,” said Ozzie, “we’ve now gone well beyond AJAX through the power of browser extensions, extensions for media and advanced controls.” RIA development isn’t being done at the expense of Windows-based desktops, but rather to extend their reach. “There’s a resurgence of interest in service-connected desktop applications, and applications that connect the activities on Web sites to local media, local documents and local applications,” Ozzie explained in his speech. M In his MIX07 keynote, Ray Ozzie showcased the old and new pieces of Microsoft’s Web development strategy. PHOTO BY MICHAEL DOMINGO Proving Microsoft’s commitment to that concept, most of the examples Ozzie showcased during the keynote were mirrored on Macs—even debugging sessions—as well as on mobile devices and even gaming consoles. Ozzie devoted the rest of the keynote to kicking the tires on Silverlight, formerly known as Windows Presentation Foundation/Everywhere. While attendees were generally impressed with the Silverlight demos, some developers had reservations and were taking a waitand-see approach to its adoption. “We won’t be using it until 1.1, 1.2. But even with 1.0, you have to install the plug-in with the browser, [so] it’s something that’s questionable. We have machines that are locked down with Group Policy,” says Raj Kaimal, a Texas-based systems analyst. “If someone tries to install something on a machine, they have to call an administrator and get that thing installed on those machines. Installing a plug-in is a question mark right now.” But demos can be like boomerangs that quietly whisper through the air only to come back and hit with a kick. One such example was Ozzie’s demonstration involving Major League Baseball’s MLB.tv, which included live game stats, live game video and replay, and video sharing. Another example showed NetFlix delivering jagged-less video performance for on-demand movies over the Web. Both application concepts were developed in the Silverlight .NET runtime environment. Still, developer skepticism abounded. “I’m not sure which components our company will be able to use, if any, immediately. I worry about putting a download in front of the user in our specific application. We don’t want to do anything that would cause the user to shy away from the sale,” says Brad Godkin, a .NET developer. Answering recent criticisms that Silverlight is merely an Adobe Flex clone, Ozzie contended it’s more than that, pointing to the technology’s high- | Redmondmag.com | Redmond | June 2007 | 9 0607red_RedReport9-16.v13 5/11/07 10:25 AM Page 10 RedmondReport definition, 720p video quality, its ability for developers and designers to collaborate in the programming language of their choice (although support for Ruby, which will be in the 1.1 version, was met with silence), and its scalability to render video and vector-based content on TVs to PCs to mobile devices without taking a performance hit. “Essentially, our video story is better than Adobe’s or Real’s or anyone else’s story, and it’s cross-platform,” said Brad Becker, group product manager for the Expression suite, in a conversation with Redmond after the keynote. “Because it’s the VC1 codec, that’s already a Windows Media Video codec, and people like CBS who have thousands and thousands of [items of] content already encoded don’t have to re-encode it into Flash video or for Real or something else,” he explained. During the same keynote, Scott Guthrie announced the addition of a Silverlight Roadmap May 2007 ■ Silverlight 1.0 beta ■ Silverlight 1.1 alpha ■ Expression Studio 1.0 RTM ■ Expression Blend 2 Preview ■ Silverlight Tools for Visual Studio “Orcas” Summer 2007 ■ Silverlight 1.0 Ships ■ Expression Media and Expression Media Encoder Ship Products With Yet-To-BeDetermined Ship Dates ■ Silverlight 1.1 ■ Silverlight for Mobile Devices ■ Expression Studio 2.0 ■ Visual Studio Orcas Dynamic Language Runtime, intended for encapsulating Silverlight development, as well as a go-live license that effectively gives developers permission to use the Silverlight plug-in on production Web sites. Another demonstration that drew a positive response was that of Silverlight Streaming. The essential idea of the technology is to allow Microsoft to play host, with some limits, to Silverlight content. Ozzie said that developers and designers have up to 4GB of storage to play around with Silverlight-enabled content and have no immediate host for the media. It’s up to developers how they want to use the storage, whether they want to stream high-quality short pieces or smaller but longer-duration content streams.— Michael Domingo (mdomingo @1105media.com) is Redmond Media Group’s executive editor, new media. EventSentry_Redmond.ai 175.00 lpi 45.00° 15.00° 1/5/2007 75.00° 0.00° 1/5/2007 12:40:42 12:40:42PM PM Process CyanProcess MagentaProcess Black Project2 1/16/07 11:16 YellowProcess AM Page 1 0607red_RedReport9-16.v13 5/11/07 10:25 AM Page 12 RedmondReport The LOW DOWN By Lafe Low Attack of the Podcasters J ust when you thought you’d seen it all, there’s a new magazine in town—Blogger & Podcaster Magazine. Take a wild guess at who it’s geared for. The publishers say they believe it’s the first title to launch simultaneously in three formats: digital, podcast and good old print. The editorial content is focused on “serious” bloggers and podcasters, not just your average, everyday geeks. Larry Genkin, CEO of Larstan Publishing Inc., the magazine’s parent company, figures total circulation in all formats will reach 250,000 within the next year. The digital edition and the podcast edition are free. A print subscription, however, costs $79 per year ($99 international). The fact that a magazine of that nature is still coming out on paper and ink should be proof positive that actual, corporeal magazines will never go away. Check ‘em out at www.bloggerandpodcaster.com. Virtual Gains Virtualization continues to gain respect and momentum as a technology and soon figures to be an essential component of any organization’s IT infrastructure. Storage virtualization, disaster recovery and SAN management vendor DataCore Software Corp. has partnered with Centia Ltd. Centia distributes the smart “Access” and virtualization tools. This gives DataCore a huge leg up in the U.K. and boosts Centia’s value proposition. By adding a virtual storage layer, DataCore essentially does for storage what VMware Inc. does for servers and what Citrix Systems Inc. does for desk- tops. Under the terms of this freshly minted agreement, Centia will distribute DataCore’s storage virtualization, disaster recovery and continuous data protection solutions. Investment Firm Issues Web Warning Would that other companies were so proactive—investment services broker AXA Distributors LLC is beefing up its Web site and refining online processes to mitigate the likelihood of fraud. These three major upgrades ought to help AXA Distributors keep a tight grip on its Web site: • The Message Center gives each registered representative specific details about his book of business, including an email record of all clientrelated transactions. • The Staff Access Level Mechanism lets firms decide on the types of information that individual reps can view, including client account information, policy details and underwriting details. This ought to help newbies and veterans alike. • The E-mail Subscriptions Mechanism lets reps receive notices about product updates and money manager changes. AXA is also distributing the following “Tips for Reps to Protect Privacy and Security”: • Whether prompted or not, change your password every 90 days. • Don’t share your ID and password unless absolutely necessary. If it’s necessary, periodically review your account activity with the user to ensure that your information, and your clients’ information, is safe and secure. 12 | June 2007 | Redmond | Redmondmag.com | • If you access the AXAdistributors.com Web site, or other secure sites, from a computer that’s different than the one you use regularly, be sure you’ve completely logged off the site. Just to be safe, you should shut down the browser before leaving the work area. • If you don’t currently use anti-virus and anti-spyware or security software on your computer, consider doing so. If you do, make sure it’s up to date. Sound advice—and demonstrating that kind of proactive thinking about security ought to make AXA’s customers feel safe having the company manage their moola. Share and Share Alike Archiving e-mails and documents is a requirement in this world of regulatory compliance. Just keeping them in a massive digital shoebox won’t do you much good when it comes time to retrieve or manage all those files. Using SharePoint as a repository works well, but you can’t just drag and drop documents to store them, work with discrete message properties like message addresses and subject lines as SharePoint metadata, classify content for search purposes or sort and filter metadata—or can you? Colligo Networks Inc. is pumping up SharePoint with a new e-mail content management system that’s an Outlook add-in called Colligo Contributor. It will perform all the above functions and organize your content without leaving Outlook. Sharing with SharePoint just got better.— Lafe Low ([email protected]) is the executive editor, features for Redmond magazine. Contact him with any product or company scoop. Project3 4/16/07 2:56 PM Page 1 Project1 5/10/07 4:11 PM Page 1 0607red_RedReport9-16.v13 5/11/07 2:21 PM Page 15 RedmondReport BetaMan By Peter Varhol Longhorn Beta 3 Drops Is it worth migrating servers in the next year? M ore control. Increased protection. Greater flexibility. How important are these characteristics in your servers? More important, does it look like Longhorn Server (still using the code-name inherited from Vista) has those characteristics in abundance enough to merit an early migration? The answer, like most, is “it depends.” If you’re looking for a gamechanger, Longhorn may not be it. Except in cases involving edge computing, there may be no compelling reason to get ready to migrate quickly. But there are some organizations for which one or more Longhorn features fill a major need. Among the key features that could make Longhorn a must-have OS: Server Core or the read-only Active Directory domain controller. I grabbed Longhorn beta 3 from the Microsoft download site using my MSDN subscription to obtain a product key. It comes as an .ISO file, which I burned onto a DVD, making it bootable on a clean system. The entire process, including downloading, burning the DVD and installing, took most of a day. However, the installation-only portion of that was about three hours. Installing requires choosing the roles you want the server to play. Longhorn Server offers roles. Many roles. But you’re able to install only those roles that you want the target server to have. This accomplishes two things: First, it simplifies administration of Longhorn systems in that you only have the features on the server that you need for its role; second, it allows for server specialization. You can design server configurations for the role they’re Figure 1. Windows Reliability and Performance Monitor is an MMC snap-in that provides a graphical view for customizing performance data collection and Event Trace sessions. intended to play and not worry about overloading them. The roles include Active Directory Domain Services, Application Server, DHCP Server, DNS Server, File Server, Print Services, Terminal Services and a number of others. During setup, you add the roles you want the server to play, and you can add to and modify the roles from the console to keep up with the shifting requirements of your organization. There’s your flexibility. Protect and Defend Greater protection is exemplified by the read-only domain controller (RODC). Let’s say you have a geographically separated branch office where a couple dozen employees log in every morning. Your first inclination might be to have a domain controller at that location, but there may be no way to guarantee the physical security of that computer. So you make that domain controller an RODC. Except for account passwords, an RODC holds all the objects and attributes that a writable domain controller holds. Changes cannot be made to the database that’s stored on the RODC; instead, changes are made on a writable domain controller and replicated back to the RODC. This prevents a change that could otherwise be made at branch locations from replicating to the entire domain. And, of course, there’s Server Core. I didn’t install Server Core, but it comes as a part of the package. Server Core installation provides a minimal environment for running specific server | Redmondmag.com | Redmond | June 2007 | 15 0607red_RedReport9-16.v13 5/11/07 2:21 PM Page 16 RedmondReport roles such as Windows Server Virtualization, AD, DNS, Dynamic Host Configuration Protocol, Windows Internet Name Service, Media Services, and File and Print Server, reducing both the servicing and management requirements and the attack surface. To provide this minimal environment, a Server Core installation deploys only the subset of the binaries that are required by the supported or to remove currently installed ones. Server Manager is also used to manage a server’s identity and system information, display server status and identify problems with role configuration. Even in this day and age, there are some admins who prefer to work at the command line. I understand that concept well. While I like a GUI as much as the next person, I find myself dropping down to the command line several times Figure 2. Longhorn Server Manager provides a Web-based console for performing just about any administrative task needed on the system or network. server roles. This is somewhat reminiscent of the older Windows Embedded Editions, in that you could pick and choose which features and capabilities you needed in an embedded system and then assemble them into a unique configuration. In the case of Server Core, you only get the one minimum configuration, with several possible roles. For Control Freaks The key to more control is Server Manager. Server Manager uses both a GUI and command-line tools that allow you to efficiently install, configure and manage Longhorn roles and features. Its Add/Remove Role Wizard allows you to add or configure one or more roles, a day, primarily because I prefer not waiting for the GUI to respond. That’s what PowerShell is for. This new command language adds to that productivity. PowerShell will remind veteran admins of one of the Unix shells with its ability to write complex scripts to call tools and perform just about any activity. Rather than being a usual command-style language, PowerShell is built on .NET and returns .NET objects. You write scripts to create and manipulate these objects. PowerShell gives you access to the file system, registry and the digital signature certificate, among other stores on the system. You can also use it to perform actions on remote systems. PowerShell is a major 16 | June 2007 | Redmond | Redmondmag.com | new system-scripting environment that current Windows script jockeys could conceivably use to enable the data center to run itself. By the Numbers Longhorn Server includes Internet Information Server (IIS) 7 and the .NET Framework 3.0 in its arsenal. This means that Longhorn is almost certainly the new Web server, and that more Web applications will use .NET 3.0 features, such as LINQ and Windows Communication Foundationbased Web services. Here are the particulars of the Longhorn product. There are four editions of Longhorn: Standard, Enterprise, Datacenter and Web Server. There’s also at least one 64-bit edition for the Intel Itanium architecture. The minimum processor speed is 1GH and the minimum memory configuration is 512MB, although 1GB is recommended. Longhorn Server gives the impression of a solid, if unspectacular, upgrade from Windows Server 2003. Microsoft listened to its customers for this product release and added features that made sense to run an enterprise and to give admins more tools. There’s nothing earthshaking about Longhorn, which means it should be able to slip right into a data center with minimal effort. The added capabilities of Server Manager, PowerShell and Server Core will make admins happy for the increased power they’ll now have at their command. On the downside, there are no “wow” capabilities that make this a mandatory upgrade, unless one of them really makes a difference in workload or reach for your organization. If you’re running Windows Server 2003 and happy with it, there’s no reason to do anything until you’re ready to upgrade servers. If you’re running Windows 2000 Server or earlier, this is your logical upgrade path, as soon as it comes out and your admin staff is comfortable with it. — Peter Varhol is Redmond’s executive editor of reviews. Project1 5/11/07 11:27 AM Page 1 -XPSLQ:H·OOWDNH\RXIURP]HURWRVFULSWLQJLQQRWLPHÁDW • Supports Windows PowerShell™, VBScript and over 30 other languages • 2RSV5HVLOLHQFH,QÀQLWH8QGR)LOH+LVWRU\DQG5HF\FOH%LQ • Supports SourceSafe, Perforce, CVS/Subversion • Advanced Database Tools • Visual XML Editor Take a test drive at http://redmond.primalscript.com Are you sure your network is secure? With RecordTS you can confirm your network is secure & compliant. RecordTS acts as Your Terminal Services & Remote Desktop “Security Camera”. · First ever Citrix/ICA Session Recorder · Records ALL Terminal Server Sessions (RDP) · Monitors ALL User Activity on Your Servers · Produces More Information Than Event Logs · Eases Auditing & Compliancy Tasks · Prevents Corporate Data Loss · Assists in Detecting Unethical User Activity · Produces Compact, Digitally Signed Video Files Citrix Versio /ICA n Availa Now ble! Visit www.TSFactory.com for a FREE Trial. © 2006 TSFactory. All rights reserved. The names of actual products and companies mentioned herein may be the trademarks of their respective owners. See us at TechEd Booth 429 0607red_Roboto18.v5 5/11/07 10:29 AM Page 18 Mr. Roboto Automation for the Harried Administrator | by Jeffery Hicks More Power for PowerShell B y now you’ve probably been kicking the tires of PowerShell for a while. I’m sure you’ll agree that it will be a big help when it comes to managing your systems. PowerShell is here to stay and will only get better with time. If you’re like Mr. Roboto, though, you always need more power and you need it now. To boost the power you can get out of PowerShell, try adding Power Gadgets to your toolbox. Power Gadgets is a PowerShell snap-in that gives you graphical widgets for displaying performance information using dials, gauges, bars and charts. Power Gadgets is actually a commercial product (www.powergadgets.com), but you can download a free trial. Normally, Mr. Roboto prefers to offer up his own work or free solutions, but the licensing costs for Power Gadgets are very reasonable. Even a small business should be able to justify the cost, given the value. Let me illustrate—literally. Suppose I want to monitor disk utilization on one of my servers. In PowerShell, I’d execute an expression like this: get-wmiobject -query "Select DeviceID,Size,Freespace from Win32_logicaldisk where drivetype=3" computer " DC01" It works, but I need more power. Here’s the same expression, except this time I sent it through Power Gadgets: Roboto on Demand Get some practice with Power Gadgets and PowerShell at: www.jdhitsolutions.com/scripts What Windows admin task would you like Mr. Roboto to automate next? Send your suggestions to [email protected]. get-wmiobject -query "Select DeviceID,Size,Freespace from Win32_logicaldisk where drivetype=3" computer " DC01"| out-chart -values FreeSpace,Size -label DeviceID -title "Disk Utilization Report" Now I have a terrific visual representation of disk utilization. I can even instruct the Out-Chart cmdlet to Figure 1: This Power Gadgets graph gives you a quick look at memory usage. refresh the information at specified intervals. I can leave this chart on my desktop and have it updated as often as I want, even after I close my PowerShell session. Suppose you want to keep an eye on how much memory your system is currently using. This expression will create a nifty dial gauge: (get-process | measure-object -property workingset -sum).sum/1mb | out-gauge -floating -refresh 0:0:2 -tooltip "Total Working Set Size" This gadget will refresh every two seconds and display “Total Working 18 | June 2007 | Redmond | Redmondmag.com | Set Size” when you hover your mouse over the chart. Here’s one more for you to try on your own: Get-wmiobject win32_processor | out-gauge -type digital -value loadpercentage -float -refresh 0:0:5 -tooltip "CPU Load %" You can also use Power Gadgets to send SMTP mail, create maps, return information from a database and even invoke Web services. And I’ve only scratched the surface. You aren’t restricted to using the existing cmdlets either. You can create your own scripts or functions, and pipe that information to Power Gadgets. All of the Power Gadget cmdlets are highly customizable to a very granular level. To simplify the process, Power Gadgets also comes with a utility where you can create self-contained and customized gadgets. You can have the source data come from a PowerShell expression, a database or a Web service. Once you’ve created a gadget, you can redistribute the stand-alone files in your network (you’ll need to install Power Gadgets) or use them on your own desktop to quickly get the system information you want without having to retype a complex expression or run a PowerShell script. You could easily create your own network operations center on your desktop with real-time monitors and graphs for just about everything running on your network. There’s no need to spend a ton of money on a high-end solution.— Jeffery Hicks ([email protected]), MCSE, MCSA, MCT, is the co-author of “Advanced VBScript for Microsoft Windows Administrators” (Microsoft Press 2006), “Windows PowerShell:TFM” (Sapien Press 2006) and several training videos on administrative scripting. Project2 4/24/07 4:43 PM Page 1 Project3 4/9/07 4:42 PM Page 1 User Account Control for the Enterprise ™ Do you trust your users with Administrative Rights? Windows Vista’s User Account Control asks users for administrator passwords in order to run many critical applications. Distributing administrator passwords to end users is not a secure enterprise solution. Least Privilege Management. BeyondTrust enables enterprises to move beyond the need to trust users with excess privileges or administrator passwords. Apply the principle of Least Privilege to all users by securely elevating privileges for authorized applications without end user input, pop-ups or consent dialogues. Empower network administrators to set centralized security policy. Built for Windows 2000, XP, Server 2003, and Vista; integrated with Active Directory and applied through Group Policy. For a free pilot installation call 1.603.610.4250 or visit www.beyondtrust.com. Windows and Vista are trademarks of Microsoft Corporation. Other company, product and service names may be trademarks of their respective owners. © 2007 BeyondTrust Corporation. All rights reserved. 0607red_ProdRev21-24.v8 5/11/07 10:31 AM Page 21 ProductReviews Ready to Rumble IBM’s System x3650 is impressive in both performance and price. By Chris Wolf For the thrifty at heart, there are few things in life better than finding a bargain. When I first started looking at the IBM System x3650, my first shock came from—of all things—the price. In the past, I was accustomed to seeing IBM products priced higher than those of their competition. This was usually backed by the tried-and-true cliché, “you get what you pay for.” The IBM with which I’m most familiar has long had a tradition of quality products with high-end prices. With these expectations, I compared the price of the x3650 against the prices of similar models from IBM’s competitors, HP and Dell Inc. Much to my surprise, the x3650 was more affordable than comparable Dell and HP 2U servers. The IBM model also offers up to 48GB of RAM, while similar HP and Dell servers maxed out at 32GB. This seeming change in IBM’s strategy made me wonder if the IBM brain trust was receiving advice from Rocky Balboa, who once stated: “If I can change and you can change, everybody can change.” While Sylvester Stallone may not be serving on IBM’s board of directors, it’s fair to say that RedmondRating Documentation 10% 9.0 Deployment 10% 9.0 Expandability 20% 9.0 Feature Set 20% 9.0 Performance 20% 9.0 Management 20% 10.0 Overall Rating Key: 1: Virtually inoperable or nonexistent 5: Average, performs adequately 10: Exceptional 9.2 IBM System x3650 Pricing begins at $2,169 IBM Corp. | 866-872-3902 | www.ibm.com the winds of change are blowing strong at IBM. The x3650 is a 2U server with a starting price of around $2,100. It offers the following features: • Support for up to two quad-core Intel Xeon CPUs • 12 DIMM slots with support for up to 48GB of RAM • Up to eight Serial Attached SCSI (SAS) hot swappable drives • Hot swappable redundant cooling and power • Four PCI Express slots • Onboard SAS RAID controller (supports RAID 0, 1, 10 with optional RAID 5 or 6 upgrade) • Onboard dual gigabit Ethernet card This server is very wellcrafted, with all of its 2U space maximized. The flexibility of the expansion slots, which support four PCI Express cards or two PCI Express and two PCIX slots, was also impressive. Cool Down Many of the server deployments with which I’m involved support server virtualization. In these deployments, storage and network I/O are the most critical. So, when configured with two dual-channel fiber channel host bus adapters and two dual-channel GB NICs, you can have a total of four fiber channel ports and 6GB network ports (including the two onboard ports). The server can accommodate up to eight 2.5-inch SAS drives or up to six 3.5 SAS drives, which offer a maximum Receiving a rating of 9.0 or above, this product earns the Redmond Most Valuable Product award. internal storage of 1.8TB (SAS) or 3TB (SATA). The base unit includes a single power supply with five cooling fans. For redundancy, you can add a second power supply, along with an additional five fans. This will give you redundant power and cooling. One of the unsung features of this unit is its Calibrated Vectored Cooling (CVC). With CVC, the speed of each cooling fan will run anywhere from 4,250 RPMs to 8,000 RPMs. The speed of the fan will increase as the temperature in the fan’s associated server zone increases. It decreases as the zone temperature falls. By allowing fans to run at a variable rate, the system noise and power consumption are both reduced. Knock Out Failures Let’s face it—hardware always seems to fail at the least opportune times. Isolating a faulty component like a bad stick of DRAM can sometimes be a process of trial and error. With the Light Path Diagnostics feature of the x3650, troubleshooting is greatly simplified. The Light Path Diagnostics card displays an error LED when a failure occurs. You can then push a button to extend the | Redmondmag.com | Redmond | June 2007 | 21 0607red_ProdRev21-24.v8 5/11/07 10:31 AM Page 22 ProductReviews card from the chassis to view additional LEDs. This lets you identify the part causing the error. Suppose that the error is caused by a faulty dual in-line memory module (DIMM). With Light Path Diagnostics, each individual DIMM has its own error LED. So isolating a faulty DIMM is as easy as checking which LED doesn’t look like the others. That’s something even Rocky can do. When combined with IBM’s Director Management tool, Light Path Diagnostics can alert you of failures once they occur. Another nice feature that you can also integrate with Director is IBM’s Predictive Failure Analysis (PFA). PFA monitors resources while tracking repeated errors (such as disk I/O) errors. Once a series of errors surpasses a predetermined threshold, the system will generate an alert. This helps you spot a failing device before it actually fails, and thus take preemptive action to prevent unscheduled downtime. The x3650 literally took everything that I could throw at it without missing a beat. With its very reasonable entrylevel price, this server would be a nice fit for medium-sized and growing organizations. With its low profile and excellent expansion options, this server is also a nice fit in data center environments. While I would always like more features, I realize that there are physical limitations of a 2U chassis, and IBM has done a nice job shoehorning as many high-performing devices and expansion slots into the server chassis as possible. With excellent performance and config- uration options, intelligent power management and aggressive pricing, the IBM x3650 is definitely worth a look. With or without the help of Rocky, it’s clear that IBM is trying to once again reign over the heavyweights. — Chris Wolf ([email protected]) is a Microsoft MVP for Windows Server—File System/Storage and is a MCSE, MCT, and CCNA. A senior analyst for Burton Group, he specializes in the areas of virtualization solutions, high availability, enterprise storage and network infrastructure management. Wolf is the author of “Virtualization: From the Desktop to the Enterprise” (Apress, 2005) and “Troubleshooting Microsoft Technologies” (Addison Wesley, 2003), and a contributor to the “Windows Server 2003 Deployment Kit” (Microsoft Press, 2003). Still a Friendly Ghost Whether you’re an enterprise network or a small company, there’s nothing to be scared of with this Ghost. By Greg Shields Ghost gave my IT career a jump-start. The same goes for a whole crop of IT people. Ghost was the tool that arrived just when we needed it to speed up new workstation deployment. During one of my projects many years ago, Ghost increased our deployment productivity by 1,100 percent over the manual method. It was so successful, I ended up getting promoted. Ghost Solution Suite version 2.0 is Symantec Corp.’s most recent release of a product line that has been around for a generation of IT workers. It has RedmondRating Documentation 25% 9.0 Installation 25% 8.5 Feature Set 25% 8.5 Management 25% 9.0 Overall Rating 8.8 Key: 1: Virtually inoperable or nonexistent 5: Average, performs adequately 10: Exceptional Ghost Solution Suite Pricing starts at $39.20 per user for 10-24 users Symantec Corp. | (408) 517-8000 | www.symantec.com long provided an easy-to-use and highperformance mechanism for deploying operating system images to workstations and servers. Ghost is so synonymous with image deployment that the imaging process for applications is often referred to as “ghosting.” The New Boo The new version of the Ghost Solution Suite has three major enhancements to the core Ghost engine, as well as a group of updates to the Ghost Console. While Ghost Server, the core Ghost product, does most of the heavy lifting, the Ghost Console often goes unnoticed. It’s this console that is the focus of the first major set of enhancements. The Ghost Console is intended to be an elementary inventory system to help you create dynamic machine groups based on inventory data. Once you’ve 22 | June 2007 | Redmond | Redmondmag.com | created those groups, you can use them to deploy images and software packages based on policies. You can assign a task to a target machine group that clones the machine, captures the user configuration, deploys a software package, executes a scripted command or many other options. This process lets you take a more holistic approach to deploying OS images, elevating what was before just a straight image dump to a more process-centric approach. While it certainly has enough features for the small- to medium-sized network, the Ghost Console’s functionality may not be granular enough for enterprise-level customers. Most likely, these large customers are already using a fully featured systems management tool like Microsoft Systems Management Server or Altiris. For those who don’t, however, the Ghost Console Project4 5/10/07 2:27 PM Page 1 RARE OCCURRENCE. For a limited time, upgrade to Crystal Reports® XI for only $99. Create brilliant reports in minutes from any data, anywhere, then instantly share them over the web. Business users get what they need, when they need it, and you get a solution that frees up your day. A rare occurrence, indeed. • Simply access any data, anywhere • Easily create reports – whatever your level of expertise • Instantly share reports over the web Act fast. Go to www.businessobjects.com/rare or call 1-888-229-2276 today. NOW $ 99 UPGRADE or $395 NEW © 2007 Business Objects. All rights reserved. Business Objects and the Business Objects logo, Business Objects and Crystal Reports are trademarks or registered trademarks of Business Objects in the United States and/or other countries. All other names mentioned herein may be trademarks of their respective owners. 0607red_ProdRev21-24.v8 5/11/07 10:31 AM Page 24 ProductReviews provides some critical inventory information like hardware composition, installed applications and patches on the target systems. One of the console’s new features that will be useful for Vista deployments is the ability to filter all your systems to show which ones are candidates for a Vista upgrade and which ones are not. This feature alone will be a great assistance to the harried administrator tasked with Vista upgrades, but having trouble determining the actual hardware requirements. Ghost’s improved capability to do user state migration is arguably the most impressive of the new features in version 2.0 of the core Ghost engine. Although user data migration tools have been around for a while, previous attempts were often difficult to implement. The way Ghost handles user migration takes everything off a several dozen third-party applications like Yahoo! Messenger, Lotus Notes, Palm Desktop and Acrobat. The comprehensive manual (at 700-plus pages) will give you detailed information about the captured settings. All the migration pieces are now integrated with the Ghost Console itself. The third new feature is compatibility with Vista upgrades. Any Vista installation requires a 32-bit pre-OS, which is different from any of Microsoft’s earlier OSes. Ghost uses this pre-OS, typically the Windows Preinstallation Environment (WinPE), to deploy images to workstations. This shift to a 32-bit pre-OS for installation opens up a host of new functionality. First, images are now essentially architecture-independent. You should be able to deploy a Vista image generated on one processor architecture to a machine with a differ- additional bootstrap drivers that let you use Ghost with more types of RAID arrays than previously possible. Interestingly enough, in an era where many companies are trying to scale their products to enterprise-level customers, Symantec’s focus is on the SMB user. While many enterprise-level customers use the Ghost Server piece to handle their image deployment, they may not need the Ghost Console to manage inventory. SMB customers, however, have a defined need for Ghost Console support and the functionality that comes with the console, including application packaging. The application packager in Ghost is designed for the IT administrator who’s not necessarily a pro at package development. It includes features like pre- and post-installation differencing to identify the updated files and registry keys. These features are available in other packaging tools, but usually for an additional cost over and above the deployment mechanism. Hauntingly Good So, do Ghost’s new features and functionality warrant a purchase or an upgrade? If you’re a small-market customer and you need an integrated inventory and image deployment tool, Ghost is a mature product that has been doing it well since many of us started our careers. If you’re an enterprise customer who’s been using Ghost Server for years, you’ll want to consider an upgrade, if for no other reason than to add Windows Vista deployment support. In either case, this new release matures a successful product that continues to hold a special place in the hearts of many IT old-timers. — Figure 1. The Ghost Console lets admins perform multiple tasks from a single GUI. machine that makes it unique, such as desktop configurations, profile information and application settings. Another aspect where Ghost excels is in its handling of third-party applications and their associated customizations. It supports configurations for ent architecture. You can now mount and edit offline any file-based Ghost images created from NTFS partitions. This means you can manipulate the image contents offline without having to deploy, update and recreate a new image. The 32-bit pre-OS also sets up 24 | June 2007 | Redmond | Redmondmag.com | Greg Shields, MCSE: Security, CCEA, is a principal consultant for 3t Systems (www.3tsystems.com) in Denver, Colo. A contributing editor to Redmond magazine and a popular speaker at TechMentor events, Greg provides engineering support and technical consulting in Microsoft, Citrix and VMware technologies. Project11 3/13/07 4:08 PM Page 1 BRIDGE THE GAP BETWEEN DATA PROTECTION AND APPLICATION AVAILABILITY SteelEye solutions ensure the availability of your critical data and applications across any environment. To request your free bridge building kit and discuss your availability needs with our experts, surf to www.steeleye.com or phone 866-318-0108. SteelEye integrates continuous data protection, the ability to cluster together physical servers with virtual machines and support for both shared storage and data replication configurations across LANs and WANS, so that you are fully protected in any situation. Monitoring and Recovery of: • • • • • Servers and Storage Devices Windows and Linux File systems and Data volumes Network connections Application and Services including: • • • • • • Exchange SQL Server Oracle 9i and 10g SAP NetWeaver Apache and IIS SharePoint All products referenced are the trademarks or copyrights of their respective owners. Project5 2/12/07 11:14 AM Page 1 0607red_ReaderRev27-28.v5 5/11/07 10:34 AM Page 27 ReaderReview Your turn to sound off on the latest Microsoft products The Power of PowerShell Readers have high praise—and high expectations—for Microsoft’s new command-line shell and scripting tool. By Joanne Cummings To know Microsoft’s PowerShell is to love it. That’s how most readers feel— it’s just tough getting to that point. PowerShell 1.0, formerly code-named “Monad” and later “MSH,” is Microsoft’s new object-oriented scripting language and command shell. Readers say it’s a huge improvement over Windows command shell (CMD.EXE), especially when it comes to being productive when managing Windows environments. Although the learning curve is a bit high, they say, getting comfortable with the tool is well worth the time and effort. “Admins are pretty busy already,” says Dmitry Sotnikov, new product research manager at Quest Software Inc. and a member of the PowerGUI forum. He has been using PowerShell for more Microsoft PowerShell 1.0 Pricing Info: PowerShell is available as a free download from Microsoft. (Eventually it will be included as part of Windows.) Microsoft Corp. | 800-426-9400 | www.microsoft.com day long. It’s part and parcel of what I do. I have scripts that automate the interactions with the database that are very repeatable. If I need to change a database object, and I need to know which other objects depend on this one, I can get that straight from the PowerShell prompt.” On Par with Unix and Linux Windows has never been strong when it comes to scripting, readers say. That has made administering large Windows environments more difficult than it should be. PowerShell shines in Now I use these PowerShell scripts all day long. It’s part and parcel of what I do. Chris Leonard, Senior SQL Server Database Developer and Administrator, GoDaddy.com than a year now. “Just learning another scripting syntax has a steep learning curve, but once you get past that transition, you’re golden.” That’s true, says Chris Leonard, senior SQL Server database developer and administrator at GoDaddy.com, a domain name registrar in Scottsdale, Ariz. Leonard says he spent several weeks going through PowerShell’s user guide at a rate of about five or 10 pages a night, slowly getting a handle on how it worked and what it could do. “It took a while to plow through it, and to port all my other scripts over to it, but the results are worth it,” he says. “Now I use these PowerShell scripts all those typical administrative environments, in which users are tasked with repetitive tasks that can quickly drive GUI users crazy. “GUIs are great when you don’t know what you’re doing or when you want to do something just once,” says John Vottero, partner at MVP Systems Inc. in Columbus, Ohio. “But when you need to do something more than once and you want it to be something you can repeat, you need to script it. It’s taken Microsoft a long time to learn that lesson, but they’ve finally figured it out with PowerShell.” Readers have used other scripting tools for Windows, especially the old command shell (CMD.EXE), but weren’t always satisfied with the results. “Historically, the scripting ability in Windows has always been second class compared to what you can do in Unix or Linux, with nice shells like Korn shell and bash,” Leonard says. “In Windows, you’re either stuck working with the limitations of command-shell scripting or you could load something like CygWin and their bash shell.” Leonard says the biggest difference is that PowerShell’s scripting language is much more robust. Previously, he had tried to use CMD.EXE to script and push database deployments to multiple servers. He found that as the scripts became more complex, debugging and maintaining them became nightmarish. “If I had scripts with dependencies— like this script has to run before these other two can run—I wanted to be able to represent that in some kind of a control file, and I was really struggling with it,” he says. “When I would go to make enhancements, the code was fragile and easy to break. And it was tough to figure out why it broke. PowerShell is a big improvement.” The “Aha!” Moment The differentiator between PowerShell and other scripting tools is that it’s object-oriented and built atop Microsoft’s .NET framework. That means PowerShell scripts aren’t just piping around plain ASCII text. Instead, they’re actually scripting entire .NET objects, including all properties and methods. | Redmondmag.com | Redmond | June 2007 | 27 0607red_ReaderRev27-28.v5 5/11/07 10:34 AM Page 28 ReaderReview “You pass information from one command to the next, and it can get pretty awkward,” says Leonard. Because PowerShell works with complete objects, you can do much more with the scripts. “Those objects still have their native properties and methods attached, so if I want the length of that file, I just say ‘GET-LENGTH,’ and there it is, boom. I didn’t have to figure out where they put it in the display,” know how to get a widget, well, the command is probably GET-WIDGET.” Leonard’s other “Aha!” moment had to do with PowerShell’s ability to interact with the Windows registry. “PowerShell extends the idea of a drive, so that things besides file locations can be pointed at by drives,” he says. “For example, certain pieces of the Windows registry are accessible as drive letters, much like the C: drive on your computer.” Just learning another scripting syntax has a steep learning curve, but once you get past that transition, you’re golden. Dmitry Sotnikov, New Product Research Manager, Quest Software Inc. Leonard says. “And I’m free to do anything with the object, not just display it. That was definitely an ‘Aha!’ moment.” What makes PowerShell strong, he says, is that it follows conventional programming constructs. It even has a built-in debugger, which is a huge improvement over CMD scripts. “If it breaks, I don’t have to just stare at my command-shell script and try to find a syntax error,” he says. “I can actually use the debugger to step through my code like I would in a compiler environment, almost. Plus, it handles arrays, looping and branching—all these things you look for in a fullblown programming language.” Compared to other scripting tools, PowerShell’s commands and utilities are very standardized. This is because it enforces a verb-noun naming convention for all of its cmdlets (pronounced “command-lets”), the built-in commands within the scripting tool. “With PowerShell, you don’t get to name your cmdlet,” Leonard says. “You have to specify your verb and your noun and then you get a name, verb-noun, like GET-DRIVE.” That level of standardization ratchets up the performance and efficiencies when using PowerShell, he says. MVP’s Vottero agrees that the standardized commands are powerful and intuitive. “It’s very easy for an end user to pick up on,” he says. “If you want to One particularly helpful key in PowerShell is HKLM. “It points to a well-known location in the registry called HKEY_LOCAL_MACHINE, and that’s great,” he says. “All of the sudden, without leaving the command prompt, I can navigate into the registry, look things up and script interactions with the registry just like I’m working with files.” Only a Few Downsides Early users say the pros far outweigh the cons with PowerShell, but there are a few missing pieces. For example, it seems to have limited capabilities for remote machines. “I’m controlling a whole bunch of servers, so it would be cool if there was some kind of naming syntax that would let me do tasks on each of my servers,” Leonard says. “That could easily streamline our deployment process when pushing things out across the server farm.” Vottero adds that it’s also a bit slow at times. “It’s slow, but it’s not so slow that it’s not usable,” he says, adding that much of what appears to be GetMoreOnline Learn more about getting comfortable with PowerShell at Redmondmag.com. FindIT code: ReadRev0607 28 | June 2007 | Redmond | Redmondmag.com | PowerShell running slow is really due to the way .NET works. “A directory search looks slow, but it’s the fault of the way .NET hands your directory entries when you’re doing a directory search. It’s up to the .NET Framework to fix that, not PowerShell.” PowerShell for Everyone Perhaps the biggest plus to PowerShell is Microsoft’s intention to include it as a unifying component across its product lines. For example, PowerShell is already included with Exchange 2007 and Systems Center Operations Manager. It just debuted in beta 3 of Longhorn server. Microsoft has also signaled its intention to include PowerShell in future versions of Windows. “That unification is the biggest advantage,” Sotnikov says. “I can use it against Exchange and Operations Manager and [Internet Information Server] IIS 7 and whatever other applications are going to be released with PowerShell support.” Vottero, who’s an ISV, says the next version of his product, the JAMS job action and management system, will require PowerShell. That type of unification and standardization will act as a catalyst for the Windows third-party marketplace. “Microsoft’s laying down the foundation and saying, ‘here’s how you do command-line script-oriented stuff for Windows.’ And now everybody can write to that framework,” he says. “Until PowerShell, that was always sort of up in the air—everybody kind of invented their own and there was no standard. Now, when we do stuff that fits into PowerShell, it will work with other ISVs’ stuff that fits into PowerShell. And that means end users can combine everybody’s stuff into whatever they need to do to get their job done.” That’s something Windows users have long clamored for. “If I was talking to Microsoft and the PowerShell guys, I’d say, ‘Great job,’” Vottero says. “Too bad you didn’t ship it five years ago.” — Joanne Cummings (jcummings@redmond mag.com) is a freelance technology journalist. Project11 1/16/07 11:19 AM Page 1 Lose that important file? Protect against accidental file deletions with NEW Undelete® 5 Now with version protection for Microsoft® Office files According to the New York Times, file loss costs businesses an estimated $13 billion per year. The problem is that the Windows® recycle bin doesn't capture every deleted file, particularly files deleted over the network and older "saved-over" versions of Microsoft Office files. Not even your backup system provides comprehensive real-time protection. Now you can get complete up-to-the-minute file protection with instant recovery—get new Undelete 5! • NEW! Version protection allows instant recovery of older versions of Microsoft Word, Excel and PowerPoint® files • EXCLUSIVE! Recovery of deleted files is easy and instant • EXCLUSIVE! Undelete 5 captures and protects all deleted files in real time — even files deleted by other systems over the network. No more lengthy backup restores! • Server and workstation editions available Try Undelete FREE! Visit: www.undelete.com/recover For volume license pricing and government or educational discounts, contact your favorite reseller or call 800-829-6468 reference number 9246 ® ©2007 Diskeeper Corporation. All Rights Reserved. Undelete, Diskeeper and the Diskeeper Corporation logo are registered trademarks or trademarks of Diskeeper Corporation in the United States and/or other countries. Microsoft, Windows and PowerPoint are either registered trademarks or trademarks owned by Microsoft Corporation in the United States and/or other countries. Diskeeper Corporation • 7590 N. Glenoaks Blvd. Burbank, CA 91504 • 800-829-6468 • www.undelete.com 0607red_F1Orphan30-36.v7 5/11/07 2:30 PM Page 30 Please, Sir, May I H Taking in orphanware can be frustrating, but there are steps you can take for its proper care and feeding. By Lafe Low S everal years ago, Jacques Francis was charged with finding a highly specialized business process automation tool. His firm, a small London-based insurance broker, made as its final choice a work in progress that was being offered to the company and other small brokers at a price well below that of what more established players could offer. That low-cost choice proved more expensive than Francis could have ever imagined. “[The vendor] never finished the product, went to the wire financially and was bought by another financial services provider that promptly pulled the plug to stem the hemorrhaging of cash,” Francis says. And just like that, Francis had become the proud owner of orphanware. Fortunately for Francis, now the IT manager for global financial services firm Demica Ltd., his story didn’t end there. 30 | June 2007 | Redmond | Redmondmag.com | The ingenuity and entrepreneurial spirit of many technology companies breeds innovation and unique solutions to complex problems. It does not, however, breed stability. That’s especially true for some of the smaller companies. If you’ve ever purchased a piece of software only to have the vendor go under or be acquired by a larger company shortly thereafter, you can empathize with the inconvenience, expense and exposure of being orphaned. 0607red_F1Orphan30-36.v7 5/11/07 2:30 PM Page 31 I Have Some More? Most IT administrators maintain a respectful level of vigilance when selecting, deploying and relying on any piece of software or hardware, especially for mission-critical functions. Some even eschew smaller companies or startups, opting instead for established companies with lengthy track records. “The big dogs eat the little dogs,” says an IT manager with a medical firm who prefers to remain anonymous, “so PHOTOS FROM CORBIS IMAGES we try to use the big dogs whenever possible.” But when a specialized utility or application with unique features is needed, administrators don’t always have the luxury of relying on proven vendors. Analysts agree that instances of orphanware are more common when smaller vendors are involved. “Orphanware is less prevalent in core business applications,” says Ray Wang, senior analyst for market researcher Forrester | Redmondmag.com | Redmond | June 2007 | 31 0607red_F1Orphan30-36.v7 5/11/07 2:30 PM Page 32 Orphanware Research Inc. Smaller vendors getting gobbled up by larger vendors, Wang finds, is the situation that most commonly leads to products being orphans. Ironically, Wang also sees a strong likelihood of orphanware resulting from systems integrators developing customized applications for large platform deployments. “Systems integrators continue to add code on top of existing base products,” he says. “Many of those integrators are small shops. Some may go under or be acquired.” The open source arena is another place where orphanware has become a common occurrence. “In custom development and the open source side, it’s more prevalent. I don’t think it’s become a disaster or a tragedy, but it’s more prevalent,” Wang believes. He cites the nature of highly specialized applications and people moving on to other positions with other companies as the primary reasons for open source orphans. “ Orphanware is less prevalent in core business applications. … In custom development and the open source side, it’s more prevalent. I don’t think it’s become a disaster or a tragedy, but it’s more prevalent. ” Ray Wang, Senior Analyst, Forrester Research Inc. Plan Ahead So how can you protect yourself? David Reitz, systems administrator for the Coors Brewing Company in Golden, Colo., has become the caretaker of orphan technology several times. His first step is to batten down the hatches and try to minimize the impact by putting together a sensible migration plan. “The short term plan deals with assessing the impact, freezing the environment and looking at other people to support it, including former employees [of the defunct company]. The longer term plan deals with moving away from the product,” he says. While it’s important to have a plan of action in the immediate event of being orphaned, it’s equally essential 32 | June 2007 | Redmond | Redmondmag.com | to negotiate up front what will happen in the event of a company’s demise or sale to another firm. “Terms in the contract should include software escrow and code ownership if the company fails,” Reitz advises. “We have used a software escrow account and obtained the source code. It was a little out of date, but it helped a lot,” he says. Planning ahead ultimately worked out well for Francis. Fortunately, he had organized a user group as his firm was purchasing the yet-to-be-finished software. He realized there’s safety in numbers to a certain extent, and that there’s some leverage available to help those left short by a vendor’s dissolution. His user group had seen that the end was coming and negotiated with the new owners to receive the code that had been placed in escrow during the sale. “The new owners gave us the code under the contractual understanding that we could maintain and develop the system for our own businesses, but not exploit it commercially,” he says. That type of arrangement is fairly typical when placing source code in escrow to provide to customers when a company goes out of business. Customers can typically receive the code to maintain and update the product for their own use, but not use it to realize a profit. Vendors will also update source code in escrow from time to time. This is yet another legal point that IT managers should clarify during their negotiations. A software escrow account should be established any time there’s a change in control within the company or any financial viability issues, says Wang. “Not only the software in escrow, but also the support contracts, training materials, installation guides and platform certification specs,” he says. “Make sure the documentation is there. Make sure the knowledge transfer is in place.” If you haven’t established these types of guidelines and an escrow account for the source code up front, be certain to act on it at the first indication that a company may be going down. “You have to do this before the bankruptcy process starts, if possible,” says Reitz. Having a backup plan like this can help, but it’s no guarantee that you won’t be left high and dry. “Sometimes you get lucky and sometimes you eat it,” says one anonymous IT manager. “I had one product that was bought out by Macromedia a month after release and never had its bugs fixed. Another case was when a blade vendor almost had 125 grand of my money. I called them to clarify part numbers and the phone was disconnected.” Doing a lot of research prior to signing a check and having more than one option is the best course of action, he says. Plan B No matter how much preparation and planning you do, you may still find yourself pursuing your Plan B. Randall Stevens goes into any negotiation with a backup plan Project4 5/10/07 2:21 PM Page 1 Redmond magazine named Centeris Likewise Management Suite Roundup Champion The Likewise Management Suite allows you to seamlessly integrate Linux, UNIX, and Mac systems with Microsoft Active Directory. Enterprise organizations with mixed networks can now improve security, simplify administration, lower IT costs regulatory compliance. Visit Centeris at Tech∙Ed booth #828 www.centeris.com/freetrial and demonstrate 0607red_F1Orphan30-36.v7 5/11/07 2:30 PM Page 34 Orphanware Protecting Yourself Y ou can take several steps up front that will give you a modicum of protection in the event that your software vendor is acquired or goes under: ✦ Formulate a step-by-step backup plan. ✦ Negotiate ownership of source code in escrow. ✦ Check financial stability of the company. ✦ Test software if possible. ✦ Consider alternative solutions. When It Happens You need to act immediately if a software package you’re using suddenly becomes orphanware. Here’s what to do: ✦ Act on your step-by-step backup plan. ✦ Lockdown and assess the situation to limit exposure. ✦ Consider employing or contracting with former employees of defunct vendors who worked on your product. ✦ Aggressively look for alternatives. ✦ Begin a phase-out plan. 34 | June 2007 | Redmond | Redmondmag.com | already in mind. As a software engineer and independent consultant, he tries to line up a vendor with a similar replacement product, but even that doesn’t always work out. “If none is available, we’ll reverse-engineer the functionality,” he says. Another IT manager, who preferred to remain anonymous, rebuilds his systems every five years. Consequently, he always has his eye on an alternative approach. “We’ve found a different vendor, found a way to do without the product, or built our own,” he says. “You always have a Plan B at the ready.” Lining up an alternative solution is often an effective strategy. “Once a buyout happens,” says John Pitton, systems administrator for Discorp, “we go into reactive mode “ The short term plan deals with assessing the impact, freezing the environment and looking at other people to support it, including former employees [of the defunct company]. The longer term plan deals with moving away from the product. ” David Reitz, Systems Administrator, Coors Brewing Company and search for a similar or better solution.” Pitton has experienced both situations where products were dropped right away and where they were maintained for a while following a sale. Most of the time, the buyout company will renegotiate with customers to continue support and upgrades. Occasionally, the new company will sideline a product or phase it out. Even when a product is phased out, though, there’s usually enough time to select and install a replacement. Pitton has found this is most often the case with smaller companies purveying the latest technology. Researching available options among competitors to that technology is vital. Project8 5/10/07 4:17 PM Page 1 you can’t monitor every student every minute... iPrism can. ® ® can iPrism from St. Bernard is the award-winning Internet filtering appliance that starts working right out of the box, blocking dangerous URL, IM and P2P traffic so your students and networks are protected 24/7. Contact us to qualify for a Free Evaluation Unit iPrism is a completely self-contained solution with no extra 1• 800 •782•3762 hardware or software to purchase. It’s easy to install and www.stbernard.com/Redmond use and with its low-cost, zero-maintenance technology, iPrism is an excellent choice for schools and libraries. iPrism’s comprehensive on-box reporting helps you meet critical CIPA compliance requirements and its hardened and optimized OS has never been hacked– even proxy tunnels can’t get around it. No wonder our renewal rates are 98%! Find out more about the IDC ranked #1 web filtering appliance. Go online for a Quick Quote or call today! Focused on Schools ©2007 St. Bernard Software, Inc. All rights reserved. The St. Bernard Software logo and iPrism are trademarks of St. Bernard Software, Inc. iPrism is a registered trademark of St. Bernard Software, Inc. 0607red_F1Orphan30-36.v7 5/11/07 2:30 PM Page 36 Orphanware “Research first what viable options are available from other similar software manufacturers,” Pitton says. “Bleeding-edge software isn’t for everyone. However, if you’re going to take the leap of faith in software that no one else is manufacturing, be prepared to self-support,” he adds. Start Me Up The experience of buying from a start-up company is similar to that of buying from a smaller or specialized vendor. Many of the risks are the same, as are many of the precautions you should take. In either case, once again, research and contingency plans are essential. First, make sure a start-up is on sound financial footing. This can sometimes be problematic, but most should be willing to give you a good indication of their financials. Even if you’re dealing with a smaller, privately funded company that’s reluctant to divulge details, market research reports can give you a good feel for how the company fits into the context of its market. While he focuses on major players for his company’s critical business applications, Deon Pretorious, the lead “ Bleeding-edge software isn’t for everyone. However, if you’re going to take the leap of faith in software that no one else is manufacturing, be prepared to self-support. ” John Pitton, Systems Administrator, Discorp developer for Geckotek in South Africa, has shopped around at start-ups for some unique solutions. “I’m not averse to purchasing non-critical software from start-up companies,” he says. “I usually take the precaution of testing the software on a trial basis in order to satisfy myself that it can perform the necessary functions and is bug-free.” The specific focus of some start-up software developers puts the company, and therefore its customers, in a unique situation. The prospective competitive advantages can overshadow the potential risks. “In certain cases, 36 | June 2007 | Redmond | Redmondmag.com | niche software is provided by start-up vendors that’s not available elsewhere. This makes it a viable proposition,” says Pretorious. Francis says he no longer relies on start-ups for line-ofbusiness applications, but still considers them for utilities and second-tier functions. “The risk to the business is too great. An exception would be if I knew a start-up’s people well and was convinced they understood my business and its requirements,” he says, or if he was considering software that provided “non-essential functionality that couldn’t compromise the business core operations by its absence.” Learning from Experience While experience may be a harsh teacher, most IT professionals left high and dry by orphanware have adjusted their tactics to better manage the situation should it happen again. Sometimes, when you negotiate ownership of source code in escrow, you may get more than you bargained for. “We’ve been in the position where we were offered the entire company’s assets,” says Coors’ Reitz. “Our maintenance contract exceeded the value of the company’s stock, so we turned them down, but referred them to other software companies,” he says. To maintain the value of his software investment, Reitz has also found those who did the initial work are often available to keep it going. He sometimes runs ads in local papers where a company was based and contracts with the former employees to do work and support. Francis’ user group members had a similar experience. They employed a developer who had originally worked on the product to finish it off and provide maintenance. Several of the members continued using the product for years, although Francis says he replaced it with an established product after a couple of years. Still, he and his user group members were able to preserve much of the value of their initial investments. Dealing directly with the original developers is the best response to orphanware, says Wang. “Reach out to existing employees and bring them on board,” he says. “The key ones to know are heads of development and releasepatch engineers.” The rewards of dealing with smaller, intensely specialized vendors or start-up software companies can outweigh the risks, but you have to go in with eyes wide open and a ready backup plan. You can stick with the big dogs, or you can isolate products you buy from potentially questionable vendors, but you had better be ready for anything. Companies will come and go, and you don’t want to get caught in the vacuum they leave behind. — Lafe Low ([email protected]) is the executive editor of features at Redmond magazine. Project1 5/9/07 9:49 AM Page 1 0607TechEdShowcase.final.qxd 5/11/07 2:32 PM Page 38 Redmond’s TECH•ED Partner Showcase GOING TO TECH•ED? MEET WITH YOUR FAVORITE VENDORS ONE-ON-ONE Tech•Ed Booth #725 UltraBac Software has been offering cutting-edge technology for more than 25 years. They were first with physical-to-virtual disaster recoveries in the Windows market space. At the forefront of dissimilar hardware restores, UBDR Gold users were some of the first to be able to truly recover to different hardware manufacturers. Not to mention, UltraBac Software recognized early on the importance of 64-bit processors, introducing support in January 2005. Visit us at Tech Ed Booth #725 to learn more! www.ultrabac.com/download 425-644-6000 38 | June 2007 | Redmond | Redmondmag.com | 0607TechEdShowcase.final.qxd 5/11/07 2:32 PM Page 39 Redmond’s TECH•ED Partner Showcase GOING TO TECH•ED? MEET WITH YOUR FAVORITE VENDORS ONE-ON-ONE Tech•Ed Booth #1147 x86 Server Virtualization with Blazing Fast Performance • Easy Installation and Deployment • Support for Windows and Linux • Multi-Server Management Console • Choice for Every Server—with a Seamless Upgrade Path www.xensource.com 650-798-5900 Tech•Ed Booth #815 Lieberman Software, a Bronze Sponsor at Microsoft Tech•Ed, provides mass management tools that reduce security vulnerabilities, increase productivity, minimize system failures and ensure regulatory compliance. Our multi-threaded, agentless solutions allow you to simultaneously manage thousands of systems from a single console. Drop by our booth (#815) and we’ll demonstrate how our products can help you randomize your local admin account passwords, streamline the management of your servers and workstations, and improve the security, uptime and auditability of your Windows and Linux systems. With five (5) Windows Vista Certifications, we know you’ll be amazed at what our products can do. www.liebsoft.com Tech•Ed Booth #1532 Have you experienced the horror of an Exchange database recovery? Does your existing solution restore your Exchange server in days—not minutes? Would you like to see completely automated Exchange failover (locally or around the world), without the complexity, expense and pain of clustering? Do you want to eliminate backup windows forever and have up-to-the-second data recovery? Are you interested in a solution that can protect and accelerate your Exchange 2007 migration? Come see a demonstration of this software-only solution that works with your existing hardware. www.inmage.net | Redmondmag.com | Redmond | June 2007 | 39 0607TechEdShowcase.final.qxd 5/11/07 2:32 PM Page 40 Redmond’s TECH•ED Partner Showcase GOING TO TECH•ED? MEET WITH YOUR FAVORITE VENDORS ONE-ON-ONE Tech•Ed Booth #353 Turbocharge Microsoft Office and SharePoint Applications over the WAN Certeon is the leader in accelerating Microsoft applications over the WAN. Running Microsoft Office System and SharePoint with Certeon’s S-Series Application Acceleration Appliances and Blueprints provides optimum speed, security and scalability for applications being accessed over the WAN. Accelerating both encrypted and unencrypted traffic, Certeon turbocharges application response times while maintaining end-to-end data security. Certeon S-Series acceleration enables the highest productivity possible for remote branch office employees. Speed Security Tech•Ed Booth #1428 If you have Windows Web sites or .NET apps, you rely on Internet Information Services (IIS) to serve them—and Port80 Software is the leader in IIS security and performance. Visit Port80 at Tech•Ed for a quick performance analysis of your Web site, IIS7 demos, HTTP caching/compression savings, plus unique network security solutions, including Port80’s new ServerDefender Web app firewall for IIS! Scalability www.certeon.com/teched www.port80software.com/teched Tech•Ed Booth #1225 Illuminate your reporting for better decision making. Business Objects is the world leader in business intelligence. Our technology is integrated into Visual Studio 2005 and Microsoft Business Solutions products and is tightly aligned with Office and SharePoint. Speed the deployment of comprehensive Web-based reporting solutions and get the details on upgrading to Crystal Reports XI for just $99 at TechEd, Booth #1225. And while you’re at it, receive a free massage. Connect your World of Mixed Computing Environments with MKS Interoperability Products • Connectivity • Compatibility • Interoperability We Bring the Power of Unix/Linux to Windows www.businessobjects.com 40 | June 2007 | Redmond | Redmondmag.com | www.mkssoftware.com/eval 0607TechEdShowcase.final.qxd 5/11/07 3:17 PM Page 41 Redmond’s TECH•ED Partner Showcase GOING TO TECH•ED? MEET WITH YOUR FAVORITE VENDORS ONE-ON-ONE Active Directory Auditing, Access Control and Authentication for Unix, Linux and Mac Centrify enables a secure, connected computing environment by centrally securing your heterogeneous systems, Web applications, databases and storage systems using Microsoft Active Directory. Centrify DirectAudit and DirectControl help you improve IT efficiency, better comply with regulatory requirements, and centrally audit and control access to your heterogeneous computing environment. Come by booth #935 at TechEd for a demo! Tech•Ed Booth #227 Server consolidation and virtualization: simple, right? Simple until you realize that you have provisioned an unknown number of virtual machines ... each with a custom OS ... with no way of managing them. Server virtualization can be manageable, find out about Virtuozzo—OS-level server virtualization. Virtualization for the REAL world. R www.centrify.com www.swsoft.com Tech•Ed Booth #828 Visit Centeris at Tech•Ed to find out why Redmond magazine named the Centeris Likewise Management Suite the Redmond Roundup Champion for Active Directory integration of Linux, Unix and Macintosh systems. www.centeris.com/freetrial 800-378-1330 | Redmondmag.com | Redmond | June 2007 | 41 0607TechEdShowcase.final.qxd 5/11/07 2:32 PM Page 42 Redmond’s TECH•ED Partner Showcase GOING TO TECH•ED? MEET WITH YOUR FAVORITE VENDORS ONE-ON-ONE WhatsUp Gold v11 WhatsUp Gold isolates network problems and provides awareness and understanding of network performance and availability. WhatsUp Gold: • Discovers and maps network gear and Windows Servers • Monitors performance and “state” changes • Provides out-of-the-box e-mail, visual and audio alerts • Industry leading web app and reporting engine In addition, WhatsUp Gold delivers all the tools you need to monitor and manage your network including Cisco gear, Windows Servers, SNMP & WMI out of the box, scripting, localizable and IPv6. Take the free trial and find out why more than 50,000 administrators call WhatsUp the most trusted name in network monitoring. Get your free trial today at Tech•Ed Booth #1027 Imagine … a directory of the people, for the people, by the people! Make it a reality! Enable your Active Directory users to self-manage their own profiles, groups, passwords and more! Stay in control with Native & Delegated Roles—you decide how much or how little they can do. Namescape’s rDirectory & myPassword supports Simple & Advanced Searching, Photos, Password Reset, E-mail Notification, etc. Download Community Edition FREE! Don’t stop there … Empower your admins with powerful tools—streamline those bulk, repetitive Active Directory tasks that bog them down. Try mPowerTools FREE! www.ipswitch.com www.namescape.com Tech•Ed Booth #1245 We know how you feel... Take control of your IT infrastructure and help it reach its full potential by using virtual infrastructure solutions from VMware to: • Provision new servers by up to 70 percent less time • Reduce hardware and operating costs by as much as 50 percent • Save more than $3,000 per year for every server workload virtualized Monitoring, alerting and reporting software created by IT Professionals for IT Professionals. www.tntsoftware.com 42 | June 2007 | Redmond | Redmondmag.com | Stop by to get your own evaluation software! www.vmware.com/go/teched Get a Free Virtual Starter Kit 0607TechEdShowcase.final.qxd 5/11/07 2:32 PM Page 43 Redmond’s TECH•ED Partner Showcase GOING TO TECH•ED? MEET WITH YOUR FAVORITE VENDORS ONE-ON-ONE Tech•Ed Booth #355 Securent delivers its innovative, standards-based Entitlement Management Solution, enabling organizations to consistently manage, enforce and audit permissions to any Microsoft Office SharePoint resource—including document libraries, lists, search queries and web parts— across distributed sites and site collections. Tech•Ed Booth #1147 XenSource virtualization products are based on the open source Xen™ Hypervisor, driving high performance for Windows and Linux guests. Founded and run by the Xen development team, XenSource delivers products that allow enterprises to realize the total cost of ownership savings that result from server consolidation, increased utilization and reduced complexity in the data center. Download XenExpress, the production-ready virtualization starter product, for free today. www.securent.com/solutions/ microsoft_sharepoint/ Tech•Ed Booth #725 The Ultimate in Data Protection: • Perform bare metal recoveries in as little as 5 minutes. • P2V, V2V, and V2P for total virtual disaster recovery flexibility. • Image live servers, including domain controllers. • Perform true dissimilar hardware restores. • 100 percent scripted, no user intervention backup and restore capability. • Perform system migrations and deployments. www.ultrabac.com 425-644-6000 [email protected] www.xensource.com/win Visit us at booth #324 GFI MailArchiver is an email archiving solution that enables you to archive all internal and external Exchange server email, reducing reliance on PST files. It allows network admins to provide users with easy, centralized access to past email via a web-based search interface. www.gfi.com/teched | Redmondmag.com | Redmond | June 2007 | 43 Project3 4/16/07 1:25 PM Page 1 Windows Vista® Ready! Secure Network Monitoring Software you can rely on to proactively Monitor, Alert and Recover your critical applications and network infrastructure equipment. ADMIN DASHBOARD - centralizes status, reports, system information in a single convenient location. • Windows Monitoring • Resource Monitoring • QA Monitoring • Protocol Monitoring • SNMP Monitoring • Trouble Alerting • Detailed Reporting • Secure Web Interface WIZARDS - make it easy to add new monitors and perform complex configuration tasks. • Admin Dashboard • Agentless Architecture 2007 Winner of Network World Clear Choice Award for Management wares that fit the bill but don’t break the bank. See how we scored at www.ipMonitor.com/scorecard/ Just Released Download the Fully-Functional 21 Day Trial REPORTING - completely configurable Reports provide statistical and performance measurements for everything from critical applications to SNMP-enabled equipment. www.ipMonitor.com Sales: 819-772-4772 Copyright© 2007 ipMonitor Corporation. All rights reserved. ipMonitor® is a trademark or registered trademark of ipMonitor Corporation in Canada, the United States of America and other countries. All other trademarks are the property of their respective owners. ipMonitor Corporation, 15 Gamelin Blvd., Suite 500, Gatineau, Quebec, Canada, J8Y 1V4 0607red_F2Outsource45-48.v7 5/11/07 10:44 AM Page 45 How one software company successfully teamed with an international outsourcer to get its products to market. By Jeff Angus W hile Deloitte Consulting LLP’s most recent report on outsourcing cites a majority of projects ending up as failures, IT management continues to feel the pressure to outsource development as a way to accomplish the ever-impossible mission of doing more with less. According to one study Deloitte cites, about 66 percent of projects fail to achieve most or even any of the benefits the client was aiming for, while 78 percent of buyers end up cutting the engagement short. While such engagements do fail, it seems they fail for a cluster of common but very avoidable reasons. There are organizations that have succeeded not just with outsourcing but with offshoring as well, which is the process of sending the jobs overseas. They’ve succeeded for several reasons. eProject Inc., a Seattle-based Software as a Service (SaaS) provider of project management systems, has had unabashed success partnering with an outsourcing firm located in the Ukraine and in Redmond, Wash. (“The Ukraine of Washington State,” as it’s known locally). Since eProject has succeeded where the majority have failed, it’s useful to know what it has done differently, and how it has built success while others have reduced development projects to piles of rubble with their own unreconstructed incompetence. “We went out and got references for offshoring partners. The qualifications we were looking for were unusual,” says | Redmondmag.com | Redmond | June 2007 | 45 0607red_F2Outsource45-48.v7 5/11/07 10:44 AM Page 46 OUTSOURCING Chris Lynch, eProject’s vice president of engineering. “We were looking for quality of work rather than lower costs … I was hiring locally, so costs were budgeted,” he says. “Quality was always the biggest need. Our specs called for a partner that was technically competent and independent, [who] would tell us what they thought we were doing right or wrong, and who would function as an extended part of our team. We wanted a peer who had enough expertise of their own to recommend content and coding techniques as well,” Lynch explains. The skill of this approach is borne out by the evidence of the financial results. eProject has expanded through a steady march of quarterly product updates to about $16 million in sales with over 125 percent growth in each of the last two years. Some choices are easy to follow by any organization trying outsourcing for the first time or improving other aspects of its existing outsourcing model. The Right Reason Is Not Cost While the most common reason the organizations the Deloitte survey queried were looking to outsource was cost-savings (70 percent), this wasn’t the reason eProject succeeded. In fact, the focus away from cost-savings may have been its key success factor. Lynch originally sought outsourced development resources because there was a shortage of skilled talent available in the Seattle metro area at the time. One of the organizations he found anxious to take on work in the United States was Validio Ukraine Ltd., with a business office in Redmond and project talent in the Ukraine’s second-biggest city, Kharkov. Validio specializes in projects that require help in requirements definition, testing and support, as well as implementation. “We put out a technical design doc, user requirements and the functional specs, and we asked how they’d do it,” Lynch explains. “We didn’t tell them too much … We didn’t want them telling us what we wanted to hear, but to see what they could bring to the table. We were looking in the response for project-team thinking more than we were the logistics of outsourcing,” he says. Lynch adds that there have been cost-savings relative to Seattle-based development, but that’s a by-product, not the main course. Integral Part of the Team Rather than industrialize the process—exhaustively define the specs then sub-contract out the work to outsiders as though manufacturing sub-components—the eProject employees work as peers with the people who get their paychecks from Validio. The eProject staff members update each other every single day in stand-up meetings, an artifact of their commitment to Agile project management techniques that complement their Agile development methods. The Kharkovians are part of those meetings. Participants practice a staple of stand-up meetings: What did you do and find out yesterday, what’s on your list today, what’s coming up next that we should consider or knit into today’s plans? All the development talent marinates in the shading, knowledge-immersion and exchange that happen in the quotidian practice of fine-tuning the day’s output. This follows the principles of the most—perhaps the only—successful school of development management thought, which is elaborated by Timothy Lister and Tom DeMarco in their book “Peopleware.” The “Peopleware” approach involves, among other practices, mutual coaching, with everyone being a coach on some topics and a learner on others, with management committed to making room for that activity. eProject employees actively encourage the process and work from the presumption, which can be self-fulfilling, that the team members from Validio will bring as much to the knowledge environment as the Seattle team members. eProject’s Software Foundation The eProject Inc. staff members use a wide spectrum of software to get their work done, based mostly on Microsoft operating systems with a mixture of non-Microsoft and Microsoft applications. The products used within their engineering group include: ■ eProject PPM6 for Scrum/Agile Project Management ■ Microsoft Visual Studio Team Foundation Server ■ Microsoft SQL Server 2005 ■ Microsoft .NET Framework ■ AutomatedQA Corp.’s TestComplete ■ MediaWiki 46 | June 2007 | Redmond | Redmondmag.com | Outside development, key tools include: ■ Salesforce.com. ■ Skype ■ Microsoft Live Meeting ■ WebEx ■ Windows Live Messenger ■ Google Talk ■ Google Docs & Spreadsheets ■ Google Enterprise Search Appliance ■ Microsoft Word, Visio, Excel and Powerpoint They run mostly Microsoft Windows XP, 2003 or Vista, with a small but growing fraction using Mac OS X. Project1 4/9/07 4:11 PM UB_Firewall_Redmond.ai Page 1 4/6/07 11:37:57 AM ™ Open door policy? Does Your Backup Software Create a Big Hole in Your Firewall? With UltraBac Software’s advanced backup technology this issue is practically eliminated. Previously there wasn’t a way to securely back up your network through a firewall without excessive risk, or having to place your entire backup infrastructure in the DMZ. The new version of UltraBac will allow you to quickly and easily back up your servers and workstations without having to compromise security by opening many ports in your system. This innovative solution allows you great flexibility by uniquely regulating exactly which ports are used for communication. A one way connection is initiated from inside your firewall so that the outside communications are initiated using a defined range. This means that networks remain more secure by eliminating unnecessary port usage, and you can easily configure your firewall for this defined range to include only your expected backup clients. If you need to better lock down your environment then you need UltraBac’s backup and disaster recovery protection. Your organization’s data is an extremely valuable asset. Keep your data safe and secure inside your firewall, no open door policy allowed. B AC K U P A N D D I S A S T E R R E C OV E RY S O F T WA R E F O R P E O P LE W H O M E A N B U S I N E S S WWW.ULTRABAC.COM © 2007 UltraBac Software. All rights reserved. UltraBac Software, UltraBac, UltraBac Software logo, UBDR Gold, UBDR Pro, and Backup and Disaster Recovery Software for People Who Mean Business are trademarks of UltraBac Software. Other product names mentioned herein may be trademarked and are property of their respective companies. 0607red_F2Outsource45-48.v7 5/11/07 10:44 AM Page 48 OUTSOURCING No Loss of Quality The Deloitte study doesn’t cite a concrete percentage of service buyers’ overall disappointment with the quality of outsourced work, but they mention it enough to make it clear that in the general outsourcing case it’s a significant drawback. Because eProject makes it clear that quality is a goal, and because the Validio part of the team is so thoroughly knit into the everyday work of the group, Validio staff will turn down immediate profits to reinforce project quality. At one of the quarterly planning meetings where a cross-section of the talent from Kharkov was in Seattle (eProject alternates quarters, sending part of the team to Kharkov every other quarter), Project Manager Tatyana Yanush, software engineer Oleksandr Megel and quality assurance engineer Marianna Almakaieva attended. When a manager on the Seattle part of the team sought a Kharkov resource for documenting some software development kit (SDK) methods, Yanush pushed back, essentially turning down billable hours, because she believed the job could be more effectively delivered by someone with proximity to the SDK’s Seattle authors. Diffusion of Knowledge Daily stand-up meetings are high-velocity knowledgetransmission vehicles, but not everyone can attend every meeting. Also, what knowledge management honchos call “institutional memory”—wisdom both explicit and unspoken—isn’t ultimately reusable in quick meetings. eProject’s remedy to this is to have one of its senior team members maintain an outline-shaped institutional memory in a wiki container. The team member updates it during meetings based on consensus understanding of decisions and issues. Tag-Team Process Proximity, whether geographic, cultural or domain understanding, is the single ingredient that—if missing—is the factor most likely to crush the value out of outsourcing. The rubbing elbows with end users, seeing them work in their jobs, overhearing their concerns, watching them interact with the end products of developed code—all these inputs inform developers in ways you can’t replace with even a perfect specification, and it doesn’t make a difference whether the outsourced coders are in Calcutta or Cleveland. eProject has figured out not only how to partially neutralize the 10-hour time difference between Seattle and Kharkov, but appears to have actually turned it into a virtue. At the end of every workday, the people on the team in one location send a detailed e-mail message to the other shop so the antipodal team can work on those tasks deemed most 48 | June 2007 | Redmond | Redmondmag.com | critical while the senders are at home. Like a pro wrestling tag-team, the paired groups pass work back and forth, resolving issues and speeding delivery against calendar time. They don’t tag-team everything, though. “There are certain times that we need very quick turnaround. If we need a solution within a day, we may not go to Validio. But if we have more than a day, we’re fine,” Lynch states. A final method that reins in the quaquaversal nature of offshoring skilled work is that Validio has chosen to have its staff work entirely in the client’s language. Perhaps unsurprisingly, the Ukrainian team members in Seattle speak English to each other even when no Seattleites are around. But this rule holds even in Kharkov, even when there are no native English-speakers present. Using common language tugs thinking into alignment. Other Factors While the eProject outsourcing model has many components you can copy, there are a few you probably won’t. Agile development methods, which lean towards evolutionary releases, fit its SaaS deliverable very precisely. eProjects’ quarterly planning meetings dovetail perfectly with its quarterly release schedule, an affordance it wouldn’t likely have if its deliverable was a set of client-server executables that had additional change management overhead built in. eProject was founded with a strong knowledgemanagement practice, even before specific software it uses had come into existence. So the company, even with rapid growth, has shot up around a knowledge-sharing ethic driven by upper management. Executives like Lynch and Christian Smith, the vice president of sales and marketing, witnessed in previous rapidly-growing start-ups the diseconomies of scale that come with corporate expansion. They very deliberately set out to pave the path with sensible, explicit organizational designs and methods based on management innovation. Also, they hire in part based on how well the talent is predisposed to fit into their collaboration-rich, knowledge-sharing teamwork model. “The commitment to using Validio forced us to tune our knowledge sharing in even sharper ways,” Lynch notes. If your organization did not grow up on top of a knowledge-management ethic, it’s a bigger challenge to insert it at an advanced stage than it is to maintain it from organizational conception or adolescence. Regardless, as the pressure to deliver more projects while not adding to staff seems inevitable, many can ponder the outsourcing lessons eProject offers. — Jeff Angus is a management consultant, speaker on management topics, trainer and the author of the book “Management by Baseball: The Official Rules for Winning Management in Any Field” (Harper Collins, 2006). Project5 4/30/07 2:20 PM Page 1 New Vista. New Office. You’re going to need these. ® From basic Excel programming to Vista security administration to certification, we have what you need. 978-0-470-10832-1 978-0-470-04688-3 978-0-470-10881-9 978-0-470-09740-3 978-0-470-04614-2 978-0-470-04401-8 978-0-470-10486-6 978-0-470-04615-9 Visit the Wiley booth #653 at Tech•Ed to learn more about our technology books. Available wherever books are sold, or order online at wiley.com. Wiley, the Wiley logo, Sybex, and Wrox are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates. Microsoft, Excel, SharePoint, and Windows Vista are trademarks or registered trademarks of Microsoft Corporation. 0607red_F2CTools50-60.v10 5/11/07 D 1:25 PM Page 50 eployment Done Right The new crop of deployment tools for Windows Vista is a marked improvement over its predecessors. By Rhonda Layfield W hen you’re creating the massive disk images you’ll need to deploy Windows Vista or Longhorn, you need a powerful tool. Windows Deployment Service (WDS) provides a central storage and deployment point for Windows XP, 2003, Vista and Longhorn images. WDS is intended to replace Remote Installation Service (RIS). And before you ask, yes—it is much better than RIS. WDS lets Pre-Boot Execution Environment (PXE) clients connect and download operating system images with little or no human interaction. You’ll need an established Active Directory (AD) domain, plus DHCP and DNS servers prior to installing WDS. Your WDS servers must be members of an AD domain and require NTFS partitions to store images. You can upgrade your old RIS to WDS by running the Windows-deployment-services-update.exe (found in the Windows AIK\WDS folder). After you’ve upgraded an RIS server to WDS, it can still offer RIS images, but it can also distribute Microsoft’s new Windows Image (.WIM) type files (see “Laying the Groundwork for Vista,” February 2007). To install WDS from scratch, first install Windows Server 2003 SP2. Then add WDS from Control Panel/Add or Remove Programs/Windows Components/ Windows Deployment Service (see Figure 1, next page). When you install WDS, you’ll have to reboot your server, so plan accordingly. 50 | June 2007 | Redmond | Redmondmag.com | Project10 2/8/07 3:02 PM Page 1 Work Smarter, Not Harder... ...with Citrix Training! Citrix Training provides the experience and knowledge you need to maximize the performance of your Citrix IT environment. Acquire knowledge to: • Maximize Return on Investment (ROI) through proper implementation and support • Improve the reliability and efficiency of your Citrix environment • Increase levels of service and customer satisfaction • Reduce implementation and support costs Available as Instructor-led Training and 24/7 eLearning, Citrix Training will help you exceed your business and career goals. Citrix Training—Work Smarter Visit www.CitrixEducation.com/redmond to find out which training courses and certifications are right for you. C I T R I X E D U C A T I O N ©2007 Citrix Systems, Inc. All rights reserved. Citrix ® is a trademark of Citrix Systems, Inc. and/or one or more of its subsidiaries, and may be registered in the United States Patent and Trademark Office and in other countries. All other trademarks and registered trademarks are the property of their respective owners. 0607red_F2CTools50-60.v10 5/11/07 1:26 PM Page 52 Deployment Configuring WDS is as straightforward as any of the rest of the current crop of wizard-driven Microsoft platforms. Open the Windows Deployment Services snap-in found in Administrative Tools. If your local server doesn’t appear under Servers, right-click the Servers node and choose “Add Server.” You could also choose to manage a remote WDS server by selecting “Another computer” and browsing to the remote server’s name. Right-clicking your server name and choosing “Configure server” launches the WDS Configuration Wizard. Click “Next” on the Welcome page and choose the NTFS partition you’d like WDS to store your images on. If you’re configuring WDS on a DHCP server, you’ll see the “DHCP Option 60” page. Smaller Y ou know what they say about good things coming in small packages. Well, when it comes to deploying disk images, smaller is definitely better. Of all the new Windows Vista deployment tools in the Windows Automated Installation Kit (WAIK), ImageX is by far our favorite. ImageX is Microsoft’s new command-line tool for creating, modifying and deploying .WIM image files (.WIM is the Microsoft Windows Imaging Format). Looking at Vista’s installation image—install.wim— gives us a view of ImageX’s compression abilities. The install file is about 2GB to start, which expands to about 8GB when you install Vista. That got us thinking—what else could ImageX crunch down with that amount of force? ImageX vs. the Other Guys Figure 1. You can add these new Windows Deployment Services through the Windows Components Wizard. Both the WDS and DHCP services listen on port UDP 67. When WDS and DHCP are installed on the same machine, you’ll have to configure WDS to not listen on port UDP 67 so it will be available for DHCP. So, if WDS normally listens on UDP 67 for inbound PXE client requests, and you configure WDS to not listen on UDP 67, how will the clients ever find the WDS server? That’s where the DHCP option 60 comes in. When the DHCP server responds to DHCP client requests, option 60 is included in the response. Option 60 lets the DHCP client know that the DHCP server is also a WDS/PXE server. You can set DHCP option 60 by putting a check mark in the Configure DHCP option 60 to “PXEClient.” Configuration Control Chances are you wouldn’t want just anyone in your company to be able to install a new OS on a whim. So WDS allows three levels of controls as shown on the “PXE Server Initial Settings” page. The first option, “Do not respond to any client computer,” is fairly straightforward. This is the default selection. The second option is “Respond only to known client computers” and the third is to “Respond to all (known and 52 | June 2007 | Redmond | Redmondmag.com | We ran a few benchmark tests of ImageX against some popular zip tools (WinZip, WinRAR and Windows built-in compressed folders) to see what it could really do. ImageX is a command-line utility. In all fairness, we’re not huge fans of the command line. In this case, though, we readily admit it speeds up the process and conveniently lets you script practically all ImageX abilities. Plus you’ll be using the same two or three commands every time. We’ll go through the examples step by step. For the first test, we compressed 1GB of music files using a folder called “Music” on our D: drive, which was stuffed with a random collection of MP3s. Here are the results after selecting “Maximum Compression” using our popular tools: WinZip 1 GB WinRAR 1 GB Windows Compression 1 GB Then it was ImageX’s turn. We have the ImageX utility on our C: drive, for simplicity’s sake. Otherwise, we’d have to navigate to the directory where it’s located. Here’s what we entered: imagex /capture /compress max D:\Music D:\music.wim "musicimg". ImageX has a variety of switches from which to choose. The ones we’re focusing on here are “/capture,” which tells ImageX that we want to 0607red_F2CTools50-60.v10 5/11/07 1:26 PM Page 53 r Is Better By J. Peter Bruzzese and Tim Duggan ImageX is a slick compression tool that can help with Windows Vista deployment, as well as everyday file compression. create a .WIM file, and “/compress,” which lets us set the compression level by following it up with Max | Fast | None after a space. The result was 1GB—not so hot. For this first example, though, we used MP3s, which are already pretty well compressed. There isn’t much room for improvement. The same would be true of video files. You won’t get an .AVI to compress much further. Up next was a handful of Word, Excel and PDF files, totaling 1GB in a folder called “docs.” The results were: WinZip 620 MB WinRAR 656 MB Windows Compression 689 MB ImageX came in at 680MB. It only beat the built-in compressed folders. Finally, we tested with a folder filled with 1GB worth of multiple copies of the same document. WinZip, WinRAR and Windows compressed folders all kept the folder at 1GB with maximum compression. ImageX created a .WIM file that weighed in at 1MB. It took the multiples copies and shrunk them down to one. That validated our initial thoughts of ImageX’s capabilities. The reason for this is ImageX’s ability to perform single instancing. Essentially, if you’re compressing a folder that has more than one instance of a file, instead of compressing that file twice, it images one copy and points to other copies from that single copy image. A file getting copied over and over again happens all the time, especially on a file server. You may never use ImageX to replace a simple compression tool, but you can create .WIM files and use its compression capabilities to create an image of folders, an entire disk or even your entire OS. ImageX vs. CompletePC In a rapid deployment scenario you’d install Vista plus any patches or applications. Then you’d seal the image with sysprep before booting with your Windows PE CD and using ImageX to create your deployment image. However, you could also use ImageX to make an image of your personal system. Not only is imaging your system a great way to create backups, you can also create multiple images for demonstration purposes. We decided to test ImageX against Vista’s CompletePC backup for disk imaging purposes. We started with a system running Vista Ultimate, using 77.6GB of disk space. We performed a CompletePC backup. The end result was a .VHD file (which is fully mountable, so you can retrieve any of your backed up files at a later time) weighing in at 32.4GB. It took a total of 41 minutes and 53 seconds to complete. This was an interesting result, because most of what we’d heard about CompletePC backups was that there’s no compression and it’s a one-to-one ratio. Next, we needed to test ImageX. We created our Windows PE disk, booted the system from the disk (which took us to the command-prompt) and ran ImageX. It failed at first. We had to create an exclusion list called wimscript.ini and place it in the ImageX directory. This exclusion list would filter out Continued on page 54 Not only is imaging your system a great way to create backups, you can also create multiple images for demonstration purposes. | Redmondmag.com | Redmond | June 2007 | 53 0607red_F2CTools50-60.v10 5/11/07 1:26 PM Page 54 Deployment Continued from page 53 the page file, hibernation file, the “System Volume Information” (the source of the errors) and any other file types we wanted to exclude. The wimscript.ini file looks like this: [ExclusionList] Ntfs.log Hiberfil.sys Pagefile.sys "System Volume Information" RECYCLER [CompressionExclusionList] *.mp3 *.zip *.cab You can add or remove elements from the list. For testing purposes, we didn’t want to exclude too much because this would conflict with the findings. This was one benefit of ImageX over CompletePC (which does a full system backup, no questions asked)—you can choose not to back up specific files or file types. We were able to create the exclusion list from within our Windows PE environment using an old friend called Notepad. We ran through the process without compression the first time and maximum compression the second time. We ended up with our non-compressed version shrinking down to an impressive 24GB. The compressed version came in only a little smaller at 23.5GB. It took the non-compressed version one hour and 28 minutes (much longer than CompletePC) and the compressed version took almost three hours. These time frames or compression results aren’t constant. Each system and each set of files is different, so each zip, backup or compression will yield varying results. The main point here is the flexibility of ImageX. So what does all of this teach us? What is ImageX really good for? You can use ImageX to compress files and folders, but where it really shines is in imaging systems. In fact, in many ways it outshines the built-in CompletePC tools. While CompletePC has simplicity and speed, ImageX gets better compression and can filter out unwanted files in the backup. — J. Peter Bruzzese ([email protected]) is a tech writer and trainer. He recently started a community forum for clustering technology at www.clusteringanswers.com. Tim Duggan ([email protected]) is a network specialist for Solution32 in New Jersey and co-founder of ClipTraining.com. unknown) client computers.” You could also choose the latter option, notify the administrator and respond after approval. Think of unknown clients as wireless laptops in the company parking lot. You configure known client computers in Active Directory Users and Computers (ADUC). In ADUC, known computers are referred to as “managed or pre-staged computers.” Create a computer object in ADUC, name the computer object and click next to get to the “Managed” page. Selecting “This is a managed computer” and typing the computer’s GUID in the “Computer’s unique ID (GUID/UUID)” box identifies that system as a known client. You can usually find the client’s GUID in the computer’s BIOS. If the computer doesn’t have a GUID, you can use the MAC address. MAC addresses are only 12 characters and GUIDs are 32, so you’ll need to pad the MAC address with leading zeros. A MAC address of 00-0F-B1-F6-21-33 would look like this: 00000000000000000000000FB1F62133. You could also type the MAC address (with no dashes) and then add leading zeros until you can select the NEXT button. The third setting lets known clients download images from the WDS server. Unknown clients will generate something called a pending request. You’ll find pending requests in the WDS snap-in under “Pending Devices.” Once a pending request appears under Pending Devices, you’ll have the option to “approve,” “reject” or “name and approve” the request by right-clicking the pending request. The “approve” or “reject” options are pretty straightforward, but “name and approve” may need a little explanation. You’d use this when you want to approve the request and name the ADUC object it will create for the new computer. The last dialog box in the WDS configuration wizard lets you add images to the WDS server. You’ll need at least one boot image and one install image. I like to clear the check mark in the box next to “Add images to the Windows Deployment Server now” and add them manually. Why? Adding the images manually gives you more flexibility. If you choose to add the install.wim that lives on the Vista product DVD in the Sources folder, you’ll install all seven images. If you choose to add them later by right-clicking either “Boot” or “Install Images” and then choosing “Add Boot/Install Image,” you can choose to add only one or two of the seven images. Boot images are WinPEs, but the WinPE on the Vista DVD (boot.wim) is different than any you’d create. You’ll have to add the boot.wim from the Vista DVD that calls for the OS install program (setup.exe). If you don’t, your PXE client will boot and download your custom WinPE and that’s it. You won’t get a list of OSes to install from the WDS server. The Power of One You have to add installation images to an image group, which gives you two important features—security and 54 | June 2007 | Redmond | Redmondmag.com | Project7 5/2/07 11:24 AM Page 1 0607red_F2CTools50-60.v10 5/11/07 1:26 PM Page 56 Deployment single instance store (SIS) techmachine. The PXE client nology. Let’s say you have two sends out a DHCP discover image groups (each containing packet looking for a DHCP multiple images), one for an server from which to get an IP office in Dallas and one for an address. Our DHCP office in New York. You’d like server not only gives the PXE to give the administrators in the client an IP address, but also Dallas office full control perthe DHCP Option 60 that missions for the Dallas image defines the DHCP server as a group. You’d like to do the WDS server as well. same for the New York admins If you choose the “Respond to with the New York image all (known and unknown) client group. Right-click the Dallas computers, but for unknown image group, choose “Security,” clients, notify the administrator 2. Running sysprep is a critical step. Make sure to and then add the Dallas admin- Figure and respond after approval” run the right version for the OS image you’re creating. istrators group (this is an option in your “PXE Server IniADUC security group). Set the permissions to “Read & tial Settings,” your PXE clients will be on hold until an Execute, List folder contents and Read permissions.” administrator approves or rejects the pending request. SIS greatly reduces the amount of disk space required to Step two is to download a WinPE. Once you connect to store your images. Let’s say there are three images in your the WDS server, you’ll need to authenticate to confirm that Dallas image group called Marketing, Sales and Research. the account you’re using has permissions to the images Each image installs Vista Ultimate, but different applicastored on the WDS server. The last step is to create and tions specific to the departmental needs. format a partition to which you’ll install, or click next and Vista Ultimate takes up more than 2GB, so if you stored the entire disk0 will be your C: partition. Then about 20 to three complete copies of Vista Ultimate, you’d need almost 30 minutes later, you’ll have a brand new machine. 8GB. SIS stores the files needed for Vista Ultimate just Creative Customizing once. It stores the applications in three separate image files within the Dallas image group. So when you view the Dallas Creating your own custom images configured with your choice of applications and desktop settings is a snap. You’ll image group, you’d see a large .RWM (resource .WIM) file containing Vista Ultimate and three smaller image files con- need a master machine and a utility called WDSCapture (you could also use ImageX.exe; see the companion story, “Smaller taining the applications. These smaller image files are typiIs Better,” which begins on p. 52). The master machine is the cally around 20MB to 30MB (depending on the apps you’ve machine upon which you’re going to create the image to installed). So in this scenario, SIS saves 5GB of disk space. deploy to other machines. Let’s look at the six steps for creatYou have to authorize WDS servers in AD. You can pering a custom image using the WDSCapture utility: form authorization in the DHCP or WDS snap-in. To 1. Install an OS (XP, 2003, Vista or Longhorn). authorize in the DHCP snap-in, just right click your server 2. Install and configure applications and desktop settings. name and choose “Authorize.” The red down arrow on the 3. Sysprep the master machine and shut it down. server changes to a green up arrow (you may need to press (Sysprepping the machine will scrub out any identifying F5 to refresh). information like the computer name or SID so the Authorizing in the WDS snap-in is a little trickier. deployed image will receive unique information. Make sure Right-click your WDS server and choose “Properties.” In you use the correct sysprep utility for the OS image you’re the “Advanced” tab, choose “Yes, I want to authorize the creating, down to the service pack level. If using a Vista WDS server in DHCP.” When you authorize from the WDS snap-in, you have to restart the DHCP server service. master machine, run sysprep version 3.14 with the generalize switch. You’ll find sysprep in the system32 folder.) Otherwise, when you look at the server in the DHCP 4. Restart the master machine by booting to a WinPE. snap-in, there’s a red down arrow and right-clicking the 5. Launch the WDSCapture utility (included in a server only lets you “Unauthorize.” WinPE by default). The WDS Process—Start to Finish 6. The WDSCapture utility launches the WDS Image Let’s set the scenario first. You have a bare metal machine Capture Wizard. Click “Next” on the Welcome page and upon which you’d like to install Vista. Your WDS server you’ll see the Image Capture Source page. contains only one boot image (the one from the Vista Select the volume you want to capture (if nothing shows DVD) and one install image and has DHCP installed and up here, the machine was not properly sysprepped), give configured with an active scope. the new image a name and description and click “Next.” A PXE boot (when you see “Press F12 to perform a netWhen prompted for credentials to connect to the WDS work boot,” press F12) is step one for your bare metal server, type an administrative account and password. On 56 | June 2007 | Redmond | Redmondmag.com | Project7 5/2/07 11:27 AM Page 1 0607red_F2CTools50-60.v10 5/11/07 1:26 PM Page 58 Deployment the Image Capture Destination page, you’ll have to enter a name and location to store the image locally (you can store it on the same volume you’re capturing if there’s enough space. The image will not contain your .WIM file). Next, check the box next to “Upload image to WDS server.” Under server name, enter either the WDS server’s name or IP address. Once the WDSCapture utility has authenticated to the WDS server, a list of Image Groups will appear in the drop-down box (image groups are created on the WDS server). Choose your image group and click “Finish.” You’ll have to store your new image locally first, then upload it to the WDS server. You can automate the WDSCapture process by creating a capture boot image. Add the boot.wim from the Vista DVD to your boot images in the WDS snap-in. Highlight “Boot Images” and in the details pane right-click the boot image and choose “Create Capture Boot Image.” Name your new capture boot image and store it locally. Once you’ve created your new capture boot image, right-click the Boot Images node again and choose “Add Boot Image.” Then browse to your new capture boot image. After you’ve built and sysprepped your master machine, you can PXE boot to connect to the WDS server. You’ll see a list of two boot images. Choose the new capture boot image. This will download a WinPE and launch WDSCapture automatically. The Need for Speed Downloading an image from a WDS server can be time consuming. You can speed this up by increasing the block size, but please proceed with caution and test first. The command-line utility we’re going to use is bcdedit. Vista and WinPE have bcdedit natively, so running this command from Vista or WinPE is the simplest method. We’ll run the bcdedit command from a machine named Vista1: 1. On a WDS server (ours is named WDSServer) share the \REMOTE INSTALL\Boot\x86 folder (this is the default folder for storing your images). For this example, we’ll use x86 as the shared folder name. 2. From Vista1, map a drive to the x86 shared folder (net use W: \\WDSServer\x86). If prompted for credentials, enter administrative credentials. 3. Copy the default.bcd found in the x86 folder to Vista1’s local C:\ drive. 4. The command to change the TFTP block size to 8192KB is typed on the Vista1 machine as one long command from the C: drive: Bcdedit -store default.bcd -set {68d9e51c-a129-4ee1-97252ab00a957daf} ramdisktftpblocksize 8192 (You could use different block sizes such as 4096 or 16384, but the 8192 seems to work well.) 5. Copy the default.bcd from the Vista1 machine to its original location on the WDS server. 6. On the WDSServer, go to a command prompt and type: Sc control wdsserver 129 (this will reset the TFTP block size for the WDSServer). All this should help you install, configure and enhance your Windows Deployment Service server. Whether you’re deploying on a single machine or across a network, Vista can be a monster to deploy. These tools and techniques should help. — Rhonda Layfield ([email protected]) has been involved with IT for 25 years. She recently co-authored “Mastering Windows Server 2003 Upgrade Edition for SP1 & R2” (Sybex, 2006). She’s a regular presenter at TechMentor Conferences and currently offers a series of Vista deployment seminars. 3_07_Redmond_Dorian_WTB.ai 133.00 lpi 15.00° 1/31/2007 45.00° 0.00° 75.00° 1/31/2007 Yellow Process Black Cyan 10:44 Process AM Magenta Process Project2 Process 2/9/07 Page 1 12:20:16 12:20:16PM PM Project11 3/13/07 3:58 PM Page 1 E-Learning is the ultimate online learning tool. It’s all yours 24 hours a day, 7 days a week, and it will give you everything you need to conquer even the toughest IT challenge. Give e-Learning a try and we’ll teach you everything we know. Visit www.transcender.com or call 1-866-639-8765. © 2005 Kaplan IT, Inc. All rights reserved. TRANSCENDER ® Kaplan IT, Inc. All rights reserved. 0607red_F2GrnMtn61-66.v10 5/11/07 11:13 AM Page 61 Green Mountain Gets the [Share]Point Coffee maker deploys Web-based portal to solve data-sharing problems. By Michael Desmond W hen Jim Travis arrived at his new job as director of sales and marketing at Vermont-based Green Mountain Coffee Roasters Inc. (GMCR), it didn’t take him long to realize he had a big job ahead of him. In fact, the scope of the challenge became crystal clear almost the instant he noticed a tall stack of FedEx mailers near his secretary’s office at Green Mountain Coffee’s offices in South Burlington, Vt. “I asked, ‘What are these?’ and she said, ‘That’s our field sales mailing,’” recalls Travis. “I said, ‘You’ve got to be kidding me.’” She wasn’t. Every Friday, Green Mountain Coffee would overnight to about 70 field sales reps an updated stack of printed material, to be inserted into the company’s thick Marketing Resource Guidebook. It was a clumsy, manual and error-prone process that led to a lot of waste and a lot of lost sales, says Travis. To see where [the salespeople] are now, with the set of reports and tools they had available, and where they were, e-mailing 100MB spreadsheets around the country, is absolutely phenomenal. Chris Wasserman, Technical Lead, Competitive Computing Inc. | Redmondmag.com | Redmond | June 2007 | 61 Project3 4/16/07 1:21 PM Page 1 FREE DOWNLOAD available for evaluation AvePoint, the AvePoint logo are registered trademarks of AvePoint, Inc. in the United States and/or othountries. © 2007 AvePoint, Inc. All rights reserved www.AvePoint.com Caught with your pants down? AvePoint’s got you covered. Call 18006616588 to schedule a demo SharePoint® ItemLevel Backup, Recovery & Archiving Solutions. 0607red_F2GrnMtn61-66.v10 5/11/07 11:13 AM Page 63 SharePoint Deployment “This has to stop. Every time you hire a person you have to take them page by page through this five-inch [thick], threering binder. It’s not appropriate,” Travis recalls thinking. Travis knew from his experience at Ocean Spray Cranberries Inc., where sales reps accessed product and sales information over the Web, that it was high time to digitize the marketing and sales material at Green Mountain Coffee. He just didn’t know how to do it. That’s where local consulting outfit Competitive Computing Inc.—also known as C2—came in. “Once Jim made his case to the management committee there and got the approval to go ahead and spend some money on [the problem], we got contacted by Rob Ely, the director of the [management information systems] department at GMCR. He was the person managing the project from [its] end,” says Chris Wasserman, technical lead at C2. “[GMCR] didn’t come with a solution set in hand— [the company] came and said, ‘Here’s the problem and what we want to do about it.’” Given the distributed sales force, a Web-based portal solution made immediate sense. And the folks at C2 knew Green Mountain Coffee well enough—both firms were founded by Digital Equipment Corp. employees—to know the company was heavily invested in Microsoft solutions. That made SharePoint Server 2003 an easy call. 5 Lessons Learned 1 Don’t Fly Blind: Rather than trying to come up with a solution to its information sharing problem on its own, Vermontbased Green Mountain Coffee Roasters Inc.’s Director of Sales and Marketing Jim Travis and Director of Management Information Systems Rob Ely turned to knowledgeable consulting firm Competitive Computing Inc. (C2) to help them target a solution platform. 2 Take an Incremental Approach: The initial rollout was limited strictly to the sales and marketing organization, and focused on areas of business collateral and document retrieval, sales data access and light contact management. Additional phases are already underway or planned. “Pretty Straightforward” One thing C2 didn’t do was pretend to know GMCR’s business. Led by Wasserman and Business Lead Jeff Pratt, the team sat down with Travis, Ely and the rest of the Green Mountain Coffee group to build a view of the challenge. Pratt says the two groups talked through a high-level view of the design, covering issues like process flow and storage of assets. “Having these groups get into a room and talk about these topics with an eye toward automating them, getting them to think about the process … independent of automating all these things—this process has been hugely beneficial to the company,” Pratt says. The discussion quickly moved to planning, including discussions of metadata handling and access, as well as design-level issues within the SharePoint environment. “The stuff they were trying to do—if you step back from it—was pretty straightforward,” Wasserman says. “Tap into the back-end database and present documents through the Web interface.” Straightforward, yes. But matters were complicated by an unrelated PeopleSoft-based customer relationship management (CRM) deployment that consumed resources and spurred GMCR to outsource the SharePoint project. Part of the problem: The deployment team found that PeopleSoft and SharePoint couldn’t coexist with SQL Server. “We had to change some low-level [collation] settings on SQL Server that were incompatible with PeopleSoft,” recalls Wasserman. “The plan was for database 3 Stand and Configure: If Travis could do one thing, it would be to extend the SharePoint Web interface to the company’s wholesalers and independent retailers. In retrospect, it might have been worth extending the project to get that functionality online from the beginning. 4 Path of Least Resistance: Replacing the inefficient and costly paper-based process with a digital Web portal was not only important, it was easy. In fact, once the heavy lifting of transferring and cataloging the collateral was finished, the marketing group was free to work on more strategic issues that could help improve the business. 5 Hold On: Rather than dismiss the C2 deployment team after the system was installed, Technical Lead Chris Wasserman stayed on board for several months in a support and maintenance role. That decision allowed Green Mountain Coffee to tune the new environment, even as it dedicated resources to the ongoing customer relationship management project. —M.D. | Redmondmag.com | Redmond | June 2007 | 63 0607red_F2GrnMtn61-66.v10 5/11/07 11:13 AM Page 64 SharePoint Deployment clusters to serve SharePoint and PeopleSoft both, but they were incompatible.” That reversal forced the team to go with separate database servers for SharePoint and PeopleSoft. To expedite the SharePoint deployment, the database was housed initially on the same server as the Web front-end. Later, a new database server was deployed and SharePoint migrated to a three-tier structure. “For the load they were getting and the number of users, it was acceptable,” says Wasserman. Crawl, Walk, Run Jim Travis, director of sales and marketing, Green Mountain Coffee Roasters Inc., says the impact the initial SharePoint deployment is having on his sales and marketing teams has caused “a deeper appreciation of the metrics behind the business.” Rather than charge into a fully interactive environment, Green Mountain Coffee deployed its portal functionality in three granular stages. The first stage simply took the massive Excel spreadsheets that had been e-mailed to field reps in the past and hosted them on the SharePoint Web portal. “We adopted a crawl, walk, run approach to the data,” C2’s Wasserman says. Next, C2 added Web views of the Excel spreadsheets. This eliminated bulk file downloads and made access to specific data much easier and quicker for field personnel. In the third stage, C2 deployed SharePoint-based analytics, cubes and SQL Server reporting services on top of the portal. It was at this stage, says Wasserman, when things really started to click. NORTHERN STORAGE SUITE RECLAIM It’s the natural state of every organization – an ongoing battle. Taking back all the unnecessary, duplicate and obsolete data. Without causing user push-back. Northern Storage Suite helps you reclaim this wasted capacity: easily and routinely. First, it shows you who is saving what, how much and where. Then it enables you to keep storage costs down by automating archiving and cleanup jobs. Reclaim wasted capacity – remove unnecessary costs. Sample the power of Northern Storage Suite – download Northern’s Free Analysis Tool: www.northern.net/redmond WWW.NORTHERN.NET / [email protected] / 1.800.881.4950 NORTHERN – MANAGING STORAGE SINCE 1995. TO US IT’S SECOND NATURE. Project2 5/10/07 1:39 PM Page 1 0607red_F2GrnMtn61-66.v10 5/11/07 11:13 AM Page 66 SharePoint Deployment “Now they’ve got a whole set of reports that are available on their portal, from personalized reports for a sales person and what their numbers are, to numbers on the whole company and what [its] sales are,” he continues. “To see where [the salespeople] are now, with the set of reports and tools they had available, and where they were, e-mailing 100MB spreadsheets around the country, is absolutely phenomenal.” Among those resources are a completely retooled set of marketing and presentation materials, which replace the bulky Marketing Resource Guidebook. Web-enabling these resources was more than simply a matter of slapping them online. The glossy color pages were redesigned for online presentation, as well as for effective output on the inkjet printers used by field staff. Next Steps With the CRM deployment project still boiling, Green Mountain Coffee decided to keep C2’s Wasserman on board to help with the transition and manage configuration issues. “This guy worked tirelessly over four or five months,” Travis says. For all the early successes, Travis says he wishes he could have done more up front. “We still need to do a lot of work on our pricing models. I probably would’ve pushed a little harder on our scorecard for the dash- board,” he explains. “I think that’s because I was pulled off on other things. I should’ve stayed with it.” Travis says he won’t make that mistake again. A host of follow-up efforts are in the offing, including a self-service portal serving Green Mountain Coffee’s growing network of wholesale customers. The new resource will do everything from providing ordering and costing services to presenting best practices and roasting recipes for coffee shops. An enterprise-wide portal is also planned, and should help drive efficiencies beyond the marketing and sales organization. Still, Travis can’t say enough about the impact this initial SharePoint deployment is having on his sales and marketing teams. “There’s a deeper appreciation of the metrics behind the business,” Travis says. “The nomenclature is changing. People are beginning to talk a bit more professionally about their brand and their metrics. You don’t get that from training.” Ultimately, Wasserman credits the success to his client’s readiness to commit to the solution. “I’m a firm believer that most IT projects are personalityrelated and not technology-related,” says Wasserman. “GMCR was really ready and willing to take this stuff on. It was a very good fit, it really was.” — Michael Desmond is the founding editor of Redmond Developer News. You can reach him at [email protected]. Consolidate Windows Servers Now! Proven Server Virtualization • Blazing Fast Performance for Windows Guests • Multi-Server Management • Seamless Upgrade Path • Powerful Administrator Console • Easy Installation and Deployment • Windows SMP Guest Support • Fully Supported Download XenExpress for free! Plus, get a free t-shirt when you refer three friends! www.xensource.com/tshirt Project2 5/7/07 ow N sta i V 10:21 AM Page 1 ted r po p Su Maximum Control. Minimum Effort. PC Remote Control Providing desktop support can be a headache with the large number of systems, servers and mobile devices located on today’s corporate network. With NetSupport Manager remote control software, you can provide seamless IT support centrally from one location, improving response times and reducing associated IT costs. Support, monitor and train your users securely over a LAN, WAN and the Internet. Manage and monitor multiple systems simultaneously with NSM’s multi-platform support including Windows, Linux, MAC, Solaris, and Windows Mobile. Troubleshoot help requests efficiently with NSM’s inventory and desktop management tools. Take control of your network before it controls you. For more information and to download a free trial copy visit: www.netsupportmanager.com [email protected] 770-205-4456 www.netsupport-inc.com 0607red_NeverAgain68.v8 5/11/07 11:16 AM NEVER AGAIN Page 68 By Steven Fishman and Alex Albright All’s Well that Ends Well W e pride ourselves on being early adopters, so on Jan. 31, 2007—the day after the official launch of Windows Vista—we activated our volume license for Vista Ultimate along with Windows Live One Care. We proceeded put it on our desktops and servers in hopes of a seamless upgrade from XP. We quickly discovered, however, that Windows Vista Firewall and Windows Live One Care Firewall conflicted with one another. We discovered another problem when we found Windows Defender wouldn’t work well together with Windows Live One Care. Cry for Help We made the 911 call to Microsoft, and the company’s tech support call center in India was great. Amey (our tech support person) was reassuring, saying “not to worry.” Using Windows Easy Assist, he proceeded to uninstall Windows Defender from Windows Vista. There was one problem with this: He didn’t realize that Windows Defender What’s Your Worst IT Nightmare? Send us your 300-600 word story —if we print it you’ll win $100 and a Redmond T-shirt! E-mail your story to Editor Ed Scannell at [email protected] and use “Never Again” as the subject line. is an integral part of Windows Vista, unlike in Windows XP where it’s a separate program. Since he carried out the uninstall at the server level, everything crashed and no one knew why. In the process we also discovered that our Dell computers wouldn’t allow the Windows Vista Ultimate Installation disks to boot up from the disks, so we were up a certain creek—the one that can’t be mentioned in a family publication— without a paddle. Luckily, our data was backed up, but we had to reformat our hard drives and do fresh installs of everything. And I mean of every program we ever had. Unexpected Upgrades Well, this eventually turned out to be a good thing because in the process we eliminated all instances where drivers were not available yet for Windows Vista. The only bad news in all this was being told by Dell that the drivers for all of our Dell 922 printers wouldn’t be available until April. Consequently, we had to purchase 86 HP inkjets (which delighted HP). The somewhat unexpected—though happy—ending is that the Windows Vista Reliability Monitor says we are 68 | June 2007 | Redmond | Redmondmag.com | now at an 8.4 rating, which is much better than we ever could’ve expected had it not been for our four days of madness. Since all’s well that ends well, we still love Microsoft. When Less Protocol Is a Good Thing Several years ago the network team was doing some work over the weekend and I happened to be there at the time. When they finished, I noticed that my log-on was unexpectedly slow. This should not have been the case given there were so few people there. I notified my manager, but nothing was done. Glacial Pace The next day, when everyone was at work, the log-on time was beyond abysmal. You could log-on after half an hour—if you could log-on at all—but forget about doing anything else. There were about 2,500 people whose productivity came to a standstill. Three days later the problem was resolved and everything was back up and running. That was the good news. The bad news was to fix it we had to pay $250,000 for new switches—actually a small price to pay since we were getting dinged $800,000 for every day that we had a total outage. The problem? Many of the machines had dual protocols, both Pathworks as well as TCP/IP. Consequently, the switches had to register each Network Interface Card twice, and so ran out of memory. Ouch. — Steven Fishman is the CIO of Ultrasonic Precisions Inc. in Corona, Calif. Alex Albright is a server administrator in Barker, Texas. ILLUSTRATION BY MARK COLLINS Project4 3/12/07 2:11 PM Page 1 A D V E RT I S E M E N T Maximum System Performance Getting to the Bottom of Common Reliability Problems As an IT Professional, you know the importance of maintaining system performance and reliability. If the desktops or servers crash, slow down or freeze, who gets called? That’s right… you or your IT staff. This “break-fix” cycle leaves you little time to be proactive. And yet, many of these issues stem from a single, hidden source. Top 5 reasons customers use Diskeeper Performance and Reliability 83% Automatic operation 83% Much superior to built-in defragmenter 44% Longer systems life with less maintenance Reliability issues commonly traced to disk fragmentation. The most common problems caused by file fragmentation are: • Crashes and system hangs/freezes • Slow boot times and boot failures • Slow backup times and aborted backup • File corruption and data loss • Errors in programs • RAM use and cache issues • Hard drive failures Having files stored contiguously on the hard drive is a key factor in keeping a system stable and performing at peak efficiency. The moment a file is broken into pieces and scattered across a drive, it opens the door to a host of reliability issues. Even a small amount of fragmentation in your most used files can lead to crashes, conflicts and errors. 44% Fast backups and antivirus and/or spyware scans 35% From Diskeeper Customer Survey—Read the full survey at: www.diskeeper.com/survey Is real-time, automatic defragmentation needed in today’s environment? More than ever! Large disks, multimedia files, applications, operating systems, system up-dates, virus signatures—all dramatically increase the rate of fragmentation. Fragmentation increases the time to access files for all common system activities including opening and closing Microsoft® Word documents, searching for emails, opening web pages and performing virus scans.To keep performance at peak, fragmentation must be eliminated instantly. Advanced, automated defragmentation (GET THE PROOF HERE: www.diskeeper.com/paper2) The weak link in today’s computers The disk drive is by far the slowest of the three main components of your computer: CPU, memory and disk. The fastest CPU in the world won’t improve your system’s performance if the drive is fragmented, because data from the disk simply can’t be accessed quickly enough. Maintaining systems can be a daunting task—maintenance, including regular defragmentation, must take place regularly to keep them running at peak levels. However, with constant uptime required, scheduling such processes to run at the right times can be tricky, since while running they pose a considerable drain on system resources. Diskeeper 2007 marks the end of scheduling, and the beginning of REAL TIME, on-the-fly maintenance of systems. Never again worry about dips in performance or straining valuable system resources —even when demand is at its absolute highest! Customers agree Diskeeper maintains the performance and reliability of their desktops and servers, reducing maintenance and increasing hardware life. “We run [Diskeeper] on our client PCs as well as our servers… with Diskeeper running daily, we can keep file performance at peak efficiency.” Tom Hill, CDR Global, Inc. Every system you manage needs Diskeeper for enhanced file system performance—automatically! ® Enhancing File System Performance —Automatically! ™ Special Offer Try Diskeeper 2007 FREE for 45 days! Download: www.diskeeper.com/red7 (Note: Special 45-day trialware is only available at the above link) Volume licensing and Government / Education discounts are available from your favorite reseller or call 800-829-6468 code 4410 © 2007 Diskeeper Corporation. All Rights Reserved. Diskeeper, Enhancing File System Performance—Automatically, and the Diskeeper Corporation logo are registered trademarks or trademarks of Diskeeper Corporation in the United States and/or other countries. Microsoft is a registered trademark of Microsoft Corporation in the United States and other countries. Diskeeper Corporation • 7590 N. Glenoaks Blvd., Burbank, CA 91504 • 800-829-6468 • www.diskeeper.com Project2 2/9/07 8. 10:29 AM Page 1 4. Recognized as the world’s most powerful defrag- menter, PerfectDisk has always been the secret to No hidden surcharges. Unlike other defragmenters, PerfectDisk doesn’t charge you extra for super-sized faster, more reliable computers. Now, with a drives, or administrative console features. powerful new suite of enterprise tools, Microsoft-certified PerfectDisk simply PerfectDisk 8.0 takes disk defragmen- makes it easy to defrag every tation to the farthest reaches of the drive on the enterprise. Period. enterprise, while placing total control right at your fingertips. 7. 3. The Top 8 Are you sitting down? To ensure your drives are always in shape, new AutoPilot Scheduling™ Reasons lets you set your computers to Good, because the PerfectDisk Command Center™ lets you deploy, defrag automatically. What’s configure and manage the defrag- more, unlike the competition, new intelligent Screen Saver Mode auto- mentation of every system on the enterprise ... all from the comfort of your matically defragments idle computers if own desktop. a user-defined number of days has passed since the last defrag. 6. 2. Your Enterprise Can’t Wait For PerfectDisk PerfectDisk's new patent-pending Resource Saver™ technology finds all the fragments of a file without and CPU throttling features automatically detect when a system is “busy” and 8 first opening the file, efficiently defragmenting even the largest reduces its disk I/O or CPU usage accordingly, making the of drives with minimal system defragmentation of even the impact. 5. PerfectDisk's new I/O busiest drives practical. 1. PerfectDisk's Space Restoration Technology,™ with its Consolidate Free Space defragments, optimizes and consolidates even Defrag, lets you create the largest piece of contiguous free space available prior to creating large files or performing And best of all, PerfectDisk 8 the largest drives in a single pass. Done. And with our Competitive Trade-up Program, the time is great to migrate to partition resizing operations. 8. So why wait? Download a FREE trial at www.perfectdisk8.com. 1-800-546-9728 www.perfectdisk8.com ® June 8, 2004 PerfectDisk 6.0 Microsoft, Windows, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. PerfectDisk is a registered trademark of Raxco Software. PC Magazine Editors’ Choice Award Logo is a registered trademark of Ziff Davis Publishing Holdings Inc. Used under license. All other product names mentioned herein are the trademarks of their respective owners. ¤ May 24, 2005 PerfectDisk 7.0 0607red_WinInsider71-72.v9 5/11/07 1:28 PM Page 71 WindowsInsider by Greg Shields Isolation Automation Exploration: Part II I n last month’s column we introduced the idea of isolation groups with Windows Vista. These groups add an extra layer of authentication—way down at the network layer—that forces a Kerberos computer authentication before checking any user credentials. Adding in this extra authentication restricts highly sensitive data communication to occur only among specific computers. Using Vista’s improved Windows Firewall with Advanced Security, it’s much easier than before to leverage IPSec and Kerberos authentication to create an isolation group. Let’s take a look at the steps necessary to implement a simplistic one on your network. The first step in creating an isolation group is to identify the workstations and servers that will be in the group. That group can range from a few workstations and a single server on up to every machine in your domain. In those cases where only a single server is isolated, it can be used to ensure only certain workstations can access data on that server. When an entire domain is isolated, all traffic initiated from outside the domain can be blocked. This helps protect the domain from external attack. In our example, we’ll set up an isolation group between a payroll server, \\payrollsrv, and two payroll workstations, \\payrollwks1 and \\payrollwks2. Once isolation is established, only the two payroll workstations will be able to initiate a connection to the server. All other network traffic initiated from other computers, within or outside the domain, will be blocked by the isolation policy. Note that the way we’ll configure this policy will not affect the payroll server’s ability to initiate a connection to another computer. That would prevent it from being a part of the domain or resolving other computers. Our policy will only affect other computers’ ability to initiate a connection to the payroll server. To set up the isolation group, open the Group Policy Management Con- Next, we’ll need to edit the GPO and configure the Connection Security Rules for our isolation group. As before, this needs to be done on a Windows Vista computer. Why? Because the options to configure the Windows Firewall with Advanced Security are only available when the GPO is edited from within Windows Vista. Choose to “Edit” the GPO and navigate to Computer Configuration | Security Settings | Windows Settings | \\payrollwks 1 \\payrollsrv \\marketingwks 1 \\payrollwks 2 Isolation Group \\nondomainwks 1 Windows Domain Figure 1. Workstations in the isolation group are allowed to contact the payroll server. Workstations outside the group and outside the domain are not. sole (GPMC) on a Windows Vista machine and create a new GPO that is attached to the domain. Isolation groups are supported on Windows Vista and Longhorn machines only, so we need to create a GPO with a WMI filter that limits its application to just those versions. The query we’ll use for this WMI filter will be SELECT * FROM Win32_OperatingSystem WHERE version >= '6'. You must ensure that the GPO is linked to this WMI filter. Windows Firewall with Advanced Security. You’ll immediately notice that the interface looks very similar to the one used in Vista to configure local firewall rules. This makes the process very easy, because if you’ve tested using local configurations then it’s nearly the same process to upgrade that local configuration to a Group Policy. Then, you create a Connection Security Rule: 1. Right-click “Computer Connection Security” and select “New Rule.” | Redmondmag.com | Redmond | June 2007 | 71 0607red_WinInsider71-72.v9 5/11/07 1:28 PM Page 72 WindowsInsider 2. Select the type of Connection Security Rule. We discussed the types of Rules in last month’s column. For our example, so we can see all the possible options, we’ll choose to create a “Custom Rule.” 3. In the next screen, we need to know the IP addresses of the computers at both endpoints. Enter the address for the server into Endpoint 1 and the IP address for the workstations into Endpoint 2. 4. Next, you’re asked how you want the authentication to occur. In this example, you want all inbound traffic to the pay- Controller services. So, in this step you’ll choose to “Require authentication for inbound connections and request authentication for outbound connections.” 5. The next screen allows you to select User, Computer or Computer Certificate Authentication. You want to restrict access to specified computers, so we’ll choose “Computer Authentication.” 6. You’re then asked to limit the rule to Domain, Private or Public network connection types. Because this authentication occurs within a Domain, you need to choose only the “Domain” connection type. The options to configure the Windows Firewall with Advanced Security are only available when the GPO is edited within Windows Vista. roll server to authenticate but you don’t want to require outbound traffic to do so. Doing this could prevent the payroll server from interacting with other network resources like DNS or Domain 7. Lastly, we give the Rule a name and finish the wizard. The GPO is now configured, but because that GPO is currently attached to the Domain, it now applies to all objects. GetMoreOnline Learn more about configuring Windows Server 2003 for isolation at Redmondmag.com. FindIT code: Insider0607 You must limit its application to just the payroll server and the two workstations. To do so, create a “Universal Group” in Active Directory Users and Computers and add the three computer accounts to that group. Then, in the GPMC, remove “Authenticated Users” from the securityfiltering box for the GPO and replace it with our Universal Group. Once Group Policy application is complete, the isolation group will be established between the Vista workstations and the server. Remember, this process works only if the workstations are Windows Vista and the server is Windows Longhorn. Previous versions will not support Connection Security Rules, and so must be configured using a local IPsec policy. Previous versions also require the IPsec Simple Policy Hotfix (downloadable at http://support.microsoft.com/kb/ 914841). After installing the hotfix, create a registry entry at HKEY_LOCAL_ MACHINE\SYSTEM\CurrentControl Set\Services\PolicyAgent\Oakley\IKE Flags. Then, set the REG_DWORD value for IKEFlags to 0x14. Once the hotfix is installed, you’ll use the local IP Security Policy Management MMC console to create the policy on the Windows Server 2003 system. This can be a complicated process. In the online version of this article, we’ll provide a simple netsh configuration file that can get you started. — Greg Shields ([email protected]), MCSE: Security, CCEA, is a principal consultant for 3t Systems (www.3tsystems.com) in Denver, Colo. A contributing editor to Redmond magazine and a popular speaker at TechMentor events, Greg is also the resident editor for Realtime Publishers’ Windows Server Community (www.realtime-windowsserver.com) providing daily commentary and expert advice for readers. Project1 4/10/07 10:01 AM Page 1 Project5 4/30/07 2:29 PM Page 1 0607red_SecAdvisor75-76.v5 5/11/07 11:25 AM Page 75 SecurityAdvisor by Joern Wettern Protect Your Customer Data O ne of the most challenging tasks facing businesses today is protecting customer data. Identity theft cases and high profile data privacy breaches fill the headlines, which only underscores how essential it is to keep your customers’ data private and secure. A few years ago, Oracle Corp. CEO Larry Ellison proclaimed that “privacy … is largely an illusion.” These days, that sentiment doesn’t go over well with consumers, who are increasingly sensitive about the security of their personal data. Before long, companies that don’t take steps to safeguard their customers’ data won’t have any customers to worry about. If your business revolves around collecting and maintaining customer data, such as names, e-mail addresses, credit card numbers or any other potentially sensitive data, then safeguarding the privacy of that data is essential to your company’s continued existence. Accidental disclosure of data that hasn’t been properly safeguarded is a disaster on many different levels—financial, customer trust and quite possibly legal ramifications. Most organizations are required by law to inform customers when their personal information is compromised. Consider the cost of not being careful with names, addresses, credit card numbers and other customer data. Research firm Gartner Inc. estimates that an average data breach costs $140 per affected customer. This includes direct costs like legal fees and the cost of notifying customers, as well as indirect costs like losing customers and employee productivity. While the impact on your bottom line may not equal that experienced by The TJX Companies Inc., which recently admitted that data for more than 45 million customers was stolen from their servers, any theft of customer data is bound to be more expensive than you dare to imagine. Policies Matter A good starting point for protecting customer data is to establish and enforce a privacy policy. Most people do actually read these policies, which are routinely posted on Web sites. Customers are also becoming increasingly sophisticated about analyzing policies and determining how they will affect the security of their personal data. what each of these principles mean. ING Direct’s policy identifies what data it maintains, the limited conditions under which it will share customer data with third parties and what happens to your data when you’re no longer a customer. The policy is easy to understand and demonstrates that the company is concerned with privacy. Unfortunately, you can also find many examples of meaningless privacy policies. You don’t have to search for long to find companies that essentially state that they may use all information they collect as they see fit, including sharing this information with third parties for advertising purposes. There’s a trend to have privacy promises made meaningless by stating that a company reserves the right to change its policy at any time without notifying customers of such changes. Lawyers may advise you to include such a statement in your policy, but you should A good privacy policy clearly states what types of information you collect, how long you need to keep this data, under what circumstances you may share the data with others and how you safeguard this information. A good privacy policy clearly states what types of information you collect, how long you need to keep this data, under what circumstances you may share the data with others and how you safeguard this information. A good policy also describes how your company protects customers, rather than merely justifying overzealous data collection. A good example of a customer-friendly privacy policy is the one used by ING Direct (http://home.ingdirect.com/ faqs/faqs.asp?s=PrivacyPolicy). The bank clearly lists four principles of data collection and use and then explains look for more customer-friendly alternatives. For instance, Amazon.com Inc.’s privacy policy contains a similar provision, but it’s supported by a pledge to always protect any data according to the privacy policy in effect when the customer initially supplied the information. What Do You Need to Know? As you’re evaluating your data collection policies, carefully consider what you really need to know to run your business. This starts with basic demographic information. If you’re a software vendor who | Redmondmag.com | Redmond | June 2007 | 75 0607red_SecAdvisor75-76.v5 5/11/07 11:25 AM Page 76 SecurityAdvisor offers trial software for download, you may require visitors to your Web site to fill out a form before they can initiate the download. Many such forms ask new customers for their name, address, phone number, e-mail address, job role, nature of their business and more. Some of this information is collected in order to contact the prospective customer. Other times, the reason for collecting it is simply that someone thought it would be nice to know as much about prospective customers as possible. Is it really useful, though, to know someone’s press that someone stole thousands of credit card numbers from your servers. Where Should You Keep It? Most businesses provide their customers with Web forms to enter information about themselves, whether this is an e-mail address or a Social Security number. Just because you need to collect this information with a server that’s on the Internet doesn’t mean that same server that holds the data should also be accessible from the Internet. Fortunately, most businesses place their data- Collecting unnecessary information doesn’t just annoy customers, it also leads to clutter that can make it much more difficult to safeguard the data. address if you don’t plan to send them any mail? Does gathering statistics about your Web site visitors outweigh the risk of annoying potential customers who may feel they’re being asked to provide too much information? As you’re evaluating what to collect, take a long, hard look at whether you really need the information. Collecting unnecessary information doesn’t just annoy customers, it also leads to clutter that can make it much more difficult to safeguard the data. How Long Do You Need It? When dealing with your own personal data, there’s probably no harm in keeping it around forever. Doing the same for business data can be problematic. Sure, there are good reasons to have a data retention policy. Long-term archiving of certain data can even be a legal requirement in some industries. However, this shouldn’t be the default. If you delete data you won’t need in the future, you won’t have to worry about the consequences if it’s compromised. For example, most businesses have no need to store a credit card number after processing a credit card transaction. Deleting this information from your servers quickly and consistently will spare you the agony of reading in the base servers on a separate network, so that hackers can’t get at them directly. In many cases, however, the same Web servers used for data entry are used to retrieve information from the database server. This renders isolation to a different network useless. Such bad network design is often the result of taking shortcuts, not paying attention to how data is used or analyzing the value of the data. Even if you think your databases aren’t accessible, they may become so inadvertently. One of the most common vulnerabilities on Web servers is SQL injection. This type of attack puts a SQL query into a form field instead of the expected data, like an e-mail address. If your Web application doesn’t carefully check that any entered data is not really a SQL command before it’s passed on to your database server, you may let a hacker get to any information he wants in your database. The only defense against such attacks is careful Web application design to ensure that all data entered by users is indeed valid. Can They Take It with Them? Whenever you’re storing customer data, you should be concerned about which employees have access to this data. After all, statistics consistently show that the majority of data theft is performed by 76 | June 2007 | Redmond | Redmondmag.com | insiders. Even if all your employees are trustworthy, it’s not uncommon for someone to lose a laptop or removable storage containing confidential data. Trying to protect against data disclosure by employees exposes an unfortunate dilemma. Employees, such as those in a customer service department, need to have access to the data you maintain to perform their jobs. You also have to ensure that they can’t steal this data. There’s no absolute protection against data disclosure or data theft by someone who has access to the data, but there are easy methods to mitigate the risk. If you make sure employees can only view a single customer record at a time, you can at least prevent someone from taking a large number of customer records with them. You can also restrict the use of mobile storage to prevent someone from easily carrying data out the door. You can also purchase software to enforce encryption of all confidential data that is legitimately taken off your premises. The Simple Things Preserving your customers’ privacy and safeguarding customer data is a complex task. It includes business analysis, Web design, database administration, network access control and much more. This may seem like a daunting task, but you can address many problems by implementing a few of the simple principles described here. Keep your customers’ privacy concerns in mind, store only the data you need, and provide access to customer data only to the extent required to run your business. This creates a foundation for designing secure Web applications and networks. The result will be more secure and easier to manage. — Joern Wettern ([email protected]), Ph.D., MCSE, MCT, Security+, is the owner of Wettern Network Solutions, a consulting and training firm. He has written books and developed training courses on a number of networking and security topics, in addition to regularly teaching seminars and speaking at conferences worldwide. Project1 5/11/07 11:41 AM Page 1 Simplify Active Directory Management, Inventory Control, & Auditing. ® ® ® ® ® ® ® Provides Custom & Canned Reports Includes Ability to Schedule Reports Eases Software Inventory & Auditing Removes Unwanted Client Software Offers Hot Fix & Service Pack Viewer Advanced Export Features Assists in Compliancy ING D? L E E F LME E H W OVER t See us a TechEd 9 Booth 42 FREE 30 Day Trial! Visit CNS-Software.com TM Tools by Administrators for Administrators 1-866-344-6267 www.CNS-Software.com ©2006 CNS Software, LLC. All rights reserved. The names of actual products mentioned herein may be the trademarks of their respective owners. Project2 5/14/07 10:13 AM Page 1 ZZZUDGPLQFRPUDGPLQ 5$'0,1 VXSHUVRQLFUHPRWHFRQWURO 5$'0,1LVWKHPRVWVHFXUHDQGUHOLDEOHUHPRWH FRQWUROVRIWZDUHGHVLJQHGWRPRQLWRUVXSSRUW RUZRUNRQUHPRWHFRPSXWHUVLQYLUWXDOO\UHDOWLPH 5$'0,1KDVSURYHQWREHLQFUHGLEO\IDVWDQGHDV\ WRXVHDSSOLFDWLRQ5$'0,1LVDFRPSOHWHUHPRWH FRQWUROVROXWLRQWKDWKDVDOOPLVVLRQFULWLFDOIHDWXUHV :LWKWKHLQYHQWLRQRI'LUHFW6FUHHQ7UDQVIHU 7HFKQRORJ\5$'0,1UHPRWHFRQWUROVRIWZDUHGH¿QHV QHZVWDQGDUGVLQWKHLQGXVWU\ 6XSHUVRQLFYHKLFOHVSHFL¿FDWLRQV *HQHUDOFKDUDFWHULVWLFV 3HUIRUPDQFH 0LOLWDU\JUDGHVHFXULW\ 6XSHUVRQLFIUDPHSHUVHFRQGVSHHGRQ/$1 IUDPHVSHUVHFRQGRUPRUHRQPRGHP 3RZHUSODQW'LUHFW6FUHHQ7UDQVIHU70 :HLJKW0E )HUU\UDQJHXQOLPLWHG :LQJVSDQYDULDEOHJHRPHWU\GHVNWRSVL]HG )XOO\26LQWHJUDWHG17VHFXULW\V\VWHPZLWK 17/0YVXSSRUW ,3¿OWHUWDEOHWKDWUHVWULFWVUHPRWHDFFHVVWRVSH FL¿F,3DGGUHVVHVDQGQHWZRUNV 6HUYHUSDVVZRUGSURWHFWLRQ $GYDQFHGELW$(6HQFU\SWLRQIRUDOOVHQGLQJ DQGUHFHLYLQJGDWD $XWKHQWLFDWLRQEDVHGRQ'LI¿H+HOOPDQH[FKDQJH ZLWKELWNH\VL]H .HUEHURVVXSSRUW &RGHWHVWLQJGHIHQVHPHFKDQLVPWKDWSUHYHQWV WKHSURJUDP¶VFRGHIURPEHLQJDOWHUHG 6PDUWSURWHFWLRQIURPSDVVZRUGJXHVVLQJ ,QFRUUHFW6HUYHUFRQ¿JXUDWLRQVSUHYHQWLRQ *HQHUDWLRQRIXQLTXHSULYDWHNH\VIRUHDFKFRQ QHFWLRQ 7ULYLD 1RFRPSHWLWLRQLQGXVWU\EUHDNWKURXJK 9LVWD266XSSRUW 6XSHUVRQLF)36UDWLR /RZHVWSURFHVVRUXVH 0LQLPXPWUDI¿FFRQVXPSWLRQ 8OWLPDWHVHFXULW\VWDQGDUGV 3ULFHUDQJH $UPDPHQW 6HFXUHYRLFHDQGWH[WFKDWIHDWXUHV )LOHFDUJRWUDQVIHU 7HOQHWDQGRWKHUXVHIXOWRROV 7\SH0XOWLUROH6XSHUVRQLF5HPRWH&RQWURO 0DQXIDFWXUHU)DPDWHFK 'HVLJQHGE\'PLWU\=QRVNR 0DLGHQÀLJKW0DUFK 9LQWURGXFHG-XQH 6WDWXVDFWLYHVHUYLFH 1XPEHUEXLOWPLOOLRQV 3ULPDU\XVHUXSWRGDWHEXVLQHVVDOORYHUWKH ZRUOG 8QLWFRVW86VTXDGURQGLVFRXQWVDYDLODEOH 2SHUDWLRQDOKLVWRU\ FRPSDQLHVRI)RUWXQHOLVWZLWKZLGH JHRJUDSKLFVSUHDG 1RUWK$PHULFD 6RXWK$PHULFD (XURSH $XVWUDOLDDQG2FHDQLD $VLD $IULFD 7\SLFDOFRPEDWXVH &RUSRUDWH 6PDOODQGPHGLXPEXVLQHVV +HOSGHVNSURYLGHUV 7HOHFRPPXWLQJ (GXFDWLRQDO +RPH )DPDWHFK,QWHUQDWLRQDO&RUSRUDWLRQ 5DGPLQDQG5HPRWH$GPLQLVWUDWRUDUHUHJLVWHUHGWUDGHPDUNVRI)DPDWHFK,QWHUQDWLRQDO&RUS 0607red_Index_79.v2 5/11/07 5:38 PM Page 79 AdvertisingSales RedmondResources AD INDEX Matt Morollo VP, Publishing 508-532-1418 tel 508-875-6622 fax [email protected] West/MidWest East Dan LaBianca JD Holzgrefe Director of Advertising, West/Central 818-674-3417 tel 818-734-1528 fax [email protected] Director of Advertising, East 804-752-7800 tel 253-595-1976 fax [email protected] Bruce Halldorson Western Regional Sales Manager CA, OR, WA 209-333-2299 tel 209-729-5855 fax [email protected] Patrick Cragin MidWest Regional Sales Manager 303-255-1733 tel 440-851-6859 fax [email protected] Cecila “CiCi” Ross Northeast Regional Sales Manager 917-463-4040 tel 917-591-8524 fax [email protected] Advertiser Page URL Acronis, Inc. 26 www.acronis.com AppDev Training 58 www.appdev.com www.avepoint.com 62 www.avepoint.com Beyondtrust 20 www.beyondtrust.com Brocade Communications Systems C2 www.brocade.com Business Objects 23,40 www.businessobjects.com Centeris 33,41 www.centeris.com Centrify 41 www.centrify.com Certeon 40 www.certeon.com Citrix Education 51 www.citrix.com CNS Software 77 www.cns-software.com Diskeeper Corporation 29,69 www.diskeeper.com Dorian Software 59 www.doriansoft.com EmFast Inc. 38 www.emfast.com ESET LLC 3 www.eset.com GFI 8,43 www.gfi.com IBM Corporation 55,57,C3 www.ibm.com Idera 41 www.idera.com Inmage 39 www.inmage.com Intel Corporation 5 www.intel.com ipMonitor Corporation 44 www.ipMonitor.com IpSwitch What’s Up Gold 42 www.ipswitch.com iTripoli Inc. 19 www.itripoli.com IT CERTIFICATION & TRAINING: USA, EUROPE Lieberman Software 39 www.liebsoft.com Lucid8 13,38 www.lucid8.com Al Tiano Microsoft Corporation 14 www.microsoft.com Advertising Sales Manager 818-734-1520 ext. 190 tel 818-734-1529 fax [email protected] MKS Inc 40 www.mkssoftware.com Namescape 42 www.namescape.com Netikus 11 www.netikus.com SALES STAFF NetSupport Software 67 www.netsupport-inc.com Danna Vedder NetOp Tech 72 www.netoptech.com www.northern.net Microsoft Account Manager 253-514-8015 tel 775-514-0350 fax [email protected] Tanya Egenolf Advertising Sales Associate 760-722-5494 tel 760-722-5495 fax [email protected] CORPORATE ADDRESS 1105 Media, Inc. 9121 Oakdale Ave. Ste 101 Chatsworth, CA 91311 www.1105media.com MEDIA KITS: Direct your Media Kit requests to Matt Morollo, VP, Publishing, 508-532-1418 (phone), 508-875-6622 (fax), [email protected] REPRINTS: For all editorial and advertising reprints of 100 copies or more, and digital (web-based) reprints, contact PARS International, Phone (212) 221-9595, e-mail: [email protected], web: www.magreprints.com/QuickQuote.asp LIST RENTAL: To rent this publication’s email or postal mailing list, please contact our list manager Merit Direct: Jeff Moriarty 333 Westchester Ave., South Building White Plains, NY 10604 [email protected] (518) 608-5066 Redmond (ISSN 1553-7560) is published monthly by 1105 Media, Inc., 9121 Oakdale Avenue, Ste. 101, Chatsworth, CA 91311. Periodicals postage paid at Chatsworth, CA 91311-9998, and at additional mailing offices. Complimentary subscriptions are sent to qualifying subscribers. Annual subscription rates for non-qualified subscribers are: U.S. $39.95 (U.S. funds); PRODUCTION NORTHERN Parklife, Inc. 64 Mary Ann Paniccia Port80 Software 40 www.port80software.com VP, Print & Online Production Raxco Software 70 www.raxco.com Julie Lombardi Redmondmag.com 78 www.redmondmag.com Sanbolic, Inc. 65 www.sanbolic.com SAPIEN Technologies, Inc. 17 www.sapien.com Kelly Ann Mundy Securent 43 www.securent.com Production Coordinator 818-734-1520 ext. 164 tel 818-734-1528 fax [email protected] Special Operations Software 37 www.specopssoft.com St. Bernard Software 35,C4 www.stbernard.com SteelEye Technology, Inc. 25 www.steeleye.com Production Manager Canada/Mexico $54.95; outside North America $64.95. Subscription inquiries, back issue requests, and address changes: Mail to: Redmond, P.O. Box 2063, Skokie, IL 60076-9699, email [email protected] or call (866) 2933194 for U.S. & Canada; (847) 763-9560 for International, fax (847) 763-9564. POSTMASTER: Send address changes to Redmond, P.O. Box 2063, Skokie, IL 60076-9699. Canada Publications Mail Agreement No: 40039410. Return Undeliverable Canadian Addresses to Circulation Dept. or DHL Global Mail, 7496 Bath Rd Unit 2, Mississauga, ON, L4T 1L2. SWsoft 41 www.swsoft.com TNT Software 42,74 www.tntsoftware.com The Training Camp 73 www.trainingcamp.com Transcender 60 www.kaplan.com TS Factory 17 www.tsfactory.com UltraBac Software 38,43,47 www.ultrabac.om VMWare 6,42 www.vmware.com Western Governors University 10,77 www.wgu.edu Wiley Publishing 49 www.wiley.com XenSource, Inc. 39,49,66 www.xensource.com EDITORIAL INDEX Company Page URL Adobe Systems Inc. 9, 22, 32 www.adobe.com © Copyright 2007 by 1105 Media, Inc. All rights reserved. Printed in the U.S.A. Reproductions in whole or part prohibited except by written permission. Mail requests to “Permissions Editor,” c/o REDMOND, 16261 Laguna Canyon Road, Ste. 130, Irvine, CA 92618. Apple Inc. 46, 80 www.apple.com Centia Ltd. 12 www.centia.net The information in this magazine has not undergone any formal testing by 1105 Media, Inc. and is distributed without any warranty expressed or implied. Implementation or use of any information contained herein is the reader’s sole responsibility. While the information has been reviewed for accuracy, there is no guarantee that the same or similar results may be achieved in all environments. Technical inaccuracies may result from printing errors and/or new developments in the industry. Citrix Systems Inc. 12 www.citrix.com Colligo Networks Inc. 12 www.colligo.com DataCore Software Corp. 12 www.datacore.com Dell Inc. 21 www.dell.com Discorp 34 www.discorp.be eProject Inc. 45 www.eproject.com Google 46 www.google.com Hewlett-Packard Development Co. 21 www.hp.com IBM Corp. 21 www.ibm.com Oracle Corp. 75 www.oracle.com Symantec Corp. 22 www.symantec.com VMware Inc. 12 www.vmware.com This index is provided as a service. The publisher assumes no liability for errors or omissions. | Redmondmag.com | Redmond | June 2007 | 79 0607red_Foley80.v5 5/11/07 11:27 AM Page 80 FoleyOnMicrosoft by Mary Jo Foley Compliance vs. Compatibility M icrosoft screwed up with Internet Explorer (IE). And I’m not just talking about its decision to wait five years between IE6 and IE7. I’m referring to the position Microsoft established years ago—that interoperability and standards adherence aren’t all that important. Ignorant, arrogant and short-sighted— Microsoft’s decision to let standards take a back seat was all of those things. Even the IE leadership agrees. Now the company is paying for the error of its ways. It’s a painful process. The IE team leaders have become serious about standards. They’re so serious that they’ve brought on Web standards maven Molly Holzschlag to help dig IE, and other units within Microsoft’s Web Platform and Tools division, out of their self-made standards hole. Holzschlag is advising Microsoft on how to make products like IE and Expression Studio more standardscompliant. If there’s sufficient time and interest, she’s also telling them to work on products like Outlook 2007, which, because of a change to the IE rendering engine, is breaking many e-mail newsletters and Web sites. She’s also working with other vendors, including browser vendors, in an attempt to get everyone at the table to “put their knives down” long enough to make some progress with interoperability, Holzschlag told me recently. The outspoken and well-spoken Holzschlag is definitely the right person for the job. She’s got the standards scars and thick skin to prove it. But why does Microsoft need an advisor like Holzschlag? Why can’t the Redmondians simply flip the standards switch and make IE compliant with all, most or at least some of the standards with which Firefox, Opera, Safari and other browsers already comply? “The problem is, the Web is already broken,” Holzschlag says. “We had a cross-platform, cross-browser [world] for one year.” As other Microsoft officials have noted, with half a billion users already, Microsoft can’t make changes to IE willy-nilly without breaking lots of Web pages. Which is worse: a browser that’s less than 100 percent standardscompliant, or a browser that is standards-compliant but wreaks havoc on the Web sites of developers who had no choice but to adhere to the IE guidelines when coding their sites for IE users? Microsoft is between a rock and a hard place of its own making on this one. It’s damned if it fixes IE to make it more compliant with Cascading Style Sheets (CSS) 2.1 layout, cross-browser object-model and other standards, as those changes will break a lot of software and many sites that have been tuned to work with Microsoft’s nonstandards-based code. It’s also damned if it doesn’t make IE more standards- GetMoreOnline Read more commentary about Internet Explorer and standards at Redmondmag.com. FindIT code: Foley0607 80 | June 2007 | Redmond | Redmondmag.com | based, as a growing number of developers, designers and users are insisting on standards when making their buying and/or development decisions. I’m not even going to touch the thorny issue of what counts as a standard in the Web world. CSS 2.1 is a spec that has yet to be ratified, although it’s the coding target for many developers. CSS 3.0 seemingly is the future, but remains “unrecommended.” So what’s a penitent browser vendor to do as it seeks to make amends for its past transgressions? At the MIX07 conference last month, Microsoft officials floated a trial balloon. What if Microsoft were to require developers and authors to “opt in” to standards mode when designing IE8-and-beyond sites and products? Holzschlag called the proposal “interesting,” and said that like the IE team itself, she still isn’t sure how or if this kind of opt-in mode would be implemented. What would you do if you were part of the IE team? Although it would be painful and potentially confusing to consumers, would it make sense for Microsoft to simultaneously release one “standards-compliant” and one “backward-compatible” version of IE8, IE9 and beyond to get out of this jam? Where do you stand on this trade-off of compliance versus compatibility? Should Microsoft err on the side of standards or backward compatibility? What suggestions would you make for ways that Microsoft can minimize customers’ and developers’ pain as it finally does the right thing, in terms of turning IE into a modern browser? — Mary Jo Foley ([email protected]) is editor of the new ZDnet “All About Microsoft” blog and has been covering Microsoft for about two decades. Project2 4/18/07 9:40 AM Page 1 Project1 1/16/07 9:56 AM Page 1