Monday, September 29, 2008

Asus Eee PC 1000H 80G XP Mini-Notebook

Ever since the Eee PC 4G opened up the mini-notebook market last year, Asus has been pumping out different flavors of the Eee, including versions of the original with XP and models sporting slightly larger screens and a multitouch pad. With the $460 Eee 1000H 80G XP, though, Asus addresses many of the previous problems we've had with earlier mini-notebook models--and it creates a solid second-gen machine in the process.

The newest member of the Eee family offers the same Intel Atom processor, 1GB of RAM, and 80GB hard disk as MSI's Wind NB U100. It has a 10-inch display and measures 10.5 by 7.5 by 1.5 inches (about the size of a hardcover book, and only slightly larger than the MSI Wind). The Eee 1000H is also fairly heavy for a mini-notebook, weighing about 3.6 pounds including the six-cell battery packed underneath. (On the plus side, the battery lasted about 4 hours, 32 minutes in our tests.) With the Eee 1000H's design the way it is, you might as well call it an ultraportable--in heft, if not performance.

The Atom processor may be passable for last-gen apps and small devices, but it's downright mopey if you're hoping to run Vista. And it isn't exactly a speed demon in XP, either: On our WorldBench 6 tests, the Eee 1000H received a score of 37, a point higher than MSI's Wind got. For the most part, though, this model's performance is consistent for what we're finding with XP-based mini-notebooks running an Atom processor and 1GB of RAM.

One thing that sets the Eee 1000H apart from the other mini-notebooks we've seen is its spacious, comfortable keyboard. I'd probably put it on a par with what you'd expect to find on a full-featured ultraportable laptop. The keyboard, coupled with an array of useful shortcut keys, makes this mini-notebook very easy to use. One key turns off the monitor, another switches the resolutions, the third changes the performance settings, and the last is user configurable. And the keys aren't the only things that work well: The touchpad offers a sensual feel and is fluidly responsive, and the mouse buttons are firm, metallic, and well mounted.

The display's native 1024 by 600 resolution looks reasonably sharp on the 10-inch screen. With a quick toggle of the shortcut key, you can pop through a number of "optimized" resolutions. The only real use I've found for the resolution gear-shifter is that it's helpful for trying to fit some oddly formatted Web pages to the screen; otherwise, you can always output video through the VGA port. A firm, flush bezel surrounding the screen and the 1.3-megapixel camera securely locks everything in place. The case has a smooth yet slightly textured feel.

Suprisingly, the Eee 1000H's audio sounded crisp, and richer than I had expected. Maybe that's the result of Dolby Sound Room technology (which Dolby says extends the speakers' bass response up an octave, and widens the sound space that the speakers project). Elvis's "Suspicious Minds" rang clear; Run DMC's "Walk This Way" sounded a little tinny, but good enough that I was able to forgo plugging in headphones. I'd even say that the Eee 1000H can fill up a small room (or office cubicle) with tunes.

One other unexpected twist: Asus preinstalls some handy software, including Microsoft Works, StarOffice, and Skype.

In other respects, the Eee 1000H provides exactly what you might expect from a mini-notebook in expandability and layout. It includes three USB ports, an SD Card slot, VGA-out, headphone/microphone jacks, and an ethernet jack.

I liked the thorough manual, too. It's funny, really: Many makers of high-end notebooks don't even bother--simply tossing a PDF in the box--and yet this well-laid-out book covers all the bases.

Asus' Eee 1000H is among the leaders in the mini-notebook market. This model offers a sizable keyboard, a solid screen, and a clean and comfortable layout, just beating out the MSI Wind. Buyers beware, however: It's a device that's roughly the size of an ultraportable yet has half an ultraportable's power (albeit at more than half an ultraportable's price).

Panasonic Unveils Line of Toughbook Laptops

Panasonic Computer Solutions Co. Thursday unveiled a slew of new portable computers, focusing on small but rugged models.

The PC maker took the covers off a light-weight rugged laptop, a tablet PC and an ultraportable computer. Panasonic said the new offerings, especially its Toughbook line of laptops, focus on helping the business person on the move,

"The growing trend of portability in computers -- lighter weight, longer battery life, advanced wireless capabilities -- needs to be balanced by true durability," said Daniel Longfield, an analyst with Frost & Sullivan, in a statement. "Highly mobile government, enterprise and small business users need reliable connectivity to drive continued productivity."

One of the mobile computers that Panasonic is unveiling is the Toughbook F8, which the company puts in the lightweight but durable category. Weighing in at 3.7 pounds with a 14.1 inch-wide display, it uses an Intel Core 2 Duo processor and has up to 4GB of RAM. With an integrated handle for easier portability, the F8 also has a 160GB shock-mounted hard drive.

Panasonic also is coming out with the Toughbook W8, an ultraportable laptop with a 12.1-inch display and an integrated DVD multi drive. Weighing about 3 pounds, the laptop runs also runs a Core 2 Duo processor and has a 120GB hard disk. It also reportedly has a battery life of seven hours.

The company also brought out the Toughbook T8, a tablet PC. The 3.3-pound computer has a 12.1-inch touch screen, stylus and screen-rotating software. The T8 runs an ultra-low voltage Core 2 Duo processor, has a 120GB hard drive and up to seven hours of battery life.

The 8 series of laptops is slated to be available in November.

The ultraportable market, in particular, is getting a lot of attention in recent months. Just this past August, Lenovo went ultraportable with a US$399 laptop.

Ultraportables, or netbooks, are relatively inexpensive, small form-factor laptops that are designed for basic applications like Web surfing, e-mailing and word processing. They're designed to use less power than traditional PCs and laptops and aren't powerful enough for serious power users or gamers.

Industry powerhouse Intel Corp. is betting heavily on the emerging market, announcing this past June that its new Atom processors are aimed directly at netbook and net-top PCs. Chris Tulley, a spokesman for Intel, said in a previous interview that he expects netbook and net-top sales to outpace growth of traditional laptops and desktops.

Firms Urged to Boost Web 2.0 Security

A new study says companies are lagging seriously behind when it comes to protecting themselves from new threats in the Web 2.0 world. While Web-based threats have become more common in recent years, businesses are still focused on e-mail threats, according to the research.

The study, which was released last week by Colorado-based security software vendor Webroot, found three out of 10 organizations have seen their businesses' Web security compromised by employees using personal Web mail accounts, visiting social networking sites and downloading videos. Webroot surveyed 648 organizations in the US, UK, Australia and Canada, and found over a third thought their employees spent at least an hour per day on non-work-related sites.

Businesses are taking measures to protect against e-mail-based threats, but they are not yet attuned to the greatest threat vector today: Web-based threats driven by employee Web use," said Mike Irwin, COO of Webroot, in a release on the finding. "We found that Web-borne malware increased over 500 percent in 2007 as cybercriminals developed new ways to attack on-site and remote employees through personal Web mail accounts, social networking sites and other Web 2.0 applications. In the current threat environment, businesses must utilize a Web security solution that provides an additional layer of in-the-cloud protection for corporate and mobile users."

The study notes that 85 percent of malware is now distributed through the Web and cited industry research that shows 49 percent of businesses allow employees unlimited access to social networking sites, which do not monitor their content for malware.

"Employees and businesses regularly use blogs, Wikis and other online information sources that are more susceptible to hackers and infections because they include content from numerous anonymous contributors, rather than one trusted source," said Irwin. "However, awareness is only just beginning to grow among the IT professionals responsible for protecting these organizations. Nearly 30 percent of the IT decision-makers we surveyed did not know if their organization or its employees are using Web 2.0 applications."

Webroot found that lack of knowledge was not for lack of fear. Nearly half the businesses surveyed said they were concerned about data breaches.

Securing Your Mobile Devices

If you've ever let a stranger borrow your corporate smartphone, you may have just given him a gift of your company's data.

The reason: he might have palmed a small USB device called the CSI Stick, and surreptitiously plugged it into your phone. The device can drain every bit of data from a cell phone in seconds, says Patrick Salmon, a mobility architect for Enterprise Mobile, a technology services company that specializes in Windows Mobile deployments.

Increasingly, companies want to give mobile or field-based employees direct, instant access to critical corporate applications previously accessible only from a desktop. To do so, existing security, authentication and management infrastructures have to be extended and adapted so that mobile devices, along with their data and wireless connectivity (cellular or Wi-Fi), are managed as surely and fully as desktop PCs.

But that's not the case in many mobile deployments today, according to consultants who, like Salmon, specialize in working with enterprise customers. "What we see is an ill-defined policy regarding devices," says Dan Croft, president and CEO of Mission Critical Wireless, a technology services company that specializes in mobile deployments.

Often personal handhelds are granted wireless access, something that would never be allowed with a personal computer, creating security vulnerabilities, manageability challenges and tech support burdens, Croft says. Companies don't plan beforehand about how to handle lost, stolen or broken devices, or the data on them. "IT needs to get control of wireless [mobility] within their company," he says.

Taking control falls into four broad areas, says Jack Gold, principle of J. Gold Associates, a mobile consulting company: securing and managing every device; managing every connection; protecting every piece of data; and educating every user.

Securing and managing every device

Mobile devices, whether bought by the company or by the individuals, are accessing company networks and company data. Device security and management are closely intertwined, because you have to be able to monitor the devices in order to enforce policies.

In most cases, practitioners recommend standardizing on two or three mobile device models, minimizing the support, security and management challenges. "Other smartphones [brought in by users] might not be capable of supporting your specific security and administration polices," Enterprise Mobile's Salmon says.

Using mobile device passwords or PINs is advised. "If your enterprise doesn't enforce a password policy on those devices, you might as well stop with all your [other] security measures," Croft says. Salmon favors PINs, coupled with a limit on the number of access attempts. After that number, the next attempt triggers an automatic lock or wipe of the handheld.

Enforcing effective passwords is one of the essentials at Florida Hospital, in Orlando, where wireless notebooks are widely used by staff and nurses, along with BlackBerry devices for e-mail. The hospital also is exploring what's involved in granting access to clinical systems from physicians' smartphones.

The hospital enforces regularly changed passwords (a function of its enterprisewide identity management infrastructure), up-to-date antivirus software and some ability to remotely wipe data from mobile clients, says Todd Franz, associate CTO. "We see the need to protect the data on these mobile devices just as much as we do on a desktop PC," he says.

On selected notebooks, the hospital also uses the CompuTrace service from Absolute Software, a kind of "LoJack for laptops." A stolen computer can be traced and tracked down. Franz won't say how often hospital laptops have been stolen, but the recovery rate for laptops protected in this way is 100%. According to some accounts, 10% to 15% of all mobile devices go missing.

Consider using comprehensive device management applications such as Sybase's Afaria, Credant's Mobile Guardian, Nokia's Intellisync, Microsoft's System Center Mobile Device Manager, and others from the likes of Checkpoint and Trust Digital, to name just a few. These policy-driven suites blend monitoring and enforcement capabilities focus on mobile clients, and typically work with back-end authentication and other servers.

It's also important to have the ability to wipe, lock or kill any mobile device that's stolen, lost or unaccounted for on a moment's notice, including its SD card if it has one. A network manager should be able to issue a command that locks a device until the right password is used, wipes or deletes some or all of the corporate data on it, or shuts it down entirely, Croft says.

Managing every connection

"These connections are a pretty significant exposure if they're not done right," Gold says. "Don't leave it up to the end users."

These practitioners favor enforcing VPN connections with IPSec for mobile deployments. "SSL, which uses TCP port 443, is the path of least resistance," Enterprise Mobile's Salmon says. "I consider this the weaker of the two options." That's chiefly because while the target server has a certificate and is trusted, the SSL client is not. IPSec requires that ports have to be specifically opened, but both ends of the connection have certificates, he says.

A related issue is allowing mobile devices to connect only if they pass muster. Is the antivirus software up-to-date? Is the VPN active? Is the Wi-Fi connection from a public hotspot?

Protecting every piece of data

Selective data encryption should be an essential item in any mobile deployment.

With a managed mobile device, you can distribute and enforce encryption policies for specific data. "Document folders, your e-mail in-box, user data, contacts, certificates, and so on as the kinds of things that should be encrypted," consultant Gold says. Also consider encrypted or encryptable removable storage devices, such as high-capacity SD cards, he says.

"Unless you're in a 'James Bond environment,' most encryption levels will give you far more security than sending an unencrypted e-mail over the Internet, which happens all the time," Croft says.

Educating every user

"Few companies educate end users on the proper procedures and policies to safeguard [mobile] corporate assets," Gold says. "Get the users on your side."

"The greatest vulnerability is human," Enterprise Mobile's Salmon says. "If a stranger asked to borrow your laptop for five minutes to check his stock portfolio, you'd say "No!" because you've been educated about the risks. There's no way you're going to let a stranger use your laptop. The same thinking has to apply to your mobile phone."

To school its nurses in mobile technology, Florida Hospital relies on trainers who also have been, or are, nurses. "They speak the same language as the users," Associate CTO Franz says. "We try to keep IT people out of the way of this training, because they do not speak the same language."

Franz makes a key point about nurses and mobile technology that's relevant to all such deployments. "People don't go to nursing school to become a clerk-typist," he says. "They go because they want to help people. Technology can assist them in doing that."

Acceptable use policies should be short and to the point, otherwise they won't get read. Training should cover all the elements (explaining the device, applications and intended usage), says Alphons Evers, global solutions manager with the mobility practice of Getronics, a global IT services company.

Educating users means willing to be educated yourself. Franz says Florida Hospital discovered that one major problem facing nurses with wireless laptops was finding enough convenient surface space with electrical power so they could be recharged, and finding a lockable locker or drawer to store the laptops when not in use. That was one aspect of mobility that hadn't been anticipated.

Enterprises Overpay for Antivirus Software, Says Analyst

Enterprises continue to pay too much for security software -- while the software vendors aren't doing enough research to keep up with fast-changing threats on the Internet, a Gartner analyst said Monday.

Security vendors are maintaining high profit margins on firewalls and antivirus software, products which are commodities these days, said Neil MacDonald, a research vice president at Gartner, during a presentation at the company's IT Security Summit in London.

Buyers should take advantage of the competitive environment in the antivirus software industry to negotiate better prices for such products, he said.

"I know it's hard to switch but you have to seriously enter the negotiations," he said. "Let the vendors know that you are not afraid to switch."

Security vendors have maintained a pricing scheme that contradicts the rest of the IT industry, MacDonald said. Typically with software or hardware, prices go down year after year with the introduction of new and better products. In some cases, however, security software often loses its effectiveness as new threats emerge, while prices stay high.

"Why in antivirus year after year do we pay more for something that gives us less?" MacDonald asked. "It's insanity. Why is information security immune from the trends of the IT industry?"

For the last 18 months, MacDonald has been researching adaptive security, a concept that envisions having different security products communicate with one another and evaluate threats in a more contextual way. MacDonald argued that security products should work together like the human body's immune system, where different defensive mechanisms work in concert with each other.

These days, a security product is often designed to address a single security aspect, such as fortifying Web applications, protecting endpoint devices or preventing network intrusions. Vendors have taken advantage of how organizations deal with a security problem by offering single products, a model that makes security overly complex, MacDonald said.

Vendors need to create security technology that is less rigid and can change when businesses modify their processes. Ideally, those products would able to apply certain security policies in certain situations, a concept MacDonald labeled as adaptive.

"Vendors are holding us back from enabling this vision," MacDonald said. "The vendors are delivering us too many unconnected point products with too much complexity."

Sprint Launches Xohm WiMax Network in Baltimore

Sprint Nextel launched its mobile Wimax broadband network in the city of Baltimore on Monday.

Xohm (pronounced "zome") will offer download speeds of between 2M bps (bits per second) and 4M bps, with prices starting at US$30 a month for mobile users, the company said.

Other plans include a one-day pass at $10, a home Internet option at $25 a month, and a "Pick 2 for Life" introductory offer that allows two devices to access the network for $50 a month. Customers won't have to sign a long-term contract.

Sprint will sell the necessary WiMax modems through the Xohm Web site and local independent retail stores. The Samsung Express costs $59.99 and the Zyxel model $79.99.

The company plans to introduce another modem from Chinese manufacturer ZTE later this year, and also expects to see notebook PCs and a wireless Internet tablet from Nokia with WiMax modems built in. Sprint also plans to sell a dual-mode wireless modem capable of connecting to the WiMax network and to its existing 3G (third-generation) mobile phone network.

Sprint is in the process of combining its Xohm WiMax business with Clearwire, and plans to form a new company in the fourth quarter, also to be called Clearwire. That company intends to build a nationwide WiMax network on which Sprint will resell airtime as a virtual mobile operator.

Security Risks Rise as Smartphones Become Smarter

As wireless devices become more numerous within businesses, their convenience will be counterbalanced by an increasing potential for security problems, according to a Gartner analyst.

New trends in the wireless industry are making it easier for hacking attacks, said John Girard, a Gartner vice president, who spoke at the IT Security Summit in London on Monday.

A few years ago, there was not a lot of standardization across wireless devices. Differing operating systems, differing implementations of mobile Java and even varying configurations among devices with the same operating system made it hard to write malicious code that ran on a wide array of devices, Girard said.

But that's changing as the quality control gets better on widely-used platforms such as Microsoft's Windows Mobile and the Symbian operating system, he said. That standardization makes it easier for attackers to write code that will run on many devices.

"The more your phone gets like a PC, the more it can host malicious code," Girard said. "People are getting used to sending out executable code."

Many of the attacks that have been traditionally plaguing desktop machines, such as phishing, will increasingly move to the mobile platform, Girard said. Also, users may be more tolerant of glitches on their mobile phones, which may be clues that a device has been infected or hacked.

That's problematic when enterprises begin installing business applications on mobile phones and carry data that is potentially valuable to attackers, Girard said.

"We're very quickly moving to the point where people really can do business on smartphones," Girard said.

Gartner is predicting that wireless ID theft and phishing attempts targeting mobile devices will become more and more prevalent throughout next year, Girard said.

Companies need to be sure before buying a fleet of mobile devices that those devices meet a minimum security specification. The security specification can be formulated by figuring out what kind of data the device will handle and what regulations a company is bound by under data protection law, Girard said.

If the hardware and software is secure when the device arrives, it makes it a lot easier to manage than trying to fix a device after it's in the field, Girard said.

Girard laid out a few key security points: Data on devices should be encrypted, proper identity and access controls should be implemented and intrusion prevention systems should used to ensure that rogue devices don't access sensitive information, he said.

Tuesday, September 23, 2008

WinZip Pro 12 Compression Software

Thanks to Windows' built-in support for .zip files, you haven't had to own WinZip or a similar program to compress and decompress .zip archives for quite a while now. The reasons for buying WinZip (or using the free trial version) now is to do things that Windows' .zip support can't handle, such as zip-to-mail, true encryption, and automated backup.

The reasons to use WinZip have increased with WinZip Pro 12, but only somewhat. In the latest version, WinZip adds photo handling and sharing features--with partial success.

I looked at a late beta of WinZip Pro 12 ($50) for this review. The $30 standard version lacks several of the features discussed below. Upgrades cost $25 for WinZip Pro and $15 for the standard version--an unwelcome development for a product that once offered free upgrades to all registered users.

WinZip 12 should appeal to people who want to zip photos for storage or mailing purposes. Since .jpg files are already compressed, zipping them with a pre-WinZip 12 file compressor doesn't shrink them much more than 1 or 2 percent. The new version, by contrast, claims to compress them by 20 to 25 percent--a significant reduction if you're dealing with gigabytes of photos, though far below the 50 percent compression we're used to getting when zipping .txt or .doc files.

My casual tests didn't yield 25 percent compression levels, but they came close, ranging from 16 to 20 percent. That's about 200MB saved for every 1GB of photos. Just be sure to select Optimize for best compression when you compress the photos.

WinZip Pro 12 can import photos directly from your camera into a .zip file. I wasn't able to get this feature to work, but this may have been due to my cameras, not the software. The software can rotate photos as it imports them and can organize them into folders. But it can't perform the versatile, tag-based photo organizing that Photoshop and Windows Live Photo Gallery users have come to expect.

WinZip Pro 12 does make it easy for you to view zipped photos--as thumbnails and in a viewer that looks and behaves much like the one that comes with Windows XP and Vista. The program even offers a viewer for looking at photos in slide-show format.

Not all of WinZip Pro 12's enhancements are photo-specific. For instance, WinZip has enhanced its already versatile zip-and-mail features, so you can zip and mail selected files from within a .zip archive. Other new features include the ability to access files within .iso images and customizable password policies to ensure that users do not create easy-to-guess passwords.

If you have a lot of pictures and need to free up some hard drive space, or if you need to shrink giant, photo-laden e-mail messages, WinZip 12 is a tempting way to make it happen. If you don't, it's still a handy program to have around.

IPhone 2.1 Jailbroken, Unlock Hack in Circulation

IPhone (and iPod touch) Software 2.1 has been unlocked by the iPhone Dev Team.

The move means the cat and mouse game between Apple and hackers attempting to open the platform up for use on different mobile phone networks and in order to install non-Apple approved music applications continues.

The iPhone Dev team released software -- Pwnage Tool -- to unlock the iPhone and iPod touch across this last weekend.

For its part, Apple has introduced new anti-unlocking measures within iTunes 8, measures designed to prevent some hacks from working. And the Dev Team claims Apple has built-in a series of countermeasures within iTunes, in order that unlocked iPhones won't easily sync with the system.

"We're waiting to see what Apple tries next," the iPhone Dev Team says. "But we think they might want to rethink their priorities. They probably won't though."

Lenovo ThinkPad X61 Laptop

Lenovo ThinkPad X61 Laptop

The Lenovo X61 laptop is the same light, sophisticated ultraportable as the earlier X60 model. Like the X60, the X61 lacks an integrated optical drive, but everything else about this business laptop is top-notch, especially the dazzling battery life.

This 3.6-pound X61 laptop, with a 2-GHz Core 2 Duo T7300 processor and 2GB of DDR2-667 SDRAM, earned a WorldBench 6 score of 75, which is fast among currently tested ultraportables. The extended-life four-cell battery lasted an amazing 6 hours and 14 minutes.

The UltraBase docking station adds four more USB ports (for a total of seven) as well as legacy parallel and serial ports. In addition, the modular optical drive has a side release, so you can swap with one hand between an optical drive, a second battery, or a second hard drive (those are optional accessories). Including the base, which is easy to snap on and off, the unit's total weight is a little over 6 pounds.

The Best Ultraportable Laptops

Lenovo Thinkpad X200 Laptop

Because it bears a lower model number, you might imagine that this a less-powerful version of the ThinkPad X300, but the X200 actually has a more recent processor. The X300 has a 13.3-inch display, however, while the X200 has a 12.1-inch screen. Ah, but what you'll see when you fire this baby up!

At just under 3 pounds with its lightest battery installed, the X200 weighs a few ounces less than the ThinkPad X61, despite offering the same 12.1-inch-wide screen and a bigger keyboard. The bright little display has an easy-to-read, 1280-by-800-pixel resolution, making it quite comfortable for work on the go. And the built-in Webcam keeps you in visual touch with your colleagues. The redesigned keyboard is as big as the ones that members of Lenovo's ThinkPad T series carry.

Equipped with the new Centrino 2 processor, Lenovo's ThinkPad X200 looks like a mild-mannered ultraportable, and yet it can leap tall workloads in a single bound. Its battery life is phenomenal, and the keyboard is huge. In short, this is a much better laptop than the ThinkPad X61, which it replaces, and a surefire winner for on-the-run execs.

No virtual bridge from Xeon to AMD, Intel says

VMware Inc. customers are getting a bit more freedom in the way they can transfer virtual machines from one Intel-based server to another, but they shouldn't hold their breath waiting for a bridge between Intel- and AMD-based systems, an Intel Corp. executive said Tuesday.

With its line of Xeon 7400 processors released this week, Intel is allowing customers using VMware's vMotion technology to move virtual machines between two servers even when they are based on different families of Intel chips.

VMotion is VMware's technology for moving running virtual machines onto a different physical server. It's used by some customers for load balancing or for building fault tolerance into applications.

Before the 7400 series, also known as Dunnington, both servers had to use the same family of Intel chips for vMotion to work, said Intel vice president Doug Fisher at the VMworld conference in Las Vegas. Now, beginning with the 7400 and in future chip families, that restriction is lifted.

VMware CEO Paul Maritz mentioned the development in his speech at the start of VMworld on Tuesday. "Now you'll be able to buy hardware essentially independent of your vMotion strategy," he said.

The compatibility goes back only to the previous processor family, the 7300 "Tigerton" series, and will extend to the next generation, known as Nehalem. "We'll always give at least three generations of compatibility," Fisher said.

Intel made a big deal about the news, but Advanced Micro Devices Inc. said its Opteron processors have had a similar capability for years. AMD doesn't change the microarchitecture of its processors as frequently as Intel, so compatibility between different Opteron lines is not an issue, said Margaret Lewis, AMD director of commercial solutions.

Customers looking to move virtual workloads between AMD- and Intel-based servers are out of luck, however, at least for the foreseeable future, according to Fisher.

"It's not going to happen," he said on the sidelines after his speech. The companies' chip architectures, while both x86, are too different and change too frequently to be made compatible. "We'd have to slow the pace of innovation to make it happen," he said.

Lewis suggested it was only Intel, not AMD, that changes its architecture frequently. "We'd need to sit down with Intel and VMware and discuss how to make it happen, and we would welcome that discussion," she said.

AMD would stand to gain the most from such compatibility, since it would give companies one less reason to buy Intel-based servers.

Dunnington is a six-core processor with a larger, 16MB Level 3 cache to boost performance. VMware Chief Technology Officer Steve Herrod said the company will keep its per-socket pricing the same for Dunnington, "so customers can get more virtual machines per processor" without paying more in licenses.

With ThinkServer, a new market for Lenovo

PC maker Lenovo says it will enter the global server market later this month, shipping systems for small and medium-size businesses.

The company's new ThinkServer computers will come in five different single- and dual-processor configurations and will be available in both tower and rack designs. The machines will be sold starting Sept. 30, according to Marc Godin, vice president and general manager of Lenovo's enterprise business unit.

Lenovo has previously sold servers in China under the SureServer brand, but now the company is breaking out of its home market for the first time, Godin said. "This is really Lenovo going after the worldwide server market," he said.

Lenovo is not bringing new technology to the table -- the ThinkServer hardware is licensed from IBM -- but the company thinks it can take advantage of its popular brand name to sell new hardware through its existing sales channels. Lenovo also makes the ThinkPad laptops and ThinkStation and ThinkCentre desktop computers.

In April, Lenovo set up a new group to sell the ThinkServer and ThinkStation workstations to corporate customers. That group, lead by Godin, now has close to 200 employees.

Although the ThinkServer line is not designed for large enterprises, Godin says it will provide products to the largest part of the server market, currently dominated by Hewlett-Packard and Dell. "It's not a complete line of products, but still, this is a very significant offering," he said.

The ThinkServers will start at $749 (U.S.) and will ship with software that allows customers to easily configure, update and monitor the performance of their computers.

The TS100 Tower and RS110 Rack servers will ship with either Intel Core 2 Duo or Xeon 3000 or 3200 processors, while the TD100 Tower, TD100x Tower or RD120 Rack servers will be available with either the Xeon 3000 or 5000 processors.

Lenovo also has six new monitors in the works.

Later this week, the company plans to introduce new ThinkVision monitors that will use 30% to 60% less energy than its pervious products. One model, the 24-in. L2440x Wide, will be Lenovo's first white LED monitor. This technology is energy-efficient and does not include the mercury found in LCD panels, Lenovo said.

DRAM production cuts fail to raise prices

Although two dynamic RAM makers cut production last week, hoping to reduce supply and spur a price recovery, the action is too little, too late, analysts said.

Tokyo-based Elpida Memory Inc. and Taiwan-based Powerchip Semiconductor Corp. both trimmed DRAM production last week as market prices plunged to new all-time lows. Although the actions slowed the pace of DRAM price declines, they didn't stop the fall.

DRAM makers have been in trouble all year because of a chip glut. They built too many new factories last year on hopes that DRAM demand would continue to rise with strong sales of new PCs and Microsoft Corp.'s Windows Vista operating system. But DRAM demand hasn't kept pace with output.

The oversupply has been a bane to suppliers, many of which are losing money on the chips they sell, but it has been a bonus for users.

DRAM is often a bottleneck for speed in computers because most vendors only add the minimum required for each system. But when DRAM prices drop, PC vendors often add a lot more DRAM. A quick look at Dell Deals, for example, shows PCs with 1GB to 3GB of mainstream DDR2 (double data rate, second generation) DRAM. For users who like to open multiple windows and use memory-intensive programs, more DRAM is better.

The production cuts by Powerchip and Elpida won't have much effect on DRAM prices because it takes months for a supply cut to take effect and because the actions represent only 2.3% of global DRAM production, according to Andrew Norwood, DRAM analyst at market research firm Gartner Inc.

Reducing DRAM production today won't affect output until November, he wrote in Gartner's "Semiconductor Monday DQ Report." "By then, the peak buying season for the holiday [PC] build will be winding down," he said.

Given current high inventory levels, the industry probably won't see any shortages for the rest of this year, he added.

Powerchip said it will reduce DRAM production by 10% to 15%, while Elpida said it will cut production by 10% at one of its main factories in Hiroshima, Japan. Elpida plans to convert some production lines to make chips used in LCD displays instead of DRAM, said Kumi Higuchi, vice president of corporate communications at the company.

The main problem for the two companies is that their rivals do not plan to follow their cuts.

Samsung Electronics Co., the world's largest maker of DRAM chips, has no plans to reduce DRAM production this year, said Eunhee Lee, a spokeswoman at the Seoul-based company. In fact, Samsung is taking advantage of the downturn to put more pressure on rivals by increasing its planned spending on new factories this year. Samsung estimates it will spend $6.32 billion on new memory-chip lines this year.

Saturday, September 20, 2008

Air Canada Clears Wi-Fi for Takeoff

Air Canada will soon be answering the prayers of its business travelers as it prepares to rollout in-flight Wi-Fi services on select U.S.-bound flights. But with the lack of an air-to-ground network on Canadian soil, passengers looking to take advantage of the new service on domestic flights will have to wait a little while longer.

Teaming up with Aircell LLC, Air Canada will rollout the "Gogo" Wi-Fi system on a handful of its Airbus A319 planes. The airline expects the initial deployment to be completed by spring 2009, primarily on west coast-bound flights to San Francisco and Los Angeles. The Internet access will allow passengers to surf the Web, check e-mail, use instant messaging applications, send SMS messages and access their corporate VPN.

"Customers who have identified the need for in-flight Internet connectivity are very much skewed to the business travelers," Charles McKee, vice-president of marketing at Air Canada, said. "The full suite of functionality that Gogo can provide aligns perfectly with what our customers want." Earlier this year, Aircell rolled out its U.S. network, comprised of 92 cell towers across the continental 48 states.

The company teamed with American Airlines to launch the service on 15 planes and is now in the process of launching the service on two other airlines. Joe Herzog, vice-president of airline solutions at Aircell, said the network took a total of six months to construct and anticipated a Canadian network could be completed even faster.

But the problem facing currently facing Aircell -- and the issue that is limiting Air Canada's initial rollout to U.S.-bound flights only -- comes in the form of a regulatory roadblock. Industry Canada has yet to assign air-to-ground spectrum to a licensee in Canada, meaning Aircell will have to hold off on putting up cell towers on Canadian soil.

"We're working with the regulatory officials in Canada right now to basically take the steps necessary so that we can have someone -- a partner perhaps -- in Canada that will obtain the necessary licensings," he said. "One of the key attributes in Canada is that there is air-to-ground spectrum already set aside specifically for this type of application. There was a lot of foresight from Industry Canada to set aside this spectrum and it makes it much more practical for us."

And with the rising fuel prices putting a cramp on the airline industry, potential users might have questions about how much Air Canada is hoping to charge for this service. According to McKee, the first phase of pricing has been set at C$12.95 (US$12.14) per flight for trips lasting longer than three hours. Gartner Inc. analyst Ken Dulaney was impressed with Air Canada's initial price point, but wondered how well the network performance would hold up under heavy use.

"The question becomes how much bandwidth will they have on these planes," he said. "If too many use it, you'll get what you have on ViaRail trips from Montreal and Ottawa -- something that is unusable."

But Herzog said that connection quality won't be an issue for passengers and compared in-flight Wi-Fi speeds to mobile broadband access on the ground. He added that the system connects each plane's Wi-Fi hot spot to the ground over a 3 MHz signal.

"Passengers have been telling us that what they're experiencing is better than what they have at home, in the office or at a coffee shop," he said.

As for the security concerns that might come with accessing potentially mission-critical data over an in-flight Wi-Fi system, Herzog said that Gogo supports most corporate VPNs and will allow passengers to use the service in full compliance with any business security requirements they might have.

IDC Canada security analyst David Senf agreed, saying the network won't be any more or less secure than a public Wi-Fi hotspot at a local coffee shop. "When sending or receiving personal or corporate sensitive data, remember the basics and use encryption," he said. "Assume that if you are not encrypting your wireless traffic that it can be read."

Senf advised that HTTPS communications is used when checking Web-based e-mail accounts such as Gmail, and that a VPN is used whenever communicating with a corporate system.

Next: Virtualized IPhones

VMware Inc.'s vClient initiative may be compelling but one industry analyst wonders how many users will require their desktop environment on portable devices.

The vClient initiative, announced this week at the 10th annual VMWorld conference, is designed to give users one view of all their data and applications on different devices, and is endorsed by major hardware vendors like Fujitsu-Siemens, HP and NEC.

Though CEO Paul Maritz did not elaborate on the implementation for smart phones and handheld devices, he did say the firm plans to include vClient versions for mobile hardware in the future.

vClient includes VMware View, designed to make user profiles and applications available on different devices, including Windows and Macintosh.

Dump the Desktop?

"People who have BlackBerrys, they have desktops, there's clearly a group of people who will pay a significant amount of money for that," said David Floyer, co-founder of the Wikibon project, a Mountain View, Calif.-based firm that publishes research online. "But I'm not sure of the fundamental value proposition."

Using the iPhone as an example, Floyer said some users may dispense with the desktop and use portable devices as their primary client.

"It's a very powerful operating system, a very powerful device," Floyer said of the iPhone. "Maybe it's just simpler that that becomes the PC of the future, that you obviate the need for so many devices. You pick one that's the best fit for your lifestyle and you'll make do with what it can do and if necessary you'll pick another one.

Along with vClient, VMware also announced Virtual Datacenter Operating System (VDC-OS), which includes services for infrastructure, cloud computing and storage.

One product under the VDC-OS umbrella is the Fault Tolerenace service, designed to move applications over to different hardware in the event of failure, with no down time.

"If a machine goes down we let another physical resource in the resource pool pick it up," said Stephen Herrod, VMware's chief technology officer. "The idea is you run a virtual machine, you have a shadow copy kept on another site kept in perfect synchronization. You can't have a fault tolerance that 'kind of works.'"

Floyer said managing storage is a major issue today in managing virtual environments.

"If you do not manage things properly, you can actually make things and your storage far worse, because instead of having ten real machines, you have 50 virtual machines running on the same infrastructure and you are not careful you have five times the storage," Floyer said. "So you have to manage the storage carefully, you have to manage the backup environment."

Windows-on-Mac Option

As part of its desktop virtualization portfolio, VMware announced version 2.0 of Fusion, which lets users run Windows applications on their Macintoshes without having to buy the Mac versions of Office software.

"A lot of businesses have a site licence for office for windows and don't want to purchase licenses of office for Mac," said Pat Lee, VMware's group manager for consumer products.

Lee added Fusion 2.0 would appeal to business users running computer-aided design (CAD) software and those that employ Mac users working on their own Apple hardware.

VMware officials said about 14,000 users attended the conference, which included an exhibition of partners and education sessions.

One Canadian user who presented was Kris Jmaeff, senior server analyst and information systems security specialist with the Interior Health Authority.

Based in Kelowna, B.C., IHA operates 28 acute care facilities and a total of 183 health facilities. More than three years ago, the organization decided to use VMware Infrastructure to consolidate servers when it was formed after an amalgamation of several regional health organizations.

In 2006, the organization had a total of 66 virtual and physical servers, and now it has 250 virtual servers, Jmaeff said. When they rolled out VMware in 2006, the organization found it had 40 percent more capacity due to server virtualization.

Now, more than 50 percent of servers in their data center are virtual, he said.

Virtualization Evolves

Virtualization has come a long way since IBM introduced CP 67 in 1967, Floyer noted.

"I grew up with IBM's original virtual machine, which was CP 67," he said. "I always had a great love for that. You could virtualize your devices, your machines and disks -- everything."

But he noted there were drawbacks.

"The first versions of this had huge overhead," he said. "You lost so much at the processor. The combination of what Intel has done to speed things up plus the work that VMware did to make the overhead reasonable and just recognizing that it's more than just providing a hypervisor."

World of Warcraft Update Due in November

Blizzard Entertainment announced last week that World of Warcraft: Wrath of the Lich King will arrive November 13.

The expansion is the second for WoW, which to date has amassed 11 million subscribers. The expansion arrives in all other regions (save China) by November 18.

"We're looking forward to launching Wrath of the Lich King and finally giving World of Warcraft players a chance to take on Arthas and his minions," said Mike Morhaime, CEO and cofounder of Blizzard Entertainment in a statement. "Until then, we'll continue to refine and playtest the expansion content to make sure it provides a highly polished and entertaining experience."

GameDaily reports that the expansion will come in two editions.

A standard edition will include the game, and a Collector's Edition will include a 208-page art book; an exclusive in-game baby frost wyrm pet; a behind-the-scenes DVD; the official soundtrack; a mouse pad featuring a map of the continent of Northrend; and two WoW Trading Card Game March of the Legion starter decks. *deep breath*

There's also two exclusive trading cards that will be made available only in the Collector's Edition.

Biggest Malware Lure? Brad Pitt

Movie star Brad Pitt has shoved Paris Hilton off the top of a list neither will have coveted being on. A fan entering Pitt's name in a search engine now has a startling one in five chance of finding a malware-hosting site instead, says McAfee.

Pitt is top of the fake website malware league, just ahead of a collection of pop and film stars that reads (in descending order) Beyonce, Justin Timberlake, Heidi Montag, Mariah Carey, Jessica Alba, Lindsay Lohan, Cameron Diaz, George Clooney, and Angelina Jolie.

Hilton no longer even makes the fake web top ten, but can perhaps take some solace from her continued popularity with spammers.

If you're never heard of some of these people then it's a fair bet that you are not the intended target of a technique that has been for some years one of the commonest ways to infect a PC. But still it persists, driven by an apparently insatiable appetite among some Internet users for computer screensavers, wallpaper, ring tones and star pictures, at whatever risk to themselves.

"Cybercriminals employ numerous methods, yet one of the simplest but most effective way is to trick consumers into infecting themselves by capitalizing on Americans' interest in celebrity gossip," commented McAfee's Jeff Green. "Tapping into current events, pop culture or commonly browsed sites is an easy way to achieve this."

Reading the latest statistics, it's hard to avoid the conclusion that malware writers think that the celebrity-obsessed are as recklessly naive as they are star-struck. Most malware-infection techniques have shown some evolution over the last two years, but the fake website ploy just goes on and on.

In fact, a deeper problem is the way users interact with search engines, as was pointed out by McAfee itself only a year ago. McAfee's motives for publicizing the issue aren't entirely neutral - at least one search engine, Yahoo, recently took up using McAfee's SiteAdvisor tool to filter the websites it returns in search boxes.

And for those users who only visit legitimate websites they know about, there is also bad news. The biggest hack trend of the last year has been compromising perfectly legitimate websites to serve malware - witness this week's large attack on the website of BusinessWeek magazine. For Internet users there is no easy escape, only the awareness of the growing number of pitfalls.

Putting WiMax to the Test

While Sprint officially launches commercial WiMAX services for the first time in Baltimore this month, one college campus 30 miles to the south will be building its own mobile WiMAX network that will be used to test next-generation applications for mobile broadband services.

The James Clark School of Engineering at the University of Maryland is deploying WiMAX nodes, routers, base stations and other equipment on its campus to create a large testing ground for next-generation mobile broadband capabilities. The lab, which is being built in collaboration with the industry group the WiMAX Forum, will give students the opportunity to test applications on a mobile broadband service that is not expected to be available in most of the United States until 2009. As one of only two WiMAX Forum labs in the world -- the other is in Taiwan -- expectations are high that it will spark a wave of innovation that will showcase WiMAX's strength as a mobile data standard.

Dr. Ashok Agrawala, a University of Maryland computer science professor who is directing the lab, says that most of the equipment is being provided by the Laboratory for Telecommunications Sciences, a federal research lab located on the campus. Much of the gear being deployed at the lab comes from Motorola, he says, including WiMAX base stations and antennae. Additionally, Agrawala expects device vendors to donate some WiMAX-enabled cell phones, PDAs and laptops to the lab, and that eventually the lab's network will support "at least 30 to 50 different devices" during experiments.

Agrawala says that once the lab is operational later this year, computer science students will start working on applications that will give everyone on campus instant access to crucial information such as class schedules, campus maps and schedules of events on campus. And that's not all: other applications in the works include real-time updates on the campus bus system, as well as updates on the nearby Washington, D.C., Metro system; dining hall menus; and even a public safety application that will send emergency signals directly to police once activated.

"With the public safety application, all you'll have to do is touch one button that will open up a window on the police dispatch," Agrawala says. "It will then open an audio and video screen so police can record the incident as it's happening."

WiMAX's potential to deliver high-speed public safety applications aren't limited to delivering messages in emergency situations. Another application that is being considered, Agrawala says, is a map application where students with disabilities can find all handicap-accessible entrances to buildings and where they can chart a course across campus that has the fewest slopes or the least amount of traffic.

Christian Almazan, a Ph.D student at the University of Maryland, says deploying WiMAX on campus will make it vastly easier to connect students to vital campus information quickly and reliably. And because WiMAX hotspots can cover miles of territory, WiMAX devices won't have the same problems as those that have to constantly hand off between hotspots to get coverage, he says.

"With WiMAX, it will be easier because you'll only need to have one device for accessing everything on campus," Almazan says. "We'll have three nodes deployed across the campus, which should cover the majority of the area. And if the signal doesn't go inside some areas, we can take advantage of the Wi-Fi capabilities we already have set up throughout campus."

The new applications will be running on a campus-based mobile platform called MyeVyu (pronounced "my view") that debuted earlier this year and specializes in supporting location-based mobile software applications. Agrawala eventually expects that this platform will be integrated into all campus laptops and devices, and that WiMAX will help the platform reach its potential to instantaneously deliver information to students and faculty.

"Our major attraction to WiMAX is its stability in terms of broadband capability," he says. "Our basic plan is to cover the campus first, and because WiMAX has such a longer reach than Wi-Fi, it's possible that the signal will be audible in the downtown areas near the campus. There's even a possibility that certain federal agencies might connect to us as well on a point-by-point basis."

Almazan says he is excited that he and fellow students will be working as pioneers in the WiMAX frontier, and he is enthused by WiMAX's potential to close the "digital divide" between urban and rural areas in the United States.

"The best part of this project is simply playing with a brand-new wireless technology that will potentially penetrate the entire United States," he says. "It will enable rural communities to have Web access with tremendous ease."

The Best Ultraportable Laptops

Lenovo Thinkpad X200 Laptop

Because it bears a lower model number, you might imagine that this a less-powerful version of the ThinkPad X300, but the X200 actually has a more recent processor. The X300 has a 13.3-inch display, however, while the X200 has a 12.1-inch screen. Ah, but what you'll see when you fire this baby up!

At just under 3 pounds with its lightest battery installed, the X200 weighs a few ounces less than the ThinkPad X61, despite offering the same 12.1-inch-wide screen and a bigger keyboard. The bright little display has an easy-to-read, 1280-by-800-pixel resolution, making it quite comfortable for work on the go. And the built-in Webcam keeps you in visual touch with your colleagues. The redesigned keyboard is as big as the ones that members of Lenovo's ThinkPad T series carry.

Equipped with the new Centrino 2 processor, Lenovo's ThinkPad X200 looks like a mild-mannered ultraportable, and yet it can leap tall workloads in a single bound. Its battery life is phenomenal, and the keyboard is huge. In short, this is a much better laptop than the ThinkPad X61, which it replaces, and a surefire winner for on-the-run execs.

Check Latest Prices

Tuesday, September 16, 2008

IDC: Sluggish economy won't slow hot laptop sales

Forget the sluggish economy. Worldwide demand for laptops is driving the PC market into an area of solid growth for the next several years, according to a study just released by IDC.

The Framingham, Mass.-based market research firm predicted that global PC shipments will grow by 15.7% this year, hitting 311 million units. The IDC report issued today also projects that worldwide PC sales growth will remain in double digits through 2011. That growth might slip to around 9% in 2012, when analysts expect annual shipments to surpass 482 million.

What's boosting the outlook, according to IDC, is the increasingly strong demand for portable computers.

"We continue to see a rapid transition to portable PCs around the world, even as economic pressures rise," said Loren Loverde, director of IDC's Worldwide Quarterly PC Tracker, in a statement. "The trend reflects the increasing importance of computing, not just in the home or office, but as an integrated part of our lives. Falling prices, more design choice and competition for PC makers to capture this market continue to drive a rapid transition."

IDC noted that desktops and x86 servers rang in about 37 million shipments in the U.S. alone during 2007. That number is expected to drop to 35.5 million this year, while shipments of portable are projected to grow from 30 million last year to 35.3 million in 2008.

Worldwide, IDC counted 161.1 million shipments of desktops and x86 servers in 2007. The research firm estimated that worldwide shipments will increase to 163.2 million this year. Meanwhile, IDC projects a huge worldwide leap in laptop shipments, from 108 million last year to 148.2 million in 2008.

"There's a lot of demand for laptops right now because there's the ability to do so much more with them at a much lower price," said Dan Olds, an analyst at Gabriel Consulting Group Inc. "It used to be that a decent notebook was twice the price of a desktop, but couldn't do nearly as much, like games, video and multi-tasking. Battery life was short, too, limiting the places you could use them. Now, you can go almost anywhere in a city, bring your laptop along, and be able to surf the Web, do your banking, check your e-mail, IM with your pals and download music."

This latest report comes in sharp contrast to one that IDC released in April, when it found that PC shipments in the U.S. had taken a sharp hit in the first quarter of 2008 because of a sluggish economy. At the time, one analyst predicted that buyers would put off buying new PCs for up to a year.

"The first half of '08 is definitely looking sluggish," IDC analyst Doug Bell told Computerworld. "At first glance, I'd say we'll be bringing our forecast down. I think companies and individuals will be putting off spending for six months to a year. There are a handful of drivers, but it will take more time to make a purchase."

Bell also said he thought that a lot of desktop and laptop purchases would be pushed off until 2009. He noted that the U.S. economy hadn't yet affected worldwide PC sales, but it might further into 2008.

Western Digital offers 500GB laptop drive

Western Digital Corp. today announced that it is shipping its Scorpion Blue 500GB 2.5-in. hard disk drive. It costs $219.99.

The new Scorpion Blue 500GB drive fits in standard laptop drive bays. The drive crams 250GB onto each of two platters into a Serial Advanced Technology Attachment (SATA) hard-drive mechanism suitable for installation in laptop computers. The two platters reside in a 9.5mm hard disk drive mechanism -- the standard height for a laptop hard drive.

Three hundred gigabytes remains the largest hard drive that can be ordered from Apple Inc. for a Mac laptop; that's an option on the 17-in. MacBook Pro. MacBooks and MacBook Pros both take commodity hard-drive components, and user interested in upgrading their systems could add this 500GB drive themselves (or pay a technician to do it).

The drive operates at 5400rpm and features Western Digital's "WhisperDrive" technology, which the manufacturer claims allows it to operate more quietly. "ShockGuard" firmware and hardware protect the drive if it's dropped or bumped, while "IntelliSeek" calculates optimum seek speeds to lower power consumption.

8 Laptop Bags That Zip Through Airport Security

While no one questions the need to properly scan laptops when going through airport security, the requirement to remove them from their protective cases is a different story. "Naked" notebooks can easily get dropped, damaged, forgotten and even stolen outright. One study done for Dell estimated that about 12,000 laptops are lost in U.S. airports every week -- a claim that has been challenged by the Transportation Security Administration (TSA) . Whatever the numbers are, you don't want your machine, with all its precious data, to become a statistic.

Happily, the TSA has recognized these issues, and began working with case manufacturers in March on a standard for checkpoint-friendly laptop bags that can pass through the security scanners without your having to remove your notebook.

Several cases meeting the spec have already hit the market, and many more are due soon. They have been allowed at checkpoints since late August.

So what makes a checkpoint-friendly laptop bag? The TSA has five official criteria :

A designated laptop-only section.

A laptop-only section that completely unfolds to lay flat on the X-ray conveyor belt.

No metal snaps, zippers or buckles inside, underneath or on top of the laptop-only section.

No pockets on the inside or outside of the laptop-only section.

Nothing packed in the laptop-only section other than the computer itself.

To meet these requirements, case makers have come up with three basic bag designs: zippered clamshells that open flat with your laptop on one side and everything else on the other; double- or triple-compartment bags that unfold and lie flat like a garment bag, again with the laptop on one side; and simple notebook sleeves that either fit into a larger bag (in which case you'll need to take the sleeve out for scanning) or are carried alone. Many existing sleeves meet these criteria, as long as they don't have pockets or metal parts on the sides.

Here are eight of the latest full-featured TSA-approved cases with pockets and compartments that hold everything from your power adapter and accessories to a change of clothes. They'll help speed up the line and look good doing it.

Aerovation Checkpoint Friendly Laptop Bag

The Aerovation ($129.95) was the first checkpoint-friendly bag on the market, available back in June. It is a clean-lined double-compartment bag made of rugged 1680D nylon fabric and a sateen liner, with 4mm of EVA foam padding in between. The accessory compartment is, according to the manufacturer, "designed to give the traveler access to files, pens, cell phone and media. There's also enough room for a change of underwear and toiletries." This no-nonsense bag measures 15 by 12 by 4 inches, has both inside and outside pockets, and holds laptops with displays up to 15.4 inches. (There is also a version for laptops up to 17 inches.)

Aerovation also offers a Checkpoint Friendly Laptop Sleeve for $24.95, which, according to the manufacturer's site, "is made of the same material as a diver's wet suit." So if you accidentally drop your laptop out the plane over the Atlantic, it should be OK.

HP Pavilion dv7t Laptop

HP Pavilion dv7t Laptop

HP's powerhouse laptop sails through performance tests and whips the current competition. If speed is what matters to you, the Pavilion dv7t has it in spades. Beyond the 17-inch screen and under the cool "liquid metal" exterior lies Intel's new Centrino 2 processor. The result: high-octane performance in an extremely shiny package. The dv7t, with its 2.53-GHz Core 2 Duo T9400 processor and 3GB of RAM, turned in a blazing score of 98 in our WorldBench 6 tests. Interestingly, MicroExpress's identically stacked all-purpose machine, the JFL9226, earned a mark of 103. The dv7t is a handsome, fast unit. For our review it was nicely configured with a 400GB hard drive, a Blu-ray drive, and Windows Vista Home Premium. And if you're looking to replace a desktop, it's a better candidate than most other big notebooks because of its proprietary left-side connection for HP's xb3000 expansion base. Though the base is an expensive add-on, it incorporates a screen stand, a third hard-drive bay, far better speakers, and a wireless keyboard and mouse for a complete desktop experience.

EU Calls for Help to Protect IT Infrastructure

The European Commission's justice and security department is seeking outside help to improve Internet and telecoms security in the European Union.

It has announced two calls for tender for protecting critical infrastructures in the IT sector -- one worth €500,000 over a nine-month period, the other worth €400,000 over a 12-month period. The deadline for submissions in both tenders is Oct. 6.

The two contracts will complement the work carried out by ENISA (European Network and Information Security Agency), the Commission said. ENISA was set up by the Commission to spearhead efforts to improve network security in the E.U.

"These two open calls for tenders form part of the ongoing E.U. programme on 'Prevention, Preparedness and Consequence Management of Terrorism and other Security Related Risks' for the period 2007-2013," the Commission said.

The main objective of the first contract is to help define criteria for identifying European critical IT and telecommunications infrastructure.

The second contract is to identify how emergency preparedness in the field of fixed and mobile telecommunications as well as the Internet could be enhanced across the European Union.

"Achieving this objective is a key element in improving the overall robustness and resilience of European electronic communication networks," the Commission said.

Mozilla reacts to rivals with plans to beef up Firefox 3.1

Mozilla Corp. will try to squeeze more into Firefox 3.1, in part as a reaction to rival browsers from Microsoft and Google, the company's chief engineer said today.

"Looking at where we are and the competitive browser landscape, we felt we would be doing a better job if we had another four to five weeks," said Mike Shaver, Mozilla's interim vice president of engineering.

Shaver wasn't sure what impact, if any, the additional work would have on Firefox 3.1's final release date, which Mozilla had targeted as late 2008 or early 2009. "It's too early to know what affect it will have," he said. "But that [late 2008/early 2009 time frame] is still what we're looking at."

In a lengthy post to the Mozilla.dev.planning message forum last week, Shaver spelled out what Mozilla hopes to do. There, he listed several features that would benefit from "one more 'feature cycle' " of development, including TraceMonkey, the browser's revamped JavaScript engine, and a privacy mode that was only recently slated for Firefox 3.1.

In an interview today, Shaver said the move was in part due to faster-than-expected progress on some features, such as extending TraceMonkey's capabilities into other areas of the Firefox code. "We saw we could apply those [TraceMonkey] techniques to performance in other areas, like [Document Object Model]. We think if we could bang on this a little longer, we would get more out of this," he said.

The desire to push TraceMonkey development wasn't a reaction to Chrome, the beta browser Google Inc. released two weeks ago. "That's not a reactive thing, it's just the next logical step," Shaver said, noting that Mozilla started work on TraceMonkey more than two months before Google announced Chrome.

But Shaver acknowledged that some of the extra work Mozilla would like to put into Firefox 3.1 is being prompted by competitive pressure. "We're not blind to the competitive landscape," he said. "We're watching other browsers as much as they're watching us."

He cited Mozilla's plans for a Firefox privacy mode as an example. Both Microsoft Corp.'s Internet Explorer 8, currently in beta, and Google's Chrome have tools that limit or eliminate what those browsers record during their travels.

"There's a difference between when just one browser has a feature and when it's in several," said Shaver. "There are user expectations."

Among the features of a Firefox privacy mode that Shaver would like to squeeze into 3.1 is one that would let users wipe surfing traces retroactively. "It would be nice if you could pretend these last two hours didn't happen," he said.

Other changes that may land in Firefox 3.1 between its first and second betas, said Shaver, include improvements to the location bar -- which Mozilla dubs the "Awesome Bar" -- and detachable tabs, a feature Chrome also sports that lets users drag tabs from a browser to the desktop to open a new window.

"In some ways, we get a free move" with the opportunity to look at rivals like IE8 and Chrome, study how they implement a feature and watch the reactions from users, said Shaver.

Currently in Alpha 2, Firefox 3.1 is scheduled to go "code freeze" at the end of this month, with a tentative ship in four weeks or so, said Shaver. "We're in good shape for mid-October to the third week," he said today.

Firefox 3.1 can be downloaded in its present form from Mozilla's site in versions for Windows, Mac OS X and Linux.

Study: PVC and Toxic Flame Retardants Still Lurk in New PCs

PC manufacturers have still not figured out how to make a computer without PVC (polyvinyl chloride) insulation and toxic brominated flame retardants (BFRs), although some consumer electronics manufacturers are now able to produce smaller gadgets without those chemicals, Greenpeace reports in a new study.

Nokia has returned to the top of Greenpeace's ranking of consumer electronics manufacturers after a year away from the number one spot -- although not for any changes to its products. Instead, it scored an extra point for improving its systems for taking back unwanted electronics in India.

However, some of Nokia's products were praised for their energy efficiency, a new criterion Greenpeace added in the ninth edition of its Guide to Greener Electronics, released Tuesday.

Other companies singled out by the campaign group for excellence in energy efficiency were Apple, Sony Ericsson and Samsung.

Greenpeace monitors the materials used in electronics because of the health hazards they can pose on disposal. Some chemicals can pollute groundwater when they leach out of waste electronics dumped in landfill, while other chemicals are released into the atmosphere when waste is incinerated or broken up for recycling.

In this edition of its report, Greenpeace is most concerned about continued use of toxic flame retardants and PVC insulation: It noted that so far, no company has released a computer completely free of these materials, although some manufacturers are reducing the quantities used in their products.

Fujitsu-Siemens Computers jumped to number three in Greenpeace's rankings, up from 15th place, after it promised to eliminate PVC and BFRs from all its products by late 2010. Many other companies have set no such timetable.

The campaign group also praised Apple for saying its new iPod line will contain no PVC, BFRs or mercury, and that it will eliminate these materials from all of its products by the end of the year.

However, Greenpeace remained unhappy with other aspects of Apple's product design, including the way that the sealed casing makes battery replacement so expensive that customers are more likely to buy a new model than replace a worn-out battery.

Despite the clean white appearance of Nintendo's game console, the Wii, the company is still the black sheep in the Greenpeace rankings. On a scale from "Bad" to "Good", Greenpeace rated the company bad on most criteria, but only partially bad on its management of chemicals, its plans to phase out substances other than PVC and BFRs, its commitment to reducing greenhouse gas emissions and its disclosure of its own carbon footprint.

Friday, September 12, 2008

Dell intros virtualization hardware, storage, services

Dell announced Wednesday a broad set of services and hardware designed to optimize both storage and server virtualization.

New AMD-based blade servers and an iSCSI storage-area network address a performance problem that occurs in highly virtualized environments, namely that loading too many virtual servers onto a single piece of hardware puts stress on memory and network bandwidth, slowing everything down.

"It's like putting too much weight on the back of a pickup truck," says analyst Charles King of Pund-IT.

Dell's PowerEdge M905 blade server offers four sockets, compared with just one or two in previous generations, King says. (Compare blade server products.) Dell says the M905 can support 66 virtual machines. According to King, performance on a typical server can slow down even if it holds just a dozen virtual machines.

Increased memory capacity is a key factor, King says. Standard one- or two-way servers top out at 16 or 32GB of memory, while Dell's new box goes up to 128GB, he says.

Dell also released a new two-socket blade called the PowerEdge M805, but said it holds more DIMM (dual in-line memory module) slots than previous two-socket machines. Later this month, Dell will update its Intel-based PowerEdge R900 rack-mounted system with six-core processors and embedded hypervisors.

Increased bandwidth and performance is also coming with new 10GB Ethernet and 8GB Fibre Channel switches, Dell says.

On the storage front, Dell announced a new EqualLogic iSCSI SAN array that doubles density and triples capacity, going up to 576 terabytes with a single management interface. The new EqualLogic PS5500E can be used to consolidate "common tiered business data and applications such as file services ... databases and virtual server environments," Dell says. (Compare storage products.)

The array also enhances data protection for virtual storage with a feature that integrates EqualLogic snapshots with VMware's hypervisor, providing faster online backups and restorations of virtual machines and file systems. This feature will be available this month as a free download to customers who have support contracts.

Dell's goal is to integrate storage and server virtualization, storage marketing director Praveen Asthana said in a conference call with reporters. The PS5500E starts at $78,000 (U.S.).

"It's not enough to offer storage; you need to integrate as much as possible," he says.

Dell's blitz of new products comes a few days in advance of VMworld, an annual virtualization industry event hosted by VMware.

More pieces of the announcement include:

  • Pricing for the PowerEdge M805 and M905 starts at $1,699 and $4,999, respectively.

  • Integration with Microsoft virtualization technology, making Windows Server 2008 and Hyper-V available as a factory-installed option on PowerEdge servers. Microsoft's System Center Virtual Machine Manager is also available for PowerEdge servers.

  • Integration of EqualLogic storage with Citrix XenServer, making it easier for IT managers to create snapshots, clones and single client images, the company said.

  • Infrastructure consulting services for Hyper-V deployments, involving assessment, design and implementation of the Microsoft hypervisor.

  • Site Recovery Manager for VMware environments, involving consulting services to prepare a disaster recovery plan and help customers configure VMware's Site Recovery Manager software, which automates disaster recovery.

  • Life-cycle management for VMware, a service involving design and implementation planning, proof-of-concept and configuration of VMware's life-cycle manager.

Laptop cellular data card from AT&T, Sierra includes microSD slot

AT&T Inc. and Sierra Wireless Inc. today announced a new laptop cellular data card called the AT&T USBConnect Mercury. It is the smallest of the cellular data cards that AT&T offers for its 3G network.

The Mercury will be free for customers who purchase a two-year cellular data plan worth at least $60 a month. AT&T offers several data plans, and for $60 a month, a customer can receive as much as 5GB of data use in the U.S.

One new feature of the Mercury, which looks like a USB flash drive, is an integrated microSD slot to give users portable storage. It was designed and manufactured by Sierra Wireless. Mercury's predecessor was the High Speed Packet Access-capable USBConnect 881, an AT&T spokesman said today.

AT&T USBConnect Mercury card
The AT&T USBConnect Mercury card, which looks like a USB flash drive, is offered with two cellular data plans. (Photo courtesy of AT&T)
The Mercury, which operates under HSPA, can be used with AT&T's North American or global data plans. The North American plan provides 100MB of monthly use in Canada and Mexico, plus 5GB in the U.S. for $109.99 a month. Meanwhile, AT&T's global plans start at $139.99 a month for 100MB of usage in 67 countries, plus 5GB in the U.S. Or, customers can receive 200MB of monthly usage in the same 67 countries for $229.99 a month.

That cost is more than what AT&T now offered Apple Inc. iPhone users in an international data roaming plan unveiled last week. One of the new iPhone plans costs $119.99 a month for 100MB of data use, while the other costs $199.99 a month for 200MB. Both plans apply to 67 countries.


Gobi wireless chip set to ship in Panasonic Toughbooks

Qualcomm Inc. and Panasonic Inc. today announced that two Toughbook laptops will ship in October with Gobi, a chip set allowing laptops to function in multiple wireless modes.

Panasonic will be the fifth laptop maker to adopt the Gobi technology. Others that have said they will incorporate the chip set are Acer Inc., Dell Inc., Hewlett-Packard Co. and Lenovo Inc., Qualcomm officials said.

The Gobi chip set and Panasonic software will allow for connections to 3G cellular networks globally, helping mobile workers and IT shops by making it possible to reach more networks than a single cellular data card or USB modem can, Qualcomm officials said.

"For IT managers, it's easier to manage a fleet of laptops, since you can [use one chip set] and manage that connection totally by software," said Mike Concannon, senior vice president of product management for Qualcomm CDMA products. "Previously, if you wanted to provision a laptop, you had to physically swap out cards. Gobi doesn't lock in customers with a long-term proposition with one carrier."

He said laptop makers like using the Gobi chip set because they don't have to support multiple cards for a single network in multiple locations.

For an international traveler, the Gobi chip set means a Verizon CDMA wireless user in the U.S. could fly to London and switch to the HSPA network with the carrier Vodafone, Concannon said. In all, Gobi supports EV-DO/EV-DO Rev. A networks in 850 MHz and 1900 MHz, HSDPA/HSUPA in 850 MHz, 1900 MHz and 2100 MHz, GSM/GPRS/EDGE in 850 MHz, 900 MHz, 1800 MHz and 1900 MHz, and stand-alone GPS.

Panasonic will support Gobi in its Toughbook 19 and Toughbook 30 laptops in October, and all of its Toughbook products in the first quarter of 2009, officials said. No pricing was announced, but Concannon said the price of the Gobi chip set has dropped by half to about $50, although that price may be reflected differently by suppliers.

Gartner Inc. analysts originally opposed embedded radios such as Gobi, but have endorsed their usage partly because of the increasing flexibility of carriers that are willing to adopt short-term contracts. Also, the embedded technology is now stable enough to be used for three years in a laptop, Gartner said in a recent report.

Microsoft-Novell partnership yields virtualization bundle

Microsoft Corp. and Novell Inc. yesterday released a virtualization bundle that represents the pair's first fully supported joint product since their historic interoperability partnership was forged in 2006.

The two have configured and optimized Novell's SUSE Linux Enterprise Server to run as a guest operating system on Windows Server 2008 Hyper-V. The product is the first to include technology developed by both vendors at the Microsoft and Novell Interoperability Lab they opened just over a year ago in Cambridge, Mass.

Dell Inc. has said it will offer a blade server running the Linux-Windows virtualization software, and is one of a number of channel partners stepping up to offer support. The others are systems integrators Computer Integrated Services Company of New York, Continental Resources, Insight, Total Tec Systems and China-based 21Vianet.

Microsoft and Novell opened their Windows-Linux interoperability lab with an initial focus on three projects: virtualization, management and identity federation. The lab was one part of their 2006 partnership agreement.

Experts say user interest in integration of virtualization wares is growing, but actual use is far from a tidal wave.

"I think it is still too soon in terms of this [interoperability work] getting out to customers," said Jay Lyman, an analyst at the 451 Group. He doesn't doubt that Microsoft and Novell are responding to user needs, because he sees that most users have mixed environments. The vendors, he said, are ahead of the curve, however.

On some level, the vendors agree.

At a virtualization launch event on Monday, Bob Muglia, senior vice president of Microsoft's server and tools business, said, "It is still early days. Only about 12% of servers are virtualized." He also said that Microsoft foresees a future world where virtualization is the norm. "It will be used across all the servers and desktops in a business," he said.

Lyman would like to see a few more case studies. "We would be interested to hear a bit more about the demand and how it is transferring to the mainstream market," he said. "We continue to ask who these customers are and what is driving their demand."

Microsoft last month said "customer demand" was driving it to spend as much as another $100 million to purchase certificates it will distribute to users, who can cash them in for support on their Novell SUSE Linux Enterprise Servers. The partners involved in supporting the pair's new virtualization bundle will help distribute those certificates.

The investment, which will come on Nov. 1, is on top of the $240 million Microsoft agreed in 2006 to spend on certificates as part of a five-year business and technology deal with Novell that also included intellectual property rights protection.

The two vendors claim the $100 million investment is needed to meet customer demand to integrate Linux and Windows. Novell has invoiced $156 million of Microsoft's original $240 million certificate purchase, leaving 35% of the funds still unused.

The original $240 million deal, which raised the ire of the open-source community, covered the distribution of 70,000 certificates for SUSE Linux Enterprise Server maintenance and support.