P.O. Box 85518 Lincoln, NE 68501-5518 CHANGE SERVICE REQUESTED October 8, 2010 Volume 32 Number 21 www.processor.com Products, News & Information Data Centers Can Trust. Since 1979 In This Issue... COVER FOCUS Help Your work allows for a variety of applications for Preparing For & Recovering display and management. As a new feature, From Data Center Disasters Cyber Switching’s ePower PDUs act as an endpoint for EnergyWise domains. “When Is your enterprise prepared for disaster? Will you the feature is enabled on ePower,” Verges be able to successfully recover data and systems? Data Center says, “the PDU itself appears as a unique We talked with industry insiders and offer their tips endpoint entity in the domain, with each and advice to make sure you’re ready. outlet being enumerated as its own entity. Disaster Recovery Planning........................................8 Now, corporate energy policy can be imple- Test Your Disaster Recovery Plan..............................10 mented using the power of the Cisco net- Tips For A Successful Recovery................................12 Go Green work and the power management function- IT’s People Problem..................................................14 ality of Cyber Switching’s ePower PDU.” ePower PDUs also incorporate features that Improving Network facilitate future growth. For example, ePower & Systems PDUs have two USB ports that let data center Management Reduce Power Consumption managers connect a myriad of peripherals, including temperature/humidity probes, Web A well-built network With Cyber Switching’s cams, and UPSes. “The flexibility with USB starts with a solid under- allows ePower to be a platform that standing of what hardware and applications ePower PDUs can grow with your needs, even years you have and how they’re being used. We after the initial deployment,” Verges offer information designed to help you says. In all, ePower PDUs can simulta- improve your enterprise network, storage, by Kris Glaser Brambila neously support up to 127 peripherals. applications, and more. See page 22. • • • Go Green DATA CENTERS are seeking ways to PHYSICAL reduce overall energy consumption According to Verges, there are INFRASTRUCTURE so they can lower costs and be more three challenges that impede a com- ■There are many effective methods totrim down green. Enterprises often start simple pany’s ability to overcome their envi- energy consumption, and it begins with managing by turning off lights when they’re ronmental objectives. These include power distribution. Cyber Switching can help with its not needed or adjusting their ther- identifying the areas that need ePower PDU........................................................page 1 mostats. But there are more effective improvement, setting realistic goals methods to trim energy consump- and creating policies, and successful- ■AFCO Systems’ HDS 10data center enclosure tion, and it begins with managing ly implementing those policies. solves the high-density heat load problems caused by power distribution. “ePower is uniquely suited to help switches such as the Cisco Nexus 7018 ..........page 13 Cyber Switching offers one such businesses of all sizes achieve all of ■Optima EPS announced anIT cabinetwith features option with its ePower PDU—the these,” Verges says. By examining the designed for server application environments....page 13 next generation of power distribution billing-grade metering that’s available unit. ePower enables remote man- on each of the PDU’s outlets, users ■Product Spotlight:Cable Management ........page 16 agement options and provides funda- can collect power usage baselines, ■Product Spotlight:KVMs ..............................page 18 mental power information for each develop ways to reduce power usage, of its outlets individually. and track that usage over time, he says. The NETWORKING & VPN Chris Verges, ePower product manager, PDU’s integration with the data network and says each outlet features billing-grade power platforms such as Cisco EnergyWise give ■Ensim Unify Enterprise Edition providesIT process metering and relay control. “Power usage for and to manage the unit’s power as an aggre- users an intelligent way to manage their automationfor provisioning, virtual lifecycle manage- each server in a data center can be tracked, gate on each input cord or bank or as each power usage. In addition, businesses can ment, and change management......................page 20 helping facilities managers to accurately allo- outlet,” Verges says. ePower PDUs support achieve their green goals with the help of ■Remote access toolscan help you keep tabs on cate costs to the proper business units based several remote management options, too, ePower’s simple user interface. your data center almost anywhere. Here’s what to con- on actual runtime data and incentivizing IT such as HTTP/S, Web Services, SSH, “Cyber Switching’s core philosophy is sider when choosing and using them..............page 21 managers to reduce their equipment’s power Telnet, Syslog, SMTP, and most recently, that knowledge is power, and power should usage,” Verges says. ePower’s remote con- Cisco EnergyWise. be controlled intelligently,” Verges says. ■nMetrics Application Monitor 6001is a hardware-based trol capabilities let you reboot equipment The Cisco EnergyWise platform simpli- “ePower provides highly accurate metering application monitoring solutionto help medium-sized when a lockup occurs or turn it off when not fies the management of equipment such as data that businesses use to make properly businesses manage network performance..........page 21 in use. Each outlet is also protected by Cyber routers, switches, and servers. It can be used educated decisions on balancing electrical Switching’s patented Cyber Breaker technol- to implement power management policies usage with the company’s critical needs STORAGE ogy, which uses a software-controlled circuit for businesses and to assemble power met- along with the control mechanisms needed ■According to Diskeeper Corporation, drive fragmen- breaker to limit overcurrent conditions to a rics into intuitive, user-friendly dashboards. to carry out that green energy policy. In tation creates even more complications in the age of single outlet. The Virtual Circuit Breaker is Cisco EnergyWise is deployed on net- short, ePower enables organizations to go SANs and VMs................................................page 15 customizable and utilizes a trip-curve to help work switches and routers known as green,” he says. P you save money and reduce downtime. EnergyWise peers, with end devices known ■NovaStor is one company that’s making a name for as EnergyWise endpoints. The open frame- Contact:(888) 311-6277 | www.cyberswitching.com itself in the data backupspace......................page 28 Ease Of Use ■When Lou Moran joined Protravel International, he For any data center solution, ease of Top ePower found the company’sbackup systemwasn’t up to par. use is a must. ePower PDUs address this by He sought help from Backup My Info!..............page 29 integrating a full-color LCD touchscreen Features where you can view power information ■Pliant Technology’s Lightning EFDs, or enterprise about the devices connected to each outlet, flash drives, exceed the performance of run-of-the- • Billing-grade power metering on each individual outlet including the amount of current being mill SSDs........................................................page 29 • Support for Cisco’s EnergyWise platform pulled by each individual outlet or a combi- • LCD touchscreen display nation of outlets and the voltage or power The Processor.com home page is frequently updated with factor of each outlet. “Locally, the color • Cyber Breaker technology limits overcurrent conditions to a single outlet new articles and hardware news to help you keep current. LCD touchscreen can be used to configure • Two USB ports can connect up to 127 peripherals Visit www.processor.com today. the unit through its on-screen setup wizard Page 2 Processor.com October 8, 2010 Subscribe Today/Address Change Form For address change, fill out form below with new information and mail or fax. PLEASE PRINT What type of subscription request is this? ❑ New ❑ Renewal ❑ Cancel © Copyright 2010 Sandhills Publishing Company. Phone: ( ______ )________________________________ Fax: ( ______ ) __________________________________________ Contact Name:__________________________________________________________________________________________ Company Name: ________________________________________________________________________________________ Subscriptions Address: ______________________________________________________________________________________________ Mail Form To: P.O. Box 85518 • Lincoln, NE 68501-5518 Overnight Delivery: 120 West Harvest Drive • Lincoln, NE 68521 City: ___________________________________________ State: ________ Postal Code:______________________________ (800) 819-9014 | LOCAL: (402) 479-2132 | FAX: (402) 479-2193 Country: ______________________________________________________________________________________________ Advertising & Reprints Email: ________________________________________ Web Address:____________________________________________ (800) 247-4880 | (402) 479-2141 | FAX: (402) 479-2193 1. What is the size of your company 3. What is your annual computer hardware/ Editorial Staff (how many employees)? software purchasing budget? [email protected] ❑ Less than 10 ❑ 200 to 499 ❑ $0 to $9,999 ❑ $100,000 to $249,999 (800) 544-1264 ❑ 10 to 99 ❑ 500 to 999 ❑ $10,000 to $24,999 ❑ $250,000 to $499,999 ❑ 100 to 199 ❑ 1,000+ ❑ $25,000 to $49,999 ❑ $500,000 to $999,000 ❑ $50,000 to $99,999 ❑ $1,000,000+ Do you have a new product that data center/IT managers would be interested in learning about? Call (800) 544-1264 2. How often do you purchase computer or email [email protected]. hardware/software? ❑ Weekly ❑ Quarterly ❑ Bi-weekly ❑Annually ❑ Monthly ❑ No Involvement www.Processor.com News Also In This Issue... SECURITY | been hired by Dell to serve as the terms of the transaction have not been dis- ■While Web 2.0 applications and Web sites have com- Apple Is Tops In vice president and general man- closed, but the deal is slated to close in the Customer Satisfaction plicated IT’s ability tosecure the network, you can ager of its networking division. fourth quarter of this calendar year. Blade maintain and, in some cases, even improve your security J.D. Power and Associates has Dell has traditionally dealt in PCs provides both hardware for the burgeoning profile if you take note of certain strategies........page 30 released a study reporting Apple and servers, but the company is data center market and software to facilitate ■Identity Automation’s Access Request Management as the highest-ranking smartphone actively becoming more involved in virtualization in the concomitant cloud com- manufacturer when it comes to cus- storage and networking in a bid to more puting sector. IBM also plans to more closely System is composed of four modules, all aimed at helping tomer satisfaction. This is the fourth closely compete with rival companies integrate Blade’s switches into its systems companiesmanage identity and access..........page 31 consecutive year Apple has come such as HP and Cisco. Earlier this for optimized data transfer to the core net- ■Buying Guide: Antivirus Appliances................page 31 out on top. This year, Apple scored year, Dell attempted to acquire working layer. ■Product Spotlight: Antivirus Appliances........page 32 800 out of 1,000 points, which is 3Par, a high-end storage vendor, | Google Drops Slightly In Search Share compiled from the information but was outbid by HP. Zamarian’s ■There are manythreats that can compromise data given by more than 6,800 departure from Cisco marks the According to the latest figures from comScore, center equipment.Fortunately, administrators can take smartphone owners. Motorola second time in a week that one of Google’s share of the search market dropped numerous steps to protect their data center assets and keep scored 791 points to grab the that company’s veterans has left by 0.4% from July to August; however, the their organizations free from unwanted downtime..page 34 second-place slot, while HTC landed in third for an upper-level executive position else- search giant still recorded 65.4% of all searches. ■Elcomsoft has developed several solutions that act as place with 781 points. Ease of operation, oper- where; Cisco’s CTO for unified communica- The newly combined forces of Microsoft and ating system, physical design, features, and tions, Joseph Burton, recently defected to Yahoo! totaled 28.5% of the searches, with password locksmithsto help if you or another user have battery function all contributed to the scores of Polycom to serve as chief strategy and tech- the larger share going to Yahoo!. In total, lost or forgotten a password................................page 35 each smartphone. nology officer. Americans performed more than 16.9 billion p■reBveefnorteio yno suy psutercmha,site’s a inmipnotrrtuasnito tno dkentoewc ttihoen koery |FCC Releases White Spaces Spectrum |Ericsson To Buy saenadr cAhO qLu Neeritewso irnk Afoulglouwset.d T bheeh Ainsdk tNhee tbwiogrk features to look for in a system............................page 36 The Federal Communications Commission Nortel’s MSS Business three with 3.8% and 2.3%, respectively. voted unanimously to release unused “white Not long after purchasing CDMA and LTE comScore notes that the results include MESSAGING & TELEPHONY space” spectrum in the television band to properties from the remaining assets of Nortel, peripheral search hits, such as Google News ■There are many ways to address email retention. unlicensed wireless broadband devices. Ericsson has agreed to acquire Nortel’s MSS for Google, to provide an accurate representa- The decision will help provide “super Wi-Fi” (multi-service switch) portfolio for a cash out- tion of the searches. But, most experts agree, the first thing to do is sit down access across the United States. The so- lay of $65 million. The acquisition will bolster with your enterprise’s legal counsel................page 37 | Report: Mobile Workforce called “super Wi-Fi” will have a longer range, Ericsson’s wireless and carrier voice divisions, Poses Higher Security Threat SERVERS quicker speeds, and more stable service than the company says. MSS will provide continua- Wi-Fi currently available. The fight over white tion of equipment supply for Ericsson’s CDMA The MessageLabs Intelligence Report from ■If green tech has as its twin goals energy efficiency space spectrum has lasted about eight years business, as well as fodder for research and Symantec found that Web site blocks, based and environmental responsibility, thenshutting down with many opposing the release of white development. The MSS business offers “sale on corporate policies, occurred 35% more comatose serversis the perfect complement......page 7 space due to potential interference with tele- and support of data networks and switching often when workers were on the road than ■Althoughserver virtualization continues to spread in vision channels and wireless microphones. platforms for core networks,” according to an when they are in the office or at a home office. To accommodate those opponents, the FCC announcement from Ericsson. Symantec suggests that this is because work- the private sector, the technology is experiencing a far has reserved two television channels for wire- ers use the freedom of the road to visit Web more sluggish uptake in the public realm............page 38 | IBM To Acquire less microphones. sites that they would not normally visit while Blade Network Technologies CLIENTS | at their desks. For example, mobile workers Zamarian To Head Up Another industry giant is moving into the were five times more likely to trigger blocks ■Multitouch interfaceis in the early adopter phase, Dell Networking Unit blade server business: IBM announced that it that related to downloads. Road warriors were serving as a key element in the popularity of smartphone Dario Zamarian, vice president of systems has agreed to purchase Blade Network Tech- also more likely to shop online and visit per- devices, and could be mainstream in the near future, and network management for Cisco, has nologies of Santa Clara, Calif. The financial sonal or dating Web sites. According to according to experts............................................page 39 Symantec, the results support the argument ■With the popularity of smartphones, you might be WATCH THE that having written security policies won’t alter This information provides a quick glimpse of current and historical stock user behavior. overwhelmed by trying to manage them. Here’s an STOCKS prices and trends for 13 major companies in the technology market. overview of solutions available to help............page 40 | Standard Created For Testing SSDs ■Quantum computers, still in their infancy, may be New standards have been created for testing able to solve some of the problems that conventional Company Symbol Year Ago Sept. 16 $ Sept. 30 $ %pr ecvhiaonugse i sfrsoume the endurance and reliability of SSDs (solid- computers can’t solve......................................page 41 AMD AMD $5.39 $6.15 $7.11 ▲15.61% state drives). Created by the JEDEC Solid CA Technologies CA $21.21 $20.23 $21.12 ▲4.4% State Technology Association, the rules DATA CENTER Cisco Systems CSCO $23.09 $21.93 $21.90 ▼0.14% include two standards for SSDs: JESD218 MANAGEMENT Dell DELL $15.14 $12.42 $12.97 ▲4.43% SSD Requirements and Endurance Test ■Product Spotlight: Google GOOG $487.20 $481.06 $525.79 ▲9.3% Method, which creates a rating that represents Data Center/IT Training Centers......................page 42 HP HPQ $45.96 $40.35 $42.07 ▲4.26% how many terabytes of data are written by a host to the SSD, and JESD219 SSD Drive ■Just as hardware and software need to be upgraded IBM IBM $117.90 $129.67 $134.14 ▲3.45% Endurance Workloads, which establish stan- Intel INTC $18.90 $18.97 $19.20 ▲1.21% and refreshed,staff roles in an IT departmentneed dard workloads for comparable results for McAfee MFE $42.97 $47.26 $47.26 uchgd. revamping occasionally, as well. Here are some helpful enterprise applications. The standards will be Microsoft MSFT $24.88 $25.33 $24.49 ▼3.32% suggestions to guide you through the process....page 44 useful for SSD vendors, many of which cur- Oracle ORCL $20.36 $25.36 $26.85 ▲5.88% rently use MTBF (mean time between failure) Red Hat Software RHT $26.97 $37.44 $41 ▲9.51% as an endurance and reliability metric, and for Symantec SYMC $15.88 $14.94 $15.13 ▲1.27% The Processor.com home page is frequently updated with all users to more easily select the best SSD for new articles and hardware news to help you keep current. NOTE: This information is meant for reference only and should not be used as a basis for buy/sell decisions. their applications. Visit www.processor.com today. October 8, 2010 Processor.com Page 3 News IT Events Upcoming Are you looking to learn more about data center quality standards. The application security transactions, but they are all still in the early or IT topics? Network with some of your peers? | VoIP Hacker Sentenced Consider joining a group of data center company analyzed more than 2,900 applica- stages of development and won’t be “technical- To 120 Months In Prison professionals. If you have an event you’d like tions in its “State of Software Security Report: ly mature systems” until at least 2012. Once listed, please send an email to Edwin Andres Pena was sentenced to 120 Volume 2” and found that 80% of Web apps these fraud detection tools evolve, businesses, [email protected]. months in prison late last month for transmit- could not pass a PCI audit. Veracode used financial institutions, and end users will have ting more than 10 million minutes in unautho- its cloud-based platform to test the strength increased confidence in the process, opening - OCTOBER - rized VoIP calls over his victims’ networks. of Internally Developed, Open Source, Out- up new possibilities, says Avivah Litan, Gartner AITP Garden State According to a release from the U.S. Justice sourced, and Commercial applications. Third- vice president and distinguished analyst. Oct. 12 Department, Pena is “the first individual ever party code is primarily to blame for insecurities; | Jim Johnston’s Steakhouse NIST Research Could Lead To Mobile charged with hacking into the networks of it made up 30% of all applications submitted for 58 Eisenhower Parkway Mountain Plaza Devices That Are More Secure VoIP providers and reselling hacked VoIP ser- the report review and failed to meet security Roseland, N.J. tech.groups.yahoo.com/group vices for a profit.” Following his 2006 arrest, standards 81% of the time. Security flaws can A new way to generate the high-frequency /aitpgardenstatechapter Pena, a citizen of Venezuela, fled the states be repaired relatively quickly, however, with waves used in cell phones could result in wire- • • • • • before being caught in Mexico in 2009. He most companies taking 16 days on average to less technology that is more secure and resis- AITP Richmond pled guilty to a count of conspiracy to com- mitigate security issues. tant to interference. In making the finding, Oct. 12 mit computer hacking and wire fraud and NIST (National Institutes of Standards and 2015 Staples Mill Road | Microsoft Recommends Richmond, Va. one count of wire fraud in February 2010. In Technology) researchers found an oscillator Waiting On IE9 www.aitprich.org addition to the prison stint, Pena was sen- that would harness the spin of electrons to • • • • • tenced to pay restitution in the amount of The beta version of Internet Explorer 9 is now generate microwaves used by mobile devices. PASS Wisconsin SQL Server about $1.01 million. Robert Moore of Spokane, available, but Microsoft is asking that users The new-found oscillator would use less ener- User’s Group Wash., was previously sentenced to 24 months wait for the final version to be released before gy than ones currently in use, and because the Oct. 12, 4:30 Microsoft Office in prison for his role in the conspiracy. Prose- deploying it across the enterprise. The software frequencies of the new devices can change 2176 Woodcrest Drive cutors claim that Pena sold discounted VoIP giant also recommends that companies should rapidly, the signals are harder to intercept or Green Bay, Wis. service plans to customers that he stole from migrate to the Windows 7 operating system jam, according to NIST. wisconsin.sqlpass.org other VoIP providers. and Internet Explorer 8 soon, largely because | • • • • • Study: Bans On Texting While Driving Win7’s first service pack must be installed Greater Houston Technology Report |Analyst: iPad Sales Are Ineffective & Business Expo before IE9 can be deployed. The public beta of To Overtake The Mac Oct. 13, 10 a.m. to 2 p.m. Win7 SP1 expired in June; however, Microsoft The HLDI (Highway Loss Data Institute), an Norris Conference Center In a late-September research note to clients, has yet to commit to a launch date for both IE9 affiliate of the Insurance Institute for High- 803 Town and Country St. analyst Gene Munster of Piper Jaffray upped a and Win7 SP1. Some of IE9’s features include way Safety, has released a study showing Houston, Texas previous projection of Apple iPad sales for full HTML 5 support, a JavaScript upgrade, site that laws against texting while driving may www.nstaexpo2010.eventbrite.com 2011 from 14.5 million to 21 million. Further, pinning to the Windows 7 taskbar, and a clean- actually have the opposite • • • • • Greater Wheeling AITP Munster reportedly believes the iPad will out- er user interface. effect, resulting in Oct. 13 sell the Mac by 2011, saying that the iPad is | increased crashes. Wheeling, W.Va. Survey Gauges Feelings Toward “the Mac for the masses.” Munster based the The researchers www.aitp-wheeling.org Virtualization & Cloud Computing projection on increasing iPad supply; expanded studied rates of col- • • • • • ISSA Central Pennsylvania distribution channels for the tablet; more avail- Open-source systems management provider lision claims made Oct. 13 ability in international markets; and increased Zenoss has released the results of a survey in the months pre- Harrisburg University of use in the enterprise sector, citing Apple’s on virtualization and cloud computing, in ceding and following Science and Technology claims that more than 50% of Fortune 100 which the company surveyed more than the institution of tex- 326 Market St. companies are either deploying or testing the 200 IT professionals from its open-source ting bans in California, Harrisburg, Pa. centralpenn.issa.org iPad. As for competition, Munster sees Android- management community. The survey found Louisiana, Minnesota, • • • • • based devices as posing the stiffest competi- that 40.7% of respondents prefer to employ and Washington and ISSA San Diego tion to Apple and the iPad. servers virtually; in fact, 29.3% use virtualiza- then compared the find- Oct. 13 | tion whenever possible. Furthermore, VMware ings to data from nearby San Diego, Calif. DLL Hijacking Exploits is the most common virtualization technology, states without bans. HLDI www.sdissa.org Pose Most Risk To IE Users used by 79.3% of respondents. Reasons for found that crashes increased in three of the • • • • • Southern New England SQL Server Researchers at Acros Security are warning that using virtualization technology included cost four states with bans and speculated that dri- User’s Group users of Internet Explorer are more vulnerable savings (64.7%), flexibility (43.4%), and hard- vers were even more distracted by efforts to Oct. 13 to DLL attacks than users of Chrome or Fire- ware savings (33.3%). Respondents were not hide their texting from view to avoid getting in www.snessug.com fox. Called “DLL load hijacking,” this type of without concerns, though; security, manage- trouble. The institute maintains that the ban • • • • • AITP Washington D.C. exploit relies on the fact that most applications ment, and monitoring were all issues cited only addresses one form of distracted driving Oct. 14, 6:30 p.m. invoke DLLs by using a simple file name rather regarding cloud computing. and appears to have no impact on reducing Alfio’s Restaurant than a full path name; this means that a hacker | the number of collisions; for their part, howev- 4515 Willard Ave. Red Hat Posts Q2 Revenue Increase could trick an application into loading a similar- er, federal highway safety officials dismiss the Chevy Chase, Md. ly named malicious file because that file need Open-source solutions provider Red Hat claims as “completely misleading” and view aitpwashdc.ning.com not reside in a specific folder or subfolder. announced its second-quarter financial results. the bans as integral to raising public aware- • • • • • Information Security Summit Windows XP users are particularly vulnerable The company’s revenue for the quarter was ness about unsafe driving practices. Oct. 14-15 because browsers running on Windows 7 and $219.8 million, a 20% increase year-over- | Corporate College East Google Tops List Vista systems by default run in Protected Mode year and its best growth rate in two years. Warrensville Heights, Ohio Of Best Places To Work and are thus insulated from many threats. Subscription revenue was up 19% year-over- www.informationsecuritysummit.org year to $186.2 million. GAAP Consulting firm Universum recently released • • • • • | Study Highlights Great ISSA Northeast Ohio operating income was $34.1 its survey of 130,000 business and engineering Potential In East Coast Oct. 14 million (a 24% increase), job hunters and their opinions of the companies Cuyahoga County Library-Parma South Wind Energy and non-GAAP operating for which they’d most like to work. In the overall 7335 Ridge Road A recent study by conservation income was $54.3 million (a business rankings, Google claimed the top Parma, Ohio www.neoissa.org group Oceana has found that 25% increase). Red Hat’s spot for the second year in a row, followed by • • • • • offshore wind turbines could net income for the quarter KPMG, Ernst & Young, PricewaterhouseCoopers, SQL Server Society generate almost half of the elec- was $23.7 million, and its and Deloitte. Microsoft ranked seventh and of Las Vegas tricity currently being used by operating cash flow was Apple ranked 18th. Among engineering firms, Oct. 14 East Coast residents. The study $64.3 million. Altogether, Google again ranked first, but Microsoft claimed The Learning Center of Las Vegas 777 North Rainbow estimates that the 13 coastal with cash, cash equivalents, the second spot, followed by IBM, Sony, BMW, Las Vegas, Nev. states could generate 127GW and investments, the com- and Intel. sssolv.com (gigawatts) of power, with North pany was worth $1.05 billion |Federal Data Center • • • • • Carolina, South Carolina, New at quarter’s end. ISSA Upstate South Carolina Consolidation Plans Proposed Jersey, and Virginia offering the Oct. 15 | Fraud Detection Not Keeping Pace NuVox most potential for easily generating wind ener- The government wants to implement a plan With Mobile E-commerce 1001 Keys Drive #100 gy. The 127GW of energy generated by East that would reduce and consolidate many of Greensville, S.C. Coast turbines would represent far more wind By the end of 2013, 12.5% of e-commerce the federal data centers that are currently www.upstate-issa.org power than currently being generated by the transactions will be done via mobile devices, operational in the United States. However, • • • • • entire country, given that the country’s current according to Gartner, and location or profile because there isn’t a large budget for such a AITP Pittsburgh Oct. 18 crop of wind turbines (all land-based when the information from mobile phones will be used to move, it could take up to 10 years to finish. Slovak Catholic Sokol study was undertaken) are capable of generat- validate 90% of mobile transactions. However, The hope is to begin using more cloud-based 205 Madison St. Road ing only some 35,000 megawatts of power. existing fraud detection tools, meant to work in and virtual infrastructures to help create a Venetia, Pa. | fixed-line computing environments, don’t work centralized network of data centers. The vast www.aitp-pgh.org Report Shows well or at all in the mobile world, says Gartner growth of federal data centers over the past AITP’s Association Outstanding Chapter Application Security Is Lacking Award Winner Research Vice President William Clark. He decade prompted the consolidation plan, but According to Veracode’s latest report, 57% of says there are a number of options in the it is yet to be seen if there is one clear solu- all applications do not meet the highest security works to help enterprises detect fraud in mobile tion to the problem. For more Upcoming IT Events, see page 8. Page 4 Processor.com October 8, 2010 P R O D U C T R E L E A S E S The Processor Product Releases section Manufacturers: includes brief overviews of data center products. Do you have a new product that data center/IT managers would be interested in learning about? All products listed have been released recently, so use this section to get Send your press release or product information up-to-date with what’s new on the market and to find products you need. to [email protected]. monitoring of physical infrastructure VMready 3.0 with Virtual Vision, is a high-performance network forensics PHYSICAL INFRASTRUCTURE maintenance through the use of a calendar Explicit Congestion Notification, and recorder for back-in-time analysis. The function as well as recurring housekeeping Weighed Random Early Detection. offering lets data center administrators ■ADC FPX Fiber Panel Series & and preventive maintenance activities. store and analyze data and extract infor- OmniReach RealFlex Universal Drop Cable FacilitiesDesk can be purchased as one of ■Brocade MLXe Core Router mation to determine the root cause of a ADC announced its latest fiber solu- two versions: Computerized Mainte- Brocade announced the Brocade given issue and determine ways to pre- tions, the FPX Fiber Panel Series and nance Management Software or Com- MLXe Core Router, which is designed to vent it from happening again. OmniReach RealFlex Universal Drop puter Aided Facilities Management. establish industry benchmarks for perfor- Cable. The FPX fiber panels feature mance, scalability, and investment pro- ■Intermec INcontrol MPO cassettes and termination/splicing ■Optima EPS IT Cabinet tection for service provider and data Intermec announced INcontrol, which or termination-only configurations. The Optima EPS announced an IT cabinet center networks. The MLXe is compati- is a new managed services portfolio ADC OmniReach RealFlex Universal with several features designed for broadcast ble with Brocade MLX and Brocade designed to provide better visibility and Drop Cable supports indoor and outdoor and server application environments. The NetIron XMR blades, ensuring the con- proactive tracking of customers’ mobile drop cable application requirements. cabinet’s modular, extrusion-based design tinued interoperability of the network. devices. Through INview, INsync, and means it can easily be customized to meet INcommand, INcontrol offers a compre- ■AFCO Systems HDS 10 specific requirements, saving customers ■Brocade Network Advisor hensive product family that provides a High Density Switch Enclosure time and money. The cabinet features sev- Brocade announced the Brocade Net- variety of service levels to meet enter- AFCO Systems introduced the HDS 10 eral cable managers, brackets, D-rings, work Advisor, a unified network manage- prise needs. High Density Switch Enclosure designed Velcro straps, and ment platform for SAN and IP networks. for the Cisco Nexus 7018 Network bundle retainers that Features include an easy-to-use manage- ■Minicom Advanced Systems AccessIT Switch. The enclosure utilizes AFCO make it an ideal fit for ment solution, nonstop networking, opti- Minicom Advanced Systems announced Systems’ advanced airflow management cable-intensive appli- mized applications, and investment an enterprise version of its AccessIT access technology to provide the necessary cool- cations. Other helpful protection. Network Advisor works management platform. AccessIT is designed ing with a 25% smaller footprint in the options include cable across Brocade Fibre Channel SANs, IP to offer a quick and easy way for IT staff to spacers, a fiber-optic networks, FCoE (Fibre Channel over run and manage multiple remote access pro- cable manager, and a Ethernet) networks, wireless networks, tocols via a Web-based interface. AccessIT brush cable manager and MPLS (Multiprotocol Label Switch- can handle more than 10 users and more that allows cables ing) networks. than 250 servers and network devices. through but contains airflow for thermal ■Exele Information Systems ■Nasuni Filer 2.0 management. Addi- TopView 6.8.7 Nasuni released Nasuni Filer 2.0, tionally, the front and Exele Information Systems released which is designed to work better in rear doors feature a convex design that TopView 6.8.7, which includes alarm Windows environments. It has full sup- accommodates extra space for cabling. For analytics capabilities that provide local port for Hyper-V server virtualization, more on this product, see page 13. and remote alarm history analysis via Windows Azure, Distributed File System AFCO SYSTEMS interactive tables and charts, identifica- namespaces, and previous versions of ■Pelican Products Pelican-Hardigg tion of nuisance or poorly configured Windows. Additionally, it now supports data center compared to other cabinets. Composite Rackmount Cases alarms, alarm flooding, and time-based private clouds and lets users provide The enclosure is designed to accept Pelican Products announced the launch alarm activity trends. The company says their own cloud credentials. cabling from overhead and/or under floor of a full range of tough, rigid composite that TopView gives users more con- feeds. It uses a series of vertical and hori- rackmount cases made with GMT (Glass trol and additional information to help ■nMetrics Application Monitor 6001 zontal cable managers, in a dedicated Mat Thermoplastic) composite shells. them improve their systems’ perfor- nMetrics’ series of application moni- cable management chamber, that help The company says that the cases “pro- mance and configuration. tors, including the Application Monitor route and secure each connection efficient- vide greater rigidity than non-reinforced 6001, helps businesses better manage and ly while minimizing the cabling’s impact products and are chemically resistant ■F5 Networks Application Ready control their network performance. The on airflow. This provides data center man- to most fuels, solvents, contaminants, Solution For Oracle Database AM6001 is a hardware-based solution agers with an extra level of confidence in and decontaminants.” Technologies that can track network flow and log it maintaining switch performance and relia- F5 Networks announced Application into a database so users can evaluate per- bility. More information about the AFCO ■Super Micro Computer SuperRack Ready Solution for Oracle Database formance and create customized reports. Systems HDS 10 is available at http:// Super Micro Computer, Inc., launched technologies that are specifically designed The AM6001 can connect with up to 50 afcosystems.com/enclosures_hds10.aspx SuperRack, which provides especially for the database. The solution features or on page 13. clean cable routing for maximum airflow integration of F5’s BIG-IP Local Traffic and easy access to rear-side system com- Manager and WAN Optimization Mod- ■Chatsworth Products ponents. SuperRack also gives users more ule with Oracle Database as well as Velocity Standard Pack than 100 optional modular components to enhanced visibility, time savings, and Chatsworth Products released Velocity select from. Other features include front, resource savings. Standard Pack, a physical security solu- rear, and side expansion units; a static tion that offers an easy-to-use method for load rating of 5,000 pounds; and fully ■Firetide 802.11n MIMO Access Points managing equipment and cabling at the welded construction via EIA-standard & Wireless LAN Controller NMETRICS cross connect. The package includes 310D hardware. Firetide released its 802.11n MIMO Velocity Cable Management and Stan- HotPoint 5100 indoor ($695) and Hot- subnets, making it ideal for medium- dard Rack and installation hardware. The NETWORKING & VPN Point 5200 ($1,295) outdoor access sized businesses. It includes eight package physically protects and manages points along with its FWC 2050 WLAN 10/100/1000 Ethernet ports; 4GB of cable while providing a pathway for ■Anfibia Reactor 2.1 Controller. The dual-radio access points RAM; and a 250GB storage capacity. premise cable and patch cords. Four vari- Anfibia released its server monitoring feature 802.11n with 300 Mbps real- The application monitor is also compati- ations are available. solution, Anifibia Reactor 2.1, which world throughput. The $4,995 FWC ble with any existing infrastructure and supervises connections, servers, databas- 2050 automatically connects and bal- can be used as a standalone unit or as ■Eaton Intelligent Power Software Suite es, hard drives, CPU, and memory via ances loads for wireless LAN networks. part of a distributed application monitor Eaton announced its Intelligent Power Web browser, iPhone, or iPad. The solu- installation. For more on this product, see Software Suite, which includes many of tion can also monitor query databases, ■Fluke EtherScope Series II Network page 21. Eaton’s power management, monitoring, log errors, display graphs, and send Assistant Version 5 and protection solutions, including the alerts via email, SMS, or to Twitter. Fluke Networks announced the latest ■Parallels Linux Shared Hosting NG Intelligent Power Manager and Intel- Additionally, Anifibia Reactor supports version of its EtherScope Series II Service Delivery Solution ligent Power Protector. The suite is administration tools, RSS feeds, and var- Network Assistant, which makes net- Parallels is introducing its Linux Shared available free for up to 10 IP addresses, ious themes. work testing quicker and easier thanks to Hosting Next Generation Service Deliv- and it lets users control a range of envi- the offering’s new Health Audit test. ery solution that utilizes clustering, load ronmental and power devices from a sin- ■Blade RackSwitch G8052 EtherScope version 5 also features a balancing, and proprietary site isolation to gle Web-based interface. This new top-of-rack edge switch from streamlined user interface and the critical improve Web hosting. Deployed as a Blade Network Technologies targets the network performance test, ProVision. module along with Parallels Automation ■ManageEngine FacilitiesDesk enterprise data center. The RackSwitch Cloud service delivery software, the solu- ManageEngine announced its Facilities- G8052 ($6,600) has Gigabit ports and ■Fluke Networks Time Machine tion hosts and syndicates cloud services Desk facilities management software. It 10Gbps uplinks for a total of 40Gbps Fluke Networks unveiled its Network such as SaaS applications, collaboration, is highly customizable and features upstream speed support. It features Time Machine hardware platform, which and other virtualized services. October 8, 2010 Processor.com Page 5 P R O D U C T R E L E A S E S port power consumption by up to 70%, ■Parallels Mobile App Trendnet says. Parallels released a mobile app for iPad, iPhone, and iPod touch owners STORAGE who use Parallels Desktop 6 for Mac or ■Atto ExpressSAS Parallels Desktop 6 Switch to Mac 6Gbps SAS/SATA Host Bus Adapters Edition. Parallels Mobile lets users access Windows apps running on a Mac Atto Technology announced that its from any network from any location via 6Gbps SAS/SATA Host Bus Adapters LACIE their devices. The app is built on the My and 6Gbps SAS/SATA RAID Host Bus PLIANTTECHNOLOGY Parallels services platform. Adapters have been proven to be com- patible with Toshiba’s 6Gbps SAS enter- UPnP/DLNA and iTunes server for the lack of a write cache make the new ■Perle Systems Media Converters prise hard drives. The x8 PCI-E 2.0 cards media streaming, Time Machine for MLC offerings safe for use with impor- Perle Systems released Media Con- feature Atto’s Advanced Data Streaming automated backups of Mac computers, tant data, the company says. For more on verters that can be managed through technology, the company says. and utilizes 802.11b/g/n Wi-Fi protocols. this product, see page 29. Secure Management Sessions in order to The LaCie Wireless Space will be avail- ■Attunity Change Data Capture ■Seagate 1.5TB FreeAgent GoFlex help customers protect enterprise infra- able in October in 1TB and 2TB capaci- & Replication Software Enhancements structures. User authentication, autho- ties, starting at $229.99. Seagate released the 1.5TB FreeAgent rization, and privacy (packet encryption) Attunity made performance enhance- GoFlex, a 2.5-inch portable external hard are also available. You can also manage ments to its change data capture and ■NetApp Integrated drive. The FreeAgent GoFlex is compati- which users have read-only status, and data replication software for Oracle Data Protection Portfolio ble with Mac and PC, and it has a which have full read and write abilities. databases, which aims to increase pro- Sunnyvale, Calif.,-based NetApp an- Superspeed USB 3.0 interface. The cessing capacity for high transaction nounced the release of enterprise-class $249.99 drive comes with a suitable USB ■ProQueSys FlowTraq loads, including those found in telecom- content management and archive tools that 3.0 cable and an NTFS driver for the Mac. ProQueSys has introduced FlowTraq, munications, financial services, and the company says will enable customers to which is a full-fidelity netflow analyz- e-commerce. Enhancements include reduce storage requirements, simplify ■Stec Mach16 er. It offers actionable intelligence to improved algorithms and optimizations management, and provide consistent Stec announced a family of SSDs for quickly relay information and instant specifically for Oracle databases. Bench- recovery for ECM. The enhanced suite of enterprise server OEMs. The company forensics for a quicker recovery from mark tests have shown up to 40% tools allows “hot backups” of applications, formerly known as SimpleTech now sells data leakage, breaches, IP theft, botnets, increased throughput. even when the application runs across the Mach16 line of drives up to 400GB and hardware failures. It also offers multiple servers and storage systems. in capacity. The new SSDs will sustain ■Bacula Systems Enterprise Edition 4.0 threat anticipation. 4KB transfer speeds of up to 30,000 Bacula Systems announced the release ■Newer Technology Guardian MAXimus I/Ops, Stec says, although the company ■RF Code M250 of Bacula Enterprise Edition 4.0, which Newer Technology introduced the did not specify whether this represented RF Code announced the M250, a fixed promises to deliver advanced backup Guardian MAXimus mini bus-powered read or write performance. It did say that reader designed to give customers in tag- features from open-source software for portable hardware RAID storage solu- dense environments and remote sites with the first time. The Swiss company notes tion. It is designed to handle “live ac- poor network connections a better RF that this release provides the ability to tivity” backup and data redundancy of Code reader. The M250 features PoE manage multiple data centers, scales up critical data and provides storage capaci- (Power over Ethernet) and is compatible to thousands of servers and clients, and ty up to 1.5TB and data transfer speeds with all RF Code active RFID asset tags as offers file-level deduplication, as well as up to 300MBps. It also offers hardware well as environmental sensors in both other advanced features. RAID 1 redundancy for a mirrored copy proprietary CellCare and SAFE (Secure wired and wireless network infrastructures. of data, or RAID 0 for speed. Array of Flash Element) technologies ■Extensis Portfolio Studio Digital Media will contribute to the drive family’s ■SevOne Performance Appliance Solution Archive Server ■Quantum RDX longevity, speed, and reliability. The SevOne announced that its PAS (Per- Extensis launched its Portfolio Studio, Quantum announced the release of its SATA Mach16 line will come in both formance Appliance Solution) now which is a Digital Asset Management removable disk-based data protection MLC and SLC configurations. includes monitoring support for virtual archive server capable of auto-archiving system, Quantum RDX. The entry-level server and Java environments. This and centralizing access to photos and Quantum RDX features a dock (USB or ■Stec ZeusRAM extension allows for monitoring across project files with consistent metadata. SATA), removable cartridges, and The latest SSD from Stec is a 6Gbps virtual and physical environments, mean- Features include support for three simul- Quantum GoProtect backup software for SAS drive that uses DRAM backed up to ing that VMware and Java applications taneous connections and indexed thumb- Windows, which reduces redundant data. flash to secure a latency rating of fewer can be monitored from the same platform nails and full-sized previews for fast RDX cartridges come with a 2.5-inch than 23 microseconds, the company says. as other applications. queries. Portfolio Studio is currently mobile hard drive and are available in The 3.5-inch drive is suitable for de- available starting at $1,999. 160GB, 320GB, 500GB, and 640GB manding applications such as database ■Smith Micro QuickLink Mobility capacities. Other features include flexi- indexing, metadata logging, and journal- ■Imation RDX 1TB Smith Micro introduced QuickLink ble onsite and offsite backup, inter- ing, Stec says. Mobility, which is designed to mix enter- Imation announced that the RDX back- prise-level broadband data connectivity up medium for small and medium-sized ■StoneFly Cloud USS and VPN security with network roaming enterprises now comes in a 1TB car- StoneFly released the StoneFly Cloud and session persistence. With QuickLink tridge. Imation’s removable hard disk USS, which is a storage solution appliance Mobility, IT managers can enjoy a cartridge provides full forward and back- made for the cloud computing environ- mobile operator that ensures secure and ward compatibility among its cartridges ment. The StoneFly Cloud USS uses a reliable access to the corporate network of many capacities, which start at 160GB. model of computing called IaaS (infrastruc- for maximum employee productivity. Pricing per cartridge ranges from ture as a service) that provides optimal QUANTUM $149.99 to $599.99. hardware utilization, reduces power and ■SolarFlare Communications changeable cartridges for multiple capac- cooling expenses, and allows the ability to EnterpriseOnload ■Infortrend EonStor DS ities, and data deduplication technology. allocate resources on an on-demand basis. SolarFlare Communications released A small-form-factor disk storage system GoProtect software restores system data its EnterpriseOnload application acceler- has been unveiled for Infortrend’s EonStor with a drag-and-drop interface via ■Viking Modular Element ation middleware, an open-source, Linux- DS family. It offers a 2U chassis accom- Windows Explorer. Tabletop solutions Serial Attached SCSI SSD based app accelerator that cuts applica- modating 24 2.5-inch disk drives with the with dock, removable cartridges, and Viking Modular Solutions added the tion latency by 50% while increasing option to include high-performance densi- software start at approximately $300; Element Serial Attached SCSI SSD to its message rates by three to four times. The ty. Additionally, these models come in 160GB cartridges start under $150. SSD product family. The 2.5-inch SAS release also includes 802.1Q VLAN either dual- or single-controller configura- SSD includes a dual-port 6GB SAS inter- trunking support for managing and sepa- tions and feature either 8Gbps Fibre ■Pliant Lightning®LB 200M & LB 400M face and advanced parallel NAND chan- rating IP traffic and 802.1ad Link Channel host connectivity or 1GbE iSCSI Pliant Technology added a pair of nel architecture. The Element SAS SSD Aggregation support for higher band- host connectivity. MLC (multi-level cell) models to its supports MLC, eMLC, and SLC NAND width, load balancing, and redundancy. Lightning line of enterprise flash drives, flash. SLC is available in 50GB and ■LaCie Wireless Space or EFDs. The new Lightning LB 200M 200GB sizes, while MLC/eMLC configu- ■Trendnet GREENnet Switch LaCie announced the LaCie Wireless and LB 400M feature 200GB and 400GB rations come in 100 to 400GB varieties. TEG-S16Dg, TEG-S24Dg Space, which is a Wi-Fi-enabled net- of respective capacity. They’re 2.5-inch Trendnet released a pair of Gigabit work-attached storage device that is ide- SSDs with dual independent SAS ports SECURITY switches that incorporate the company’s ally suited for home and small office that have full-duplex capability and wide GREENnet energy-saving technology. users. The device enables multiple Mac port aggregation support. Pliant claims ■Application Security AppDetectivePro 7 The TEG-S16Dg ($159.99) has 16 ports and PC users to back up files wirelessly; performance in excess of 10,000 I/Ops Application Security released App- and a 32Gbps switching capacity. The connect to it as an access point; or (LB 400M) for a typical workload of DetectivePro 7. The new version of the TEG-S24Dg ($219.99), meanwhile, is a deploy it as an Ethernet extender, switch, 4KB file mixed reads and writes. database security, risk, and compliance 24-port, 48Gbps version. Both can drop or router. The Wireless Space supports Enterprise-class reliability features and Go to Page 6 Page 6 Processor.com October 8, 2010 P R O D U C T R E L E A S E S Continued from Page 5 enterprises better understand and influ- program automates the database audit ■Idappcom Traffic IQ V2.0 SERVERS ence visitors. process and makes it more efficient for Idappcom released its Traffic IQ V2.0, auditors and IT advisors. Additionally, it which lets companies test and protect secu- ■Dell PowerEdge, PowerVault ■Kyocera FS-C2026MFP & FS-C2126MFP offers better contextual scanning and rity systems. Some of Traffic IQ V2.0’s & PowerConnect Kyocera announced the release of two reporting features that let auditors stan- features include an extended library of Dell announced the release of a suite multifunctional printers, the FS-C2026MFP dardize their processes. This decreases the threats, security rules for IP filtering, a of solutions aimed at helping growing and FS-C2126MFP. Both can color print, manual efforts required for analyzing audit scripting engine, and enhanced reporting. businesses update their aging IT infra- copy, and scan, and both use the 200,000 findings, and offers audit control mapping structures with easy integration, minimal page preventive maintenance schedule objectives to scan policies before scan- ■Identity Automation disruption, and with what the company and meet Energy Star guidelines. Features ning. Additionally, AppDetectivePro 7 ARMS Identity Management Suite calls “straightforward and easy pricing.” include a 50-sheet document processor, offers built-in DISA-STIG (Defense Houston-based Identity Automation has The release includes PowerEdge servers, 300-sheet capacity, 768MB of memory, Information Systems Agency Security released its latest suite of identity manage- PowerVault storage, and PowerConnect front-loading USB interface, and Power- ment tools. ARMS (Access Request networking solutions. PC446 667MHz processor. Management System) is composed of four modules aimed at helping companies man- ■Oracle SPARC T3 Systems ■Motorola Solutions MC959B age identity and system access. The Oracle released what it says is the Motorola Solutions announced the Account Management, Group Management, industry’s first 16-core server processor release of the MC959B, a ruggedized Sponsorship, and Workflow modules are with the arrival of its SPARC T3 handheld mobile computer with user- Technical Implementation Guide) work Systems. SPARC T3 systems range from selectable WAN. The MC959B allows plan framework, with scan policies and single-socket, 16-core blades to four- users to select their preferred 3G cellular questionnaire definitions for each data- socket, 64-core five-rack units. The sys- network; it can be deployed on multiple base-specific version. tems can run on Oracle Solaris and networks and will switch between 3.5G Oracle VM for SPARC and work in tan- GSM HSUPA and 3.5 CDMA EVDO Rev ■Attachmate Reflection For Secure IT 7.2 dem with Oracle Database, Fusion A connections. According to the company, Attachmate released the Attachmate Middleware, and Oracle Applications. the device—designed for mobile field Reflection for Secure IT 7.2, a bundle distinct and freestanding but work well workers—is the industry’s most rugged of SSH servers for Unix, Linux, and together for users who require all four func- ■Oracle VM Server For SPARC 2.0 mobile computer. The MC959B is one of Windows. The 7.2 version offers support tions. Additionally, the company’s DSS Oracle announced its VM Server for the first handheld industrial mobile for public key infrastructure and HPN file (Data Synchronization System) is the SPARC 2.0 server virtualization solu- computers to use Qualcomm’s Gobi con- transfer. It also offers optimization over engine that drives their identity, data, tion. It is preinstalled on the company’s nectivity technology—an embedded high-latency networks and specialized access and configuration management SPARC T-Series servers and allows for mobile wireless solution designed to integration in Sun Solaris and IBM AIX. solutions. For more on this product, see up to 128 virtual servers to be run on one decrease connectivity limitations. page 31. system. It also features the capability of ■Bocada Free Health Check running multiple OS environments. SERVICES With Bocada Prism ■IBM InfoSphere Guardium 8 Bocada is now offering a free health IBM announced InfoSphere Guardium CLIENTS ■Lee Technologies Lee Genesys check assessment aimed at providing 8, a security product designed to help Data center technology provider Lee Bocada partners a comprehensive review companies protect sensitive data. Fea- ■IBM Customer Experience Suite Technologies announced Lee Genesys of their overall data protection environ- tures include automatic monitoring of IBM announced the IBM Customer consulting services. Aimed at helping ment, including uncovering the strengths structured data and application usage, Experience Suite, software designed to SMBs maximize the efficiency of data of the current backup environment in alerts about suspicious activity, simpli- improve an enterprise’s customer inter- center projects ranging from new con- place. The check will also detail improve- fied security and compliance regulations, actions via online or mobile avenues. struction to consolidation, Lee Genesys ments, problems, and courses of action. stronger information governance con- Features include analytics, social net- is an assessment program that helps trols, and lower compliance costs. working, Web content management, por- clients define and meet their data center ■DNF Security Falcon USS tal, mashups, and mobile capabilities. infrastructure requirements while avoid- DNF Security has released Falcon USS, ■Tenable Nessus iPhone Application The company says the suite will help ing unnecessary overbuilding. the latest edition to its Falcon Series of Tenable Network Security released an security appliances. The company says iPhone version of its Nessus vulnerability USS is the first model that mixes VMS scanner. It allows users to connect a (video management software) with shared Nessus server to their iPhone or iPod touch video storage in one hardware appliance. and perform security scans and review the DNF states that the appliance is ideal for surveillance areas where many VMS PROCESSOR applications are used or multiple edge is now resulting reports. The free Nessus applica- tion features remote starting, stopping, and on Facebook and Twitter! pausing of network scans and the ability to analyze scan results. recorders are necessary in one system. The model comes in 3U and 4U rackmount MESSAGING & TELEPHONY chassis and includes hot-swappable drives and trays, a redundant 1200W PSU, and ■Polycom SpectraLink 8400 Follow us at an advanced cooling system. The 1600wz Polycom’s SpectraLink 8400 series and 2400wz models are available in 32TB voice-over-Wi-Fi handsets feature bar and 48TB sizes. code readers, a standards-based applica- http://twitter.com/processorpub tion platform, and what the company ■eEye Digital Security Zero Day Tracker touts as the industry’s broadest interop- Processor eEye Digital Security announced the erability with 802.11a/b/g/n wireless or search for “ ” Zero Day Tracker, a free service de- infrastructure and market-leading UC signed to give companies the most up-to- platforms. According to Polycom, the date information concerning new Zero 8400 series units offer the industry’s on Facebook. Day exploits as well as information on lowest total cost of ownership—up to how to protect themselves. The service is 33% lower than competing systems. a revamped version of eEye’s Zero Day Alerts. The tracker will complement ■Vertical Communications Wave ISM 2.0 eEye’s VEF (Vulnerability Experts Vertical Communications announced Forum), which is a monthly Web event the Wave ISM 2.0 software upgrade for wherein eEye offers advice about the lat- Wave IP 2500 and Wave IP 500 Business est cyber threats. Designed to help keep Communication Systems. The upgrade IT workers apprised of the latest threats includes multiple new features and field and how to fight against them, Zero Day trials of Fax Manager and Voice Server Tracker is a free download, available 2.0, which include automated inbound from eEye’s Web site. and outbound applications. October 8, 2010 Processor.com Page 7 G R E E N T E C H & T I P S Shut Down Comatose Servers: Underutilized Servers Cost Money, Impact The Environment BY ROD SCHER IF GREEN TECH has as its twin goals energy efficiency and environmental Why Do We Have Comatose Servers? Solving The Problem responsibility, then shutting down comatose servers (machines that are One would think that comatose servers are low-hang- The ability to locate and shut down comatose servers consuming energy but not doing any ing fruit: Have servers that aren’t doing anything? presumes two things: the ability to enable detailed moni- useful work) is the perfect complement Well, find ‘em and unplug ‘em. But if it’s that easy, toring of those servers and the motivation to do so. to virtualization: Both result in increased why do they exist in the first place? And if harvesting Monitoring can pay big dividends. If you install and efficiency and a reduced environmental comatose servers is an inexpensive way to reduce both use monitoring software on every server, you’ll quickly impact. While virtualization generates IT costs and environmental impact, why do they con- discover which servers are underutilized, which are band- more return from a given investment, tinue to exist? Ken Brill, founder of the Uptime width hogs, which are repeatedly bottlenecked, and which shutting down unused servers complete- Institute (www.uptimeinstitute.org), attributes the prob- ones are simply comatose. Use monitoring to trigger ly frees up that investment. lem to a management hole resulting largely from alerts after a certain amount of time has passed, so you Let’s face it: Although much savings reduced data center headcount. With fewer people on can know when servers may be approaching end-of-life. can be realized by virtualizing underuti- staff, no one is assigned to do asset management. In The motivation question is harder to address. Because IT lized servers, there are probably servers effect, no one knows who “owns” all of these assets, let doesn’t generally pay the power bill, there may be little (some estimates run as high as 30%) in alone what sort of shape they’re in or what they’re incentive for IT to be energy efficient. But your data center doing absolutely nothing. being used for. experts recommend getting staff involved in These are not merely underutilized, Some comatose servers are simply the result of institu- green tech initiatives and per- they’re essentially useless. A conservative tionalized knowledge: Legacy servers are left plugged in haps instituting rewards for effort pegs the ongoing energy costs of because they still have files on them, and those files might staff who find ways to save each of those servers at about $400 or so be important to someone. In any case, the (now under- money, increase efficien- yearly. Of course, that’s simply the cost of staffed) IT department is busy responding to the day’s col- cy, and reduce the energy and does not take into account lection of crises, so who has time to move the files? Who company’s whatever you’re spending on software or even knows what they are or who needs them? (In reality, environmental maintenance or on related manpower the answer may be that no one needs them; they’re obso- impact. This ap- costs. Perhaps most importantly, it does lete, just like the server on which they reside.) As Brill proach can go a not take into account your initial CAPEX pointed out in a Forbes interview, “After weeks or months long way toward investment, nor the opportunity costs pass and employees turn over, the details of what can be making IT staff associated with having expended a large removed will be forgotten, and it becomes a major feel some owner- portion of your CAPEX budget on equip- research project to identify what is not needed.” ship of the issue. ment that is going largely unused. Page 8 Processor.com October 8, 2010 IT Events Upcoming C O V E R F O C U S For more Upcoming IT Events, see page 3. CCNA “X” Boot Camp Training Oct. 18-22 Disaster Recovery Planning New Horizons Computer Learning Center Lexington, Ky. www.nhlexington.com • • • • • Interop Oct. 18-22 Cover All The Bases Before The Worst Happens Javits Convention Center New York, N.Y. www.interop.com/newyork • • • • • AITP Long Island by Bruce Gain what they are supposed to do Oct. 19 • • • and what they are not sup- www.aitp-li.org AFIREERUPTSin the middle of posed to do. They need to • • • • • AITP Southwest Missouri the night in your enterprise’s know the boundaries.” Oct. 19 warehouse that quickly spreads Springfield, Mo. to the server room just a few Don’t Forget aitpspringfield.org About The Business walls away. Although the local • • • • • fire department arrives in less Given the technology op- ISSA St. Louis Chapter Oct. 19 than 10 minutes and quickly tions from which admins can St. Louis, Mo. extinguishes the flames, the choose to recover from a dis- stl.issa.org data center’s entire cooling aster, it might be easy to forget • • • • • and power infrastructure is that disaster recovery planning Oklahoma City destroyed, along with several must ultimately serve the AITP Chapter Oct. 19 mission-critical servers. The enterprise’s business needs Oklahoma City, Okla. data center will not be opera- first. “Today, IT infrastructure www.aitp.org/organization/chapters tional again for several weeks. is undergoing radical change /chapterhome.jsp?chapter=40 At the start of the following as a result of virtualization, • • • • • business day, there are no cloud computing, globaliza- AFCOM Central Ohio Oct. 20 working servers with which to tion of customer markets, and Columbus, Ohio take and send orders, meaning supply chain; however, the www.afcomcentralohio.org the enterprise will no longer be • • • • • able to generate revenue. In the AITP Lehigh Valley Key Points IT department, nobody seems Oct. 20 Fleetwood, Pa. to know how the backup sys- • Disaster recovery planning should be an www.lv-aitp.org tems work or even where the ongoing and constantly evolving process. • • • • • backed-up data and applications are. The AITP Northeastern Carefully Plan Backups & Management Finalizing plans and then waiting for a dis- CTO knows that a disaster recovery plan Wisconsin Chapter aster to happen is not recommended. was completed a few years ago but is unfa- Admins are constantly assessing data cen- Oct. 20, 4:15 p.m. Holiday Inn Select miliar with the specifics, and the person ter and network capacity needs, but don’t • A disaster recovery plan is only as good as 150 S. Nicolet Road who set up the plan is mountain-climbing in forget to adjust the capacities needed for the document that staffers must use and Appleton, Wis. Tibet and is not reachable by phone or adequate backups as part of disaster recov- rely on in the event of a disaster. new.aitp.org email. The scenario is frightening, but ery planning. “It is not an either/or model, • Planning should prioritize quick restoration of • • • • • AITP Atlanta unfortunately, it is all too representative of because you have to think about planning in applications and data that users require with Oct. 21, 5:30 p.m. what can happen when disaster strikes. such a way that integrates your data center’s less emphasis on nonessential systems. Crowne Plaza Atlanta Perimeter NW Here are some ways to better plan for dis- data and applications with the backups,” 6345 Powers Ferry Road NW aster recovery so that if the worst does hap- says Clemens Pfeiffer, CTO for Power fundamentals of business continuity and Atlanta, Ga. pen, your enterprise’s server applications Assure (www.powerassure.com). “For that disaster recovery are still the same,” says www.aitpatlanta.org can be back up and running quickly. matter, any capacity improvements should Michael Croy, director of business contin- • • • • • AITP Greater Boston improve disaster recovery, as well.” uity solutions at Forsythe Technology Prioritize & Organize Oct. 21 Plans must also cover strategies for any (www.forsythe.com). “The most basic prin- Phillip’s Old Colony House The importance of applications and data office, regardless of location. At the same ciple is that disaster recovery covers not Dorchester, Mass. varies, so disaster recovery planning time, disaster recovery plans should also only technology, but the services a business www.bostonaitp.org should likewise prioritize what gets recov- involve drawing on admins from locations relies on and provides. It’s about the • • • • • AITP Omaha ered first in the event of a disaster. “If you offsite on an as-needed basis to manage resiliency of those services, and it includes Oct. 21 have 10 servers, there might be three that other data center locations remotely in the people, processes, and the whole supply Omaha, Neb. are mission-critical that everyone needs to event of a disaster. However, having too chain,” Croy says. “Every organization www.aitpomaha.com do their job all day long,” says John many people doing too many things can needs to be aware of its own ability to • • • • • Matzek, CEO of Logic IT Consulting. “But also cause problems in the event of a disas- recover from a business interruption and ISSA Parsippany Oct. 23 some servers might be less important, so ter. “You don’t want to have too much help also be aware of the capabilities of its Deloitte Services that if you turn them off, nobody would in certain areas that can cause it to be more suppliers, including any cloud service, 100 Kimball Drive notice for a few days.” chaotic,” Edwards says. software-as-a-service, or platform-as-a- Parsippany, N.J. Prioritizing should involve gathering To combat having too many cooks in the service providers.” nj.issa.org input from people outside of the IT depart- proverbial kitchen, admins should clearly So although disaster recovery solutions • • • • • ISSA Des Moines ment. “Instead of getting the email server outline who does what in their disaster continue to evolve, the fundamental ques- Oct. 25 to work first, the executive knows that the recovery plans. “You need to outline what tions remain the same for disaster recovery 3920 SW Camden Circle impact if the calendar is unavailable is staffers need and can do and clearly outline planning. For example, Croy says disaster Ankeny, Iowa more significant,” Matzek says. “That is whom you need to contact to get approval recovery planning must ensure that the www.issa-desmoines.org why it is important to have the input from from before you start,” Edwards says. organization knows which processes and • • • • • AITP Akron everybody in the different departments to It is also necessary to spell out what IT applications are mission-critical and how Oct. 26 prioritize so everybody understands what staffers should not do. “Somebody from the quickly mission-critical processes and appli- Akron, Ohio is important.” security team might try to figure out how cations can be restored. Proper planning www.akron-aitp.org Remember, too, that the best disaster to get a Web site switched over but who also should involve assessing potential busi- • • • • • recovery plan is not much good if only one doesn’t know all of the ins and outs and ness impacts of interruption and making ISSA Inland Empire Oct. 26, 11:30 a.m. person has everything in his or her head details,” Edwards says. “Instead, you have sure IT admins and business leaders close Coco’s Restaurant and Bakery and is missing on the day things go wrong. to make sure the security team, Web [man- any gaps between their recovery needs and 60 West Foothill Blvd. That is why it is essential to make sure that agement teams], and facility groups know their recovery capabilities. P Upland, Calif. plans are widely documented and that perti- ie.issa.org nent information is readily available, says • • • • • ISSA Baltimore Bryce Edwards, general manager of com- Best Tip: Go Active-Active Oct. 27, 4:30 p.m. plex infrastructure and managed hosting for Sparta Inc. The Planet (www.theplanet.com). “Even Once the perfect plan is in place, many might think it is OK to step down and move on to another 7110 Samuel Morse Drive, make sure that you have cheat sheets print- project while hoping for the best if and when disaster strikes. Jack Norris, vice president of market- Suite 200 Columbia, Md. ed out in hard copies with important con- ing for Power Assure (www.powerassure.com), describes this wait-and-see approach as a “pas- www.issa-balt.org tact details and escalation procedures that sive-active” process. Instead, planning for disaster should be an ongoing process, which Norris • • • • • IT [staffers] have and keep in their wal- describes as “active-active” planning. “Continually making sure that disaster recovery plans are AITP California Southland lets,” Edwards says. “The IT staff also ready to be executed at any time is an ‘active-active’ approach,” Norris says. “Whether enterprises Oct. 27 needs to know whom to contact, so whether have their own site or whether they take advantage of hosted opportunities, active-active is viable www.aitpcalsouthland.org it is different technical, facility, [or] data regardless of the size of the enterprise.” center providers, etc., you need to know.” October 8, 2010 Processor.com Page 9 DS-RPC Remote Site Management Series Device Management • Console Port Management • Remote Power Control • True RMS Voltage/Current • SNMP Support • HTTP Power Control • SSHv2/SSL Secure Access • RADIUS Authentication • Direct TCP Port Access • Telnet/SSH Menu Device Selection • Device Port Naming • Individual Port Password Assignment BayTech’s DS-RPC Remote Management Series provides secure and RADIUS authentication, SNMP, and user access lists per port allow reliable management for your network, servers, and console ports. system administrators to remotely manage the DS Series with greater The DS-RPC combines the powerful combination of power manage- confidence and control. The selected host module provides either ment and console access. The cost-effective DS-RPC Series is meant secure in-band or dial-up out-of-band access to your DS-RPC Series for single connection applications. Security features such as SSH v2, remote management solution. Bay Technical Assoc. Inc. 5239 A Avenue Long Beach, MS 39560 Tel: 228-563-7334 Fax: 228-563-7335 [email protected] A Gaw Associates, Inc. Company ● Toll Free: 877-GAW-RACK DataCenterDepot.com (429-7225) ePower We are an industry leader, nationally recognized Cyber Switching’s new ePower family is targeted at data center for the highest quality managers searching for greener solutions which integrate rich features while providing unsurpassed reliability and great value. products and services, as well as most • Color LCD Touchscreen - Enhanced productivity – interactive screen allows for local management economical solutions. - Quick and easy setup – configure network access within 5 minutes with no laptop needed • Cyber Breaker® the Virtual Circuit Breaker - “Trips” an individual outlet when the amperage exceeds a user-defined threshold - Limits overcurrent conditions to a single outlet, protecting equipment - More freedom with faster response times and user-definable trip curve Made in the USA Adjustable height tables • Individual Outlet Power Metering and Control - Utility-grade metering and control (±2% accuracy) - Track usage and reduce costs when enrolling in Standard & Utility Company Incentive Programs Seismic racks • Demand/Response Load Shedding - Proactively shed loads manually or enroll in AutoDR program - Protect your mission-critical applications during Demand/Response events Wall mount racks • Two High-Speed USB ports - External peripherals: environmental sensors, web cams, flash drives, hubs, etc. Rack accessories • Slimmest PDU with Individual Outlet Metering on the Market ● Cable ladders - Product depth only 2.25 inches thick • 60+ High Density PDU Configurations ● Cable management - Wye and Delta 3o inputs from 4.2 kW to 27.3 kW ● Custom manufactured Contact: [email protected] or (888) 311-6277 to place your order or for more information racks and accessories ● Design solutions and free expert Some Of Our Valued Customers Include: Adobe Systems • ANL • Blue Cross Blue Shield consulting Brocade Communications • Cisco Systems • General Dynamics • Department of Defense ● Extreme Networks • Hewlett-Packard • Intel • Jabil • NEC • Telenav • WebEx Rack and stack Technical furniture Rack mount travel case Call us today, receive answers today: 877-429-7225 Give us 1% of your business . . . we’ll earn the rest! www.cyberswitching.com • (888) 436-9830 Page 10 Processor.com October 8, 2010 News C O V E R F O C U S Test Your Disaster Recovery Plan A Few Steps Today Will Save Your Data Center Tomorrow | IT Industry Sees Growth In Employment Rate by Chris A. MacKinnon performance and storage efficiency by an interruption test (wherein production There’s good news in the wake of the reces- • • • implementing more aggressive deletion processing is failed over to the recovery sion for those looking for IT-related jobs. NO DATA CENTER is exempt from disaster. policies, regulatory compliance demands site) even be considered, Quin says. According to TechAmerica Foundation, about The truth is disasters happen all the time, are forcing them to keep older data on file Rodin, on the other hand, says the only 30,200 tech jobs were added in the first six caused by such things as human error, sys- for several years. He says that as the rate effective way to test a disaster plan is months of this year, compared to a loss of tem breakdowns, and natural disasters. of data production continues to grow, it through simulation tests that are run at about 143,000 jobs during the same time last Worst of all, you never know if or when it creates a snowball effect. “Another trend least once a year. And when you test your year. However, many aren’t sure if this growth will happen to you. The main question is: is that companies are cutting back on their plan, Rodin says, you should try a num- trend will continue. Industry analysts say that Are you ready for a disaster if it happens to IT spending, training, and staffing because ber of different scenarios. “For example,” growth will be slow as the country continues to your data center? Part of being ready for a of difficult economic conditions,” Rodin he says, “what if your CEO’s laptop was rise out of the recession but that any increase disaster in the enterprise is knowing how to says. “This increases the likelihood of stolen and it contained important data? in employment is a good sign that companies test a disaster plan and also how often you unexpected disasters.” Or what if human resources needed to are looking to hire again. should test it. Here are a few suggestions to retrieve six years’ worth of old files for a Testing Methods | help you prepare for when disaster strikes. wrongful dismissal suit—how long SCO Selling Unix Assets In Quin’s opinion, there is a well-estab- would it take you to search through six The SCO Group plans to auction off “substan- lished hierarchy of testing types for disas- years of historical email and locate all Key Points tially all” of its Unix business, according to a ter recovery infrastructure and operations. conversations relating to a specific topic, recent announcement. The items up for grabs, “Walkthrough tests are essentially docu- theme, or incident?” the company says, are “free and clear of liens • Walkthrough tests, in which a hypothetical ment reviews where a hypothetical disas- Rodin says another consideration is how and encumbrances” related to its 2008 filing for disaster is posited and the team walks ter is posited and the team walks through quickly you can recover a critical server in Chapter 11 bankruptcy protection. Items being through the plan for resolution, should the resolution according to the details the event of power failure causing disk sold include Unix System V software and ser- always occur first. These tests can help failure. Additionally, how vices. SCO drew much attention in 2003 when find gaps and oversights in the plan itself. quickly can you rebuild a it unsuccessfully sued IBM and later Novell • An effective way to test a disaster plan is server from bare metal? over Unix, the former for allegedly infringing on through simulation tests, which should be And if the data center contributions to Linux source code and the lat- run at least once a year. Try a number of caught fire, how much ter regarding the ownership of Unix IP. scenarios when you test the plan. downtime would the com- pany have to endure before • Testing a plan is also about discovering coming back online? How mistakes, oversights, and errors in the long would this take? And plan and supporting infrastructure. how long would it take you to set up a new server at another location on a The Plan Is A Priority moment’s notice? James Quin, lead research As far as frequency is con- analyst with Info-Tech Re- cerned, Quin says that, real- search Group, says a disaster istically speaking, enterprises plan should be a priority should be continually testing | in any data center. Quin their plans. “The point of Gartner: IT Debt To Reach $500 Billion says disaster preparedness testing is less about building According to Gartner, global IT debt will total ensures that the IT opera- the skills to operate the plan about $500 billion this year, and it could tions of an enterprise are in the event of a disaster than reach $1 trillion by 2015. IT debt is defined able to recover from some it is about discovering mis- by Gartner as the cost of clearing out the form of outage-inducing takes, oversights, and errors backlog of maintenance that would be re- interruption. “Given that in the plan and supporting quired to bring an enterprise’s applications enterprises these days are infrastructure,” he says, fully up-to-date. The gap is largely the result essentially completely re- adding that as each error is of shrinking IT budgets over the past decade, liant on their IT operations found and corrected, subse- and Gartner says the debt is higher than ever to perform their business quent testing is needed. before and could pose a serious risk to orga- operations, the ability to recover from such outlined in the plan,” he explains. “These Quin says enterprises should try to nizations’ business systems. Gartner recom- outages means that they are able to continue tests should always occur first and are avoid testing the disaster recovery in mends that enterprises create annual status to operate as a viable functioning business,” used to find gaps and oversights in the “broad strokes.” He says the likelihood reports on their application portfolios to keep Quin says. (For tips on what to include in plan itself.” that catastrophic failures will occur is far track of applications and ensure that they your disaster recovery plan, turn to “Disas- Quin says after walkthrough tests, there lower than the likelihood of localized don’t become obsolete or break down. ter Recovery Planning” on page 8.) are simulation tests and parallel tests. “In “small-scale” outages. “Further, broad | According to Steven Rodin, CEO of the former, the recovery infrastructure is testing requires a tremendous leveraging Six Companies Accused Of Storagepipe Solutions (www.storagepipe brought online to make sure processes of resources, while scenario testing can be Anticompetitive Hiring Agreement .com), a number of trends are pushing the work and that systems can be made func- accomplished with less effort,” he says. Google, Apple, Intel, Adobe Systems, Intuit, increasing need for data center disaster tional,” he says. “In the latter, historical “Over time, the sum of the work per- and Walt Disney’s Pixar Animation Studios planning. First, Rodin says data is growing data is processed to ensure appropriate formed in scenario testing will more than have reached a settlement with the U.S. at an alarming rate; in fact, many compa- results are generated.” Only after all these equate to the gains that can be made with Department of Justice in which the compa- nies are reporting data growth rates of types of tests have been conducted should catastrophic failure testing.” P nies agreed to end anticompetitive hiring 50% or more per year. Secondly, he says practices. After an initial (and ongoing) inves- the current trend for business is moving Top Tip: Work With Trustworthy, Capable Vendors tigation into employer practices, the DoJ filed toward a geographically dispersed, 24/7 a complaint concerning the companies’ service model. “Customers want to submit According to Steven Rodin, chief executive officer at Storagepipe Solutions (www.storagepipe agreement not to poach top employees from purchase orders online, pay bills online, .com), when it comes to disaster recovery planning, corporate data protection is very complex. one another. According to the DoJ, such a and access their accounts through cus- “You have to deal with many different systems (email, databases, operating systems, laptops, pact limits the employees’ opportunities to tomer-facing online portals from anywhere, compliance, high-availability, etc.), and each of these requires a different disaster protection compete for top positions, in turn eliminating at any time,” he says. “The productivity approach,” he says. “The best advice would be to pick a partner that offers many different types the possibility of bidding wars or higher cost of unplanned downtime is increasing, of business data protection solutions and to have them put together a tailored disaster recovery salaries for those employees. The settlement and so is the revenue cost from lost trans- plan based on your IT needs.” He concludes, “When you work through a trusted vendor for your will prohibit companies from entering into actions and service failure.” entire backup, recovery, and availability systems, it simplifies your IT management and reduces such an agreement. Rodin says that although it might be or eliminates the possibility of overlap, waste, or system conflicts.” tempting for businesses to improve server