P.O. Box 85518 Lincoln, NE 68501-5518 ELECTRONIC SERVICE REQUESTED July 15, 2011 Volume 33 Number 14 www.processor.com Products, News & Information Data Centers Can Trust. Since 1979 In This Issue... (cid:40)(cid:66)(cid:84)(cid:70)(cid:80)(cid:86)(cid:84)(cid:1)(cid:39)(cid:74)(cid:83)(cid:70)(cid:1) FEATURE PACKAGE Virtualization Expert Advice In Four Key Areas (cid:52)(cid:86)(cid:81)(cid:81)(cid:83)(cid:70)(cid:84)(cid:84)(cid:74)(cid:80)(cid:79)(cid:1) How can you better trouble- shoot performance issues? (cid:52)(cid:90)(cid:84)(cid:85)(cid:70)(cid:78)(cid:84) Improve your patching and update process? We talked & The SMB with experts to answer those questions and others. Weigh The Pros & Cons Better Data Center Visualization................................24 To Determine If Gaseous Troubleshooting Performance Issues........................25 Alternatives Are Right Improving Your Patch & Update Process...................26 Small Companies & Virtualization Technologies Building A Successful IT Team..................................27 For Your Enterprise Are Not Mutually Exclusive PHYSICAL INFRASTRUCTURE ■ In order to extinguish fires as quickly as possible and by Robyn Weisman (cid:66)(cid:79)(cid:69)(cid:1)(cid:67)(cid:70)(cid:68)(cid:66)(cid:86)(cid:84)(cid:70)(cid:1)(cid:85)(cid:73)(cid:70)(cid:74)(cid:83)(cid:1)(cid:74)(cid:79)(cid:71)(cid:83)(cid:66)(cid:84)(cid:85)(cid:83)(cid:86)(cid:68)(cid:85)(cid:86)(cid:83)(cid:70)(cid:84)(cid:1)(cid:66)(cid:83)(cid:70)(cid:1)(cid:84)(cid:80)(cid:1) by Cynthia Harvey minimize the potential damage, many enterprises are (cid:114)(cid:1)(cid:1)(cid:1)(cid:1)(cid:1)(cid:1)(cid:114)(cid:1)(cid:1)(cid:1)(cid:1)(cid:1)(cid:1)(cid:114) (cid:78)(cid:74)(cid:79)(cid:74)(cid:78)(cid:66)(cid:77)(cid:1)(cid:85)(cid:73)(cid:66)(cid:85)(cid:1)(cid:74)(cid:85)(cid:1)(cid:88)(cid:80)(cid:86)(cid:77)(cid:69)(cid:79)(cid:8)(cid:85)(cid:1)(cid:84)(cid:70)(cid:70)(cid:78)(cid:1)(cid:79)(cid:70)(cid:68)(cid:70)(cid:84)(cid:84)(cid:66)(cid:83)(cid:90)(cid:15) (cid:114)(cid:1)(cid:1)(cid:1)(cid:1)(cid:1)(cid:1)(cid:114)(cid:1)(cid:1)(cid:1)(cid:1)(cid:1)(cid:1)(cid:114) turning to gaseous fire suppression systems. Although Virtualization(cid:1)(cid:73)(cid:66)(cid:84)(cid:1)(cid:72)(cid:80)(cid:85)(cid:85)(cid:70)(cid:79)(cid:1)(cid:66)(cid:1)(cid:77)(cid:80)(cid:85)(cid:1)(cid:80)(cid:71)(cid:1) (cid:35)(cid:86)(cid:85)(cid:1)(cid:52)(cid:46)(cid:35)(cid:84)(cid:1)(cid:66)(cid:83)(cid:70)(cid:1)(cid:79)(cid:80)(cid:1)(cid:69)(cid:74)(cid:71)(cid:71)(cid:70)(cid:83)(cid:70)(cid:79)(cid:85)(cid:1)(cid:85)(cid:73)(cid:66)(cid:79)(cid:1)(cid:85)(cid:73)(cid:70)(cid:74)(cid:83)(cid:1) For data centers,(cid:1)(cid:71)(cid:74)(cid:83)(cid:70)(cid:1)(cid:83)(cid:70)(cid:81)(cid:83)(cid:70)(cid:84)(cid:70)(cid:79)(cid:85)(cid:84)(cid:1)(cid:66) these systems can be costly, they offer a number of (cid:85)(cid:83)(cid:66)(cid:68)(cid:85)(cid:74)(cid:80)(cid:79)(cid:1)(cid:74)(cid:79)(cid:1)(cid:85)(cid:73)(cid:70)(cid:1)(cid:70)(cid:79)(cid:85)(cid:70)(cid:83)(cid:81)(cid:83)(cid:74)(cid:84)(cid:70)(cid:1)(cid:88)(cid:80)(cid:83)(cid:77)(cid:69)(cid:1)(cid:80)(cid:87)(cid:70)(cid:83)(cid:1)(cid:85)(cid:73)(cid:70)(cid:1) (cid:77)(cid:66)(cid:83)(cid:72)(cid:70)(cid:83)(cid:1)(cid:68)(cid:80)(cid:86)(cid:84)(cid:74)(cid:79)(cid:84)(cid:15)(cid:1)(cid:45)(cid:74)(cid:76)(cid:70)(cid:1)(cid:67)(cid:74)(cid:72)(cid:72)(cid:70)(cid:83)(cid:1)(cid:70)(cid:79)(cid:85)(cid:70)(cid:83)(cid:81)(cid:83)(cid:74)(cid:84)(cid:70)(cid:84)(cid:13)(cid:1) (cid:87)(cid:70)(cid:83)(cid:90)(cid:1)(cid:83)(cid:70)(cid:66)(cid:77)(cid:1)(cid:85)(cid:73)(cid:83)(cid:70)(cid:66)(cid:85)(cid:15)(cid:1)(cid:34)(cid:68)(cid:68)(cid:80)(cid:83)(cid:69)(cid:74)(cid:79)(cid:72)(cid:1)(cid:85)(cid:80)(cid:1)(cid:85)(cid:73)(cid:70)(cid:1)(cid:54)(cid:15)(cid:52)(cid:15)(cid:1)(cid:39)(cid:74)(cid:83)(cid:70) advantages over water-based systems....................page 1 (cid:77)(cid:66)(cid:84)(cid:85)(cid:1)(cid:71)(cid:70)(cid:88)(cid:1)(cid:90)(cid:70)(cid:66)(cid:83)(cid:84)(cid:13)(cid:1)(cid:67)(cid:86)(cid:85)(cid:1)(cid:88)(cid:73)(cid:66)(cid:85)(cid:1)(cid:66)(cid:67)(cid:80)(cid:86)(cid:85)(cid:1)(cid:74)(cid:79)(cid:1)(cid:84)(cid:78)(cid:66)(cid:77)(cid:77)(cid:1) (cid:85)(cid:73)(cid:70)(cid:90)(cid:1)(cid:66)(cid:77)(cid:84)(cid:80)(cid:1)(cid:88)(cid:66)(cid:79)(cid:85)(cid:1)(cid:85)(cid:80)(cid:1)(cid:74)(cid:79)(cid:68)(cid:83)(cid:70)(cid:66)(cid:84)(cid:70)(cid:1)(cid:85)(cid:73)(cid:70)(cid:74)(cid:83)(cid:1)(cid:67)(cid:86)(cid:84)(cid:74)(cid:79)(cid:70)(cid:84)(cid:84)(cid:1) (cid:34)(cid:69)(cid:78)(cid:74)(cid:79)(cid:74)(cid:84)(cid:85)(cid:83)(cid:66)(cid:85)(cid:74)(cid:80)(cid:79)(cid:13)(cid:1)(cid:78)(cid:80)(cid:83)(cid:70)(cid:1)(cid:85)(cid:73)(cid:66)(cid:79)(cid:1)(cid:25)(cid:26)(cid:13)(cid:17)(cid:17)(cid:17)(cid:1)(cid:79)(cid:80)(cid:79)(cid:14) (cid:66)(cid:79)(cid:69)(cid:1)(cid:78)(cid:70)(cid:69)(cid:74)(cid:86)(cid:78)(cid:14)(cid:84)(cid:74)(cid:91)(cid:70)(cid:69)(cid:1)(cid:67)(cid:86)(cid:84)(cid:74)(cid:79)(cid:70)(cid:84)(cid:84)(cid:70)(cid:84)(cid:32)(cid:1)(cid:56)(cid:73)(cid:70)(cid:79)(cid:1)(cid:90)(cid:80)(cid:86)(cid:1) (cid:66)(cid:72)(cid:74)(cid:77)(cid:74)(cid:85)(cid:90)(cid:13)(cid:1)(cid:74)(cid:78)(cid:81)(cid:83)(cid:80)(cid:87)(cid:70)(cid:1)(cid:85)(cid:73)(cid:70)(cid:74)(cid:83)(cid:1)(cid:70)(cid:71)(cid:71)(cid:74)(cid:68)(cid:74)(cid:70)(cid:79)(cid:68)(cid:74)(cid:70)(cid:84)(cid:13)(cid:1)(cid:66)(cid:79)(cid:69)(cid:1) (cid:83)(cid:70)(cid:84)(cid:74)(cid:69)(cid:70)(cid:79)(cid:85)(cid:74)(cid:66)(cid:77)(cid:1)(cid:67)(cid:86)(cid:74)(cid:77)(cid:69)(cid:74)(cid:79)(cid:72)(cid:84)(cid:1)(cid:70)(cid:89)(cid:81)(cid:70)(cid:83)(cid:74)(cid:70)(cid:79)(cid:68)(cid:70)(cid:69)(cid:1)(cid:71)(cid:74)(cid:83)(cid:70)(cid:84)(cid:1)(cid:74)(cid:79)(cid:1) ■ ITC Tech’s cabinet solutions run the gamut of designs (cid:85)(cid:73)(cid:74)(cid:79)(cid:76)(cid:1)(cid:80)(cid:71)(cid:1)(cid:68)(cid:80)(cid:78)(cid:81)(cid:66)(cid:79)(cid:74)(cid:70)(cid:84)(cid:1)(cid:88)(cid:74)(cid:85)(cid:73)(cid:1)(cid:71)(cid:70)(cid:88)(cid:70)(cid:83)(cid:1)(cid:85)(cid:73)(cid:66)(cid:79)(cid:1)(cid:18)(cid:17)(cid:17)(cid:1) (cid:78)(cid:66)(cid:76)(cid:70)(cid:1)(cid:78)(cid:80)(cid:79)(cid:70)(cid:90)(cid:15)(cid:1)(cid:46)(cid:80)(cid:83)(cid:70)(cid:1)(cid:74)(cid:78)(cid:81)(cid:80)(cid:83)(cid:85)(cid:66)(cid:79)(cid:85)(cid:77)(cid:90)(cid:13)(cid:1)(cid:81)(cid:70)(cid:83)(cid:73)(cid:66)(cid:81)(cid:84)(cid:13)(cid:1) (cid:19)(cid:17)(cid:17)(cid:26)(cid:1)(cid:9)(cid:85)(cid:73)(cid:70)(cid:1)(cid:78)(cid:80)(cid:84)(cid:85)(cid:1)(cid:83)(cid:70)(cid:68)(cid:70)(cid:79)(cid:85)(cid:1)(cid:90)(cid:70)(cid:66)(cid:83)(cid:1)(cid:71)(cid:80)(cid:83)(cid:1)(cid:88)(cid:73)(cid:74)(cid:68)(cid:73)(cid:1)(cid:69)(cid:66)(cid:85)(cid:66)(cid:1)(cid:74)(cid:84)(cid:1) for infrastructures. The company produces everything from (cid:70)(cid:78)(cid:81)(cid:77)(cid:80)(cid:90)(cid:70)(cid:70)(cid:84)(cid:13)(cid:1)(cid:87)(cid:74)(cid:83)(cid:85)(cid:86)(cid:66)(cid:77)(cid:74)(cid:91)(cid:66)(cid:85)(cid:74)(cid:80)(cid:79)(cid:1)(cid:74)(cid:84)(cid:79)(cid:8)(cid:85)(cid:1)(cid:85)(cid:73)(cid:70)(cid:1)(cid:71)(cid:74)(cid:83)(cid:84)(cid:85)(cid:1) (cid:78)(cid:66)(cid:79)(cid:90)(cid:1)(cid:52)(cid:46)(cid:35)(cid:84)(cid:1)(cid:73)(cid:80)(cid:81)(cid:70)(cid:1)(cid:85)(cid:80)(cid:1)(cid:67)(cid:70)(cid:68)(cid:80)(cid:78)(cid:70)(cid:1)(cid:70)(cid:79)(cid:85)(cid:70)(cid:83)(cid:81)(cid:83)(cid:74)(cid:84)(cid:70)(cid:14) (cid:66)(cid:87)(cid:66)(cid:74)(cid:77)(cid:66)(cid:67)(cid:77)(cid:70)(cid:10)(cid:13)(cid:1)(cid:66)(cid:79)(cid:69)(cid:1)(cid:85)(cid:73)(cid:80)(cid:84)(cid:70)(cid:1)(cid:224)(cid:83)(cid:70)(cid:84)(cid:1)(cid:68)(cid:66)(cid:86)(cid:84)(cid:70)(cid:69)(cid:1)(cid:78)(cid:80)(cid:83)(cid:70)(cid:1)(cid:85)(cid:73)(cid:66)(cid:79)(cid:1) standard enclosures to industrial cabinets to customized (cid:85)(cid:73)(cid:74)(cid:79)(cid:72)(cid:1)(cid:85)(cid:80)(cid:1)(cid:68)(cid:80)(cid:78)(cid:70)(cid:1)(cid:85)(cid:80)(cid:1)(cid:78)(cid:74)(cid:79)(cid:69)(cid:1)(cid:67)(cid:70)(cid:68)(cid:66)(cid:86)(cid:84)(cid:70)(cid:13)(cid:1)(cid:88)(cid:70)(cid:77)(cid:77)(cid:13)(cid:1) (cid:68)(cid:77)(cid:66)(cid:84)(cid:84)(cid:1)(cid:68)(cid:80)(cid:78)(cid:81)(cid:66)(cid:79)(cid:74)(cid:70)(cid:84)(cid:13)(cid:1)(cid:74)(cid:71)(cid:1)(cid:79)(cid:80)(cid:85)(cid:1)(cid:74)(cid:79)(cid:1)(cid:85)(cid:73)(cid:70)(cid:1)(cid:39)(cid:80)(cid:83)(cid:85)(cid:86)(cid:79)(cid:70)(cid:1) (cid:5)(cid:19)(cid:15)(cid:24)(cid:1)(cid:67)(cid:74)(cid:77)(cid:77)(cid:74)(cid:80)(cid:79)(cid:1)(cid:88)(cid:80)(cid:83)(cid:85)(cid:73)(cid:1)(cid:80)(cid:71)(cid:1)(cid:69)(cid:66)(cid:78)(cid:66)(cid:72)(cid:70)(cid:15)(cid:1) designs for special applications.................................page 12 (cid:78)(cid:80)(cid:84)(cid:85)(cid:1)(cid:80)(cid:71)(cid:1)(cid:85)(cid:73)(cid:70)(cid:78)(cid:1)(cid:66)(cid:83)(cid:70)(cid:1)(cid:77)(cid:86)(cid:68)(cid:76)(cid:90)(cid:1)(cid:85)(cid:80)(cid:1)(cid:73)(cid:66)(cid:87)(cid:70)(cid:1)(cid:70)(cid:87)(cid:70)(cid:79)(cid:1)(cid:66)(cid:1) (cid:22)(cid:17)(cid:17)(cid:1)(cid:80)(cid:79)(cid:70)(cid:1)(cid:69)(cid:66)(cid:90)(cid:15)(cid:1)(cid:56)(cid:73)(cid:70)(cid:79)(cid:1)(cid:85)(cid:73)(cid:80)(cid:84)(cid:70)(cid:1)(cid:85)(cid:73)(cid:80)(cid:86)(cid:72)(cid:73)(cid:85)(cid:84)(cid:1)(cid:66)(cid:83)(cid:70)(cid:1) (cid:56)(cid:73)(cid:70)(cid:79)(cid:1)(cid:66)(cid:1)(cid:69)(cid:66)(cid:85)(cid:66)(cid:1)(cid:68)(cid:70)(cid:79)(cid:85)(cid:70)(cid:83)(cid:1)(cid:70)(cid:89)(cid:81)(cid:70)(cid:83)(cid:74)(cid:70)(cid:79)(cid:68)(cid:70)(cid:84)(cid:1)(cid:66)(cid:1)(cid:71)(cid:74)(cid:83)(cid:70)(cid:13)(cid:1) ■ Burk Technology Climate Guard is an environmental (cid:84)(cid:74)(cid:79)(cid:72)(cid:77)(cid:70)(cid:1)(cid:42)(cid:53)(cid:1)(cid:81)(cid:83)(cid:80)(cid:71)(cid:70)(cid:84)(cid:84)(cid:74)(cid:80)(cid:79)(cid:66)(cid:77)(cid:1)(cid:88)(cid:80)(cid:83)(cid:76)(cid:74)(cid:79)(cid:72)(cid:1)(cid:71)(cid:80)(cid:83)(cid:1)(cid:85)(cid:73)(cid:70)(cid:78)(cid:1) (cid:76)(cid:70)(cid:81)(cid:85)(cid:1)(cid:74)(cid:79)(cid:1)(cid:78)(cid:74)(cid:79)(cid:69)(cid:13)(cid:1)(cid:85)(cid:73)(cid:70)(cid:1)(cid:69)(cid:70)(cid:84)(cid:74)(cid:83)(cid:70)(cid:1)(cid:85)(cid:80)(cid:1)(cid:87)(cid:74)(cid:83)(cid:85)(cid:86)(cid:66)(cid:77)(cid:74)(cid:91)(cid:70)(cid:1)(cid:66)(cid:85)(cid:1) (cid:83)(cid:70)(cid:81)(cid:66)(cid:74)(cid:83)(cid:74)(cid:79)(cid:72)(cid:1)(cid:85)(cid:73)(cid:70)(cid:1)(cid:71)(cid:66)(cid:68)(cid:74)(cid:77)(cid:74)(cid:85)(cid:74)(cid:70)(cid:84)(cid:1)(cid:66)(cid:79)(cid:69)(cid:1)(cid:83)(cid:70)(cid:81)(cid:77)(cid:66)(cid:68)(cid:74)(cid:79)(cid:72)(cid:1)(cid:70)(cid:89)(cid:81)(cid:70)(cid:79)(cid:84)(cid:74)(cid:87)(cid:70)(cid:1)(cid:1) monitoring system for data centers that includes an intui- tive Web interface for tracking and management.....page 13 Key Points ■ Although an overabundance of cables is a fact of life in today’s data centers, careful cable man- (cid:114)(cid:1) Clean-agent fire suppression systems agement and the right tools can help data centers work in one of two ways: either by avoid cable sprawl....................................page 14 diluting the amount of oxygen in a room or by chemically interrupting and ■Buying Guide: Fire Protection.....................page 15 cooling the fire. ■Product Spotlight: Fire Protection..............page 16 (cid:114)(cid:1) Because gaseous systems activate when ■Product Spotlight: fires are small and don’t cause additional Data Center Furniture......................................page 18 damage to computer systems, they offer distinct business continuity advantages NETWORKING & VPN over water-based systems. ■Virtualization has gotten a lot of traction in the (cid:114)(cid:1) The biggest disadvantage of gaseous enterprise world over the last few years, but what fire suppression systems is the about in small and medium-sized businesses?..page 1 additional cost. ■VPNshave emerged as a safe way for users to exchange information from beyond the enterprise’s (cid:70)(cid:82)(cid:86)(cid:74)(cid:81)(cid:78)(cid:70)(cid:79)(cid:85)(cid:1)(cid:66)(cid:83)(cid:70)(cid:1)(cid:75)(cid:86)(cid:84)(cid:85)(cid:1)(cid:81)(cid:66)(cid:83)(cid:85)(cid:1)(cid:80)(cid:71)(cid:1)(cid:85)(cid:73)(cid:70)(cid:1)(cid:85)(cid:80)(cid:85)(cid:66)(cid:77)(cid:1)(cid:68)(cid:80)(cid:84)(cid:85)(cid:15)(cid:1)(cid:1) firewall. The problem is that a number of things, includ- (cid:58)(cid:80)(cid:86)(cid:1)(cid:68)(cid:66)(cid:79)(cid:1)(cid:66)(cid:77)(cid:84)(cid:80)(cid:1)(cid:77)(cid:80)(cid:84)(cid:70)(cid:1)(cid:84)(cid:70)(cid:83)(cid:87)(cid:70)(cid:83)(cid:84)(cid:1)(cid:66)(cid:79)(cid:69)(cid:1)(cid:69)(cid:66)(cid:85)(cid:66)(cid:13)(cid:1)(cid:85)(cid:70)(cid:78)(cid:14) ing IP address conflicts and firewall configuration prob- (cid:81)(cid:80)(cid:83)(cid:66)(cid:83)(cid:74)(cid:77)(cid:90)(cid:1)(cid:81)(cid:83)(cid:70)(cid:87)(cid:70)(cid:79)(cid:85)(cid:74)(cid:79)(cid:72)(cid:1)(cid:90)(cid:80)(cid:86)(cid:83)(cid:1)(cid:68)(cid:80)(cid:78)(cid:81)(cid:66)(cid:79)(cid:90)(cid:1)(cid:71)(cid:83)(cid:80)(cid:78)(cid:1) lems, can break the links.................................page 20 (cid:69)(cid:80)(cid:74)(cid:79)(cid:72)(cid:1)(cid:67)(cid:86)(cid:84)(cid:74)(cid:79)(cid:70)(cid:84)(cid:84)(cid:15)(cid:1)(cid:42)(cid:71)(cid:1)(cid:66)(cid:79)(cid:1)(cid:80)(cid:86)(cid:85)(cid:66)(cid:72)(cid:70)(cid:1)(cid:84)(cid:85)(cid:83)(cid:70)(cid:85)(cid:68)(cid:73)(cid:70)(cid:84)(cid:1)(cid:71)(cid:80)(cid:83) (cid:69)(cid:66)(cid:90)(cid:84)(cid:1)(cid:80)(cid:83)(cid:1)(cid:88)(cid:70)(cid:70)(cid:76)(cid:84)(cid:13)(cid:1)(cid:85)(cid:73)(cid:70)(cid:1)(cid:68)(cid:80)(cid:84)(cid:85)(cid:1)(cid:80)(cid:71)(cid:1)(cid:85)(cid:73)(cid:66)(cid:85)(cid:1)(cid:69)(cid:80)(cid:88)(cid:79)(cid:85)(cid:74)(cid:78)(cid:70)(cid:1)(cid:68)(cid:66)(cid:79) ■Buying Guide: (cid:82)(cid:86)(cid:74)(cid:68)(cid:76)(cid:77)(cid:90)(cid:1)(cid:67)(cid:70)(cid:68)(cid:80)(cid:78)(cid:70)(cid:1)(cid:78)(cid:86)(cid:68)(cid:73)(cid:1)(cid:72)(cid:83)(cid:70)(cid:66)(cid:85)(cid:70)(cid:83)(cid:1)(cid:85)(cid:73)(cid:66)(cid:79)(cid:1)(cid:85)(cid:73)(cid:70)(cid:1)(cid:81)(cid:73)(cid:90)(cid:84)(cid:74)(cid:14) VPN & Remote Connectivity....................................page 21 (cid:68)(cid:66)(cid:77)(cid:1)(cid:69)(cid:66)(cid:78)(cid:66)(cid:72)(cid:70)(cid:15)(cid:1) ■Product Spotlight: (cid:34)(cid:68)(cid:68)(cid:80)(cid:83)(cid:69)(cid:74)(cid:79)(cid:72)(cid:1)(cid:85)(cid:80)(cid:1)(cid:37)(cid:66)(cid:87)(cid:74)(cid:69)(cid:1)(cid:41)(cid:80)(cid:71)(cid:71)(cid:78)(cid:66)(cid:79)(cid:13)(cid:1)(cid:78)(cid:66)(cid:83)(cid:76)(cid:70)(cid:85)(cid:14) VPN & Remote Connectivity.......................................page 22 (cid:74)(cid:79)(cid:72)(cid:1)(cid:66)(cid:79)(cid:69)(cid:1)(cid:68)(cid:80)(cid:78)(cid:78)(cid:86)(cid:79)(cid:74)(cid:68)(cid:66)(cid:85)(cid:74)(cid:80)(cid:79)(cid:1)(cid:68)(cid:73)(cid:66)(cid:74)(cid:83)(cid:1)(cid:71)(cid:80)(cid:83)(cid:1)(cid:85)(cid:73)(cid:70)(cid:1)(cid:39)(cid:52)(cid:52)(cid:34)(cid:1) (cid:9)(cid:39)(cid:74)(cid:83)(cid:70)(cid:1)(cid:52)(cid:86)(cid:81)(cid:81)(cid:83)(cid:70)(cid:84)(cid:84)(cid:74)(cid:80)(cid:79)(cid:1)(cid:52)(cid:90)(cid:84)(cid:85)(cid:70)(cid:78)(cid:84)(cid:1)(cid:34)(cid:84)(cid:84)(cid:80)(cid:68)(cid:74)(cid:66)(cid:85)(cid:74)(cid:80)(cid:79)(cid:10) SERVERS (cid:66)(cid:79)(cid:69)(cid:1)(cid:66)(cid:1)(cid:67)(cid:86)(cid:84)(cid:74)(cid:79)(cid:70)(cid:84)(cid:84)(cid:1)(cid:69)(cid:70)(cid:87)(cid:70)(cid:77)(cid:80)(cid:81)(cid:78)(cid:70)(cid:79)(cid:85)(cid:1)(cid:78)(cid:66)(cid:79)(cid:66)(cid:72)(cid:70)(cid:83)(cid:1)(cid:71)(cid:80)(cid:83) Key Points (cid:52)(cid:74)(cid:70)(cid:78)(cid:70)(cid:79)(cid:84)(cid:13)(cid:1)(cid:85)(cid:80)(cid:69)(cid:66)(cid:90)(cid:8)(cid:84)(cid:1)(cid:84)(cid:78)(cid:66)(cid:77)(cid:77)(cid:70)(cid:83)(cid:13)(cid:1)(cid:69)(cid:70)(cid:79)(cid:84)(cid:70)(cid:83)(cid:1)(cid:68)(cid:80)(cid:78)(cid:81)(cid:86)(cid:85)(cid:70)(cid:83)(cid:1) ■Product Spotlight: (cid:84)(cid:90)(cid:84)(cid:85)(cid:70)(cid:78)(cid:84)(cid:1)(cid:84)(cid:86)(cid:68)(cid:73)(cid:1)(cid:66)(cid:84)(cid:1)(cid:67)(cid:77)(cid:66)(cid:69)(cid:70)(cid:1)(cid:84)(cid:70)(cid:83)(cid:87)(cid:70)(cid:83)(cid:84)(cid:1)(cid:78)(cid:66)(cid:76)(cid:70)(cid:1)(cid:69)(cid:66)(cid:85)(cid:66)(cid:1) Rackmount Servers.........................................page 28 (cid:77)(cid:70)(cid:66)(cid:84)(cid:85)(cid:1)(cid:66)(cid:1)(cid:81)(cid:80)(cid:83)(cid:85)(cid:74)(cid:80)(cid:79)(cid:1)(cid:80)(cid:71)(cid:1)(cid:66)(cid:1)(cid:68)(cid:80)(cid:78)(cid:81)(cid:66)(cid:79)(cid:90)(cid:8)(cid:84)(cid:1)(cid:74)(cid:79)(cid:71)(cid:83)(cid:66)(cid:84)(cid:85)(cid:83)(cid:86)(cid:68)(cid:14) (cid:68)(cid:70)(cid:79)(cid:85)(cid:70)(cid:83)(cid:1)(cid:224)(cid:83)(cid:70)(cid:84)(cid:1)(cid:70)(cid:87)(cid:70)(cid:79)(cid:1)(cid:78)(cid:80)(cid:83)(cid:70)(cid:1)(cid:68)(cid:80)(cid:84)(cid:85)(cid:77)(cid:90)(cid:1)(cid:67)(cid:70)(cid:68)(cid:66)(cid:86)(cid:84)(cid:70)(cid:1)(cid:85)(cid:73)(cid:70)(cid:90)(cid:1) (cid:114)(cid:1) (cid:52)(cid:46)(cid:35)(cid:84)(cid:1)(cid:66)(cid:83)(cid:70)(cid:1)(cid:66)(cid:69)(cid:80)(cid:81)(cid:85)(cid:74)(cid:79)(cid:72)(cid:1)(cid:87)(cid:74)(cid:83)(cid:85)(cid:86)(cid:66)(cid:77)(cid:74)(cid:91)(cid:66)(cid:85)(cid:74)(cid:80)(cid:79)(cid:1)(cid:71)(cid:80)(cid:83)(cid:1)(cid:85)(cid:73)(cid:70)(cid:1) STORAGE same reason larger enterprises have: to (cid:85)(cid:86)(cid:83)(cid:70)(cid:1)(cid:84)(cid:70)(cid:70)(cid:78)(cid:84)(cid:1)(cid:85)(cid:80)(cid:1)(cid:67)(cid:70)(cid:1)(cid:66)(cid:1)(cid:79)(cid:80)(cid:14)(cid:67)(cid:83)(cid:66)(cid:74)(cid:79)(cid:70)(cid:83)(cid:15) (cid:84)(cid:85)(cid:80)(cid:83)(cid:70)(cid:1)(cid:84)(cid:80)(cid:1)(cid:78)(cid:86)(cid:68)(cid:73)(cid:1)(cid:69)(cid:66)(cid:85)(cid:66)(cid:1)(cid:74)(cid:79)(cid:1)(cid:66)(cid:1)(cid:87)(cid:70)(cid:83)(cid:90)(cid:1)(cid:84)(cid:78)(cid:66)(cid:77)(cid:77)(cid:1)(cid:84)(cid:81)(cid:66)(cid:68)(cid:70)(cid:15)(cid:1) consolidate their infrastructure, improve (cid:34)(cid:79)(cid:69)(cid:1)(cid:74)(cid:79)(cid:68)(cid:83)(cid:70)(cid:66)(cid:84)(cid:74)(cid:79)(cid:72)(cid:77)(cid:90)(cid:1)(cid:87)(cid:70)(cid:79)(cid:69)(cid:80)(cid:83)(cid:84)(cid:1)(cid:85)(cid:73)(cid:66)(cid:85)(cid:1)(cid:84)(cid:70)(cid:77)(cid:77)(cid:1)(cid:87)(cid:74)(cid:83)(cid:85)(cid:86)(cid:14) (cid:105)(cid:60)(cid:34)(cid:84)(cid:62)(cid:1)(cid:85)(cid:73)(cid:70)(cid:1)(cid:68)(cid:80)(cid:79)(cid:68)(cid:70)(cid:79)(cid:85)(cid:83)(cid:66)(cid:85)(cid:74)(cid:80)(cid:79)(cid:1)(cid:80)(cid:71)(cid:1)(cid:69)(cid:66)(cid:85)(cid:66)(cid:1)(cid:84)(cid:85)(cid:80)(cid:83)(cid:66)(cid:72)(cid:70)(cid:1)(cid:66)(cid:79)(cid:69)(cid:1) ■ In 2010, LTO-5 Ultrium appeared and nearly doubled efficiencies, and save on resources. (cid:66)(cid:77)(cid:74)(cid:91)(cid:66)(cid:85)(cid:74)(cid:80)(cid:79)(cid:1)(cid:81)(cid:83)(cid:80)(cid:69)(cid:86)(cid:68)(cid:85)(cid:84)(cid:1)(cid:66)(cid:79)(cid:69)(cid:1)(cid:84)(cid:70)(cid:83)(cid:87)(cid:74)(cid:68)(cid:70)(cid:84)(cid:1)(cid:66)(cid:83)(cid:70)(cid:1)(cid:80)(cid:71)(cid:71)(cid:70)(cid:83)(cid:14) (cid:68)(cid:80)(cid:78)(cid:81)(cid:86)(cid:85)(cid:74)(cid:79)(cid:72)(cid:1)(cid:81)(cid:80)(cid:88)(cid:70)(cid:83)(cid:1)(cid:72)(cid:70)(cid:85)(cid:84)(cid:1)(cid:84)(cid:78)(cid:66)(cid:77)(cid:77)(cid:70)(cid:83)(cid:13)(cid:1)(cid:74)(cid:85)(cid:1)(cid:67)(cid:70)(cid:68)(cid:80)(cid:78)(cid:70)(cid:84)(cid:1) the capacity of the previous specification and also increased (cid:74)(cid:79)(cid:72)(cid:1)(cid:78)(cid:70)(cid:66)(cid:79)(cid:84)(cid:1)(cid:71)(cid:80)(cid:83)(cid:1)(cid:52)(cid:46)(cid:35)(cid:84)(cid:1)(cid:85)(cid:80)(cid:1)(cid:77)(cid:70)(cid:87)(cid:70)(cid:83)(cid:66)(cid:72)(cid:70)(cid:1)(cid:85)(cid:73)(cid:70)(cid:1)(cid:78)(cid:66)(cid:79)(cid:90)(cid:1) (cid:84)(cid:80)(cid:1)(cid:78)(cid:86)(cid:68)(cid:73)(cid:1)(cid:78)(cid:80)(cid:83)(cid:70)(cid:1)(cid:68)(cid:83)(cid:74)(cid:85)(cid:74)(cid:68)(cid:66)(cid:77)(cid:1)(cid:85)(cid:80)(cid:1)(cid:71)(cid:74)(cid:79)(cid:69)(cid:1)(cid:71)(cid:74)(cid:83)(cid:70)(cid:84)(cid:1)(cid:66)(cid:85)(cid:1)(cid:85)(cid:73)(cid:70)(cid:1) data transfer rates. For tape users, these upgrades repre- (cid:114)(cid:1) (cid:55)(cid:74)(cid:83)(cid:85)(cid:86)(cid:66)(cid:77)(cid:74)(cid:91)(cid:66)(cid:85)(cid:74)(cid:80)(cid:79)(cid:1)(cid:70)(cid:79)(cid:66)(cid:67)(cid:77)(cid:70)(cid:84)(cid:1)(cid:52)(cid:46)(cid:35)(cid:84)(cid:1)(cid:85)(cid:80)(cid:1)(cid:81)(cid:83)(cid:80)(cid:87)(cid:74)(cid:69)(cid:70)(cid:1) (cid:67)(cid:70)(cid:79)(cid:70)(cid:71)(cid:74)(cid:85)(cid:84)(cid:1)(cid:87)(cid:74)(cid:83)(cid:85)(cid:86)(cid:66)(cid:77)(cid:74)(cid:91)(cid:66)(cid:85)(cid:74)(cid:80)(cid:79)(cid:1)(cid:81)(cid:83)(cid:80)(cid:87)(cid:74)(cid:69)(cid:70)(cid:84)(cid:13)(cid:1)(cid:81)(cid:66)(cid:83)(cid:85)(cid:74)(cid:68)(cid:86)(cid:14) (cid:87)(cid:70)(cid:83)(cid:90)(cid:1)(cid:70)(cid:66)(cid:83)(cid:77)(cid:74)(cid:70)(cid:84)(cid:85)(cid:1)(cid:84)(cid:85)(cid:66)(cid:72)(cid:70)(cid:13)(cid:117)(cid:1)(cid:41)(cid:80)(cid:71)(cid:71)(cid:78)(cid:66)(cid:79)(cid:1)(cid:84)(cid:66)(cid:90)(cid:84)(cid:15) sent major improvements and potentially appealing reasons their end users the same or greater level (cid:77)(cid:66)(cid:83)(cid:77)(cid:90)(cid:1)(cid:88)(cid:74)(cid:85)(cid:73)(cid:1)(cid:83)(cid:70)(cid:72)(cid:66)(cid:83)(cid:69)(cid:84)(cid:1)(cid:85)(cid:80)(cid:1)(cid:84)(cid:70)(cid:83)(cid:87)(cid:70)(cid:83)(cid:1)(cid:66)(cid:79)(cid:69)(cid:1)(cid:69)(cid:70)(cid:84)(cid:76)(cid:85)(cid:80)(cid:81)(cid:1) (cid:42)(cid:79)(cid:1)(cid:80)(cid:83)(cid:69)(cid:70)(cid:83)(cid:1)(cid:85)(cid:80)(cid:1)(cid:70)(cid:89)(cid:85)(cid:74)(cid:79)(cid:72)(cid:86)(cid:74)(cid:84)(cid:73)(cid:1)(cid:224)(cid:83)(cid:70)(cid:84)(cid:1)(cid:66)(cid:84)(cid:1)(cid:82)(cid:86)(cid:74)(cid:68)(cid:76)(cid:77)(cid:90)(cid:1)(cid:66)(cid:84) to upgrade their tape infrastructures.........................page 30 of service, while reducing the amount of (cid:87)(cid:74)(cid:83)(cid:85)(cid:86)(cid:66)(cid:77)(cid:74)(cid:91)(cid:66)(cid:85)(cid:74)(cid:80)(cid:79)(cid:15)(cid:1)(cid:105)(cid:47)(cid:80)(cid:88)(cid:1)(cid:52)(cid:46)(cid:35)(cid:84)(cid:1)(cid:66)(cid:83)(cid:70)(cid:1)(cid:66)(cid:67)(cid:77)(cid:70)(cid:1)(cid:85)(cid:80)(cid:1)(cid:86)(cid:84)(cid:70)(cid:1)(cid:1) (cid:81)(cid:80)(cid:84)(cid:84)(cid:74)(cid:67)(cid:77)(cid:70)(cid:1)(cid:66)(cid:79)(cid:69)(cid:1)(cid:78)(cid:74)(cid:79)(cid:74)(cid:78)(cid:74)(cid:91)(cid:70)(cid:1)(cid:85)(cid:73)(cid:70)(cid:1)(cid:81)(cid:80)(cid:85)(cid:70)(cid:79)(cid:85)(cid:74)(cid:66)(cid:77)(cid:1)(cid:69)(cid:66)(cid:78)(cid:14) infrastructure needed. (cid:85)(cid:73)(cid:70)(cid:1)(cid:84)(cid:66)(cid:78)(cid:70)(cid:1)(cid:85)(cid:70)(cid:68)(cid:73)(cid:79)(cid:80)(cid:77)(cid:80)(cid:72)(cid:74)(cid:70)(cid:84)(cid:1)(cid:66)(cid:85)(cid:1)(cid:71)(cid:66)(cid:83)(cid:1)(cid:77)(cid:80)(cid:88)(cid:70)(cid:83)(cid:1)(cid:68)(cid:80)(cid:84)(cid:85)(cid:84)(cid:1) (cid:66)(cid:72)(cid:70)(cid:13)(cid:1)(cid:78)(cid:66)(cid:79)(cid:90)(cid:1)(cid:70)(cid:79)(cid:85)(cid:70)(cid:83)(cid:81)(cid:83)(cid:74)(cid:84)(cid:70)(cid:84)(cid:1)(cid:66)(cid:83)(cid:70)(cid:1)(cid:85)(cid:86)(cid:83)(cid:79)(cid:74)(cid:79)(cid:72)(cid:1)(cid:85)(cid:80)(cid:1)(cid:72)(cid:66)(cid:84)(cid:70)(cid:80)(cid:86)(cid:84) (cid:88)(cid:74)(cid:85)(cid:73)(cid:1)(cid:71)(cid:66)(cid:83)(cid:1)(cid:77)(cid:70)(cid:84)(cid:84)(cid:1)(cid:42)(cid:53)(cid:1)(cid:70)(cid:89)(cid:81)(cid:70)(cid:83)(cid:85)(cid:74)(cid:84)(cid:70)(cid:1)(cid:66)(cid:79)(cid:69)(cid:1)(cid:66)(cid:68)(cid:73)(cid:74)(cid:70)(cid:87)(cid:70)(cid:1)(cid:85)(cid:73)(cid:70)(cid:1) (cid:71)(cid:74)(cid:83)(cid:70)(cid:1)(cid:84)(cid:86)(cid:81)(cid:81)(cid:83)(cid:70)(cid:84)(cid:84)(cid:74)(cid:80)(cid:79)(cid:1)(cid:84)(cid:90)(cid:84)(cid:85)(cid:70)(cid:78)(cid:84)(cid:15)(cid:1)(cid:34)(cid:77)(cid:85)(cid:73)(cid:80)(cid:86)(cid:72)(cid:73)(cid:1)(cid:85)(cid:73)(cid:70)(cid:84)(cid:70)(cid:1) The Processor.com home page is frequently updated with (cid:84)(cid:66)(cid:78)(cid:70)(cid:1)(cid:67)(cid:86)(cid:84)(cid:74)(cid:79)(cid:70)(cid:84)(cid:84)(cid:1)(cid:67)(cid:70)(cid:79)(cid:70)(cid:224)(cid:85)(cid:84)(cid:1)(cid:77)(cid:66)(cid:83)(cid:72)(cid:70)(cid:83)(cid:1)(cid:70)(cid:79)(cid:85)(cid:70)(cid:83)(cid:81)(cid:83)(cid:74)(cid:84)(cid:70)(cid:84)(cid:1) (cid:84)(cid:90)(cid:84)(cid:85)(cid:70)(cid:78)(cid:84)(cid:1)(cid:68)(cid:66)(cid:79)(cid:1)(cid:67)(cid:70)(cid:1)(cid:68)(cid:80)(cid:84)(cid:85)(cid:77)(cid:90)(cid:13)(cid:1)(cid:85)(cid:73)(cid:70)(cid:90)(cid:1)(cid:80)(cid:71)(cid:71)(cid:70)(cid:83)(cid:1)(cid:66)(cid:1)(cid:79)(cid:86)(cid:78)(cid:67)(cid:70)(cid:83) (cid:114)(cid:1) (cid:52)(cid:70)(cid:83)(cid:87)(cid:70)(cid:83)(cid:1)(cid:66)(cid:79)(cid:69)(cid:1)(cid:85)(cid:73)(cid:70)(cid:79)(cid:1)(cid:69)(cid:70)(cid:84)(cid:76)(cid:85)(cid:80)(cid:81)(cid:1)(cid:87)(cid:74)(cid:83)(cid:85)(cid:86)(cid:66)(cid:77)(cid:74)(cid:91)(cid:66)(cid:85)(cid:74)(cid:80)(cid:79)(cid:1)(cid:74)(cid:84)(cid:1) new articles and hardware news to help you keep current. (cid:73)(cid:66)(cid:87)(cid:70)(cid:1)(cid:70)(cid:79)(cid:75)(cid:80)(cid:90)(cid:70)(cid:69)(cid:13)(cid:117)(cid:1)(cid:84)(cid:66)(cid:90)(cid:84)(cid:1)(cid:44)(cid:83)(cid:74)(cid:84)(cid:73)(cid:79)(cid:66)(cid:1)(cid:52)(cid:86)(cid:67)(cid:83)(cid:66)(cid:78)(cid:66)(cid:79)(cid:74)(cid:66)(cid:79)(cid:13)(cid:1) (cid:80)(cid:71)(cid:1)(cid:66)(cid:69)(cid:87)(cid:66)(cid:79)(cid:85)(cid:66)(cid:72)(cid:70)(cid:84)(cid:1)(cid:80)(cid:87)(cid:70)(cid:83)(cid:1)(cid:88)(cid:66)(cid:85)(cid:70)(cid:83)(cid:14)(cid:67)(cid:66)(cid:84)(cid:70)(cid:69)(cid:1)(cid:84)(cid:90)(cid:84)(cid:85)(cid:70)(cid:78)(cid:84)(cid:15)(cid:1) (cid:85)(cid:73)(cid:70)(cid:1)(cid:81)(cid:66)(cid:85)(cid:73)(cid:1)(cid:78)(cid:80)(cid:84)(cid:85)(cid:1)(cid:52)(cid:46)(cid:35)(cid:84)(cid:1)(cid:85)(cid:70)(cid:79)(cid:69)(cid:1)(cid:85)(cid:80)(cid:1)(cid:85)(cid:66)(cid:76)(cid:70)(cid:15) Visit www.processor.com today. Go to Page 10 Go to Page 10 Page 2 Processor.com July 15, 2011 Subscribe Today/Address Change Form For address change, fill out form below with new information and mail or fax. PLEASE PRINT What type of subscription request is this? ❑ New ❑ Renewal ❑ Cancel (cid:170)(cid:1)(cid:36)(cid:80)(cid:81)(cid:90)(cid:83)(cid:74)(cid:72)(cid:73)(cid:85)(cid:1)(cid:19)(cid:17)(cid:18)(cid:18)(cid:1)(cid:52)(cid:66)(cid:79)(cid:69)(cid:73)(cid:74)(cid:77)(cid:77)(cid:84)(cid:1)(cid:49)(cid:86)(cid:67)(cid:77)(cid:74)(cid:84)(cid:73)(cid:74)(cid:79)(cid:72)(cid:1)(cid:36)(cid:80)(cid:78)(cid:81)(cid:66)(cid:79)(cid:90)(cid:15)(cid:1)(cid:34)(cid:77)(cid:77)(cid:1)(cid:83)(cid:74)(cid:72)(cid:73)(cid:85)(cid:84)(cid:1)(cid:83)(cid:70)(cid:84)(cid:70)(cid:83)(cid:87)(cid:70)(cid:69)(cid:15)(cid:1) Phone: ( ______ )________________________________ Fax: ( ______ ) __________________________________________ Subscriptions (cid:46)(cid:66)(cid:74)(cid:77)(cid:1)(cid:39)(cid:80)(cid:83)(cid:78)(cid:1)(cid:53)(cid:80)(cid:27)(cid:1)(cid:49)(cid:15)(cid:48)(cid:15)(cid:1)(cid:35)(cid:80)(cid:89)(cid:1)(cid:25)(cid:19)(cid:22)(cid:21)(cid:22)(cid:1)(cid:116)(cid:1)(cid:45)(cid:74)(cid:79)(cid:68)(cid:80)(cid:77)(cid:79)(cid:13)(cid:1)(cid:47)(cid:38)(cid:1)(cid:23)(cid:25)(cid:22)(cid:17)(cid:18)(cid:14)(cid:19)(cid:22)(cid:21)(cid:22) Contact Name:__________________________________________________________________________________________ (cid:48)(cid:87)(cid:70)(cid:83)(cid:79)(cid:74)(cid:72)(cid:73)(cid:85)(cid:1)(cid:37)(cid:70)(cid:77)(cid:74)(cid:87)(cid:70)(cid:83)(cid:90)(cid:27)(cid:1)(cid:18)(cid:19)(cid:17)(cid:1)(cid:56)(cid:70)(cid:84)(cid:85)(cid:1)(cid:41)(cid:66)(cid:83)(cid:87)(cid:70)(cid:84)(cid:85)(cid:1)(cid:37)(cid:83)(cid:74)(cid:87)(cid:70)(cid:1)(cid:116)(cid:1)(cid:45)(cid:74)(cid:79)(cid:68)(cid:80)(cid:77)(cid:79)(cid:13)(cid:1)(cid:47)(cid:38)(cid:1)(cid:23)(cid:25)(cid:22)(cid:19)(cid:18) (cid:9)(cid:25)(cid:17)(cid:17)(cid:10)(cid:1)(cid:20)(cid:20)(cid:21)(cid:14)(cid:24)(cid:21)(cid:22)(cid:25)(cid:1)(cid:93)(cid:1)(cid:45)(cid:48)(cid:36)(cid:34)(cid:45)(cid:27)(cid:1)(cid:9)(cid:21)(cid:17)(cid:19)(cid:10)(cid:1)(cid:21)(cid:24)(cid:26)(cid:14)(cid:19)(cid:18)(cid:20)(cid:19)(cid:1)(cid:93)(cid:1)(cid:39)(cid:34)(cid:57)(cid:27)(cid:1)(cid:9)(cid:21)(cid:17)(cid:19)(cid:10)(cid:1)(cid:21)(cid:24)(cid:26)(cid:14)(cid:19)(cid:18)(cid:26)(cid:20) Company Name:________________________________________________________________________________________ Advertising & Reprints Address: ______________________________________________________________________________________________ (cid:9)(cid:25)(cid:17)(cid:17)(cid:10)(cid:1)(cid:19)(cid:21)(cid:24)(cid:14)(cid:21)(cid:25)(cid:25)(cid:17)(cid:1)(cid:93)(cid:1)(cid:9)(cid:21)(cid:17)(cid:19)(cid:10)(cid:1)(cid:21)(cid:24)(cid:26)(cid:14)(cid:19)(cid:18)(cid:21)(cid:18)(cid:1)(cid:93)(cid:1)(cid:39)(cid:34)(cid:57)(cid:27)(cid:1)(cid:9)(cid:21)(cid:17)(cid:19)(cid:10)(cid:1)(cid:21)(cid:24)(cid:26)(cid:14)(cid:19)(cid:18)(cid:17)(cid:21) City: ___________________________________________ State: ________ Postal Code: _____________________________ Editorial Staff Country:_______________________________________________________________________________________________ (cid:70)(cid:69)(cid:74)(cid:85)(cid:80)(cid:83)(cid:33)(cid:81)(cid:83)(cid:80)(cid:68)(cid:70)(cid:84)(cid:84)(cid:80)(cid:83)(cid:15)(cid:68)(cid:80)(cid:78)(cid:1)(cid:116)(cid:1)(cid:9)(cid:25)(cid:17)(cid:17)(cid:10)(cid:1)(cid:22)(cid:21)(cid:21)(cid:14)(cid:18)(cid:19)(cid:23)(cid:21) Email: ________________________________________ Web Address: ___________________________________________ (cid:37)(cid:80)(cid:1)(cid:90)(cid:80)(cid:86)(cid:1)(cid:73)(cid:66)(cid:87)(cid:70)(cid:1)(cid:66)(cid:1)(cid:79)(cid:70)(cid:88)(cid:1)(cid:81)(cid:83)(cid:80)(cid:69)(cid:86)(cid:68)(cid:85)(cid:1)(cid:85)(cid:73)(cid:66)(cid:85)(cid:1)(cid:69)(cid:66)(cid:85)(cid:66)(cid:1)(cid:68)(cid:70)(cid:79)(cid:85)(cid:70)(cid:83)(cid:16)(cid:42)(cid:53)(cid:1)(cid:78)(cid:66)(cid:79)(cid:66)(cid:72)(cid:70)(cid:83)(cid:84)(cid:1)(cid:88)(cid:80)(cid:86)(cid:77)(cid:69)(cid:1)(cid:67)(cid:70)(cid:1) (cid:74)(cid:79)(cid:85)(cid:70)(cid:83)(cid:70)(cid:84)(cid:85)(cid:70)(cid:69)(cid:1)(cid:74)(cid:79)(cid:1)(cid:77)(cid:70)(cid:66)(cid:83)(cid:79)(cid:74)(cid:79)(cid:72)(cid:1)(cid:66)(cid:67)(cid:80)(cid:86)(cid:85)(cid:32)(cid:1)(cid:36)(cid:66)(cid:77)(cid:77)(cid:1)(cid:9)(cid:25)(cid:17)(cid:17)(cid:10)(cid:1)(cid:22)(cid:21)(cid:21)(cid:14)(cid:18)(cid:19)(cid:23)(cid:21) 1. What is the size of your company 3. What is your annual computer hardware/ (cid:80)(cid:83)(cid:1)(cid:70)(cid:78)(cid:66)(cid:74)(cid:77)(cid:1)(cid:81)(cid:83)(cid:70)(cid:84)(cid:84)(cid:33)(cid:81)(cid:83)(cid:80)(cid:68)(cid:70)(cid:84)(cid:84)(cid:80)(cid:83)(cid:15)(cid:68)(cid:80)(cid:78)(cid:15) (how many employees)? software purchasing budget? ❑ Less than 10 ❑ 200 to 499 ❑ $0 to $9,999 ❑ $100,000 to $249,999 (cid:52)(cid:68)(cid:66)(cid:79)(cid:1)(cid:85)(cid:73)(cid:74)(cid:84) ❑ 10 to 99 ❑500 to 999 ❑ $10,000 to $24,999 ❑ $250,000 to $499,999 (cid:50)(cid:51)(cid:1)(cid:36)(cid:80)(cid:69)(cid:70) ❑ 100 to 199 ❑ 1,000+ ❑ $25,000 to $49,999 ❑ $500,000 to $999,000 (cid:88)(cid:74)(cid:85)(cid:73)(cid:1)(cid:90)(cid:80)(cid:86)(cid:83)(cid:1) ❑ $50,000 to $99,999 ❑ $1,000,000+ (cid:78)(cid:80)(cid:67)(cid:74)(cid:77)(cid:70) 2. How often do you purchase computer (cid:84)(cid:78)(cid:66)(cid:83)(cid:85)(cid:81)(cid:73)(cid:80)(cid:79)(cid:70)(cid:1) hardware/software? (cid:85)(cid:80)(cid:1)(cid:84)(cid:70)(cid:70)(cid:1)(cid:80)(cid:86)(cid:83)(cid:1) ❑ Weekly ❑ Quarterly (cid:88)(cid:70)(cid:67)(cid:84)(cid:74)(cid:85)(cid:70)(cid:15) ❑ Bi-weekly ❑ Annually ❑ Monthly ❑ No Involvement www.Processor.com News Also In This Issue... STORAGE CONT’D non-security fixes and patches to companies directors will examine the business rationale ❙ ■Disaster recovery, or DR, is a tried-and-true part of the New IBM Study Examines that have paid for special support contracts behind this arrangement, including its effect continuity plan of every enterprise, and lately DR planning Future Of Wellness Devices for the second five years. Vista SP2 consumer on sales to particular overseas customers. is moving to a new location: the cloud...................page 32 An IBM study, which surveyed more than editions will continue to receive support until It will also clarify the responsibilities of the ■ Chenbro added to its modular chassis products with its 1,300 consumers that use health and wellness April 2012, while corporate versions of Vista CEOs, the chair, and the board itself. In new line of RM235 modular storage chassis......page 33 devices, revealed increasing interest in using Business and Vista Enterprise will receive return, NEI Investments withdrew a related wireless devices and applications for continu- security updates through mid-April 2017. shareholder proposal. SECURITY ing health and fitness. According to the “Future ❙ ❙ RIM To Re-Evaluate Bank Regulator Updates of Connected Health Devices” study, there are ■ It’s up to data centers to protect their enterprises Its Management Structure Online Security Guidance a growing number of devices designed to facili- and users from the risks associated by the rapid prolif- tate greater consumer control over personal The board of directors for BlackBerry mobile Financial institutions now have stronger rec- eration of Android devices.............................page 34 health that target dieting, elder care, blood device maker Research In Motion, prompted ommendations for the types of authentication ■ The Trusted Computing Group, a not-for-profit stan- monitoring, mobility, and communication for the by shareholder NEI Investments, has agreed they use for online transactions, thanks to dards industry group, is one organization that’s making impaired. Based on the survey results, 96% of the shift to machine-level trust possible........page 35 respondents indicated that a device’s ease of use is the most important factor in choosing a ■ Instead of trotting out the latest Internet bogeyman to medical device. persuade hype-wary business leaders that information ❙ security is important to the company’s well-being, iPad Topples Every Other Tablet consider taking another approach....................page 36 In Online Traffic ■Weak passwords are a never-ending challenge in According to comScore’s new Device Essen- an enterprise environment. But there are several tricks tials reporting service, Apple’s iPad is the clear IT managers can have up their sleeves ...........page 37 winner of the tablet online traffic competition. Across 13 countries and five continents, the MESSAGING & iPad drives more than 89% of tablet Internet TELEPHONY traffic. In the United States, the iPad is respon- sible for 21.8% of all non-computer device ■Enterprise IM is an effective and powerful communica- traffic, whereas the Android platform accounts tion tool that can boost productivity and cost savings, but for 0.6%. Canada boasts the highest iPad- unfettered use can put organizations at risk.............page 38 driven non-computer device traffic at 33.5%. ■ IT managers struggle with email on many different Mobile phones are a different story: Android levels, but one of the more sensitive issues remains represents 35.6% of all traffic, while the iPhone how to manage email that contains private and con- accounts for 23.5%. fidential enterprise information....................page 39 ❙ Office XP & Vista SP1 Losing Official Support CLIENTS Microsoft announced that support for its ■Automating Windows updates helps save time and Windows Vista SP1 and Office XP software money, as well as avoid potentially costly errors that may officially ended on July 12. Traditionally, to form a committee to analyze the com- new input from the FFIEC (Federal Financial come from manual configurations.............................page 40 Microsoft divides its 10-year support for pany’s unusual management structure. RIM Institutions Examination Council). The FFIEC ■ Your company’s policy for open-source software business products between “mainstream has two co-CEOs, one of which—founder issued a supplement to its 2005 guidance, shouldn’t be separate from the overall IT strategy. support,” which covers the first five years, Mike Lazaridis—also holds the position of “Authentication in an Internet Banking Envi- Instead, define what elements could contain open-source and “extended support,” which provides president. The new committee’s independent ronment,” stressing the need for multifactor software and where it should be avoided............page 41 authentication, layered security measures, consumer education, and periodic risk assess- ■ The iStarUSA IS-500R2UPD8 is a 500W 80 Plus WATCH THE This information provides a quick glimpse of current and historical stock ments in light of new types of threats. Member Certified PSU that integrates PMBus support and STOCKS prices and trends for 14 major companies in the technology market. agencies will begin to assess institutions’ includes a number of safety features to prevent compliance with the new security expectations disasters in server rooms.................................page 41 starting in January of next year. % change from Company Symbol Year Ago June 23 $ July 7 $ previous issue ❙ DATA CENTER DARPA Plans Defense Investments AMD AMD $7.37 $7.06 $7.15 ▲ 1.27% MANAGEMENT DARPA (Defense Advanced Research Projects Apple AAPL $258.09 $331.23 $357.20 ▲ 7.84% ■ Can IT really help solve the problems caused by not CA Technologies CA $18.56 $22.27 $23.42 ▲ 5.16% Agency) announced that it’s planning to invest having enough doctors, nurses, and lab workers? Experts Cisco Systems CSCO $22.55 $15.47 $15.90 ▲ 2.78% $1 billion over the course of five years to sayIT systems can’t replace human caregivers, but Dell DELL $12.78 $16.27 $17.15 ▲ 5.41% innovations in defense systems. One of the there are a number of things they can do............page 42 Google GOOG $456.56 $480.22 $546.60 ▲ 13.82% examples of successful defense innovations DARPA cited is the use of crowdsourcing to ■ Whether the slow economy has dealt you HP HPQ $45.48 $35.23 $36.45 ▲ 3.46% create the XC2V (Combat Support Vehicle), deep budget cuts or squeezing the most out of IBM IBM $127.97 $166.12 $176.48 ▲ 6.24% which is a militarily relevant vehicle design. every dollar is just business as usual, opting for used Intel INTC $20.10 $21.71 $23.23 ▲ 7% DARPA received more than 150 credible and refurbished gear can help you stretch your LinkedIn LNKD N/A $70.32 $93.98 ▲ 33.65% designs for the XC2V, and it indicated that the budget further..................................................page 43 Microsoft MSFT $24.41 $24.63 $26.77 ▲ 8.69% winning design would take less than 14 weeks Oracle ORCL $23.22 $32.46 $34.09 ▲ 5.02% to build. The current plan provides $500 million The Processor.com home page is frequently updated with Red Hat Software RHT $30.55 $45.27 $46.67 ▲ 3.09% for high-tech resources to create jobs, as well new articles and hardware news to help you keep current. Symantec SYMC $14.50 $18.93 $19.86 ▲ 4.91% as improve the United States’ global positioning Visit www.processor.com today. NOTE: This information is meant for reference only and should not be used as a basis for buy/sell decisions. in manufacturing. July 15, 2011 Processor.com Page 3 Page 4 Processor.com July 15, 2011 News S TAT S & F A C T S hiring expectations have lessened. KPMG, an Providing The Latest Insight & Information audit, tax, and advisory firm, found in 2010 From Leading Research Firms that 72% of executives expected an increase in hiring. This year, only 49% predicted the same. Further, 27% indicated that employee headcount levels had reached or surpassed Security Budgets pre-recession levels, while 42% indicated that headcount would hit pre-recession levels sometime during the next 18 months. The DOWN . . . survey also found that most companies antic- ipate the majority of their revenue to stem from the U.S. market vs. China and India, which topped the list of countries the previ- ous two years. Cloud computing was tabbed by 65% of those surveyed as being expected IT is feeling the budget crunch, and even money spent on security isn’t being to generate the most revenue, up from 54% spared from cuts. A recent survey from nCircle offers some startling statistics: last year. 48% of respondents say the economic downturn is impacting their ❙ Gartner Foresees Uptick enterprise’s security initiatives (up 11% from a year ago). In Worldwide IT Spending . . . 18% Research group Gartner says worldwide IT of respondents say compliance initiatives are also being ❙ Legislators Propose E-Waste Bans spending is on track to grow 7.1% this year; hampered by the current economic climate. Congress has introduced a bill called the that’s a significant increase from the 5.6% 44% Responsible Electronic Recycling Act that growth it had earlier estimated. In announc- of respondents say their companies don’t have would block U.S. companies from export- ing the forecast, Richard Gordon, a Gartner a way to effectively measure and report on security ing hazardous electronic waste to develop- research vice president, says he’s surprised risk reduction and compliance. ing nations. The problem with exporting the the Japan earthquake and tsunami did not 30% e-waste is that electronic hardware, such as have a bigger impact on global IT spending. of companies don’t adequately enforce monitors, can contain hazardous chemicals, “Despite widespread concerns about disrup- their own security policies. and when recycled in more primitive condi- tions to the supply of critical components in tions, the electronics can become a danger; the initial aftermath of the natural disaster, for example, children may break apart the there has not been a dramatic impact on devices and accidently expose themselves overall IT spending,” he says. The comput- to the chemicals. The bill should also help to ing hardware segment is set for the big- strengthen the U.S. e-waste industry because gest growth, 11.7%, followed by enterprise it will create new jobs for enforcing and prop- software (9.5% growth), telecom (6.9% erly separating the electronics. The bill is sup- growth), and IT services (6.6% growth). ported by a number of companies, including Gartner expects spending on cloud comput- HP, Dell, Apple, and Best Buy. ing to grow four times faster than spending on overall IT, but the cloud segment still ❙ Logicalis Acquires Netarx accounts for a fairly small portion of the total Logicalis, an integrator of IT and commu- money spent on IT. nications solutions, announced that it has ❙ . . . & IDC Expects Growth acquired Netarx for $34 million in order to . . . But Security In U.S. IT Spending add the IT professional services provider’s managed services, data center, collabora- IDC’s latest survey of planned IT spending at tion, and infrastructure design solutions to U.S. enterprises and public sector organiza- Problems MOUNT the Logicalis portfolio. Logicalis says that the tions shows high expectations for this year. acquisition will help it build on its Midwest The research firm predicts IT spending will presence by expanding its IT consulting and increase 5.6% through the end of this year. For services business, enhancing the company’s comparison’s sake, IDC points out, the U.S. managed services abilities, and adding a GDP is forecast to grow just 3% this year. The robust Tier 1 service desk. Founded in 1997, survey shows that the top IT initiatives among The pressure is increasing when it comes to Netarx is based in Auburn Hills, Mich., but large enterprises are security (chosen by 31% protecting your enterprise from today’s has technical and sales staff in Arizona, of respondents), business analytics (19%), and security threats, and it shows no sign Indiana, and Ohio. “This acquisition further smart technologies (17%). of slowing down. enhances our service portfolio in the U.S. ❙ Lack Of Business Intelligence with a services offering that goes beyond Programs In Colleges the infrastructure design and lifecycle man- agement and takes us to different areas of Students interested in business intelligence our customers’ business,” said Ian Cook, and analytics may not have enough degree The “2011 Information Security & Compliance Trend Study” from nCircle ranked the top five threats: 1. Meeting security compliance requirements 2. Cloud computing 3. Advanced persistent threats 4. Web application vulnerabilities Logicalis CEO, in a statement. “This move programs available to them, according to a 5. accelerates the development of a ‘Business study by Barbara Wixom, an associate IT pro- Smartphones Transformation Service’ offering, which com- fessor at the University of Virginia, and Thilini bines deep technical knowledge with practi- Ariyachandra, an assistant professor of MIS A recent survey from ISACA looked specifically at mobile devices, cal IT business application.” at Xavier University. The study found that only finding that 58% of information security and IT audit professionals three out of the 129 schools included in the ❙ view mobile devices owned by employees (or BYOD, for bring your Hardware & Software Execs survey had business intelligence degree majors own device) as posing the greatest risk. That compares to work- Believe Recovery Will Stretch On for undergraduates, and 12 had graduate pro- supplied smartphones, notebooks, tablets, broadband cards, or flash Technology executives now believe the U.S. grams. Despite the low number of programs drives, which were viewed as a greater risk by 33% of respondents. economy will need until 2013 to recover available, there is definite interest in the field: Mobile-specific security policies are a great help, and more than 80% instead of 2012, according to a survey from 150 students took business intelligence classes of companies have such a policy, but 31% say the policy needs to be KPMG of 102 C-level and senior executives because they were required for another major updated or better communicated to employees. associated with software and hardware and 90 took classes to make business intel- companies. Survey results also found ligence their career. July 15, 2011 Processor.com Page 5 News Apple’s iPhone devices account for the caution when deploying such devices in the cloud applications, both OSes could poten- ❙ Microsoft Partners most traffic with 2.9%, followed by Android enterprise. Due to Apple’s app certifica- tially expose sensitive enterprise data. With Major Chinese Search Engine (2.6%), iPad (2.1%), BlackBerry (0.57%), tion process, iOS offers greater protection ❙ Sophos Acquires Astaro Microsoft announced a deal with Baidu Symbian (0.03%), JavaME (0.02%), and against malware vs. Android, which has a .com, China’s largest search engine, in Windows Mobile (0.02%). Worldwide, the much less strict process for allowing appli- Sophos has concluded its acquisition of which Microsoft will provide English-language iPad is responsible for 1% of all Internet cations into the Android Market. However, Wilmington, Mass.,-based Astaro Networks, searches in China. Baidu holds an 83% mar- traffic. NetMarketShare also reported on because both devices link to third-party a move aimed at expanding Sophos’ end- ket share in Chinese-language searches, the status of the browser wars; as of the point security capabilities and increas- but according to the company, as many as end of June, Internet Explorer 9 is now ing the company’s footprint in the 10 million English-language searches are found on 17% of Windows 7 PCs in the area of unified threat management. performed each day; Baidu says it struck this world and 21.8% of the Win7 PCs in the Eventually, the acquisition may enable deal with Microsoft in order to improve these United States. Sophos to expand onto mobile plat- searches. This move could help Microsoft’s ❙ forms. The deal is viewed as possibly IBM Announces Computer Bing engine increase its overall traffic and creating more competition in the SMB Memory Breakthrough help the company have a stronger foothold in network security space, and the reac- China than Google. Researchers at IBM announced that they tion of most Sophos partners has been have created a phase-change material overwhelmingly positive, with compa- ❙ Smartphones Outsell Feature Phones memory chip that can store two bits of nies feeling that the acquisition will According to its May survey of mobile phone data per cell instead of one. IBM says allow Sophos to compete with rivals users in the United States, Nielsen reports PCM is 100 times faster in reading and Symantec and McAfee and perhaps that smartphone sales have eclipsed that writing data than flash memory, and it even with large network security com- of the less expensive and more function- can withstand 10 million write cycles panies such as Cisco and Juniper. ally limited feature phones for the first time. compared to 30,000 for enterprise-class ❙ Chrome Browser Share Hits 20% Currently 38% of mobile consumers own flash. PCM also won’t lose data when smartphones, and in the past three months, the power is turned off. IBM says that it Google Chrome continues to gain in 55% of customers who bought new phones has also overcome a problem with PCM popularity, with StatCounter reporting opted for smartphones instead of feature called drift, in which the changing resis- that the browser has now topped a 20% phones. Last year, just 34% of new phone tance of the phase-change material over global market share. Two years ago, purchasers got smartphones. Nielsen also time causes read errors. The technology the browser’s share was only 2.8%, so reports that Android has the largest consum- should be ready for some server applica- the rise has been dramatic. In the same er base, with 38% of smartphone owners run- tions in 2016, IBM says. time frame, Internet Explorer’s share ning the mobile OS on their devices. Android ❙ has fallen from 59% to 44%, while Symantec Analyzes also dominates the new phone purchases, Firefox’s numbers dipped slightly, from Smartphone OSes but it’s Apple’s iPhone that saw the biggest 30% to 28%. Other usage trackers peg growth in the past three months. Symantec recently released a whitepaper Chrome’s share at a somewhat lower detailing the security risks associated rate: Net Applications, for example, ❙ Mobile Web Traffic & IE9 Update with the top two smartphone operat- tracks total users, while StatCounter According to analysts at NetMarketShare, ing systems: Apple’s iOS and Google’s measures the total number of Web site Web traffic from mobile devices and tablets Android. Symantec says both OSes are clicks. Using the former method, Net accounts for more than 5% of worldwide vulnerable to social engineering attacks Applications figures Chrome’s current traffic and more than 8.2% of traffic in the and Web- and network-based attacks, market share at about 13%, Microsoft’s United States. When broken down by device, among others, so it is best to exercise at 54%, and Firefox’s at 22%. Page 6 Processor.com July 15, 2011 P R O D U C T R E L E A S E S The Processor Product Releases section Manufacturers: includes brief overviews of data center products. Do you have a new product that data center/IT managers would be interested in learning about? All products listed have been released recently, so use this section to get Send your press release or product information up to date with what’s new on the market and to find products you need. to [email protected]. PHYSICALINFRASTRUCTURE delegation, monitoring, and auditing solu- to 9KB and features a store-and-forward tions for including authentication and audit- ■Netuitive 5.5 switching architecture. Users operating in ■Burk Technology Climate Guard ing management for cloud environments. Netuitive has released Netuitive 5.5 for a hybrid environment or upgrading IPv4 Burk Technology announced its new enterprise management on physical, vir- IP addresses will appreciate the built-in Climate Guard modular environmental ■Black Box Hardened & Extreme tual, and cloud environments. The 5.5 ver- support for both IPv4 and IPv6. Media Converter Switches monitor for server rooms. Climate Guard sion features a single-view dashboard that has built-in sensors for temperature, light, Two new 1Gbps copper-to-fiber switch- displays workload, health, and capacity STORAGE and sound and can be configured with extra es for adverse conditions are now avail- data; chargeback reporting on application sensors to also monitor humidity, floods/ able from Black Box. The Hardened Media use; and Microsoft Hyper-V flexible sup- ■Blancco LUN Eraser Converter Switches (LBH2001A-H) are suit- port. In addition, the 5.5 version offers Blancco released its LUN Eraser, which ed to factory use with a temperature range expanded storage support and expanded securely erases logical and physical data of -13 to +140 degrees Fahrenheit, while virtualized data center reports. that’s detected by Unix and Windows oper- the Extreme Media Converter Switches ating systems. Primary capabilities of the (LBH2001A-P) can survive outdoors (-40 to ■New Boundary Technologies LUN Eraser include PCI DSS compliance, leaks, smoke, motion, or door contact. The +167 F). Both media converter switches route Prism Suite 12.0 disaster recovery tests for high availability, onboard Web interface allows for easy 10/100/1000Mbps Ethernet data between New Boundary Technologies released and end-of-hosting subscription. Reporting setup, monitoring, and access to alert his- twisted pair and 1000Mbps fiber segments. Prism Suite 12.0, which includes enhance- is based on XML format that works with tory and charts. Additionally, it can send ments that build upon a three-part founda- Blancco Management Console. ■CablesToGo TruLink A/V Controller alerts via email, SMS messaging, or SNMP tion: desktop configuration management, & TruLink Media Gateway ■Corus360 RES-Q traps. Climate Guard features eight built-in hardware and software asset management, ports for digital sensors, eight switch inputs CablesToGo has released the TruLink and patch management capabilities. Key Disaster Recovery Services for contact closures, and support for a max- A/V Controller for projectors, DVD and improvements include secured groups, RES-Q Disaster Recovery Services, under imum of 64 total sensors. For more on this Blu-ray players, document cameras, and centralized and automated management of the umbrella of Corus360, announced an product, see page 13. other devices centrally operated and used in assets, and customized inventory configu- expansion of its disaster recovery services, K-12 classrooms. The controller is a wall- ration. The secured groups allow IT man- including recovery testing and managed ser- ■Exar XRP252x Series Power mount keypad with eight interchangeable agers to put certain groups of computers vice offerings. New features include testing Distribution Switches buttons and up to four programmable com- off-limits to all but their most experienced options on IBM mainframe, IBM i and p Exar announced the XRP252x series of mands per button. The company has also admins, meaning a help desk user can’t series, Sun, HP, and Intel systems. single- and dual-channel power distribu- released the TruLink Media Gateway prod- accidentally deploy a workstation task to a tion switches. The switches support USB uct family of connectivity panels allowing server or reboot an executive computer in ■Quantum StorNext M330 3.0 and older and are optimized for VBUS for easy multimedia sharing and in-room the middle of an important meeting. Quantum released the StorNext M330, the power distribution applications with a entertainment for corporate, hospitality, first product in its new family of StorNext guaranteed 900mA per channel current education, healthcare, and other markets. ■Oracle VM Template For MySQL appliances. The M330 is a metadata control- capability, controlled rise and fall time, Enterprise Edition ler appliance that mixes high-performance, and enhanced port protection. ■Ericom Software AccessToGo Oracle has introduced the Oracle VM heterogeneous software file sharing and Ericom Software released AccessToGo, a Template for MySQL Enterprise Edition, tiered, vendor-agnostic archiving benefits ■FieldView Solutions FieldView 4.0 mobile client that offers secure, on-demand which lets MySQL users deploy and man- available in the company’s StorNext data FieldView Solutions released FieldView access to Windows applications and desk- age Web and Cloud applications more management software with a purpose-built 4.0, the latest version of its DCIM (data tops operating on terminal services, virtual cheaply and efficiently. The offering hardware approach. The appliance is target- center infrastructure management) solu- desktops, and workstations. AccessToGo is employs a preinstalled and preconfigured ed at organizations dealing in sustained large tion. The company says that the new ver- powered by Ericom Blaze RDP compres- software stack for reliable performance data throughput applications. New software sion boasts advanced system measurement sion and acceleration technology and aims and other features that improve uptime. features introduced with the M330 include tools and streamlined analytical reports to quicken complex graphic displays on the an enhanced user interface and reporting that improve and control data center ener- iPad, iPhone, iPod touch, and Android tab- ■Symantec ApplicationHA tools. The M330 includes two SAN clients gy usage, while validating cost savings lets and phones. Symantec released the newest ver- for the controllers and 10 StorNext SAN across globally distributed environments. sion of its high-availability solution for clients for any supported OS. The M330 is ■Flexera Software FlexNet Manager VMware virtual environments, Symantec priced at $75,000. ■HP UPS R1500 G3 & R/T3000 G2 For IBM ApplicationHA. The new offering lets HP announced two new UPS systems Application usage management solu- users virtualize business-critical applica- ■SanDisk Lightning EFD that provide a graceful shutdown for equip- tions provider Flexera Software has released tions and features disaster recovery capa- There are six new SSDs in SanDisk’s ment in a variety of network setups, includ- FlexNet Manager For IBM, which is aimed bilities, integration with VMware vCenter Lightning EFD (Enterprise Flash Drive) ing complex virtualized environments. The at application producers and their custom- Site Recovery Manager, and a dashboard family. The 6Gbps SAS models are all rack-mounted appliances include HP Power ers. Built on the FlexNet Manager Platform, for VMware vCenter Server monitoring in the 2.5-inch form factor and feature Protector power management software and the product is a scalable Enterprise License and management. write-through logging for data safety. have USB connections, hot-swap batteries, Optimization solution that automates IBM SLC capacities include 100GB, 200GB, independent load segments, and a $250,000 license management and gives enterpris- ■Talend ESB Studio SE & ESB EE and 400GB; MLC units come in 200GB, protection guarantee. es control over software estates to reduce Talend released Talend ESB Studio SE 400GB, and 800GB versions. license, maintenance, and audit costs for (Standard Edition) and Talend ESB EE ■Server Technology Smart POPS IBM desktop and server software. (Enterprise Edition) for Data Services to ■Scality RING Organic Storage Software Server Technology has released the accelerate the development, deployment, Scality announced the concept of organ- Smart POPS (Per Outlet Power Sensing) ■ManageEngine Desktop Central and management of enterprise-class pro- ic storage, a new class of object-based CDU product family. Users can view ManageEngine has added software duction environments. Talend ESB Studio storage that remains fresh and resilient for power, temperature, and humidity on a metering and USB device policy compli- SE is a companion GUI for Talend’s open- decades. Scality’s RING Organic Storage Web browser via the Smart POPS’ built- ance to its Desktop Central Web-based source ESB products, which are used by software distributes data among a collec- in network interface. The information per enterprise Windows server and desktop developers to quickly build integration pro- tion of nodes. Features include applica- power outlet covers current load, voltage, management solution. The software meter- cesses. Talend ESB EE for Data Services tion-level long-term storage, resiliency, power (kW), apparent power (VA), crest ing engine aids enterprises in complet- is a reliable and scalable enterprise service self-healing and adaptive capabilities, and factor, and power factor. ing audits of software usage and making bus that allows development teams to holis- location awareness. decisions about software renewals and tically address integration projects. NETWORKING & VPN purchases. The USB device policy will let ■SGI InfiniteStorage 5500 administrators prohibit the use of specific ■Transition Networks MIL-SM8DPA SGI announced its new InfiniteStorage ■BeyondTrust PowerBroker USB device instances. Transition Networks announced its 5500 storage platform, which is specifically Identity Services 8-port all fiber managed MIL-SM8DPA designed for companies that need to run BeyondTrust has added two products ■Napatech NT40E2-4 switch. The MIL-SM8DPA is a dual- high-end, memory-intensive programs and to its PowerBroker Identity Services Quad-Port 10GbE Adapter speed configurable switch that supports applications. The IS5500 features RAID 6, platform. The new products include an Napatech’s new NT40E2-4 adapter fea- eight SFP slots, each configurable with hot-swappable controllers and other com- Enterprise Edition and Open Edition, tures four ports of 10Gbps connectivity, 100Base or 1000Base SFP transceiv- ponents, and a mirrored data cache with a which BeyondTrust purchased from doubling the port density of its two-port ers. The two shared combination ports battery backup. It is available in 12-, 24-, Likewise Software and will release to inte- sister, the NT20E2. For higher throughput offer auto-sensing 10/100/1000Base-T or 60-drive depths. All models support dual grate Linux, Mac OS X, and Unix sys- needs, the company also offers a single- RJ-45 connectivity. New security fea- controllers and can be used as expansion tems and Microsoft Active Directory. The port 40Gbps adapter dubbed the NT40E2- tures include SSH, SSL, and TACACS+ units with a mix of 2.5-inch and 3.5-inch PowerBroker Identity Services platform 1, which supports both SONET/SDH and secure management via logging. The MIL- drives. The IS5500 supports SSD, 15K consists of inside perimeter privilege Ethernet interfaces. SM8DPA offers a jumbo frame size up SAS, 10K SAS, and near-line SAS drives. July 15, 2011 Processor.com Page 7 P R O D U C T R E L E A S E S QualysGuard suite. QualysGuard combines designed to support the Microsoft Office hosted by traditional email servers or as part ■Winchester FlashDisk VX-3464R security and compliance services such as 365 email application. Features include of cloud-based corporate Google accounts. & VX-3462S vulnerability management, Web app scan- email archiving, DLP that protects private Winchester Systems announced the release ning, and PCI compliance and policy compli- information in emails, and powerful policy- ■Ascom i62 & Enterasys 3600 Series of FlashDisk VX-3464R and VX-3462S ance. The solution is also designed for rapid driven email encryption. Integration RAID disk arrays that support 10Gbps deployment and flexible price options. Ascom Wireless Solutions and Siemens’ Ethernet connectivity in a network-centric ■Vircom directQuarantine v1.1 Enterasys Networks have announced certified ■ExoIS PeepSafe 2.0 environment. The four-port, two-controller Vircom released a new version of direc- interoperability between their VoWiFi hand- VX-3464R can expand to 336TB, as can the ExoIS PeepSafe 2.0 is aimed at helping tQuarantine, an Outlook add-on module set, the Ascom i62, and the Enterasys 3600 two-port VX-3462S with a single control- organizations descope their corporate environ- for Vircom’s modusGate email security series of wireless access points. Ascom’s i62 ler. Both are available with CA ARCserve ments by implementing processes that move software that provides end-user control of VoWiFi (Voice over Wi-Fi) handsets work Replication software built in. the storage and transmission of cardholder quarantine emails directly from Outlook. with Enterasys’ 3600 series access points to data to a PCI-compliant hosted environment. V1.1 features a Report As Spam feature exceed standard Wi-Fi certification require- SECURITY The fully managed and customizable secure that lets end users send an unfiltered spam ments, the companies say. The resulting portal environment incorporates encrypted message to the quarantine and automati- 802.11n solution provides users with indoor ■Black Box Network Services EncrypTight email, fax, voice messages, online storage, and cally send an email to Vircom for analysis. mobile phone service with “wired-like” voice Black Box announced the EncrypTight safe processing of cardholder data. quality. The pairing also supports higher call ■Vormetric Data Security for SAP architecture for Internet or WAN connectiv- capacities at greater ranges. ity. It’s able to encrypt network data at OSI ■McAfee Security Management Solution Vormetric announced the release of Layer 2, 3, or 4. EncrypTight is designed to be McAfee introduced its McAfee Security Vormetric Data Security for SAP, which ■Cloudmark Mobile Messaging transparent and saves IT admins time because Management solution, which integrates with is designed to protect data in SAP environ- Security Solution it doesn’t utilize VPN tunnels. The drag-and- the McAfee ePolicy Orchestrator, McAfee ments with transparent, high-performance Cloudmark has launched its Cloudmark drop interface lets you set encryption policies Risk Advisor, and McAfee endpoint products. encryption. It provides strong encryp- Mobile Messaging Security Solution, a secu- based on IP addresses, port numbers, protocol The new offering is designed to give users tion for complex environments without rity suite that includes a global reporting and IDS, and VLAN tags. an at-a-glance view of all security and risk the need to modify application modules analysis component, as well as automated, events that have occurred on-premises, on a or underlying systems. It’s unique in active messaging filtering. In conjunction ■Dataguise DgSuite 3.5 hosted desktop, in the network, or on a server. its ability to protect both structured and with the launch, Cloudmark also announced Dataguise has announced the release of Enhanced features of the platform include unstructured data, including SAP reports, its 2011 Mobile Spam Guide, a toolkit DgSuite 3.5. The new release offers proac- complete visibility into security posture with archives, and database extracts. designed to help address mobile spam. The tive risk-based enterprise security intelligence new automated and real-time reporting analyt- Mobile Messaging suite enables operators and solutions for transparently securing PII ics; proactive risk analytics that let users ana- MESSAGING & TELEPHONY to combat evolving messaging threats with (personally identifiable information), PCI lyze the impact of an event or configuration advanced mobile antivirus, subscriber behav- (Payment Card Industry) data, information change on their overall risk profile; and sim- ■ArcMail Technology ArcMail Guardian ior analysis, and subscriber preference capa- covered by HIPAA regulations, and other plified automated operations, which automate ArcMail Technology’s ArcMail Guardian bilities, while allowing mobile operators to similar sensitive data located in structured and monitor key security program operations. is a new email archiving tool capable of inte- create customized scenarios to suit the needs database repositories across distributed enter- grating Google-hosted email with email from of their networks and subscriber base. prise environments. ■Proofpoint Compliance other corporate sources, such as Microsoft For Microsoft Office 365 Exchange. The system offers a hybrid ■RPost Email Encryption Upgrade ■Dell QualysGuard Proofpoint has launched Proofpoint approach that includes an on-premises appli- RPost announced upgrades to its email Dell SecureWorks and Qualys have Compliance for Microsoft Office 365, a ance that simultaneously retrieves, indexes, encryption solution, which is now easier to use teamed to integrate and distribute the cloud-based regulatory compliance suite and archives all email messages whether Go to Page 8 Page 8 Processor.com July 15, 2011 P R O D U C T R E L E A S E S Continued from Page 7 enclosure design, separable and indepen- open software development platform, Jazz, (Total Managed Print) Portal. The cloud- and features enterprise security intelligence dently scalable power shelves that are user- which enables deep collaboration between based TMP Portal now features a flex- and auditable proof of compliance. Enterprise upgradeable, and your choice of cooling. software and systems groups. ible suite of nine brand-agnostic and pro- security intelligence provides reporting and prietary services that can be tailored to monitoring for increased email security. The CLIENTS ■Xeal–powered by iStarUSA Group complement and supplement any solution improved proof of compliance feature ensures IS-500R2UPD8 500W 80 Plus Redundant PSU provider’s MPS model. that emails meet corporate policies. ■Appian Mobile BPM Enhancements Xeal–powered by iStarUSA Group– ■Pervasive TurboRush For Hive Appian has released improvements to its released the IS-500R2UPD8, an environ- SERVERS mobile BPM (business process manage- mentally friendly 500W 2U 80 Plus-certified Pervasive Software unveiled the Pervasive ment) software, including mobile image redundant PSU that includes numerous safety- TurboRush for Hive, a product that acceler- ■RAID Fusion 2U and document capture abilities within pro- related features, including over-current and ates data warehouse system, or Hive, queries RAID has announced its latest Fusion cess. Other enhancements include access for SQL and Hive developers. To achieve the 2U, a VMware-certified quad-processor to key data and tasks from a mobile device, improved processing performance, Pervasive server that uses Intel’s latest 10-core E-7 private-label branding of native client TurboRush for Hive relies on the Pervasive 8800 Series CPUs and ioMemory storage applications in public applications for vari- DataRush dataflow engine to rapidly process technology from Fusion-io. The system is ous mobile platforms or via private distri- tasks without altering any code. aimed at demanding enterprise computing bution to enterprise devices, and the ability environments and is capable of sustaining for developers to create process applica- ■Quest Software Coexistence Manager 750,000 I/Ops on non-volatile flash. The tions once and deploy them immediately to For GroupWise company says the system “unites high- all major mobile platforms. Quest Software announced Coexistence density core count with high-performance, Manager for GroupWise, a tool designed low-latency ioMemory.” ■Exele Information Systems TopView 6.10 over-voltage protection to ward off catas- to provide direct coexistence between Exele Information Systems announced trophes in data centers. Support for PMBus Novell GroupWise and Microsoft Ex- ■RAID Fusion 2U EX enhancements to its TopView software enables organizations with PMBus software change 2007/2010/Online as part of a RAID announced its new Fusion 2U EX suite with the release of TopView 6.10 to manage power supply failures with bet- migration or to integrate disparate envi- HPC server. It can support up to four Intel with Alarm RSS capability. The Alarm ter efficiency and effectiveness. The RoHS- ronments. Features include a Free/Busy 7500 EX series 130W or 95W processors RSS capability allows users to subscribe to compliant IS-500R2UPD8 has an MTBF Connector, Directory Connector, and or Xeon E-7 8800 Series processors and up one or more TopView Alarm feeds from a rating topping 100,000 hours, power failure Calendar Guard. In addition, the product is to 512GB of DDR RAM. Additionally, it variety of desktop and mobile devices. It alarms and signals, Automatic Fan Thermal scalable for environments of any size. features six hot-swappable 3.5-inch SATA can also contain multiple feed items, item Control, hot-swappable power modules, and drive bays. headlines, item descriptions, and links. load-sharing functionality. Beyond a 24-pin ■Vertica 5.0 main connector, the PSU includes one 4-pin Vertica announced Vertica 5.0, the latest ■SGI Altix ICE ■IBM Rational Solution For Collaborative 12V, one 8-pin EPS 12V, eight Molex, two version of the Vertica Analytics Platform. SGI unveiled its SGI Altix ICE, a highly Lifecycle Management SATA, and one floppy connectors. For more Version 5.0 offers improved flexibility flexible, tightly integrated blade architec- IBM introduced its Rational Solution for on this product, see page 41. and real-time performance for customers ture based on the latest Intel Xeon (Sandy Collaborative Lifecycle Management, an with demanding business intelligence and Bridge EP) processor series. The Altix ICE enterprise-focused offering that lets soft- ■OKI Data Total Managed Print Services analytic workloads. A software develop- high-performance computing solution sup- ware development teams effectively man- OKI Data Americas has announced ment kit provides users with the ability to ports FDR InfiniBand and will scale to up age their application lifecycles to avoid the growth of its MPS (Managed Print customize and insert customer- and use to 2,304 cores in a single rack. Other fea- project delays, low quality, or budget Services) program within the channel case-specific query logic into the Vertica tures include a new building-block blade overruns. The software is built on IBM’s through the expansion of the OKI TMP database for fully parallel execution. Program Details (cid:114)(cid:1) Trade in one old PDU regardless of brand for one new Cyber Switching PDU at a discounted price (cid:114)(cid:1) $100 discount on ePower, $75 on Dualcom S, $50 on Dualcom Plus, and $25 on E Series PDU models (cid:114)(cid:1) All Cyber Switching units are brand new, 100% factory-tested and calibrated with full manufacturer standard warranty (cid:114)(cid:1) One discount per trade-in for each new Cyber Switching PDU purchased with no trade-in limit (cid:114)(cid:1) FREE return shipping of old PDU(s) - certain limitations may apply (cid:114)(cid:1) FREE environmentally-friendly disposal of your old PDU(s) once returned to Cyber Switching To get started, please contact: [email protected], (888) 311-6277, or visit www.cyberswitching.com/cashforclunkers. July 15, 2011 Processor.com Page 9 A Gaw Associates, Inc. Company ● Toll Free: 877-GAW-RACK DataCenterDepot.com (429-7225) We are an industry leader, nationally recognized for the highest quality products and services, as well as most economical solutions. Made in the USA Adjustable height tables Standard & Seismic racks Wall mount racks Rack accessories ● Cable ladders ● Cable management ● Custom manufactured racks and accessories ● Design solutions and free expert consulting ● Rack and stack Technical furniture Equipment mounted travel case Call us today, receive answers today: 877-429-7225 Give us 1% of your business . . . we’ll earn the rest! Page 10 Processor.com July 15, 2011 Virtualization & The SMB Continued from Page 1 infrastructure, SMBs, which may have department in your business, such as “You want to ask [whether] the prod- vice president of product marketing and only one person managing their infra- your administrative staff, that uses a uct is integrated, or are there many business development for Citrix-owned structures, can be more efficient with standard set of applications. “Using the moving parts you need to manage indi- Kaviza (www.kaviza.com). their time. technology and incrementally expanding vidually. Also you want to know if the “Imagine if you only have to manage from there is a lot easier and cost-effec- administration is UI-based, whether the The SMB Groundswell a few servers, yet those same servers tive than doing a top-down deployment,” setup is wizard-driven or complex, and David Marshall, founder of VMBlog let you offer email, hosted PBX, hosted she says. the amount of infrastructure required to .com and an editor of “Virtualization virtual desktops, and have direct Active run it in production,” she says. Sidestepping Complexities for Dummies,” says that the ground- Directory servers,” she says. “You may In addition, SMBs have more options swell of SMB interest in virtualization be reducing the amount of infrastruc- As SMBs incorporate virtualization to find the products that work for their has inspired virtualization vendors to ture that you have to buy and manage, into their infrastructures, they need to unique situations. “Do your home- put together packages that offer SMBs but you’re not reducing the level of ser- be especially careful in choosing prod- work,” Marshall advises. “A few years the same types of features large enter- vice or usability to your users.” ucts that can be deployed with minimal ago, it seemed like you only had one prises have taken for granted for years. infrastructure and degree of expertise, vendor to really choose from,” but Good Places To Start “Many of the features that were once Subramanian says. that’s not the case now, he says. P considered enterprise-class, such as SMBs are adopting virtualization in vMotion or vMotion-like capabilities, much the same pattern as larger orga- SMB Action Plan fault tolerance, and high availability, nizations. Typically they start by con- are making their way to SMB versions,” solidating servers. “Oftentimes you Marshall says. have servers that don’t need dedicated If you’re an SMB looking to implement virtualization or expand, say, from server virtualization to Moreover, enterprises have served as infrastructure to run, so consolidating desktop virtualization, David Marshall of VMBlog.com and “Virtualization for Dummies” has one guinea pigs as virtualization technolo- those workloads into virtualized shared word of advice. gies have developed, and now these environments offers good bang for the technologies have advanced to the buck,” Subramanian says. “Start! If you’re still waiting around for ‘something’ to push you in, stop waiting. It’s 2011, and point where SMBs can implement them Once the server stack has been virtu- we’ve come a long way since 2005 or 2006,” he says. using wizards or other simple meth- alized, SMBs tend to move into desk- ods. “Vendors are designing turnkey or top virtualization. “Because they have Steve Kosted, senior product marketing manager of the Windows Server team at Microsoft, out-of-the-box VDI (Virtual Desktop already invested in server virtualiza- offers three basic steps to get you going: Infrastructure) solutions specifically tion, they often have spare capacity on with the SMB in mind,” he says. that virtualized server stack that they (cid:114)(cid:1) Make a business case for virtualization. Compare the leading virtualization solutions and can start to utilize for moving their decide on a solution based on cost and comfort level. Doing More With Less desktops,” says Parmeet Chaddha, Subramanian points out that SMBs executive vice president of products (cid:114)(cid:1) Plan for virtualization. While deploying a virtualization solution in your environment is rela- see the value in using virtualization to and technology at Pano Logic (www tively straightforward, it is important to understand how to best optimize your environment and manage physical resources while giving .panologic.com). how you will deploy the solution, including server, desktop, and application virtualization. users a greater level of access than they Subramanian recommends that SMBs can sustain using traditional IT infra- seeking to virtualize should start off (cid:114)(cid:1) Try virtualization for free. Several vendors offer trial versions that let you test features and structures, even if they have just a hand- with specific use cases. For example, capabilities so that you can get an idea of how this virtualized environment will work within ful of servers. In addition to the cost if you want to deploy desktop virtual- your data center before you have to commit to a solution. savings and consolidation of physical ization, you might consider finding a Gaseous Fire Suppression Systems Continued from Page 1 why people choose gaseous systems is the building itself. “Clean-agent systems gaseous systems are not, companies some- because they don’t want water all over protect the contents of a space, and fire times choose to eliminate planned gaseous How It Works their computer systems,” Chase says. sprinkler systems protect the structure,” systems if construction budgets get tight. The term “gaseous fire suppression” When a water-based system is trig- he explains. “You don’t give up one for The other big downside is the floor space covers two large categories: CO (car- gered—whether there actually is a fire or the other. They are both critical elements necessary to store the gas. Unlike water, 2 bon dioxide) systems and clean-agent not—it sprays water throughout a facility, in total fire safety.” clean agents must be stored onsite, and systems. CO systems work by dilut- often damaging servers and other hard- some, particularly the inert gases, take up 2 The Disadvantages ing the oxygen content of the room to ware that weren’t affected by the fire. By quite a bit of valuable real estate. “The the point where you can’t sustain a fire, contrast, if a single server rack catches If gaseous fire systems have so many inert gases require much more storage explains Barry Chase, a fire protection on fire, a gaseous system can put out that advantages, why doesn’t every data center space, and in some cases, an owner may engineer for the NFPA (National Fire small fire without damaging the rest of the install one? “Usually cost is a concern,” have to designate a separate room to hold Protection Association). However, car- data center. Chase says. When building a data center, the storage cylinders,” Hoffman says. bon dioxide systems aren’t used in areas In addition, when a sprinkler system is companies have to consider the potential Finally, although these systems are con- of data centers where people are pres- activated, it leaves a big mess. “Sprinkler risk vs. the expense of installing a clean- sidered safe for the environment, some ent because the extinguishing concentra- water is not very clean,” Chase says. “It agent system. companies are concerned about the poten- tion is above the lethal concentration for sits in a pipe for a long time before it dis- Hoffman notes that because sprinkler tial global warming possibilities of using humans, he adds. charges, and it does not come out like your systems are required by fire codes and clean agents. P Clean-agent systems, on the other tap water.” hand, can be used in occupied spaces. Not only are clean-agent systems less Clean agents fall into two smaller sub- messy than water systems, they also trig- Choosing The Right categories: inert gases and chemical ger faster. “Basically, when a fire sprin- agents, primarily halocarbons. “The inert kler head has been activated, everything Gaseous Fire Suppression System gases extinguish by reducing the level of in the vicinity has been destroyed by fire oxygen in a room to a level that cannot or smoke because it needs to grow to When you’re deciding what type of gaseous fire suppression system to install, you have sev- support combustion but can still support that size to activate the sprinkler head,” eral things to consider. First, will the room or facility be occupied by people? If so, you’ll need a human life,” Hoffman explains. “The Hoffman says. “Whereas with clean clean-agent system, not a carbon dioxide system. chemical agents act not by the removal agent, we act on very early smoke detec- of oxygen, but they work chemically on tion and discharge before a fire has had Second, although all clean-agent systems are required to meet NFPA (National Fire Protec- a fire and they extinguish primarily by a chance to grow to the point where it tion Association) standards and achieve a UL Listing, different manufacturers use different cooling at the molecular level.” would activate a sprinkler head.” agents and deliver those agents in different ways. Some require less storage space. Some All of the clean agents—both the inert In nearly all cases, local fire authorities are more environmentally friendly. Some can only be used in a total flooding application, while gases and the chemical agents—are non- require data centers to have a water-based some can be applied locally. You need to weigh the various options to find the product that conductive and invisible, leave no resi- sprinkler system even if they also have a meets your needs. due, and are safe for use in areas where gaseous system in place, Hoffman says. people are present. That actually works out well, because Finally, David Hoffman, marketing and communication chair for the FSSA (Fire Suppression each type of system plays a different role The Advantages Systems Association) and a business development manager for Siemens, recommends that you in an overall fire suppression plan. The make sure you select an authorized distributor. Authorized distributors have been trained by the When it comes to protecting the infor- gaseous systems turn on first and put the system manufacturers, and you must purchase from these companies in order to keep your war- mation and hardware in a data center, gas- fire out while it is still small. If those ranty in effect. eous fire suppression systems have some systems fail and the fire grows larger, the obvious advantages. “Usually the reason water-based system turns on to protect