P.O. Box 85518 Lincoln, NE 68501-5518 ELECTRONIC SERVICE REQUESTED January 27, 2012 Volume 34 Number 2 www.processor.com Address Changes: (800) 334-7458 or Fax: (402) 479-2193 Advertising Sales: (800) 247-4880 or Fax: (402) 479-2104 Products, News & Information Data Centers Can Trust. Since 1979 Network Security & Your Organization Planning & Proper Resources Are Key To Protecting Your Network Throughout the five years that Milton and Security. To that end, the use to gain control of your sys- Security Group (www.miltonsecurity.com) company has compiled a “Top tem. You should also perform has been in business, the company has talked 10” list of tips for common net- network security testing. Use to, and helped, quite a number of organiza- work access control questions a tool such as the EdgeOFIS tions of all sizes. Each of these organizations and concerns. system from Milton Security, has unique problems, but there are common Start by ensuring you have which will allow you to find themes between all of them. The biggest a security policy in place. your problem areas and find the theme, or question, seems to be, “How do we Your security policy should holes before the attackers do. secure our growing data, network, end nodes, define the level of security If you need help, Milton also systems, or cloud when we have less money and the roles and responsibili- offers auditing services to help and less people than we did last year?” ties of users, administrators, you achieve your goals. This area of concern has no boundary and managers. Establish a strong pass- based on organization size or type. The Create a complete invento- word policy. Weak passwords solution at its core will be pretty similar, ry of all devices connected to could mean a compromised user but the implementation will be different your network. From the printer account. Help your users come between organizations; Milton Security in the basement to the badge up with easy ways to remem- Group believes they can be separated into reader and all phones, tab- ber their passwords to reduce simple groups: Who, What, Where, When, lets, PCs, notebooks, etc. (Yes, passwords being written down. Why, and How. even the bar code scanner in An even better option is to use The key part of the security strategy—and the warehouse) This informa- a two-factor authentication sys- where most resources are spent—is being tion is key when creating your tem in conjunction with an Edge able to control and monitor each one of security profile. In addition, 7200 Adaptive Network Access these groups. What is the situation like in knowing the devices you have Control system from Milton. organizations that are unprotected? If an on your network can help you Lock down your USB ports. employee neglects that nagging reminder track down problems quickly. It This helps reduce the risk of about updating his system and goes on a also helps to provide a list you users introducing viruses, mal- business trip, not only would he be vulner- can work from when perform- ware, or backdoors. To do this, able, the likelihood of his system being ing maintenance. you will need an active agent compromised in some way is much higher. Make sure all of your oper- such as the Milton USBInformer And when that employee returns to HQ ating systems and applica- to continuously monitor for and plugs in, he is practically escorting the tions are patched with the unauthorized devices. For more threats into the building. Being able to mon- latest service packs and hot- information on USBInformer, itor and control the level of security on fixes. This is the step that a lot please visit the MiltonSecurity. employees’ devices is therefore vital to an of companies have problems com Web site. enterprise’s data security. with. Utilizing tools such as Control access onto the the Milton Edge Series devices, physical network at all times. Steps To Security you can ensure your systems are patched, Do a complete vulnerability assessment You can do this utilizing Milton’s Edge 7200 Over time, Milton Security Group has which will close vulnerabilities that can and network security assessment. Scan Adaptive Network Access Control system. found that most organizations are seeking be exploited by others. For more informa- all services on all devices and turn off or Don’t provide more rights to system a “What should we do first?” list for imple- tion on the Edge Series, please visit the remove unnecessary services. Unneeded resources than necessary. Implement the menting Adaptive Network Access Control MiltonSecurity.com Web site. services can be the entry point attackers concept of “least privilege.” Document your systems, and test their readiness on a quarterly basis. Testing is If an employee neglects that nagging reminder about key to ensuring systems are ready and able to do their jobs. updating his system and goes on a business trip, not only Educate your employees. Education is a vital component in any security plan. would he be vulnerable, the likelihood of his system being If you have questions or need advice on a problem, send your question to advice@milton security.com or call (888) 674-9001 and compromised in some way is much higher. Milton Security Group will be happy to help you get an answer. P Page 2 Processor.com January 27, 2012 Subscribe Today/Address Change Form For address change, fill out form below with new information and mail or fax. PLEASE PRINT What type of subscription request is this? ❑ New ❑ Renewal ❑ Cancel (cid:170)(cid:1)(cid:36)(cid:80)(cid:81)(cid:90)(cid:83)(cid:74)(cid:72)(cid:73)(cid:85)(cid:1)(cid:19)(cid:17)(cid:18)(cid:19)(cid:1)(cid:52)(cid:66)(cid:79)(cid:69)(cid:73)(cid:74)(cid:77)(cid:77)(cid:84)(cid:1)(cid:49)(cid:86)(cid:67)(cid:77)(cid:74)(cid:84)(cid:73)(cid:74)(cid:79)(cid:72)(cid:1)(cid:36)(cid:80)(cid:78)(cid:81)(cid:66)(cid:79)(cid:90)(cid:15)(cid:1)(cid:34)(cid:77)(cid:77)(cid:1)(cid:83)(cid:74)(cid:72)(cid:73)(cid:85)(cid:84)(cid:1)(cid:83)(cid:70)(cid:84)(cid:70)(cid:83)(cid:87)(cid:70)(cid:69)(cid:15)(cid:1) Phone: ( ______ )________________________________ Fax: ( ______ ) __________________________________________ Subscriptions (cid:46)(cid:66)(cid:74)(cid:77)(cid:1)(cid:39)(cid:80)(cid:83)(cid:78)(cid:1)(cid:53)(cid:80)(cid:27)(cid:1)(cid:49)(cid:15)(cid:48)(cid:15)(cid:1)(cid:35)(cid:80)(cid:89)(cid:1)(cid:25)(cid:19)(cid:22)(cid:21)(cid:22)(cid:1)(cid:116)(cid:1)(cid:45)(cid:74)(cid:79)(cid:68)(cid:80)(cid:77)(cid:79)(cid:13)(cid:1)(cid:47)(cid:38)(cid:1)(cid:23)(cid:25)(cid:22)(cid:17)(cid:18)(cid:14)(cid:19)(cid:22)(cid:21)(cid:22) Contact Name:__________________________________________________________________________________________ (cid:48)(cid:87)(cid:70)(cid:83)(cid:79)(cid:74)(cid:72)(cid:73)(cid:85)(cid:1)(cid:37)(cid:70)(cid:77)(cid:74)(cid:87)(cid:70)(cid:83)(cid:90)(cid:27)(cid:1)(cid:18)(cid:19)(cid:17)(cid:1)(cid:56)(cid:70)(cid:84)(cid:85)(cid:1)(cid:41)(cid:66)(cid:83)(cid:87)(cid:70)(cid:84)(cid:85)(cid:1)(cid:37)(cid:83)(cid:74)(cid:87)(cid:70)(cid:1)(cid:116)(cid:1)(cid:45)(cid:74)(cid:79)(cid:68)(cid:80)(cid:77)(cid:79)(cid:13)(cid:1)(cid:47)(cid:38)(cid:1)(cid:23)(cid:25)(cid:22)(cid:19)(cid:18) (cid:9)(cid:25)(cid:17)(cid:17)(cid:10)(cid:1)(cid:20)(cid:20)(cid:21)(cid:14)(cid:24)(cid:21)(cid:22)(cid:25)(cid:1)(cid:93)(cid:1)(cid:45)(cid:48)(cid:36)(cid:34)(cid:45)(cid:27)(cid:1)(cid:9)(cid:21)(cid:17)(cid:19)(cid:10)(cid:1)(cid:21)(cid:24)(cid:26)(cid:14)(cid:19)(cid:18)(cid:20)(cid:19)(cid:1)(cid:93)(cid:1)(cid:39)(cid:34)(cid:57)(cid:27)(cid:1)(cid:9)(cid:21)(cid:17)(cid:19)(cid:10)(cid:1)(cid:21)(cid:24)(cid:26)(cid:14)(cid:19)(cid:18)(cid:26)(cid:20) Company Name:________________________________________________________________________________________ Advertising & Reprints Address: ______________________________________________________________________________________________ (cid:9)(cid:25)(cid:17)(cid:17)(cid:10)(cid:1)(cid:19)(cid:21)(cid:24)(cid:14)(cid:21)(cid:25)(cid:25)(cid:17)(cid:1)(cid:93)(cid:1)(cid:9)(cid:21)(cid:17)(cid:19)(cid:10)(cid:1)(cid:21)(cid:24)(cid:26)(cid:14)(cid:19)(cid:18)(cid:21)(cid:18)(cid:1)(cid:93)(cid:1)(cid:39)(cid:34)(cid:57)(cid:27)(cid:1)(cid:9)(cid:21)(cid:17)(cid:19)(cid:10)(cid:1)(cid:21)(cid:24)(cid:26)(cid:14)(cid:19)(cid:18)(cid:17)(cid:21) City: ___________________________________________ State: ________ Postal Code: _____________________________ Editorial Staff Country:_______________________________________________________________________________________________ (cid:70)(cid:69)(cid:74)(cid:85)(cid:80)(cid:83)(cid:33)(cid:81)(cid:83)(cid:80)(cid:68)(cid:70)(cid:84)(cid:84)(cid:80)(cid:83)(cid:15)(cid:68)(cid:80)(cid:78)(cid:1)(cid:116)(cid:1)(cid:9)(cid:25)(cid:17)(cid:17)(cid:10)(cid:1)(cid:22)(cid:21)(cid:21)(cid:14)(cid:18)(cid:19)(cid:23)(cid:21) Email: ________________________________________ Web Address: ___________________________________________ (cid:37)(cid:80)(cid:1)(cid:90)(cid:80)(cid:86)(cid:1)(cid:73)(cid:66)(cid:87)(cid:70)(cid:1)(cid:66)(cid:1)(cid:79)(cid:70)(cid:88)(cid:1)(cid:81)(cid:83)(cid:80)(cid:69)(cid:86)(cid:68)(cid:85)(cid:1)(cid:85)(cid:73)(cid:66)(cid:85)(cid:1)(cid:69)(cid:66)(cid:85)(cid:66)(cid:1)(cid:68)(cid:70)(cid:79)(cid:85)(cid:70)(cid:83)(cid:16)(cid:42)(cid:53)(cid:1)(cid:78)(cid:66)(cid:79)(cid:66)(cid:72)(cid:70)(cid:83)(cid:84)(cid:1)(cid:88)(cid:80)(cid:86)(cid:77)(cid:69)(cid:1)(cid:67)(cid:70)(cid:1) (cid:74)(cid:79)(cid:85)(cid:70)(cid:83)(cid:70)(cid:84)(cid:85)(cid:70)(cid:69)(cid:1)(cid:74)(cid:79)(cid:1)(cid:77)(cid:70)(cid:66)(cid:83)(cid:79)(cid:74)(cid:79)(cid:72)(cid:1)(cid:66)(cid:67)(cid:80)(cid:86)(cid:85)(cid:32)(cid:1)(cid:36)(cid:66)(cid:77)(cid:77)(cid:1)(cid:9)(cid:25)(cid:17)(cid:17)(cid:10)(cid:1)(cid:22)(cid:21)(cid:21)(cid:14)(cid:18)(cid:19)(cid:23)(cid:21) 1. What is the size of your company 3. What is your annual computer hardware/ (cid:80)(cid:83)(cid:1)(cid:70)(cid:78)(cid:66)(cid:74)(cid:77)(cid:1)(cid:81)(cid:83)(cid:70)(cid:84)(cid:84)(cid:33)(cid:81)(cid:83)(cid:80)(cid:68)(cid:70)(cid:84)(cid:84)(cid:80)(cid:83)(cid:15)(cid:68)(cid:80)(cid:78)(cid:15) (how many employees)? software purchasing budget? ❑ Less than 10 ❑ 200 to 499 ❑ $0 to $9,999 ❑ $100,000 to $249,999 (cid:52)(cid:68)(cid:66)(cid:79)(cid:1)(cid:85)(cid:73)(cid:74)(cid:84) ❑ 10 to 99 ❑500 to 999 ❑ $10,000 to $24,999 ❑ $250,000 to $499,999 (cid:50)(cid:51)(cid:1)(cid:36)(cid:80)(cid:69)(cid:70) ❑ 100 to 199 ❑ 1,000+ ❑ $25,000 to $49,999 ❑ $500,000 to $999,000 (cid:88)(cid:74)(cid:85)(cid:73)(cid:1)(cid:90)(cid:80)(cid:86)(cid:83)(cid:1) ❑ $50,000 to $99,999 ❑ $1,000,000+ (cid:78)(cid:80)(cid:67)(cid:74)(cid:77)(cid:70) 2. How often do you purchase computer (cid:84)(cid:78)(cid:66)(cid:83)(cid:85)(cid:81)(cid:73)(cid:80)(cid:79)(cid:70)(cid:1) hardware/software? (cid:85)(cid:80)(cid:1)(cid:84)(cid:70)(cid:70)(cid:1)(cid:80)(cid:86)(cid:83)(cid:1) ❑ Weekly ❑ Quarterly (cid:88)(cid:70)(cid:67)(cid:84)(cid:74)(cid:85)(cid:70)(cid:15) ❑ Bi-weekly ❑ Annually ❑ Monthly ❑ No Involvement www.Processor.com News forth by HHS. The guide is designed to help ❙ ❙ ❙ Anonymous Hacks Researchers Trace Stuxnet Survey Highlights Paperless Doubts practices implement EHRs to improve health- Military Gear Supplier . . . Back To 2007 According to new data from Majority Opinion care, care efficiency, and population health in More than 20,000 credit card numbers and Security researchers at Kaspersky Lab have dug Research, more than half of the 1,142 the United States. It outlines five steps of mean- passwords were stolen from online military gear down deep into the makeup of the dangerous Americans surveyed don’t believe the United ingful EHR deployment: assessing practice pre- supplier Special Forces Gear, and hacker group Stuxnet virus and its sibling Duqu and discovered States will ever be truly paperless; 20% believe paredness; developing a strategy; selecting a Anonymous is claiming responsibility. In a state- that the viruses—and perhaps others that are as an all-electronic nation is possible, and 24% system; training for, installing, and migrating to ment posted on the message board Pastebin, yet unknown—could have originated as far back as were undecided or had no opinion. The survey the EHR; and finally achieving Meaningful Use. the group says it pilfered 8,000 credit card num- 2007. The researchers made their determination by was also broken down by gender and political ❙ Virtual Security Appliances bers and 14,000 passwords in August; Special examining the viruses’ drivers, uncovering a similar affiliation; 25.4% of men and 15.7% of women Gaining Popularity Forces Gear has confirmed the attack and says architecture that Kaspersky analysts call “Tilded,” saw an all-electronic future, while 22.7% of it has completely revamped its site because its authors used file names that start with Republicans and 17.4% of Democrats expected Research firm IDC found that when it comes with new security measures “~d.” Stuxnet and Duqu appear to have the nation to go paperless. Research firm to messaging security, there is a growing the company says will pre- been designed to target a country’s con- Gartner notes that the imaging software market shift in enterprises from using traditional vent another attack from trol systems and critical infrastructure is on the rise as enterprises work to transform software platforms to instead implementing happening. Anonymous using zero-day vulnerabilities and are their physical documents into digital files; the virtual security appliances. A little over a year claims it targeted the considered particularly troublesome market reached $1 billion worldwide in 2010 ago, messaging security software programs site because its custom- due to their complexity—Stuxnet in and is expected to climb to $1.8 billion by 2015. installed on servers or dedicated appliances ers are largely military particular contains more than 4,000 for antivirus filtering, antispam, and content ❙ Increased Patient Data Risks and law enforcement functions, similar to commercial soft- monitoring for email, social messaging, and Could Lead To More Lawsuits In 2012 personnel. The news ware code. instant messaging programs constituted about came on the heels of As more and more healthcare providers make 42% of the market; however, IDC says that ❙ New Accountable Care Anonymous’ announcement the move to electronic health records and patient share is expected to fall to 27% by 2015 as Initiative Could Bring of a similar attack carried data is increasingly available on mobile devices more and more enterprises make the move to Big Savings out against security com- and in the cloud, researchers at ID Experts are virtual appliances, which offer a more built-in pany Strategic Forecast. A new initiative launching this predicting an increase in data breaches and approach by running on the hypervisor level. month is set to save 32 health- subsequent lawsuits this year. The same was IDC predicts virtual appliances will grow from ❙ . . . & Leaks care organizations across the true for 2011, when a number of data breaches 1.8% of the market in 2010 to 12.2% in 2015. Israeli Credit Card United States about $1.1 billion prompted the Department of Health and Human Other systems rounding out the market are Accounts over five years by increasing efficiency and Services’ Office for Civil Rights to increase its dedicated hardware-based messaging security A group of Saudi hackers associated with improving communication between provid- oversight of the healthcare market and fine appliances, predicted to remain steady with Anonymous reportedly broke into a number of ers and beneficiaries, according to CMS (the organizations that were found to be providing about 28% of the market, and cloud-based Israeli Web sites and stole credit card informa- Centers for Medicare and Medicaid Services). inadequate privacy protection. Experts pre- security as a service, expected to hold about tion for about 400,000 card holders, though the The initiative is designed to test the efficacy dict increased attention will be paid to HIPAA 31.2% of the market. card company says that only about 14,000 of of different payment models as a way to help regulations and that organizations found to be ❙ Federal CIO Council Releases the card numbers were valid. Though the group healthcare organizations work together with noncompliant will be aggressively pursued. The Cloud Security Standards claimed to be using the credit card information private payers, reduce Medicare cost growth, increased focus on safety and regulations will For FedRAMP to make purchases, the compromised sites— and provide better care for beneficiaries. The likely spur healthcare organizations to step up which included a local TV station and an Israeli Pioneer model will establish a reward system their security measures to ensure that patient More than 150 security con- sports information site—said the accounts had for healthcare providers that deliver high-quality data will not be compromised. trols in 16 categories have been locked down and that the card holders services and is targeted toward providers that been established would not be held accountable for any fraudu- have experience with providing integrated care for FedRAMP lent charges that might appear. across various healthcare settings. (the Federal Risk Assessment Program) by the federal WATCH THE This information provides a quick glimpse of current and historical stock CIO Council. FedRAMP is a STOCKS prices and trends for 13 major companies in the technology market. cloud security standardization program that outlines security requirements for cloud deploy- % change from Company Symbol Year Ago Jan. 5 Jan. 19 previous issue ments on certain types of systems, AMD AMD $8.02 $5.46 $6.22 ▲ 13.92% provides continuous monitoring and Apple AAPL $332.68 $418.03 $427.75 ▲ 2.33% risk assessments, and authorizes CA Technologies CA $25.46 $20.31 $22.28 ▲ 9.7% security vendors for government- Cisco Systems CSCO $20.77 $18.92 $19.79 ▲ 4.6% wide cloud service and infrastructure Dell DELL $13.60 $15.17 $16.57 ▲ 9.23% deployments. The new security Google GOOG $626.77 $659.01 $639.57 ▼ 2.95% standards are a big step forward for HP HPQ $46.78 $26.50 $27.15 ▲ 2.45% FedRAMP, providing a cornerstone IBM IBM $155.80 $184.66 $180.52 ▼ 2.24% ❙ for standardized security authoriza- HHS Releases Guide Intel INTC $20.95 $25.40 $25.63 ▲ 0.91% tion processes, the CIO Council says. The For Meaningful Use LinkedIn LNKD n/a $64.13 $74 ▲ 15.39% controls were established with input from Microsoft MSFT $28.35 $27.68 $28.12 ▲ 1.59% Divisions within the U.S. Department of Health industry and government entities and address Oracle ORCL $32.31 $26.59 $28.56 ▲ 7.41% and Human Services have joined forces to such concerns as multitenancy, shared Red Hat Software RHT $43.28 $42.70 $46.90 ▲ 9.84% release a “How To Get Started” guide designed resource pooling, and infrastructure control, Symantec SYMC $17.81 $15.80 $16.59 ▲ 5% to help small physician practices successfully as well as categories such as access con- select and deploy electronic health records in trol, incident response, risk assessment, and NOTE: This information is meant for reference only and should not be used as a basis for buy/sell decisions. compliance with Meaningful Use standards set account management. January 27, 2012 Processor.com Page 3 Page 4 Processor.com January 27, 2012 News S TAT S & F A C T S ❙ shipped; Acer and Asustek came in fourth and ITC Investigates Providing The Latest Insight & Information fifth, respectively. Patent Infringement Claims From Leading Research Firms ❙ Study Shows Increase In Demand A number of smartphone and tablet makers For Cloud Skills have been named in patent infringement allega- tions made by Digitude Innovations, a patent According to recent findings from Wanted Researchers Release Rankings licensing firm. The U.S. International Trade Analytics, cloud skills are more in-demand than Commission is currently looking into Digitude’s ever before, with 61% of technology job want claims against RIM, Nokia, HTC, Samsung, and ads listing a need for workers with cloud com- For Browsers & Web Sites a handful of other big-name mobile device mak- puting experience. The study considered want ers concerning four patents for mobile technolo- ads posted by 2,400 businesses nationwide and At 2011’s End gy. The patents cover mobile technology meth- showed a high concentration of listings search- ods for call management, dual-purpose input/ ing for cloud skills in San Francisco and San output circuits, multimode mobile information Jose, in the heart of Silicon Valley; New York terminals, and notifications for unopened mes- City, Seattle, and the nation’s capital were also Chrome Is Climbing Through The Ranks In Browser Share sages. So far, Amazon and HTC have both filed among the cities showing double-digit demand responses to the charges, asking the ITC to increases. Wanted Analytics expects that many According to statistics from Net Applications, although Microsoft’s Internet Explorer is still tops rule against Digitude; Amazon’s popular Kindle of these positions will take some time to fill, as in the browser market, Google’s Chrome is close to overtaking Mozilla’s Firefox for the No. 2 Fire and HTC’s EVO Design 4G are among the demand for cloud skills is high but supply is still spot; Chrome’s share is especially impressive given the browser has only been around since devices at issue. relatively low; the firm advises IT professionals late 2008. The end of 2011 also signaled a drop below 1% for version 6 of Internet Explorer— ❙ who are searching for jobs to acquire new cloud Yang Resigns From Yahoo! a drop Microsoft celebrated with a cake. Here’s a breakdown of the top five browsers: skills and certifications. Beleaguered search company Yahoo! saw ❙ SSD Revenue Up 105% In 2011 another major change earlier this month when Jerry Yang, co-founder and former CEO of the According to IDC, solid-state drive revenue company, resigned from his post on the board more than doubled from 2010 to 2011, climbing of directors and all other positions within the from 2010’s record-setting $2.4 billion to reach company. Yang served as CEO before being $5 billion in 2011. There are a number of factors replaced by Carol Bartz in early 2009 following in play that led to the increase, IDC says; for Mozilla Firefox an unsuccessful takeover attempt by Microsoft, example, flooding in Thailand made a serious 21.83% of which Yang was one of the major opponents. hit to hard disk drive availability, and the market Yang’s exit follows the ouster of Bartz, who was shift to mobile devices such as tablets, which replaced earlier this month by Scott Thompson, use SSDs for storage, also provided a boost. former president of PayPal. Analysts speculate Other factors in SSDs’ growth include strategies Google Chrome that the changing hands may lead the company that use solid-state drives in complementary 19.11% to revisit the idea of being acquired. setups with HDDs and a continued shift toward ❙ tablets and ultrabooks in both consumer and SAP Reports Strong Finish To 2011 business settings. IDC expects the growth to In its fourth-quarter preliminary results posting, continue, predicting a 51.5% rate of growth from software giant SAP announced an 11% uptick in 2010 to 2015 for the SSD market. The research sales and a 206% gain in operating profit com- firm also expects pricing to fall pared to the same time last year. Specifically, below the $1-per-giga- the company’s sales climbed from $5.1 billion byte point by the end Q4 2010 to $5.7 billion in Q4 2011; operating of this year. Apple Safari profit went from $684 million to $2.1 billion year over year. The company also saw its software Microsoft Internet Explorer 4.97% revenue increase 16% year over year, growing 51.87% from $1.9 billion to $2.2 billion. For fiscal 2011 Opera as a whole, the company’s sales jumped 14% year over year from $15.8 billion to $18 billion, 1.66% and its operating profit grew 88% from $3.3 bil- lion to $6.2 billion. SAP attributes much of its success in 2011 to “outstanding growth” in its core applications, big gains for its HANA in-memory database, and increased Google Tops List Of Most-Visited Web Sites In 2011 momentum in its analytics and A recent Nielsen report named Google the most-visited Web site of 2011, with an average mobile soft- of more than 153 million unique visitors per month; Facebook wasn’t far ware business. behind with 137 million. Here are Nielsen’s top five most-visited Web sites, ranked by average number of unique ❙ IDC & Gartner visitors per month: Report Decline 7 In PC Shipments 6. 0 3.4 37.6 130m.ill1ion 115.mill9ion 1 million Agdie sfvlhoi coeedcs-o dlneimodm intoyis ,a ha esndldo hwaandr odaw bdnur inivnde a tmhneca ergk looefbt ,ma tlho Peb Cisle lu g- ❙ShNoeww B Sinega rOcnh TMhaer kMeot vSehare Figures 15 million 1 million Y shipment market, IDC says. In Q4 2011, ship- Market research firm comScore released (iM o ments were down 0.1% year over year, falling its latest search market statistics, which Y nc i u from 92.8 million to 92.7 million. Shipments for show that Microsoft’s Bing search engine l a udicr T all of 2011 showed a slight increase over 2010 has surpassed Yahoo! and is now in second Go Fa ho ng Bingoso ube otsoaf l1ree.s6m %waii.ln lI DlsiklCoe wley,x rpbeeuccto ttvshe etrh rbeey sf ietrhsaetr cqehun afdirr tmoefr stohafey 2 sy0 e1a2r , p1inl5a D.c1ee%c b eoemfh btihneedr , U Gu.opSo .og snleely.a sBrcliihng ghe tnclyag mifnroeem ma w1a5ark%ye w ti nit h o c o , Wift with a predicted 5.4% increase in shipments November but still enough to pass Yahoo!, e ! nd for the year. Fellow research firm Gartner also which fell from 15.1% in November to 14.5% g owsi reported a decline in shipments for Q4 2011 of in December. Meanwhile, Google—still the l b s t o Live 1.4% year over year. Gartner also broke down clear market leader—climbed from 65.5% in e e, s the results by manufacturer and found that November to 65.9% in December, largely at o an while Lenovo is still in second place, it is quick- Yahoo!’s expense. Bing’s growth is thanks k d M ly approaching current No. 1 PC maker HP, in large part to Yahoo!, with which Microsoft SN which suffered a 16.2% year-over-year decline teamed up in 2009 to power Bing’s search ) in shipments for Q4 2011. HP still held 16% of queries and ads. The deal has been benefi- the PC market share for the quarter, with 14.7 cial for a struggling Yahoo!, with Microsoft million PCs shipped; Lenovo held 14% of the paying Yahoo! 88% of traffic acquisition fees; market with shipments of 12.9 million units, however, Yahoo! is still in an uncertain state up 23% from Q4 2010. Dell came in third with as it works to find its footing following leader- 12.6% of the market and 11.6 million units ship changes. January 27, 2012 Processor.com Page 5 News led to Hurd’s resignation at HP, both Fisher and voters whether tablets will take the place large amounts of bandwidth were using a ❙ Dell Reorganizes Company Hurd have said the letter contains inaccura- of laptops and found that more than half laptop (64%), while one-third of consumers After one of Dell’s three presidents, Paul cies. However, according to the letter, Hurd told of those aged 30 to 44 and 45 to 64 most were using a smartphone. Bell, announced his retirement, Dell Fisher about HP’s potential purchase of EDS believe the tablet will take the place of lap- ❙ IBM Holds Record Number Of Patents announced there would be another reorga- before talks were made public, showed Fisher tops—53% and 52%, respectively. However, nization at the company, the second shuffle documents from a Chinese government official, the youngest demographic believes the lap- According to IFI Claims Patent Services, IBM in the past 12 months. Steve Felice, another made unwelcome sexual advances, and tried to top will stay the dominant form of personal is once again the No. 1 global company in Dell president, will take over Bell’s respon- impress the woman with his bank receipts docu- computing, with nearly half of the 18- to terms of patents held by a single corporation. sibilities at the company, which include the menting more than $1 million in one account. 29-year-olds surveyed saying the tablet will IBM has held the top spot for 19 years and public and large enterprise segments. Felice ❙ not overtake the laptop. In terms of gender, currently holds 6,180 utility patents. Samsung Microsoft Sues Comet For Piracy is currently responsible for all consumer 53.2% of men said the tablet will replace the increased its patent number to 4,894 and business segments at the company. Bell Microsoft is suing Comet, a consumer electron- laptop vs. 39.2% of women. holds the second position, followed by Canon, worked for Dell for about 15 years and led ics retail chain based in the United Kingdom, ❙ which saw a patent increase of 11% to 2,821. Forrester Notes Apple’s Prevalence the company’s government, education, and for allegedly selling illegally copied versions of Microsoft was also included in the top 10, In Enterprises healthcare teams. Although Dell did not Windows operating systems to consumers as but slipped to the sixth slot after several comment further on the reorganization, it recovery disks. Although In a Forrester report, Apple is predicted to Asian companies accumulated U.S. patents. will go into effect Feb. 4. consumers can cre- sell about $19 billion worth of Mac comput- Microsoft, along with Oracle, HP, Intel, and ate recovery disks ers and iPad tablets to enterprises in 2012. Cisco, gained fewer patents in 2011 than in ❙ AutoVirt Closes Doors themselves with certain This is a 58% increase compared to 2011, the previous year. Asian companies currently Start-up company AutoVirt versions of Windows, according to Forrester analysts; Apple’s account for half of the top 50 firms that hold is no longer in business. Microsoft says that sales to enterprises in 2011 amounted to U.S. patents. After the company CEO replicating the software roughly $12 billion. In 2013, the company ❙ Report: Choose Third-Party and vice president left and then selling it for expects sales to continue to rise, reach- Data Recovery Providers Carefully in November, AutoVirt’s profit amounts to coun- ing an estimated $28 billion worth of Apple business came to a halt in terfeiting. Microsoft computers and tablets sold to corporations. Third-party system recovery options can December. The company claims Comet produced Although Windows computer and tablet occasionally do more harm than help, is no longer receiving and sold 94,000 recov- manufacturers still hold the dominant place according to a recent report. Ponemon funds and is seeking to ery CDs with the oper- in enterprise sales, with about $69 billion in Institute’s “Trends in Security of Data sell its intellectual prop- ating systems, totaling hardware sales expected this year alone, Recovery Operations” report reveals that erty. The New Hampshire- about $2.2 million in Apple’s rapid growth is notable. Forrester 83% of survey respondents say their enter- based company opened sales. The UK-based analysts say they expect Apple sales to be prise suffered at least one data breach in in 2007 with the aim to retail group says it sold evenly divided between Mac computers and the past year. Of those that experienced a simplify the backing up and sharing of data the disks legally and will defend its company iPad tablets. breach, 19% say the breach occurred while in the cloud. AutoVirt employed about 30 against the counterfeiting allegations. ❙ a third-party data recovery service provider 802.11ac Gigabit Wireless people and created analytics software to ❙ had possession of the drive. The majority of TiVo & AT&T Reach Settlement To Be Available This Year assess data storing systems. The company respondents said they would go to a third- boasted about $20 million in local venture TiVo and AT&T have reached a settlement According to UK-based IMS Research, more party vendor if they could not find capital funding from both Sigma Partners after TiVo filed a patent infringement com- than 3 million 802.11ac devices will ship in a backup, if they perceived the and Kepha Partners. plaint against AT&T in 2009. The complaint 2012, which will be the first year of availabil- vendor’s service to be faster alleged that AT&T infringed upon three of ity for the new wireless standard. Although or cheaper, or whenever ❙ French Mac Reseller TiVo’s patents, including multimedia stream- the bulk of the shipments won’t be made critical data is lost. That Sues Apple ing and playback correction technologies. until later in the year, chipsets and being said, nearly half eBizcuss, France’s leading reseller of Apple AT&T agreed to pay at least $215 million in routers with the faster, updated wire- do not consult internal products, is suing Apple. The retail center the settlement, starting with $51 million as less standard were demonstrated in IT security person- is claiming that Apple is unfairly limiting the an initial payment, which will be followed by January at the Las Vegas Consumer nel when selecting availability of its most popular products, such quarterly payments made to TiVo until June Electronics Show. More spectrum a data recovery as the iPad 2 and MacBook Air, to the com- 2018. However, if AT&T’s subscriber base and advanced antenna technol- service pro- pany. The first Apple retail store opened in increases past a set level, the payments will ogy can be credited for the faster vider, and only Paris in 2009, and eBizcuss’ CEO Francois increase. All litigation has been dismissed by data speeds. The research firm 31% have poli- Prudent claims Apple favors its own store and both parties per the settlement. expects 802.11ac to be a popular cies in place to is purposefully causing a merchandise short- ❙ technology, with many enterprises updat- ensure that critical information is protected Riverbed Buys Expand Networks age at eBizcuss. According to Prudent, Apple ing to the new standard; however, although during data recovery operations, according also undercut a quote to potential customers Riverbed Technology announced that it many 802.11ac devices will soon be avail- to Ponemon. for a commercial bid. Similar claims regard- has acquired the intellectual property of able, smartphones are not expected to offer ❙ Survey: Federal IT Mobile Use ing Apple merchandise shortages have been Israel-based company Expand Networks, the new standard until 2014. On The Rise filed in the United States by several separate which focuses on WAN optimization tech- ❙ IDC Expects Increase resellers since Apple opened its own retail nology. Expand’s liabilities, contracts, and A recent Bluetext survey found that more In Network Revenues stores starting in 2001. other obligations were not assumed in the than half of federal IT workers now use deal. Although Riverbed is already a global IDC is predicting a slight increase in network mobile devices for work-related purposes; ❙ RIM Considering Reorganization company, Expand Networks has a vast revenues this year due to mobility, video 45% of respondents are using such devices Of Its Board, Co-CEOs Quit customer base in Europe, the Middle East, popularity, and cloud computing solutions. daily. Email, project management, and Research In Motion is considering a reorga- Africa, and some areas of Asia that will help According to the research firm, network social media are the most popular appli- nization of its board of directors. According expand Riverbed’s customer portfolio. The spending will grow 8.7% in 2012, compared cation types, according to the study, with to reports, the RIM board is currently review- acquisition was largely based on acquiring to the 3.8% growth in 2011. The mobility Facebook being the most-used social media ing the structure of the board, including the additional customers, as the two compa- market is seeing a lot of opportunity and platform accessed on mobile devices. Email possibly moving to an independent chair- nies’ product offerings are similar in nature. growth, as evidenced by smartphone ship- applications are currently used by 93% of man. Official changes to the board must be Expand Networks has been in the liquidation ments, which were actually twice that of lap- federal agencies represented in the survey, submitted by Jan. 31 and will have a 30-day phase since October 2011. top shipments in 2011. Other trends leading but Bluetext expects other business-related review period. In other news, RIM co-CEOs ❙ to the increasing revenues, according to IDC, applications to become increasingly popular Poll Reveals Consumer Thoughts Mike Lazaridis and Jim Balsillie have quit are consumerization and the BYOD concept with federal workers in 2012 as mobile device On Tablet Popularity and will be replaced by COO Thorsten in the enterprise, as well as the increased applications for the workplace become widely Heins. Lazaridis and Balsillie also resigned A recent poll reveals that many consumers video consumption in the workplace. used at government agencies. as co-chairmen of the board. They’ve been see the value in tablet computers, as 46% ❙ ❙ Report Details Cache SSD Market To Surge replaced by Barbara Stymiest, an indepen- said they believe that tablet computers will Consumer Bandwidth Usage Gap Due To Ultrabook dent director who has served on RIM’s board surpass laptop computers in consumer popu- for about four years. larity. The survey asked 1,155 registered According to England-based mobile opera- Research firm IHS predicts that cache SSD tor advisor Arieso, the gap between shipments will increase dramatically over ❙ Letter Released Detailing so-called extreme bandwidth users the next few years, in large part due to the Sexual Harassment Claims and the rest of the population is expected popularity of the Ultrabook market. Against Former HP CEO widening. After conducting a study The firm says shipments of cache SSDs will A letter detailing former HP CEO Mark in November, the company found reach 121 million units in 2015, compared Hurd’s actions alleged in the sexual that just 1% of consumers were to 881,000 units shipped last year. Cache harassment charges filed by Jodie generating half of all mobile traffic. SSD shipments for this year are expected to Fisher was publicly released recently Additionally, 90% of all bandwidth reach around 25.7 million units, with about after a court ruling. Fisher’s attorney, is consumed by just the top 10% 22 million of those going into Ultrabooks. Gloria Allred, sent the letter to Hurd of consumers. Compared to 2009, Cache SSDs are a lower-cost alternative to while he was still at HP. The letter when the top 3% of users produced a traditional SSD, as they run alongside a details meetings between the two 40% of mobile traffic, the same separate, spinning hard drive. Cache SSDs without significant detail or dialogue. percentage now generates 70% of deliver a significant performance boost, Although these allegations eventually the traffic. Most of those consuming including faster boot-up times. Page 6 Processor.com January 27, 2012 P H O T O L I S T I N G S Processor Manufacturers: The Photo Listings section Do you have a new product includes brief overviews of data center products. that data center/IT managers would be interested All products listed have been released recently, so use this section to get up to date in learning about? with what’s new on the market Send your press release or product information and to find products you need. to [email protected]. LINDY 1102 GRAND – M S G USBI ILTON ECURITY ROUP NFORMER USB P B I H & C F ORT LOCKER NTERNET UB OLOCATION ACILITY System administrators can physically prevent users from Control USB Port Bootstrapping startups to Inc. connecting Pen Drives, MP3 Players and other USB Mass Access!USBInformer 500 and Fortune 500 companies Storage Devices to their computers to copy data, introduce provides USB port count on us every single day for viruses, etc. The USB Port Blocker is a combined ‘key’ and security on endpoints. their colocation or data center ‘lock’ assembly which plugs into the USB port. Simply plug Using a real time secu- operations. Find out what they the ‘keylock’ into the port and release the latch - the lock rity monitoring service, already know and experience remains in place! Plug the key back into the lock to remove. the USBInformer client the 1102 GRAND difference! Easy! stops access to any USB (cid:114)(cid:1) 1/2, full cabinets, cages, and raw space for data centers device not approved by (cid:114)(cid:1) 30+ carriers/Internet providers (cid:114)(cid:1)(cid:49)(cid:73)(cid:90)(cid:84)(cid:74)(cid:68)(cid:66)(cid:77)(cid:77)(cid:90)(cid:1)(cid:67)(cid:77)(cid:80)(cid:68)(cid:76)(cid:84)(cid:1)(cid:66)(cid:68)(cid:68)(cid:70)(cid:84)(cid:84)(cid:1)(cid:85)(cid:80)(cid:1) administrators. The web portal of USBInformer allows admin- -10 Meg Internet as low as $55 per month a USB port istrators to remotely grant or reject user access to new and -100 Meg Internet as low as $200 per month (cid:114)(cid:1)(cid:36)(cid:80)(cid:79)(cid:84)(cid:74)(cid:84)(cid:85)(cid:84)(cid:1)(cid:80)(cid:71)(cid:1)(cid:21)(cid:1)(cid:77)(cid:80)(cid:68)(cid:76)(cid:84)(cid:1)(cid:66)(cid:79)(cid:69)(cid:1)(cid:18)(cid:1)(cid:76)(cid:70)(cid:90) existing USB devices. USBInformer provides granular con- -Full GigE Internet as low as $1,000 per month (cid:114)(cid:1)(cid:22)(cid:1)(cid:69)(cid:74)(cid:71)(cid:71)(cid:70)(cid:83)(cid:70)(cid:79)(cid:85)(cid:1)(cid:68)(cid:80)(cid:77)(cid:80)(cid:83)(cid:1)(cid:68)(cid:80)(cid:69)(cid:70)(cid:1) trol over USB ports by computer, user, and USB Device ID. (cid:114)(cid:1) Dual electric utility power feeds, redundant UPS battery versions available: Pink, Every device plugged in to a monitored computer is recorded backup, backup diesel generator service, redundant cooling Green, Blue, Orange, White and sent back to the administrator portal. Administrators are units, and more then able to review which users attempted to plug in unau- (cid:114)(cid:1) Fractional/private technical offices thorized devices. (888) 674-9001 | www.miltonsecurity.com (888)-865-4639 | www.lindy-usa.com/ (816) 471-7872 | www.1102grand.com R S DMD S R C RM137 ACKMOUNT OLUTIONS YSTEMS ECOVERY HENBRO 42U & 24U - 4 P S R D C C E D 1UH -S S C OST ERVER ACK ATA ALL ENTER QUIPMENT EINSTALLATION OT WAP ERVER HASSIS Rackmount Solutions introduced the 42U and 24U - 4 Post Properly disposing of outdated computer equipment is a The RM137 server chas- Server Rack. The 4 post server rack has been designed real hassle. At DMD, we make it easy. By offering a host of sis is designed to address with a strong “L” shaped square rackrail, the most versatile free services, we allow you to turn over your underutilized the demand of cloud data on the market. It is ideal for all rackmount servers, KVM equipment without having to worry about compliance, earth- centers and is an ideal switches, network equipment, etc. Unlike other server racks, friendliness, or even getting a fair market price. DMD will solution for computing the Rackmount Solutions 42U and 24U - 4 Post Server rack package, transport, and audit your equipment free of charge. intensity applications. It includes a base and adjust- We’ll even provide an energy savings audit free of charge. supports up to a 13.68 able rails that can adjust from However, all of these free services don’t mean that you will x 13-inch motherboard 21.2” to 35”d which adds 8” get charged with environmental cleanup issues later. Each and 1U redundant PSU. The 6Gb/s SATA backplane and for base plates. The server step in this process is documented, providing our custom- advanced fan anti-vibration mechanism help enhance rack also includes one free ers with a serial number based Certificate of Transfer and hard drive read/write performance. With a built-in info tag, set of adjustable angle brack- Certificate of EPA Compliance for each asset. the RM137 can be easily recognized by the system ets which are ideal for heavy administrator. items needing extra support. (cid:114)(cid:1) Supports 1U single and 1+1 redundant PSU (via optional kit) (cid:114)(cid:1) 2-bay (RM13702) and 4-bay (RM13704) 3.5” HDD configuration in one chassis (866) 207-6631 | www.rackmountsolutions.net (866) 999-5704 | www.dmdsystems.com (909) 947-3200 | www.chenbro.com M C CM25 D S JETNAS OVIN OOL UST HIELD™ CEILING-MOUNTED SERVERROOM AIR CONDITIONER PROTECT MISSIONCRITICALHARDWARE NAS, iSCSI, FC STORAGE APPLIANCES Based on breakthrough engineering technology, the Prevent electronic failure and downtime due to: JETNAS provides a full range of NAS, iSCSI, FC storage MovinCool CM25 ceiling-mounted server room air conditioner (cid:114)(cid:1) Abrasive airborne particles, dust and fibers solutions in different form factors from 1U to 4U rack-mounts offers a combination of features and benefits simply unavail- (cid:114)(cid:1) Atomized/aerosol liquids and oils and Towers to meet your business needs and to secure your able elsewhere on the market today. Unlike a traditional fan (cid:114)(cid:1) Particle damaged critical data. Our JETNAS appliances combine high density coil unit, the MovinCool CM25 offers a totally self-contained equipment storage capacity and advanced redundancy, scalability, unit that is perfect for server rooms and other tight spaces. (cid:114)(cid:1) Dust induced CPU availability, and management functionality. fire & Component (cid:114)(cid:1) 25,000 Btu/h cooling capacity heat damage (cid:114)(cid:1) Hardware RAID with SAS2, SATA3 Enterprise drives (cid:114)(cid:1) Environmentally-friendly design - 14 SEER, variable- (cid:114)(cid:1) Scalable up to 720TB with additional JBOD units speed compressor, R410A refrigerant & RoHS compliant NEMA rated protection (cid:114)(cid:1) 4 X 10 Gigabit Ethernet, Network bonding supported (cid:114)(cid:1) Compact, self-contained unit is easy to install for all performance envi- (cid:114)(cid:1) VMware, Xen, Microsoft Hyper-V compatible (cid:114)(cid:1) Wall mount controller offers advanced programmability ronments: computers, (cid:114)(cid:1) No additional cost for clients and capacity expansion and settings thin clients, printers, (cid:114)(cid:1) High sensible cooling – label makers, monitors, touch screens & more. ideal for server rooms Use PROMO CODE PRO2012 for 10% off your first order. Expires 3-16-2012 Reseller inquiries are welcome. (800) 264-9573 | www.movincool.com (800) 587-9557 | www.dustshield.com (888) 227-2926 | www.JETNAS.com January 27, 2012 Processor.com Page 7 S C M S C X QUARE ARE ETRIC YSTEMS ORPORATION I SYSTEMS MISSION CRITICAL FLOOR CLEANING THERHINO BOX®COMMUNICATIONS SHELTER TRUENAS™ PROSTORAGE APPLIANCE Your “Mission Critical” area needs proper attention to support The Rhino Box communications iXsystems recently introduced the TrueNAS™ Pro Storage the backbone of today’s business. Our staff is well trained by shelter is engineered from the Appliance. With a rock-solid FreeBSD® base, ZFS support, industry leaders; your requested process followed to the let- ground up to protect commercial and a powerful Web GUI, the TrueNAS™ Pro (formerly ter; and our green cleaning techniques assure low voc inva- and industrial grade equipment in “FreeNAS™ Pro”) 2U Appliance pairs easy-to-manage sion, vital dust retrieval and reduced concrete salts sloughing harsh environmental conditions FreeNAS™ software with world-class hardware and support into these critical areas. enabling deployment and operation for an unbeatable storage solution. In order to achieve maxi- Technicians have completed an extensive training program of communications and IT equipment mum performance, the TrueNAS™ Pro 2U System supports offering green cleaning services for Data/Access flooring both nearly anywhere at any time. Fusion-io’s flash memory cards and 10 GbE network cards. above and below the surface. We selected this service as Paired with optional JBOD expansion units, the TrueNAS™ a compliment to our current offering because it requires the Standard Features and Capabilities: Pro System offers excellent capacity at an affordable price. same attention to detail; the thoughtful planning of the job; (cid:114)(cid:1) Available in 9U to 21U sizes For more information, visit http://www.iXsystems.com/ and deliberate execution to protect your investment. Rest (cid:114)(cid:1) Support for RF and Wireless Systems TrueNAS. assured we are carefully working while you are resting for the (cid:114)(cid:1) External Temperature Range: -30°F to 160°F next day. (cid:114)(cid:1) AC, DC or AC/DC Redundant Operation (cid:114)(cid:1) Supports Equipment Payload Weights to 300 lbs. *Quality Since 1990 (cid:114)(cid:1) Heavy Duty Shock and Vibration Protection (cid:114)(cid:1) Internal Fail-Safe Temperature Control System (800) 200-9680 | www.squarecare.com (800) 549-7421 | [email protected] (855) GREP-4-IX | www.iXsystems.com PDU C ™ O R D C R N ABLES N AMP ATA ENTER OCKY ET ULL P D C F 7L S D C & C S ISTED OWER ISTRIBUTION ABLES ULL AYER UPPORT ATA ENTER LOUD OLUTION Experience why thousands of data centers have made OnRamp’s Data Center services are backed by our In business since 1996, RockyNet experts have the knowl- PDU Cables their preferred choice. Full7Layer Support. OnRamp’s engineers are available edge and experience necessary to guide you to your goals. 24/7/365 to provide support where you will most likely need Our SAS-70/HIPAA Compliant Data Center offers collocation, PDU Cables - the industry’s leading UL Listed and labeled it: inside your rack. Other Data Center companies like to talk managed servers, web hosting and virtual cloud machines so power whips. Engineered to the highest quality level, about support, but actually provide very little in the way of we can provide all of your data services. We provide redun- controlled environment manufactured with industrial grade real, hands-on help. OnRamp is different. While our engi- dant sites, UPS/Generator power, N+1 Cooling, multiple GigE components and factory tested for unequaled safety and neers regularly perform tape swaps and server reboots, they Ports and static-free raised flooring. reliability. Offering hundreds of custom have the expertise and capability to support customers all the (cid:114)(cid:1) Personalized services to fit specific business needs cable configurations to suit every way through the application layer, going above and beyond (cid:114)(cid:1) Collocation/Man Servers/ Virtual Cloud Machines application, our trained technical staff can routine requests. In fact, many customers view OnRamp as (cid:114)(cid:1) Third Rack/Half Rack/Full Rack/Private Cages assist you in every way. an extension of their IT department, and choose to supple- (cid:114)(cid:1) 24/7/365 On-Site Support ment their technical expertise, enhance their service, or (cid:114)(cid:1) HIPAA/SAS-70 Compliant PDU Cables provide a complete seek on-demand support in emergencies with the help of pre-fabricated PDU cable assembly OnRamp’s Full7Layer Support. solution to ensure the highest reliability for your data center environment. (866) 631-4238 | www.pducables.com (512) 322-9200 | www.onr.com/processor (303) 444-7052 | www.Rockynet.com N B USA C -A I . N S G ETWORK OX OMPU IRE NC ORD TAR ROUP Z-S A IVI R C S CAN YAN N OW OOLING YSTEM NordStar Group (NSG) is one of the nation’s leading sources Z-Scan from Network Box is revolutionizing how organi- The Ayan IV In Row Unit is the latest addition. This new unit for New, Refurbished, Legacy and Green Products. The zations deal with Internet-based security threats. is designed to create an efficient and modern cooling system, companies extensive partner list includes HP, Sun/Oracle, without sacrificing space and specifications. This unit has IBM, Dell, Cisco, Juniper, VMWare, SonicWall and other Traditional antivirus technologies focus on recognizing the been designed to be green friendly, by using a high efficiency Tier 1 manufacturers and software providers. NSG’s hard- threat, identifying it and then stopping it. The entire process scroll compressor with EC fans, making it the latest ware portfolio includes Servers, Workstations, Storage and can take between 4-12 hours. Hackers know this and are innovation for the customer’s specific cooling needs. Networking Equipment. NSG is a comprehensive solutions taking advantage of it by flood- provider offering not only hardware and components, but full ing the Internet with at least The Ayan IV has been implementation and IT solutions. NSG can provide System 40,000 new pieces of malware designed to provide cooling in Design Configurations, Installation, End of Life Products and per day. a horizontal direction, Asset Recovery. Z-Scan takes an entirely new creating a new way to position approach based on statisti- the unit. The individual unit cal observations – creating/ can be positioned between releasing signatures are fully the racks, creating a more automated, reducing the cycle to just seconds. And Z-Scan even dissipation of extreme can respond to certain types of spam in seconds, instead of heat from the servers. several hours typical in the Internet security industry. (832) 467-0000 | www.nordstargroup.com (832) 242-5758 | www.networkboxusa.com (562) 945-8971 | www.compu-aire.com Page 8 Processor.com January 27, 2012 An Ounce Of Prevention Seize Control Greg Schulz, senior advisory consultant with The Server and StorageIO Group, says most third-party defrag solutions provide Proactively Tackle Defragging With A Third-Party Solution insight into both the performance impact of fragmentation and the estimated benefit Defragging enterprise systems is a no- introduced; and providing central manage- Diskeeper automatically optimize the storage from taking action. “Leveraging manage- brainer. If you’re still using Windows’ built-in ment over a fleet of enterprise systems. with zero impact on the user and system activ- ment tools looking both at space and capacity defragmenter to do it, however, you may want Windows’ built-in defragmenter also ities,” he says. Such ability, which Diskeeper’s are important to make effective decisions; to rethink the approach as it’s not necessarily requires IT to determine when to schedule the InvisiTasking technology enables, is “even otherwise, you are flying blind,” he says. designed to be an enterprise solution. tool so it can get the resources needed and not more important for systems that are running Quan says having central control over The merits of defragging are a given. As impact other user or system processing, Quan 24/7,” Quan says. defragging functions is essential as is the Mike Karp, vice president and principal says. By default, Windows’ built-in defrag- Another limitation is Windows’ built-in ability to make the defrag tool a “set it and analyst at Ptak, Noel, and Associates, says, menter is disabled for Windows Servers per defragmenter’s inflexibility to let administra- forget it” proposition to help save time and “Companies that don’t defrag invariably take a Microsoft recommendation that “given the tors grant special users or groups granular con- reduce costs. “Just as important is to pro- a hit both in terms of system performance variability of server workloads, defragmenta- trol over certain defragging functions. Plus, vide the IT area with status and performance and system reliability.” In addition to warding tion should be enabled and scheduled only Windows’ built-in defragmenter does not con- reports when needed,” Quan says. off deterioration of application performance, by an administrator who understands those solidate free space and large fragments effi- Perhaps the biggest benefit of using a third- defragging ensures faster, more reliable back- workloads.” Conversely, “other utilities like ciently and requires at least 15% of free space. party solution is receiving full value and bene- ups and recoveries. “A single recovery will fit from enterprise systems. Windows’ built-in often more than offset the expense of invest- defragmenter, for example, doesn’t return sys- ing in defrag technology,” Karp says. Comparing System Performance tem performance benefits immediately back to Windows’ built-in defragmenter “wasn’t users, Quan says. “One clear example of this designed for an enterprise environment, not is the IntelliWrite technology found only in only from a management viewpoint, but Diskeeper, which prevents most fragmenta- also the demands of running in an enterprise tion from occurring in the first place,” he says. environment that is highly active,” says Gary The IntelliWrite technology is 100% compat- Quan, senior vice president of product strategy ible with SAN technologies such as deduplica- at Diskeeper (www.diskeeper.com). tion and Thin Provisioning. Despite offering basic functionality and Preventing fragmentation before it occurs evolving somewhat over the years, Quan means users get “performance benefits imme- says the tool hasn’t kept pace with the new diately and fewer resources are needed or used storage demands presented by enterprises. to handle it later,” Quan says. Read perfor- These demands include exponential growth in mance is improved, he says, because “the read storage demands, which results in even more can now occur in one contiguous request.” fragmentation that degrades system perfor- Write performance, meanwhile, is increased Disk defragmentation offers numerous advantages. This graph shows improved system performance mance; meeting the advancements that storage “as the writes will now be more contiguous or using a tool to prevent fragmentation before it happens. technologies (virtual, SANs, SSDs, etc.) have sequential in manner.” P January 27, 2012 Processor.com Page 9 H O W T O Set Up & Test Data Center Backup Power Protect Your Business From Power Failure Issues There are many factors that can lead to Fully Test Your Backup Power System Set Up A Maintenance Schedule Key Points power failure in a data center, such as weather- related issues, overloaded electrical systems, Once every component is installed and After the backup power system is set up or something as simple as a power supply fail- you are ready to turn on your backup power and running correctly, you should still plan (cid:114)(cid:1) Know every piece of equipment you’ll ing due to wear and tear. Although some of system, you should run a full test to ensure for regular tests and maintenance to ensure need for the backup power system these scenarios are inevitable and unavoidable, it can handle the workload you planned for the dependability of the system for long- and incorporate them into the data a well-designed and tested backup power sys- during the initial design phase. Test every term use. An enterprise power system will center’s design to ensure you’ll have tem can keep your company up and running component at the same time and check for lose its value and reliability if proper main- enough space. as well as prevent downtime related to loss of inconsistencies, performance issues, or fail- tenance does not take place, whether the (cid:114)(cid:1) Choose the right generator size for your power. Along with the help of a few experts, ures. If you can pinpoint potential problems system is run frequently or not, says Bob data center’s power needs and test it regu- we’ll show you where to start when setting up from the beginning, you can fix them and Haden, power systems specialist at Global larly to ensure it is working correctly. a data center backup power system and how prevent them from occurring in the future. Power Supply (www.globalpwr.com). He to maintain it to protect your company from In the long term, according to Hallahan, suggests regular equipment testing and a (cid:114)(cid:1) Set up a regular testing and maintenance power failure for years to come. generators should be “exercised at 30% load, comprehensive preventive maintenance schedule for your backup power system in for at least 30 minutes every 30 days.” He also program to protect your enterprise’s criti- the future. Know The Components Involved recommends running a full system test on an cal facility and prevent costly repairs. P & Plan For Them annual basis. The frequency and magnitude of As with any data center project, research these tests can be included in the overall main- and education are the best places to start. IT tenance plan for your backup power system. managers in charge of setting up these sys- The key is to ensure the components are ready Get Started tems should know which components are part to be used immediately in case of a power of the backup power system. According to failure, because even if one of the components Dwight D. Wells, senior manager of sales fails, your data center could go down, putting The best place to start when setting up a backup power sys- application engineering at MTU Onsite your entire business at a standstill. tem is to take advantage of available resources to educate Energy (www.mtuonsiteenergy.com), most yourself about backup power and everything that goes into it. backup power systems comprise a diesel “Backup power systems can be extremely complex, and often engine with a cooling system as well as an alternator, control system, and parallel switch- require the collaboration of several industry experts,” says gear, for multiple generator sets. BobHaden, power systems specialist at Global Power Supply Wells says it’s crucial that companies don’t (www.globalpwr.com). Important things to consider, according wait until the last minute to consider backup to Haden, include what equipment to use, how to package that power and should plan for it from the begin- equipment, how the generator will interface with the facility, ning of the facility design phase. “Emergency quality of equipment, overall costs and budget restraints, standby power is such a mission-critical element that you can’t afford to put off time restraints, delivery, and logistics. until the last minute,” he says. “From the beginning, you need to plan for space. Emergency standby power should be part of the archi- Action Plan tects’ and electrical contractors’ first considerations.” The following action plan was Determine What Generator Size provided by Dwight D. Wells, senior manager Your Data Center Requires Top Tips of sales application engineering at MTUOnsite Energy One of the most important steps (www.mtuonsiteenergy.com): in setting up a backup power sys- ✔Everyone involved in the setup tem is to correctly size the genera- ■ Early in the facility design process, begin planning for an adequate of the backup power system tor. You must assess exactly how emergency standby power system. Energy-saving measures in the should have an understanding much power your data center uses, design of the facility will help reduce the required size of the standby of the overall data center envi- choosing a generator that can handle the IT workload. Although power system and lower costs. ronment in order for the design there is sizing software available, ■ Engage all relevant parties in the planning procedure—facility project to be successful. you may want to call an expert to help with the calculations. owner, IT, electrical contractor, utility, site contractor, local permit- ✔Perform a full power loss simu- “In the initial design stages, ting authorities and generator set manufacturer(s), and other major lation just after installation, so the owner or the design consul- component suppliers. you’ll be sure it’s working cor- tant can use rules of thumb to develop an order of magnitude of ■ Specify generator sets taking into account the average approved rectly, know how reliable it is, and have peace of mind that the backup power system,” says load factor. A higher 24-hour-average approved load factor rating can you can depend on it in case of Richard Hallahan, senior manag- often lower initial and long-term costs, especially on multiple genera- er at Cummins Power Generation power failure. tor set installations. Consider dual starter motors and dual best bat- (www.cumminspower.com). teries on all generator sets for the highest reliability. ✔Regularly test your backup “Watts per square foot of white space or kilowatts per rack can be ■ Choose a generator set manufacturer with a strong distributor network power system, and when you a place to start. Next, the owner do, test every piece of equip- that offers such services as factory witness testing to verify generator will need to decide how robust ment at the same time. performance; maintenance contracts to ensure routine and emergen- they want the facility, which will drive the quantity of components cy maintenance; 24-hour emergency parts supply and assistance; and listed above. As design evolves, the strong reputation, warranty, and record of performance. owner or consultant should contin- ue to enter actual power consump- ■ Verify that the standby power system works as designed through a for- tion values into their calculation to mal commissioning process that involves the facility owners, electrical contractor, further refine sizing needs of the local permitting authorities, and the generator set manufacturer. backup power system.” Page 10 Processor.com January 27, 2012 PROD UC T S POT L IGHT Data Backup & Disaster Recovery Arkeia vStorage Virtual Appliance C2C ArchiveOne Enterprise Carroll-Net Health Server Product Offsite Backup Description Arkeia’s vStorage Virtual Appliance is a comprehensive C2C’s ArchiveOne Enterprise is designed to give Carroll-Net tailors its unique backup and disaster recovery backup and recovery tool for VMware vSphere 4 plat- Exchange administrators a simple yet sophisticated solution to each customer by providing a free Backup forms and VMware Infrastructure 3. The virtual appliance tool to improve the health of the email system and Server that’s installed in the customer’s office. Each night, includes Arkeia vStorage Backup Agent and can be deliver greater efficiency of storage and unrivalled a full backup of all the customer’s data is transferred to the rapidly deployed in and be used to back up any vSphere power to both live and archived data. ArchiveOne server and encrypted before it’s then transmitted offsite to hypervisor. Arkeia vStorage Backup Agent enables local Enterprise is designed to remove all unwanted email Carroll-Net’s self-owned and operated secure data cen- and over-the-network backups to disk, tape, or to disk and other data items from live Exchange servers, ter, where the data is archived for up to a year. Beyond and then tape, and backup sets can be replicated locally enforce corporate e-policies, and search email with providing the ability to quickly recover from server failures, or over a WAN. an unlimited scope. ArchiveOne Enterprise can be Carroll-Net’s offsite backup approach means each client installed in about one hour, with little training needed. can recover from fires, storm damage, and other disasters. (cid:114)(cid:1) Management through Arkeia’s Web-based interface (cid:114)(cid:1) VMware CBT (Changed Block Training) (cid:114)(cid:1) Fully automated mailbox quota management (cid:114)(cid:1) Free Backup Server for onsite installation (cid:114)(cid:1) vCenter integration, vApp support, and RDM (Raw (cid:114)(cid:1) Advanced PST discovery and management (cid:114)(cid:1) Free theft protection baked into Backup Server Device Mapping) (cid:114)(cid:1) Extensive retention period controls (cid:114)(cid:1) Unlimited U.S.-based tech support (cid:114)(cid:1) Enables full, incremental, and differential backups (cid:114)(cid:1) E-discovery for performing forensic searches (cid:114)(cid:1) HIPAA-compliant (cid:114)(cid:1) Includes one year of maintenance Best For: Situations requiring sophisticated archiving, Best For: Full backups transferred offsite. Best For: VMware vSphere environments. retention, e-discovery, and compliance with an easy learning curve for users. Price: Plans start at $99 per month Contact:(888) 432-1638 | www.carroll.net Idealstor Bantam NovaStor NovaBackup Quantum DXi4500 Product DataCenter Description The Idealstor Bantam is a removable disk backup system NovaStor’s NovaBackup DataCenter backup and restore Quantum’s DXi4500 appliances are turnkey solutions that combines the best of disk and tape by using 2.5-inch solution has served Fortune 500-class environments for that can be deployed seamlessly with all leading back- SATA disks as backup media, which can then be sent more than a decade. The solution is available via competi- up software using a simple NAS interface. They are offsite for storage and disaster recovery. The Bantam is tive, all-inclusive price models based on server volume, designed for rapid, seamless integration and maximum priced for SME budgets but has features that meet the thus eliminating confusing pricing lists and guesswork client performance without changes to existing backup needs of larger enterprises, as well. The system features required to determine exact backup requirements. Easy to architectures or potentially disruptive media server data transfer rates of up to 480MBps and is bundled with implement, the solution features a distributed architecture upgrades, unlike software-based deduplication. Each iBac Data Protection Software from Idealstor. and central management, which eliminates bottlenecks DXi4500 model includes support for remote replication, through evenly distributed workloads. NovaBackup virtual environments, and Symantec’s OpenStorage (cid:114)(cid:1) Complete backup system offering up to 1TB of remov- DataCenter supports virtual environments and can scale interface as standard features. able disk capacity from midsized enterprises to environments with several (cid:114)(cid:1) Disk capacities of 320GB, 500GB, 750GB, and 1TB volumes of petabytes’ worth of data to manage. (cid:114)(cid:1) Data deduplication in an easily shared NAS device currently available (cid:114)(cid:1) Two preconfigured models with 2TB or 4TB of (cid:114)(cid:1) Includes iBac 5.0 for native format backup and drag- (cid:114)(cid:1) Local support engineers available for consultations usable capacity and-drop restore with data deduplication (cid:114)(cid:1) Centrally managed, easy to administrate, and (cid:114)(cid:1) Reduces typical disk capacity needs by 90% or more (cid:114)(cid:1) Bantam cartridges are housed in a rugged aluminum highly reliable through deduplication frame and are shock-proofed (cid:114)(cid:1) Architecture designed for massive scalability (cid:114)(cid:1) All-inclusive licensing models Best For: SMEs and branch offices in distributed sites Best For: Replacing tape backup with a faster, larger, (cid:114)(cid:1) SPLA models available for service providers that are seeking an affordable disaster recovery solution. and more reliable backup media. Best For: Midsized to large environments seeking to reduce storage costs, administrative overhead, and backup instabilities.