Wednesday 31 July 2013

Windows RT on ARM chips is 'not promising,' Asus exec says

Taiwan firm plans to focus instead on making devices running Intel chips, report says

Even Asus, maker of the Microsoft Surface RT tablet, isn't impressed with the sales results of Microsoft Windows RT-based tablets.

Asus Chairman Jonney Shih told tech news website AllThingsD that the Taiwan-based manufacturer won't be launching new Windows RT-based tablets running on ARM chips.

Shih didn't flat out say Asus won't produce Windows RT products, but did maintain that the company is putting time and energy into devices that run on Intel chips.

"The result is not very promising," he told AllThingsD, referring to the widely reported problems with Surface RT and the Asus VivoTab RT.

Asus could not be reached to elaborate on Shih's comments.

Nvidia, which makes the Tegra 3 ARM-based processor used in Surface RT, recently voiced support for Surface RT and the Microsoft concept behind it.

"Surface RT is the very beginning of a long process and it's the first shot in a changing landscape," said Rene Haas, vice president of computing products at Nvidia.

Haas in May said that next-generation Tegra 4 chips would be used in multiple RT tablets, but in July said he couldn't commit to when or what types of future RT product will appear.

Microsoft cut the prices of its Surface RT tablets by up to 30% in mid-July.

Just 200,000 Surface RT and other Windows RT tablets shipped in the first quarter of 2013, IDC said.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Sunday 28 July 2013

How to Keep Terrorists, Hackers and Other Bad Guys From Stealing Your Data

How to Keep Terrorists, Hackers and Other Bad Guys From Stealing Your Data
The sheer volume of digital information that businesses produce and collect today offers a greater incentive than ever for hackers to break into private online communications and company files. Recent revelations that the National Security Agency (NSA) successfully used digital snooping to foil real-world terrorist operations serves as a glowing reminder of life in the digital information age.

The dramatic leak is also a somber reminder of the fragile nature of computer security. Even disregarding concerns over NSA surveillance, small businesses need to ask themselves if their IT infrastructure can withstand potential intrusion attempts from foreign governments or organizations with deep pockets and no qualms about hacking into their networks.

How-to: Build Multiple Layers of Security for Your Small Business

One way to significantly increase your security may be to reduce your companys reliance on third-party cloud providers. Given an inherent lack of oversight over external vendors, businesses have no viable means to accurately assess a particular cloud providers' security posture or competence.

Moreover, cloud services may make an appealing target for sweeping, state-sponsored hacking attempts by foreign governments. And these cloud service providers could conceivably be compelled to reveal information via a secret federal subpoena.

With this in mind, here are some strategies that your businesses can consider to tighten the bolts on security and reduce your risk.

Bringing IT Home: Better Security, But at What Cost?

Bringing everything in house is the easiest way to ensure that no data can be secretly accessed. This is relatively straightforward task for popular collaboration platforms such as Microsoft Exchange Server and SharePoint, both of which are available in both cloud and onsite flavors. In some instances, a hybrid deployment model that puts highly sensitive data on an onsite server, but more generic information at a cloud location, may serve you well, too.

While the initial cost of a non-cloud approach will almost always be more costly than a cloud deployment, the maturity and available expertise in virtualization infrastructure deployment means that mid- to long-term costs should not be significantly more expensive. Moreover, the availability of more powerful computer hardware, not to mention cheap storage and RAM, means that even a relatively low-end server today is capable of running more virtual machines simultaneously than ever before.

Unfortunately, the proliferation of online services means that an onsite deployment may not always be possible. Security-conscious businesses may want to reevaluate if online-only services such as QuickBooks Online and FreshBooks are really necessary.

Related: How to Set Up a Business-Grade Wi-Fi Network

If that answer is "Yes," then you should at least ensure that all communications with the online service is always conducted over an encrypted channel such as secure sockets layer (SSL). This can be set up with the appropriate configuration at the company gateway or proxy server to prohibit non-SSL connections.

Add Encryption Services to Cloud Storage

Cloud storage has garnered a big following among businesses and end users-and for good reason. The benefits are real: You can back up data to a remote location with nothing more than an Internet connection, then access this data regardless of your geographic location.

You can use cloud storage reasonably safely, provided you adhere to certain precautions-specifically, encrypt all data and perform all uploads over SSL. While practically all cloud providers say they encrypt uploaded data, many also hold the decryption key, which renders any benefit moot. Ideally, the cloud storage provider should have no access to the unencrypted data at all. This is referred to as having zero knowledge of the data.

SpiderOak is one vendor that encrypts data at the block level. If your business has already invested in a cloud storage service such as Google Drive, SkyDrive and SugarSync you may want to look at Boxcryptor, which works on top of these services to add AES 256 and RSA encryption to uploaded files.

Another option is Mozy, which offers the optional capability to encrypt data with a private key. You can even nonsecure services such as Dropbox if you ensure that data files are separately encrypted prior to being uploaded.

Analysis: Does Encryption Really Shield You From Government's Prying Eyes?

In addition, small and midsized businesses will be glad to know that offsite backups are possible without having to resort to cloud services, because network-attached storage (NAS) appliances from vendors such as Lenovo Iomega and Synology offer the capability to perform device-to-device replication.

With the appropriate network infrastructure in place, there's no reason why businesses can't deploy redundant units at branch offices to add real-time synchronization or backup capabilities without having to invest in expensive SANs.

Protect Instant Messages by Establishing Private Networks

Unprotected IM communication is also vulnerable to interception. Workers used to conducting chats via public IM networks such as AIM, Google Hangouts and Windows Live are essentially transmitting confidential discussions, passwords and other privileged information with no guarantees of their privacy. Moreover, many IM services also support video calls or voice chats, which serves as additional risk vectors vulnerable to snooping by unauthorized parties.

Sidestepping these glaring security shortcomings entails circumventing public IM networks entirely by establishing a private network-typically with a private IM server deployed within a corporate network. Options include Microsoft Lync Server or an open source alternative such as Cisco Systems' Jabber. (Note that Lync may entail additional licensing costs, while Jabber and others may require more effort to deploy.)

Getting users to adopt a new IM service may be a bigger challenge than most businesses anticipate. AIM, Google Hangouts and Windows Live are popular for a reason. Also note that many popular IM chat clients on both the desktop and mobile devices may not support open standards such as Jabber, while a closed platform such as Lync is typically accessible only on official clients.

Use VPN to Encrypt All Data Transfers

The virtual private network (VPN) is another commonly ignored security component that businesses should hasten to implement. For remote workers, the capability to encrypt data communications from their laptops and desktops back to the office not only protects them from snooping at insecure Wi-Fi hotspots, it also grants remote access to resources on the corporate network.

The complexity and cost of setting up a VPN has declined significantly. Moreover, support is offered on a variety of tablets and smartphones. That said, you will need to do some research to determine what will work best. (Most leading VPN services will plug into existing directory services such as Active Directory for authentication.)

Feature: Top SSL VPN Tools

Depending on the number of VPN users your company expects at any given time, it may be necessary to deploy a beefier appliance or increase the specifications of the virtual machine to deal with the workload.

Traditional physical and virtual solutions aside, outlier offerings such as the iTwin Connect may work well for smaller organizations, too.

The iTwin makes it childs play to create an encrypted VPN tunnel back to the corporate network. It leaves one end of the two-piece device plugged into the office desktop, with the other end plugged into a laptop outside the corporate firewall.

Businesses Must Stay on Their Toes

Allegations of snooping on government officials at the 2009 G20 summit, along with the high-profile RSA hack in 2011, offer additional insight into what governments and highly skilled hackers can pull off. Even SSL encryption may not be as foolproof as once believed, given how hackers are stealing secret encryption keys and successfully attacking digital certificate authorities.

No one is immune from hacking attempts and digital harassment. With so much at stake, the onus is on businesses to raise their security baseline by eliminating risky behaviors and implementing sound security measures. With diligence and awareness, there's no reason for even small businesses on a modest budget can't achieve greater security.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com




Friday 19 July 2013

Citrix edges VMware, Microsoft in VDI face-off

BYOD adds complexity to hosted VDI implementations

We compared hosted virtual desktop infrastructure (VDI) products from Microsoft, Citrix, VMware, Oracle and Ericom and came to many conclusions, but the most important one is this: Setting up hosted desktop sessions in a BYOD world is a complex undertaking.

When a user grabs a device and wants to access a session, the first step is downloading an app for the device, which may or may not have additional configuration steps. Thankfully, most of the client-side apps we tested needed no more than an IP or DNS address name -- and one (Oracle) could do an automated search by an address pre-seeded in the client.

If and where possible, we strongly recommend mandating a VPN connection before linking to a network, but this isn't always possible or feasible. Once a user initiates a session, a connection broker takes the user's request, and after an authentication step, the broker chooses an ad hoc or persistent session.

Here's where things get thick. The session is a live instance running as a virtual machine on the network, therefore, the session must wake up and be a fully functioning member on that network so as to reach its resources and deliver some of the characteristics of the session to the user's remote device. No matter what device they’re on or where they are, users want a beautiful analog of what they might see on their desktop at the office.

The user must also be authenticated, often through a local user database, LDAP or Microsoft's Active Directory. Printing resources must be defined. By user or group attribute, an administrator must determine sharing of information in concepts like: do you allow the user to store data away from the host session? Can a user launch a web session on the virtualized and remotely connected session? Is there just one or a handful of apps to use, or is the session wide-open? Does the user get to own the session for the next reuse, thus burning a license?

Indeed licensing issues, and how Microsoft treats Windows licenses, cause VDI makers considerable grief, because of the many licensing plans Microsoft offers, and how VDI sessions might use up available licenses. Careful consideration is required as in some cases, 100 non-persistent sessions could decrement the entire 100-license pool quickly and permanently until the problem is found and resolved.

Then there are session customizations, so that users land with the correct session customizations. The sessions must work well, perhaps in ugly circumstances such as over-subscribed Wi-Fi access points in remote locations.

Uncontrollable events can occur, such as logon storms, when many people must suddenly meet for online meetings using VDI, or other event storms that can task building ad hoc sessions. It's a lot of work. We know because we did it. And there were items we had to gloss, like multi-monitor capabilities (Horizon View has it), constraining video characteristics (shared by most all), super-multimedia (too many device differences), and strict adherence to policies (Active Directory or session-managed).

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


Sunday 14 July 2013

Microsoft chops Surface RT price to $349

One Microsoft bull urges consumers to take a pass, even at that price

Microsoft on Sunday slashed prices on its Surface RT tablets by as much as 30%, with the entry-level 32GB model selling for $349.

The 64GB Surface RT was also discounted by $150, and now sells for $449, or 25% off its former price.

When Microsoft launched the tablet, it sold the 32GB device for $499 and the 64GB configuration for $599.

Microsoft started selling the Surface RT at the lower prices Sunday, as did some of its U.S. retail partners, including Best Buy and Staples. On its website, Staples noted that the discounted prices are valid until July 20, and only while supplies last.

Microsoft's website, however, listed no caveats, hinting that the lower prices might be permanent or at least will be honored for longer than one week.

The prices are another attempt by Microsoft to clear its existing inventory in preparation for a second-generation line of Windows RT devices. Previously, Microsoft had launched multiple deals to rid itself of the poor-selling tablet, most recently in June when it slashed prices by 60% in a bid to get universities and K-12 schools to buy the device.

Earlier, it kicked off a buy-a-Surface-RT-get-a-free-cover deal that ran until June 30. And at several conferences, including June's TechEd North America and this month's Microsoft Partner Conference, the company sold attendees a 64GB Surface RT for $100, 83% off list price.

Today's sale prices were nearly Microsoft's cost, which according to estimates of the tablet's component prices, runs the company at least $284 for the 32GB Surface RT.

Microsoft has not abandoned Windows RT, the pared-down operating system that powers the Surface RT, but virtually every third-party OEM has either pointedly ignored the OS or publicly announced that they would not support it with devices of their own. Instead, the OEMs have flocked to Windows 8 Pro, even though some analysts question the value of touch devices on a platform whose biggest selling point is legacy software that doesn't support touch.

It was the lack of OEM support that made it possible for Microsoft to drop the price of the Surface RT so dramatically. Microsoft essentially had promised hardware partners that it would not undercut their pricing -- unlike Microsoft, the third-party OEMs must pay for the Windows RT license -- but with no competition, and thus no OEMs to antagonize, Microsoft was able to push the Surface RT into the bargain basement.

Long-time supporters of Microsoft have turned their back on Surface RT, even at the heavily-discounted price. Today, blogger Paul Thurrott, generally bullish on Microsoft, excoriated the tablet, calling it a "piece of junk" that is "simply too underpowered to provide a satisfactory experience."

Microsoft has made no noise about when, or truth be told, even if, it will debut new Surface RT devices. But it seems clear, after last week's corporate reorganization and its emphasis on a "complete spectrum" of devices -- a "family of devices," as CEO Steve Ballmer put it -- that the company must at some point unveil new tablets, if only to put its money where Ballmer's mouth is.

Analysts and pundits alike have held up the newest processors from Intel and ARM licensees such as Nvidia as Microsoft's best hope for gaining more ground in tablets. Those processors, battery misers and more powerful, respectively, are expected to appear in new devices this fall -- in time for the holiday selling season but likely not for the almost-as-important back-to-school sales, into which Best Buy lumped the discounted Surface RT.

Microsoft has not revealed sales figures for the Surface line -- which also includes the Surface Pro, powered by Windows 8 Pro -- but estimates by research firms like IDC have been lackluster.

Surface RT on sale

Staples is one of the U.S. retailers selling the Surface RT tablet at a sharp discount. (Image: Staples.)

The discounted Surface RT can be purchased at Microsoft's retail and online stores, as well as retailers like Best Buy and Staples.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


Wednesday 10 July 2013

EMC 'Bringing the Sexy Back' to Data

"Imagine a dam with a single, small sluice gate near the bottom, and there's water just gushing over the top," says Guy Churchward, president of Backup and Recovery Systems at EMC. That sluice gate represents your backup platform and the water represents your data. "Backup can't handle the load."

And worse is coming, Churchward says. If you were to pan the camera back from your little dam with water spilling over the top, you'd see 15 other raging rivers rushing toward you.

Protection Storage Fragmentation Disenfranchises IT

"We're on notice, as an organization to create a more open and agile infrastructure for protection storage," he says. "The bottleneck now is around the server. It's not us saying the competition is doing it wrong. It's us saying the way people are doing backup today isn't going to scale. It's actually going to create fragmentation and disenfranchise IT."

Today, Churchward says, users are addressing individual data protection challenges reactively, as they arise, and they're applying costly siloed or "one size fits all" products and solutions that are difficult to manage, optimize and pay for. You've got desktop backup, virtualized backup, cloud backup, different forms of backup for different applications. In effect, he says, organizations are creating "accidental architecture."

"Evolving data protection technology and expanding requirements have completely transformed the backup industry," writes Stephen Manley, CTO of Backup and Recovery Systems at EMC.

"Unfortunately, with such rapid change, many organizations have fallen into the chaos of an accidental architecture, Manley says. The backup team isnt solving critical protection performance challenges from the application, virtualization and storage teams, so those teams deploy silos of point products as they deem appropriate. The accidental architecture results. Its accidental because nobody would intentionally plan for half-dozen unconnected protection tools, no central oversight and no cost controls."

"Customers need to define a protection storage architecture to combat the accidental architecture," he adds. "This architecture should be composed of loosely coupled modules to minimize vendor lock-in while providing the value of integrated data protection. That way, the backup team can solve immediate challenges while delivering a platform that can evolve with business and technical requirements."

EMC's New Protection Storage Lineup

This thinking has led EMC to take a different approach to protection storage. Today it announced a broad array of new hardware and software products intended to help IT deliver a protection storage architecture that meets the demands of the business, give stakeholders control and visibility into the protection of the environments they manage, all with the capability to scale as necessary. As Churchward notes, it's about bringing the sexy back to backup.

The new products affect a broad swathe of the company's product lines, including Data Domain, Avamar, NetWorker and Mozy.

EMC has introduced four new midrange Data Domain systems-the Data Domain DD2500, DD4200, DD4500 and DD7200-which consolidate backup and archive data onto a single protection storage platform. EMC says the systems are up to 4x faster and 10x more scalable than the existing Data Domain systems they replace. The systems also support up to 540 data streams, a 3x increase over past systems.

For extended backup and archive application support, the Data Domain systems now support direct backup from SAP HANA Studio via NFS. Also, DD Boost for Oracle RMAN now supports Oracle Exadata and SAP running on Oracle.

On the Avamar front, EMC has added support to Avamar 7 for all major data center workloads directed to Data Domain systems, with the addition of file system and NAS/NDMP backups, allowing all major data center workloads to be protected by the combined solution.

For virtual environments, EMC has added VM Instant Access, which allows a VM to be booted from a Data Domain system and running in less than two minutes. And a new VMware vSphere web client provides the capability to manage Avamar directly from the vSphere interface.

EMC has introduced new integrated snapshot management to NetWorker 8.1. It features a new wizard-based user interface, auto-discovery and intelligent assignment of snapshot storage. In addition, EMC says Data Domain Boost support over Fibre Channel enables 50 percent faster backups and 2.5x faster restores compared with VTL-based configurations. EMC is also delivering a complete refresh of its VMware support, leveraging Avamar technology services.

Finally, for cloud backup, EMC has added Active Directory integration to Mozy to reduce the administrative burden of separately creating user accounts and to enhance self-service. EMC has added storage pools to reduce the amount of time spent monitoring storage quotas at the individual machine level, and it has also added keyless activation to make provisioning new users a faster, more efficient process.

"Previously, Great Western Bank struggled just to meet backup and recovery SLAs, and still worried about our ability to recover data and systems in a fashion that carried no impact to our business in the event of a disaster," says Mike Strenge, senior vice president of Information Technology at Great Western Bank.

"EMC's data protection solutions alleviated those most basic concerns and have additionally enabled the IT team to take a more strategic role in the bank's aggressive acquisition objectives," Strenge says. "We're confident that we have the data protection infrastructure to support the change and growth of our business objectives."


Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


Tuesday 9 July 2013

Ultimate guide to Windows 8 ultrabooks

Testing of eight Windows 8 ultrabooks reveals that users looking for the slimmest, lightest devices will have to accept tradeoffs

While finding a touchscreen for a desktop computer is nearly impossible, and finding a touchscreen notebook computer takes some searching, touchscreen ultrabooks are readily available. These thin, light and relatively compact computers are intended to be portable and to be used at a moment’s notice. Adding touch seems a natural thing to do.

Nearly every maker of an ultrabook offers a touchscreen, and nearly all of them offer Windows 8 as the default OS. While most Windows users aren’t accustomed to a touchscreen on their computers, the rise of smartphones and tablets has introduced most users to the idea. In fact, by the time I was finished with this review, my non-touchscreen Windows 7 laptop had become frustrating because I kept touching the screen and expecting something to happen.

Intel created and defined the ultrabook market, but we didn’t exclude products simply because they didn’t meet all of Intel’s specs. If the vendor called their product an ultrabook, we reviewed it. (Watch the slideshow version of this story.)

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com