throbber
Founded in 19/8
`
`
`AUGUST 16, 1999 VOLUME 21, ISSUE 33
`
`es
`i!
`
`Defining Technology for Business
`Sealers as
`:
`
`
`
`
`
`‘Tools for your tagteam:
`‘Help yourself: How to
`SoftQuads
`_ turn employeeself-
`XMetaL uses a
`'@
`FRe> service tools
`word processor
`into a boon
`modelfor XML
`instead of
`markup. 51
`a bane. 93
`From bricksto clicks
`
`
`
`ee eeeeee
`
`Ce
`
`Midlevel
`
`pete ha atl lem arta retettae a hg
`
`gerele Cee eae lat seat tad
`
`way to keep up
`
`& GM leads waveofnext-generation I-commerceinitiatives
`By Dana Gardner
`of Forrester Research,
`in Cam-
`last week, is one of the early ex-
`To poT-CoMor not to dot-com?
`amples of the wave oftraditional
`bridge, Mass. “It will be General
`Electric, GM, and Wal-Mart that
`brick-and-mortar companies, such
`as Wal-Mart and Williams-Sono-
`will harmonize their channels and
`create a single experience for the
`ma, that is pursuing major initia-
`commerce impact|shotcorporstebehemothsuchas
`tives based on Webservices,
`customer. This is where the action
`sends shock waves
`General Motorsis nowfully design-
`is going to happen. This e-GM ts the
`“Theearly Internet economy we
`have nowis only a small vibration
`ing its long-term business strategy
`Manhattan Project of [Internet
`aroundthe Internet.
`through ERP world
`commerce].”
`of the changes we will see,” said
`A new e-GM division, launched
`George Colony, founder and CEO
`P GM page 32
`Web-enabled or not, companies are
`picking up the pace to respond to
`accelerating demands fram the
`marketplace. Although enterprise
`resource planning (ERP) giant SAP
`may have been caughtoff guard by
`the onsetof Internet commerce, the
`companyis quickly shifting into high
`gear, See article, page 14.
`Meanwhile, manufacturers are optimizing their existing ERP
`infrastructures to handle the growing need for speed. See Special
`News Report, page 34.
`
`With the potential cost savings and
`expanded reach of Internet com-
`
`Payment systems
`
`Credit carts
`hecome virtual
`with eCharge
`
`yr
`
`
`
`
`
`
`
`
`> Dan Briody: Whosto
`blame,Intel or the OEMs?
`
`
`SEXAINTieeeseesenseses(AR-AT SORT#29-052
`842239304150 JAN 24 00
`221 001133
`
`wi
`FO BOX 904
`ANA ARBOR Ml
`
`030. 138
`
`46106-0984
`
`
`
`hlulbes lassellll, seolberldardels sbocbarbualbbansl
`
`
`
`
`
`NEWS
`By Matthew Nelson
`> Hewlett-Packardrecruits partners for
`
`PAYMENT COMPANY—eCharge
`plans to do to Internet credit card
`E-speak integrationplatform. 5
`systems what the Internet itself did
`to brick-and-mortar stores.
`NEWS
`> Soul of an old machine: EMC buys
`Data General. 12
`
`eeeeterpteS
`
`
`Officials at eCharge will an-
`nounce this week a completely In-
`ternet-based credit and payment
`systemto facilitate purchasing be-
`tween buyers and eCharge-enabled
`merchants.
`However, eChargewill offer mer-
`chants a discount fram what they
`are charged by traditional credit
`cards suchas Visa and MasterCard,
`With a
`less-expensive option
`available, those traditional cards
`maybein big trouble.
`“The current pricing structureis
`going to collapse. Thereis no ques-
`tion about it,’ said Albert Pang, an
`| electronic-commerce software an-
`
`| alyst at International Data Corp.,
`in Mountain View, Calif, “It will
`change the rules of the game with
`credit card payment systems over
`the Internet. [twill have an impact
`> ECHARGE page 32
`
`
`ow that quick reaction has
`
`becomeessential to a company’s
`
`survival, you may not have time
`to deploy a full-scale customer
`
`relationship management
`
`tool.That's where midtier
`tools comein.
`
`» See Comparison by Mario Apicella and Dan Sommer on
`page 68.
`
`CHETPea.Lies,
`- Ex. 1064, p. 1
`
`Petitioner Apple Inc.
`
`Petitioner Apple Inc. - Ex. 1064, p. 1
`
`

`

`
`
`
`
` = S
`
`oundoff
`
`54
`
`Intranets &: |Commerce
`51 Review: SoftQuad Software
`releases XMetaL 1.0,a produc-
`tion tool for creating content
`based on XML and SGML.
`Review: BeatWare's e-Picture
`1.0 integratesall the features
`a Web designer needsto edit,
`illustrate, animate, and more.
`55 Mentor’s Corner: Victoria's
`Secret's too-popular spring-
`fashion cybercast persuades
`the retailer to adoptIP multi-
`casting technology.
`
`59 Review:Theflexibility of
`SalesLogix's SalesLogix 3.1
`puts it among the cream of
`the customerrelationship
`managementsoftware crop.
`60 Review: Corel’s latest version
`of Paradoxis easier to use, but
`withits array of design flaws,
`the productstill needs work.
`
`lest CenterComparison
`
`
`
`68 The InfoWorld Test Center
`examines your options for
`midtier customer relationship
`managementsoftware.
`
`
`
`93 Employeeself-service tools
`can boost productivity, but
`only if workers have the desire
`andthe training to use them.
`
`94 Three IT managersreflect on
`the experiences they had and
`choices they made whiletrav-
`eling downtheir career paths.
`
`Bos Lewis
`Do personality
`dose minds?
`
`build teams or
`
`NICHOLAS PETRELEY
`Sure, some software stinks.And it may
`beyourfault.114
`SANDY REED
`The consumerPC market is booming,
`yet fewerpeople are using their PCs,83
`
`
`
`5 From the News Desk /
`Michael Vizard
`
`46 Window Manager /
`Brian Livingston
`48 Security Watch / Stuart
`McClure and Joel Scambray
`56 Net Prophet / Dylan Tweney
`66 Test Center Rx / Laura
`Wonnacott and Brooks Talley
`82 To the Editor
`
`82 InfoToon / Tom Cheney
`83 From the Editor in Chief /
`Sandy Reed
`95 |S Survival Guide / Bob Lewis
`95 Career Currents /
`Margaret Steen
`113 The Gripe Line / Ed Foster
`113 Notes From the Field /
`Robert X. Cringely
`114 Down to the Wire /
`Nicholas Petreley
`114 From the Ether / Bob Metcalfe
`1170 Reader Resources
`
`
`
`
`
`Saat
`
`lability
`
`If you're not
`careful, identity
`thieves may hijack
`yourpersonal
`information and
`masquerade as you
`page 48
`
`News
`
`§ Hewlett-Packard recruits part-
`hers to use its E-speak elec-
`tronic-commerce technology.
`8 Oracle prophesies that the
`demandforits delayed Linux-
`based 11ii suite will remain
`strong come 2000.
`
`12 The enterprise-storage war
`heats up with EMC’s acquisi-
`tion of Data General.
`
`
`
`14 Business-app behemoth SAP
`lumbers into the Web arena,
`but the move maybe too late.
`20 Microsoft and the U.S, govern-
`ment draw conflicting conclu-
`sions as to whether the com-
`pany abused its power.
`24 Street Prices: Pentium desktops
`28 Hologix's Attricom lightens
`the electronic-commerce load
`for heavy industries,
`28 The Bug Report
`32 Comdisco tackles same new
`projects,including data center
`services and an IT investment
`tracking tool.
`34 IT's influence spreads as manu-
`facturers integrate production
`systems with ERP and Internet-
`based supply chains.
`Platforms & Infrastructure
`39 Review: Symantec's
`pcAnywhere 9.0 connects
`remote employeestocritical
`data, applications, and users’
`systems,
`39 Review: Mobile Essentials,
`Version 2.0, from Symantec,
`eases connecting mobile users
`to the corporate network.
`
`
`SecurityWatch
` 7
`
`
`Mats&infrastructure
`
`
`
`
`
`Symantec's
`latest tools help
`you support
`your mobile
`workforce
`page 39
`
`
`
`Go onlineforall
`the latest news,
`discusston
`.
`5
`foTurns,
`interviews, and
`:
`-
`Test Center
`productreviews.
`
`
`
`
`
`
`
`
`|et
`| > Maggle Biggs: Have you
`|
`taken a vacation this sum-
`mer? If so, did you check
`you wereaway?Whydo
`1
`e-mail of voice mail while
`have troubledisconnecting?
`the promise ofcustomerrelationship
`|» Test Center: What do you think about
`management tools? Are these products
`too much work for the return, or are you
`willing to take the plunge to suit your
`business needs?
`
`you think some people
`
`|
`
`> Bob Lewis: Do exercises thattry toinstill
`4n appreciation for the perspective of
`variousidentifiable groups work, or do
`they just make the problem worse by
`emphasizing the groups’ characteristics
`to the detrimentof the individuals’?
`
`www.infoworld.com
`
`G INFOWORLD AUGUST 16, 1999 www.infoworld.com
`
`
`
`Newsletters
`Go online to subscribe
`to any orall of our six
`e-mail newsletters.
`
`> Nicholas Petreley: We are willing
`accomplicesto the negligent software
`publishers because wetolerate inferior
`software. Do you see a brightfuture for
`software, or will everyone take bugs and
`security holes for granted?
`» From the Ether,
`by Bob Metcalfe
`» Notes from the Field,
`> Dan Briody: Whydid Intel blame PC
`by Robert X. Cringely
`makers for the delayofits own Mobile
`» Security Wotch,
`Pentium fll chip? And who should we
`believe,Intel or the OEMs?
`by Stuart McClure
`and Joel Scambray
`» The Tweney Report,
`by Net Prophet
`Dylan Tweney
`» Wireless World,
`by Dan Briody
`» The Linux Report
`
`> Steve Kiely: In the age of Website
`outages, the CEO of Stratus Computer
`talks about why such mission-critical
`systemswill increasingly depend upon
`a solid serverinfrastructure of fault-
`tolerant systems.
`
`
`
`PLLUSTRATOON87BERNDSCHPODCR(CEMIERLEFT)
`
`
`
`
`
`Petitioner Apple Inc.
`
`- Ex. 1064, p. 2
`
`Petitioner Apple Inc. - Ex. 1064, p. 2
`
`

`

`
`
`INTRANETS & I-COMMERCE
`
`
`
`e‘a’y V it:
`learningto spell
`the new economy
`
`seaof“e's,
`
`TOP THE INSANITY.I'm drowning ina
`
`It all started innocently enough. “E-
`commerce”
`was an understandable,
`pronounceable abbreviation for “elec-
`tronic commerce.”
`Co
`But then people started addingthe“e" pre-
`fix to one damn thing after another, IBM
`
`ridiculousness in the term e-con-
`
`
`
`
`
`
`
`
`started talking about e-business.
`omy. You can almost hear the pun-
`Hewlett-Packard helped Microsoft
`launch eChristmas.com and then
`dits patting themselves on the back
`went on to offer e-Services. Then
`for coining that one.
`came an avalanche of e-terms,
`And yet — hello? — thisisn’t
`
`even a new word, Someone just
`both literal and poetic: eToys, eBay, E-
`dropped a hyphenintoa perfectly good oe
`Loan, eConcert, eMachines, and even eEye.
`This e-mania has reached its apex of
`lish word — onethat already began with “e,
`in case you hadn't noticed.
`I, for one, have had e-nough,
`Yet, as a pundit myself, I have a profession-
`al obligation to coin terms, Besides, | want to
`inIp shore up the embattled forcesbehindthe
`I” prefix, short for “Internet,” of course.
`(InfoWorld, bucking |the trend, has long pre-
`ferred “I-commerce™ to“e-commerce.”)
`Thus,in the spirit of rampant neologisms,
`I propose that we call the next-generation In-
`ternet the I-nternet.
`The term I-nternet, of course,refers to the
`fact that now even the Internetitself isn't im-
`muneto the disruptive, decentralizing forces
`of the Internet.
`Three recent battles over Net technologies
`— the DNS,instant messaging, and Web page
`annotations — illustrate the point.
`TheInternet's DNS,the key to readable Net
`addresses, has long been administered by a
`single government contractor, Network So-
`lutions Inc. (NSI). The U.S. government pro-
`posed a more open,decentralized system, to
`be organized by the nonprofit Internet Cor-
`poration for Assigned Names and Numbers
`(ICANN). Yet ICANNis provingitself inca-
`pable of creating a workable alternative, and
`NSI meanwhile remains firmly in control.
`In other words, the entire l-nternet, which
`ostensibly empowers small com panies to
`compete with the biggest ones,is being held
`h ostape by a single government contractor.
`Another I-nternet attraction is the topsy-
`turvy farce of Microsoft lashing out at Amer-
`ica Online for refusing to makeits chat client,
`AOLInstant Messenger, interoperable with
`Microsoft's chat client, MSN Messenger.
`Microsoft, the champion ofopenness? Give
`mea break, At no point has Microsoft offered
`to open its own chat client to AOLor anyone
`else — opennessonly goes one way here.
`On the I-nternet,“openness” may be noth-
`ing more than a verbal cudgel wielded bythe
`public relations groupsin big corporations.
`Andyet, once in awhile something comes
`experience, and 24 x 365 support.
`along that really does open things upabit.
`If you want to speed things
`Onesuch technologyis Third Voice (www
`thirdvoice.com), a browser add-onthat lets
`anyonestick virtual Post-it Notes on any Web
`page,for the whole world to see.
`Third Voice has provoked strongreactions.
`The companyandits proponentscall the
`plug-in a powerful tool for free speech. Yet
`Web publishersare aghast that their Websites
`are getting“tagged” by Third Voicegraffiti.
`Nowadays, wheneverythingstarts with an
`“e,the Webitself almost seems passé. That's
`why’m glad there are still new technologies
`capable of provoking outrage and debate.
`Doesthe I-nternet really have revolution-
`ary potential left in it, or is it e-business as
`
`usual? Write to me at dylan@infowarld.cam.
`
`With a Cache databaselicense,
`you can speed up your development.
`[0 SPEED
`LICENSE.
`soeicst ata ave
`performance
`e+(ACHE
`Post:EcCMDatabare
`
`With Caché, the post-relational database,
`
`you can develop complex applications so
`fast it's like owning a “License to Speed."
`
`With advanced object and Web technologies,
`
`Caché can dramatically speed up your time-to-
`
`market, But Caché gives you more than a rapid
`
`application development environment.
`
`d ar
`pment
`
`Once deployed, Caché-based applications are
`
`so fast we've had customers get up to a 20x
`
`boost in SOL performance after switching their
`
`database, And without changinga singleline
`
`of application code.
`
`Do youstill peddle applications
`that run on a relational database engine?
`
`All this is made possible by Caché's
`multidimensional data server and applica-
`tion server, offering you multiple ways to
`
`access data, multidimensional storage
`
`architecture, scalable performance, plus
`richer technology for faster Web and
`
`object development.
`
`Caché comes from InterSystems, the
`
`leader in high-performance database
`systems, with over 2,000,000 licensed
`
`users worldwide, 20 years of database
`
`up, start by moving quickly tocall
`us at 1-800-753-2571. We'll rush infor-
`
`mation to you about the DBMS thatis so
`advanced, it won the "Best New Database
`of 1998" award.
`
`
`
`InterSystems
`
`E. CACHE
`
`Post-Relational Database
`
`www.LicensetesSpeed.com One Memorial Drive, Cambridge, Massachusetts 02142 1.800.753.2571
`CD iectipetenss Conpereten Ad rights reeereed Cachd are “Lacenee Tn fered’ are crateredtredenarts of inedyaters Corperenon
`
`5G INFOWORLD AUGUST 16, 1999 www.infoworld. com
`
`Petitioner Apple Inc.
`
`- Ex. 1064, p. 3
`
`Dylan Tweney is the content development
`managerfor the InfoWorld Web site. He has
`been writing about the Internet since 1993,
`
`Petitioner Apple Inc. - Ex. 1064, p. 3
`
`

`

`
`
`
`
`Petitioner Apple Inc. - Ex. 1064, p. 4
`
`It practically floats.Weighing just 3.1 pounds and measuringless
`than one inch thin, our newsvelte Compaq Armada M300 was
`truly designed to meet the needs of your mostfrequenttravelers.
`Built with Intel’ mobile processors, its performance is anything
`but lightweight. An optional Mobile Expansion Unit
`‘nitel
`frees yourtravelers from having to deal with the hassle
`celeron-TTTTree
`Pagettnen
`of wires. While a choice of commondocking solutionsoffers youflexibility and investment
`protection. And,like every Armada,it features Intelligent Manageability that simplifies network
`management. No wonderour whole Armadalinehasliterally flown off the shelves. Any
`questions? Call 1-800-AT-COMPAQ.Orvisit us atwww.compaq.com/armada.
`COMPAG. Better answers:
`
`Armada M3o0 Series at $1,999°
`+ 3.1 lbs, 0.9" thin - Intel” Mobile Celeron” processor 333 MHz » 11,3" color TFT display
`+ 4. GB" Hard Drive « 6q MB RAM = 56K V.go integrated modemt« Optional Mobile Expansion Unit
`
`Petitioner Apple Inc. - Ex. 1064, p. 4
`
`

`

`It’s whytheynever
`seem to callanymore
`
`
`
` Symantec Mobile Esse 7
`
`
`
`
`
` Now, mobile professionals can instantly set up
`
`
`
`
`
`in multiple locations, with a single click.
`INTRODUCING THE NEW CORPORATE EDITION OF SYMANTEC MOBILE ESSENTIALS
` Supporting a
`large mobile workforce can wreak havoc on a
` help desk. For one thing, users call at all hours from all around the
` world asking for help adjusting network and
`
` IP settings. Face it, manually adjusting to new
`
`
`sites can be a real problem for even savvy users.
` But with the new corporate edition of Symantec Mobile
`
` Essentials” 2.0, you can centrally create and deploy an unlimited
`
` number of location profiles that will automatically re-set users’
`
` laptop configurations to new locations witha single click.
`
` And that’s true whether they're logging on from Bombay,
`
` working in the Boston office, or telecommuting from home. Call
`
` today for more information,
`to be ready for the June release of
` Symantec Mobile Essentials.
`It’s one more way Symantec helps
`
`
` maximize user productivity and minimize support from IT.
`
`
`SYMANTEC,
`
`Call us at 1-800-745-6054, ext. 9E87 orvisit
`
`
`www.symantec.com/mobileessentials
`
`for a FREE white paper and a special trialware previewedition.
` Offer valid only in the United States, Syrnantec and the Symantec logoare US registered trademarks and Symancec
`EST
`
`Petitioner Apple Inc. - Ex. 1064, p. 5
`
`Mobile Essentials is a trademark of Symantec Corporation, All other brand names and trademarks are the property
`of their respective owners. © 1909 Symangec Corporation. All rights reserved
`
`Petitioner Apple Inc. - Ex. 1064, p. 5
`
`

`

`Advertising Supplement
`
`S
`
`ie
`
` a |
`
`ENTERPRISE CONNECTIONS
`
`atFOR PRIMETit
`
`Petitioner Apple Inc. - Ex. 1064, p. 6
`
`

`

`
`
`Check Point.
`With more than 27,000 VPN installations
`and millions of remote VPN users.
`
`CHECK POINT
`
`
`
`Petitioner Apple Inc. - Ex. 1064, p. 7
`
`

`

`Advertising Supplement
`
`—____ AAAAAAAA
`
`
`Th
`
`REALITY
`
`OF VIRTUAL PRIVATE NETWORKS
`
`
`
`
`WHATTYPE OF
`VENDOR DO USERS
`CH OOSE FOR VPN 5
`
`
`IRTUAL PRIVATE NETWORKS (VPN) solve a number of
`networking challenges. These include greater security
`for communications across the network, the ability to
`quickly deploy additional users and locations, converging a
`number of enterprise communications capabilities, plus supporting
`a number ofstrategic applications, such as electronic commerce,
`voice and video conferencing, telecornmuting, and remote access.
`The positive effects that
`that can lead the network
`VPNs can have on an organi-
`manager down that positive
`Fathon can be dramatic, ac-
`path, These inchede:
`intranets:
`for commu-
`cording to VPN equipment
`fication between various cor-
`vendor Check Point Software
`porate
`departments
`and
`Technologies Lid. of Red-
`wood City, Calif. These posi- co
`branch offices
`tive effects may include: an
`Service
`= Remote access: to keep
`increase in sales, accelerated
` eweare
`the remote of mobile em-
`product development cycles,
`wane fl
`ployee connected with home
`base
`and strengthened strategic
`Not sure
`= Extranets
`for connee-
`partnerships. Prior ta the ad-
`10
`tivity between a corporation
`vent of VPNs,
`if additional
`0
`communication
`facilities
`eee
`and its business partners,
`were needed, the network manager had one option:
`customers, and suppliers
`Call the telephone company and order up rere
`leased lines. Not only was thisan expensive solution
`in-many cases, but the associated lead times forin-
`
`20
`
`30
`
`40
`
`50 40 70%
`
`ARE VPNs MORE VIRTUAL OR REAL?
`Are VPNs truly the holy grail that net managers have
`
`Petitioner Apple Inc. - Ex. 1064, p. 8
`
`

`

`Advertising Supplement
`
`AAAAUAAAA,
`
`defined in REC 2411. Note that the
`
`,
`
`ig
`Key
`
`
`
`THE |? Sent)Y PROTOCOLS
`vost VPN vendors will throw 2409TheInternetKeyExchange—
`the term “IPsec” at thelr cus-
`(HE)
`tomers when discussing the
`2410 TheNULLEncryption
`capabilities of their products
`Algorithm and its use with
`and services. But what does thisPRE
`mean for the network manager?
`2417
`IP Security Document
`IPsec,shortforInternetPratocol See‘etasesh(lament
`Security Protocol Suite, provides
`2412
`OAKLEY Key
`privacy (the process ofencrypting
`Determination Process:
`the data) and authentication (the
`The inter-relationships of the
`process ofidentifyingthe originator
`above documents, plus the proto-
`ofthat data) for (P-based internet
`cols and algorithms thatare docu-
`mented within the IPsec suite, are
`works. The protacoly are docu-
`mented in a series of Request for
`security architecture document
`Comments (RFC) documents:
`CRETE RFC 2403) covers the general con-
`249) Security Architecturefor the
`of |Psec technologies. There
`Internet Protocol
`antwo: key protocols: the En-
`
`capsulatingSecurity Payload (ESP, ©)7"mt
`defined in RFC 2406), which pro-
`and RFC 2412).
`vides privacy, and the Authentica-
`Hit sounds like this és abotofma-
`within ESP and AH
`tion Header (AH, defined in RFC
`terial todigest, it is:The Internet En-
`2404 TheUseofHMAC-SHA.1-g6
`zqoz], which provides authentica-
`gineering Task Force labored for
`WeNESPaadAn
`
`2405 The ESP DES-CBC Cipher—tion. Variousalgorithms in support several years on these IPsec docu:
`Algorithm with Explicit IV=of the ESP and AH processes have ments. For starters, check out RFC
`2406iPEncapsulatingSecurity
`theirown documents (suchas RFCs
`2411 (the document roadmap] and
`
`+
`
`4
`
`2407 The Internet IP Security
`Domain of Interpretation for
`SeatsISAKMP...
`2408 Internet SecurityAssociation
`and Key Waar
`Py
`
`of Interpretation (DO1, defined in
`RFC 2407) decuments default val-
`wes and other specifications. The
`Key Management documents de-
`fine
`various
`key management
`schemes (see RFC 2408, RFC 2409,
`
`and then continue the research
`based on your network's specific se-
`curity requirements.
`All ofthese documents are avail-
`ableontheIETFWebsite:wwwileft.
` org/ric.himl.
`
`got it night? Should network managers re-architect
`their networking infrastructures one more time or
`stay with the tried-and-proven leased-line solutions
`forthe WAN connections?
`Network managers responsible for geographi
`cally dispersed systems, typically connected via low:
`speed links. and_.also lacking the staff or time to im-
`plement a peece-part solution, are food candidates
`for VPN technologies, according to john McConnell,
`president of McConnell Associates in Boulder, Cola
`
`a shared public network,” says Atul
`tions ower
`Kapoor, senior vice president and managing direc-
`tor of research and analysis for the Toly Group in
`Manasquan, Wj. “VPNs are a natural for the in
`tranet/estranet ape, and therefore should be with us
`as faras one can safely predict these things.”
`But given sucha broad definition ofVPM service.
`what networking challenges do end users count om
`this technology to solve? “For row, the top applica-
`tion by far is remote access to corporate network
`
`Petitioner Apple Inc. - Ex. 1064, p. 9
`
`

`

`Advertising Supplement
`
`AAAAAAAA
`
`
`
`
`“The real battle sions, additionallatency is nota
`consultancy, As security and per-
`in the VPN indus- major issue, But for real-time ap-
`formance issues are addressed
`plications, such as voice or
`little by lithe, Zines predécts
`more interestin site-to-site VFN try is guaranteed video, excess latency results in
`connectivity for heavy-duty ap.
`poor application performance,
`performance.”
`and ultimately, end-user dissat-
`plications, and eventually, same-
`isfaction with that service. And if
`day, all applications. “The goal
`for this technology is converged Eric lines, Telechoice the end users are unhappy, net-
`networks and applications,” so
` work managers know thatit is
`thal network managers can reap
`only a matter oftime before their
`the economic advantages and management bene-
`phone will start to ring,
`$0.4 little preventive medicine in the form af a
`fits of running everything over a single infrastruc-
`ture, Zines says.
`Service Level Agreement, or SLA,is typically includ:
`ed in the contract with the VPN provider, And if the
`HOW WELL D0 VPHs PERFORM?
`provider misses a performance bogey, there is typi-
`tally some type of sennce refund or credit given, as
`you ask most network managers to list their lop
`specified in the service contract, for the timethat the
`three concerns, the performance oftheir networks.
`network did not perform as advertised. But these re-
`is likely to bead thatlist. “The real battle in the VPN
`funds may be in the toc-little-too-late category,
`industry is guaranteed performance,” says Zines.
`Having some network management systems.
`“Availability and latency guarantees are nice, but they
`available to measure, and document, VPN perfor-
`SPONSORED Bt.
`don't cut itin a mission-critical emaron-
`marice can be ertical when it comes me to settle
`ment.
`up with the provider at the end of the month, Not
`veoraevttakCoen
`Much of this boils down to the qualie
`only should you know ifyou are getting what you pay
`chek oo ty of service, or QoS, and the measure:
`for, but whether what
`Hewlett-Packard
`‘Tents that go inte QoS determinations.
`you are petting is ad-
`“Unfortunately, there is still more quality
`THE IMPACT OF
`equate to meet your
`oflip service, as opposed to quality of service,” says
`
`Frank Henderson, chief technical officer ofthe Net: infrastructure=re:
`VIRTUAL PRIVATE
`Plex Graup, an loelin, N,J., consultancy,
`quirements, Hewlett
`NETWORKS ...
`Packard Co.'s Met-
`But one ofthe keys to cracking the VPN challenge
`on Leased Lines
`is to be well-armed with details concerning the
`work System Test
`Division has devel-
`specifics of your network, and how its various ele-
`ments are operating. In many cases, this boils down
`oped a number of
`scalable network test
`to a clear understanding of network performance
`metrics, which include network availability and la-
`solutions,
`ranging
`tency,
`from software-only
`systems that run un-
`Network availability is a ratio ofthe tinve that the
`der
`Windows
`network is operational, compared with the total time
`of the measurement period, and then expressed as
`95/93/INT,
`to fully
`a percentage. A number that is frequently tossed
`configured dedicated
`around ts 99.9999, or “five nines"ofnetwork avail-
`analyzers that sup-
`port both switched
`ability, which means that the service prowideris guar-
`and shared network
`antecing that the network will only go down .oor%s
`architectures,
`of the time, a very small amount that would take lit-
`The HP LAN An-
`erally years of measurements to accurately verify,
`Latency ia the delay, typically measured in mil-
`alyrer is a Windows-
`liseconds, to get from one location to another via the
`based
`protocol
`service provider's network. Typical latencies across
`analysis and: moni-
`
`on Connectivity
`@ Will VPNG enable pau commeetivity?
`
`Q. Will VENrepioce leased lines?
` Seed ont eaters Be fll eteet eeeeee
`
`Petitioner Apple Inc. - Ex. 1064, p. 10
`
`

`

`Advertising Supplement
`
`
`—______________ /AAAAAAAA
`
`SURFING FOR )-))-0)\1: WEB INFORMATION
`
`he Web ‘surfing" business is an
`extremely fickle one. Few kmow
`this better than Excite [nc.,
`which has expanded from its in-
`ception as a search engine to a point
`of presence for the Web, including
`search, a personal channelized front
`page, chat boards, communities, E-
`mail, and instant messaging.
`Since Excite has expanded its busi-
`ness model beyond the search en-
`gine by adding a variety ofnew ser-
`its users are creating new
`demands ondata availability. For Ex-
`cite, easily and automatically prop-
`agating index data from its single-
`source query server
`to remote
`read-only mirrors is essential.
`Eric Anderson, UNIX Systems
`Administrator at Excite, turned to
`VERITAS Software in Mountain
`View, Calif, with his network storage
`challonge, Anderson agreed to beta
`test VERITAS Storage Replicator for
`File Systems (SRFS) because au-
`tomation is keytoenablingthe cam-
`pany to go forward with its business,
`“Using SRFS will save time for our
`
`administrators and maintenance
`overhead. Currently we have one
`person spending about 20 hours
`maintaining the mirrors. Using
`SRFS, we may be able to reduce this
`to just two hours per week,” Ander-
`SON Says.
`Excite is testing SRFS to create
`and maintain up to 12 remote world.
`wide read-only mirrors ofits source
`query server index data.
`The company primarily uses Sun
`Solaris servers and arrays, Initially,
`Excite startedtesting with two Sun
`servers, and grew the configuration
`tothe currently used 10 Sun Eqooos
`with two SPARC storage arrayseach
`on the West Coast, and six on the
`East Coast. Query servers handle
`the search words typed by users an
`the Web. The query servers process
`the search words, and deliver a list
`of related concepts rather than just
`key words. The company has a set
`of“fetchers” that collect information
`from the Internet. That information
`is then updated and merged onto a
`120 GB volume database. The 120
`
`GB in Excite's database is being
`managed by the underlying file sys-
`tom. That merged information is
`then manually copied to a series of
`array servers, which the query
`Servers use to gather and post re-
`sults bo users,
`Using SRFS, the newly merged
`data set is then replicated over the
`Internetto Excite’s: designated hosts
`on the EastCoast, Anderson is hape-
`ful
`that SRFS will automate this
`process, saving time in the copying
`process that in turn will enable Ex.
`citeto deliver a quicker, more up-to-
`date index at all “local” locations.
`VERITAS Software is the de-fac-
`te standard for application sterage
`management, with over bo of the
`world’s leading servers and operat-
`ingsystems integrating its software.
`VERITAS provides these custorners
`with onterprise-class application
`storage managementsoftwaresolu-
`ions to manage the explosion of
`data and the growing complexity
`and scalability of networked envi-
`ronments that exist today. &
`
`Distributed software modutes, The distributed met-
`work analysis and management module is an ewcel-
`lent resource for VPN manapers with multiphe phys-
`ical locations an the network. This module enables
`the network manager to centrally view and tharhage
`all LAN Analyzer data collecthon resources on the
`network. Each manageable device appears with its
`
`UP, UP AND AWAY
`ssaaa Muivkgt Revenise
`
`00
`4,200
`
`600
`
`:
`
`IP address of user-defined name
`All of the troubleshooting and monitoring fea
`tures that are-available locally with HP LAN Analyz-
`er are-vallable for distributed deyvices.that are also
`part of the management systern. in the case where
`@ technician is on site at a remote location to help
`troubleshoot a problem, the Distributed module
`greatly minimizes the time to resolve a problem
`This module lets both the network manager and the
`local support technician stmiultaneously ew and an
`alyze the segment in question, The network manager
`and technician can then collaborate to solve the
`probler, thus optimizing the lime necessary to re
`store the network to full operational status,
`
`Petitioner Apple Inc. - Ex. 1064, p. 11
`
`

`

`Advertising Supplement
`
`AAAAAAAA,
`
`
`
`“The goal for this
`technology is
`converged networks
`and applications.”
`Eric Zines, Telechoice
`
`
`been scrambling oflate to
`make their products com-
`pliant with the recently pub:
`lished Internet Engineering
`Task Force (IETF) standards
`for Internet Protocol Securi-
`fy, or IPsec.
`According to IDC, lead:
`ing solutions and products
`for VPNs should incorporate
`the following key features:
`©The ability to transparently interface with ex
`isting local-area network services and infrastructure
`= Integration with firewalls
`Integration with public key infrastructures and
`digital certificates
`Encryption and security association hardware
`acceleration, either embedded in the system or of-
`fered as an optional add-on
`©The ability to interface with existing authentica-
`tion systems, management systems, and directories
`
`policies and performance-ori-
`ented quality-of-service (QoS)
`policies
`= Unique product sets for
`the enterprise and service
`providers.
`And with somecareful at-
`tention to network design,
`data throughput, security, and
`management schemes,
`the
`current VPN offerings promise bo meet and exceed
`the challenges of their leased-line predecessors, W
`
`Mark A. Miller PLE, (mark@diginet.corn) 1 pres:
`dent afDigiNet Comp., ¢ Denver-based intermetwork
`consultingfirm.
`nowOLD BYNT JOLUTIORG TEA
`DMECHOR HILARY CaELR
`BURR) MOET Tk CaitGeit aT
`RODCT MANAGER: #1) LAMBRA ASSOCIATES
`DESIGN; PORN CAMPCE- DERN ORPON
`MAWAGING EINTOR Alice mftes
`RCORUCTIOM: 00882 COILPOWLE/CHEeE COI
`eC1 ATW OOCOeS
`
`a
`WORLD
`oan
`
`
`
`=The ability to deal with both security-oriented
`
`
`
`If Your NetworkControl Center
`Looks Like This, HP Has the Perfect
`Troubleshooting Solution For You.
`Introducing the NEW HP LAN Analyzer.
`isa Windows” based network anadroer thot nus on ys
`mobebiks 1 oan helyeu thekbeshoot, moniior
`ene mae
`your (O°) Erhermet menor. Ir provices deunilest intar-
`iilion jibal neterk sindeies do find anil sehr probes, Gai
`boca prow wilh your nenwork,
`its prbomi uncer ©) io (1S
`het price) nef iS PronHEF
`Aurnye equiessithens
`
`
`
`www.hp.com)qo/lananalyzers
`
`heb pica tas illc
`your new HPLAN Analyzer
`Veit aner Wile
`citer auinal
`three >
` inkl iB
`PACKARD
`WT LASS Anecdyaest
`texckay
`ty HEWLETT
`
`Petitioner Apple Inc. - Ex. 1064, p. 12
`
`

`

` NTERPRISE COMPUTING
`SalesLogix offers flexible CRM
`
`> Customerrelationship managementsoftware
`
`i ks
`
`www.infoworld.com
`
`
`
`
`SALESLOGIX'S WORKGROUPCLIENT has a consistent,friendly interface
`that canbe personalized by system administrators or users,
`
` H
`
`Developers Den:
`Vacation contradiction
`Many people are taking some
`time off this summer. However, all
`too often, technology pros
`announcetheir time away from
`the office by saying thatthey will
`check voice mail and e-mail occa-
`sionally. Why can't some technol-
`ogy pros disconnect? Have you
`‘taken a vacation this summer, and
`if so, did you check e-mail or voice
`mail while you were away? Did
`you b

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket