`
`
`AUGUST 16, 1999 VOLUME 21, ISSUE 33
`
`es
`i!
`
`Defining Technology for Business
`Sealers as
`:
`
`
`
`
`
`‘Tools for your tagteam:
`‘Help yourself: How to
`SoftQuads
`_ turn employeeself-
`XMetaL uses a
`'@
`FRe> service tools
`word processor
`into a boon
`modelfor XML
`instead of
`markup. 51
`a bane. 93
`From bricksto clicks
`
`
`
`ee eeeeee
`
`Ce
`
`Midlevel
`
`pete ha atl lem arta retettae a hg
`
`gerele Cee eae lat seat tad
`
`way to keep up
`
`& GM leads waveofnext-generation I-commerceinitiatives
`By Dana Gardner
`of Forrester Research,
`in Cam-
`last week, is one of the early ex-
`To poT-CoMor not to dot-com?
`amples of the wave oftraditional
`bridge, Mass. “It will be General
`Electric, GM, and Wal-Mart that
`brick-and-mortar companies, such
`as Wal-Mart and Williams-Sono-
`will harmonize their channels and
`create a single experience for the
`ma, that is pursuing major initia-
`commerce impact|shotcorporstebehemothsuchas
`tives based on Webservices,
`customer. This is where the action
`sends shock waves
`General Motorsis nowfully design-
`is going to happen. This e-GM ts the
`“Theearly Internet economy we
`have nowis only a small vibration
`ing its long-term business strategy
`Manhattan Project of [Internet
`aroundthe Internet.
`through ERP world
`commerce].”
`of the changes we will see,” said
`A new e-GM division, launched
`George Colony, founder and CEO
`P GM page 32
`Web-enabled or not, companies are
`picking up the pace to respond to
`accelerating demands fram the
`marketplace. Although enterprise
`resource planning (ERP) giant SAP
`may have been caughtoff guard by
`the onsetof Internet commerce, the
`companyis quickly shifting into high
`gear, See article, page 14.
`Meanwhile, manufacturers are optimizing their existing ERP
`infrastructures to handle the growing need for speed. See Special
`News Report, page 34.
`
`With the potential cost savings and
`expanded reach of Internet com-
`
`Payment systems
`
`Credit carts
`hecome virtual
`with eCharge
`
`yr
`
`
`
`
`
`
`
`
`> Dan Briody: Whosto
`blame,Intel or the OEMs?
`
`
`SEXAINTieeeseesenseses(AR-AT SORT#29-052
`842239304150 JAN 24 00
`221 001133
`
`wi
`FO BOX 904
`ANA ARBOR Ml
`
`030. 138
`
`46106-0984
`
`
`
`hlulbes lassellll, seolberldardels sbocbarbualbbansl
`
`
`
`
`
`NEWS
`By Matthew Nelson
`> Hewlett-Packardrecruits partners for
`
`PAYMENT COMPANY—eCharge
`plans to do to Internet credit card
`E-speak integrationplatform. 5
`systems what the Internet itself did
`to brick-and-mortar stores.
`NEWS
`> Soul of an old machine: EMC buys
`Data General. 12
`
`eeeeterpteS
`
`
`Officials at eCharge will an-
`nounce this week a completely In-
`ternet-based credit and payment
`systemto facilitate purchasing be-
`tween buyers and eCharge-enabled
`merchants.
`However, eChargewill offer mer-
`chants a discount fram what they
`are charged by traditional credit
`cards suchas Visa and MasterCard,
`With a
`less-expensive option
`available, those traditional cards
`maybein big trouble.
`“The current pricing structureis
`going to collapse. Thereis no ques-
`tion about it,’ said Albert Pang, an
`| electronic-commerce software an-
`
`| alyst at International Data Corp.,
`in Mountain View, Calif, “It will
`change the rules of the game with
`credit card payment systems over
`the Internet. [twill have an impact
`> ECHARGE page 32
`
`
`ow that quick reaction has
`
`becomeessential to a company’s
`
`survival, you may not have time
`to deploy a full-scale customer
`
`relationship management
`
`tool.That's where midtier
`tools comein.
`
`» See Comparison by Mario Apicella and Dan Sommer on
`page 68.
`
`CHETPea.Lies,
`- Ex. 1064, p. 1
`
`Petitioner Apple Inc.
`
`Petitioner Apple Inc. - Ex. 1064, p. 1
`
`
`
`
`
`
`
` = S
`
`oundoff
`
`54
`
`Intranets &: |Commerce
`51 Review: SoftQuad Software
`releases XMetaL 1.0,a produc-
`tion tool for creating content
`based on XML and SGML.
`Review: BeatWare's e-Picture
`1.0 integratesall the features
`a Web designer needsto edit,
`illustrate, animate, and more.
`55 Mentor’s Corner: Victoria's
`Secret's too-popular spring-
`fashion cybercast persuades
`the retailer to adoptIP multi-
`casting technology.
`
`59 Review:Theflexibility of
`SalesLogix's SalesLogix 3.1
`puts it among the cream of
`the customerrelationship
`managementsoftware crop.
`60 Review: Corel’s latest version
`of Paradoxis easier to use, but
`withits array of design flaws,
`the productstill needs work.
`
`lest CenterComparison
`
`
`
`68 The InfoWorld Test Center
`examines your options for
`midtier customer relationship
`managementsoftware.
`
`
`
`93 Employeeself-service tools
`can boost productivity, but
`only if workers have the desire
`andthe training to use them.
`
`94 Three IT managersreflect on
`the experiences they had and
`choices they made whiletrav-
`eling downtheir career paths.
`
`Bos Lewis
`Do personality
`dose minds?
`
`build teams or
`
`NICHOLAS PETRELEY
`Sure, some software stinks.And it may
`beyourfault.114
`SANDY REED
`The consumerPC market is booming,
`yet fewerpeople are using their PCs,83
`
`
`
`5 From the News Desk /
`Michael Vizard
`
`46 Window Manager /
`Brian Livingston
`48 Security Watch / Stuart
`McClure and Joel Scambray
`56 Net Prophet / Dylan Tweney
`66 Test Center Rx / Laura
`Wonnacott and Brooks Talley
`82 To the Editor
`
`82 InfoToon / Tom Cheney
`83 From the Editor in Chief /
`Sandy Reed
`95 |S Survival Guide / Bob Lewis
`95 Career Currents /
`Margaret Steen
`113 The Gripe Line / Ed Foster
`113 Notes From the Field /
`Robert X. Cringely
`114 Down to the Wire /
`Nicholas Petreley
`114 From the Ether / Bob Metcalfe
`1170 Reader Resources
`
`
`
`
`
`Saat
`
`lability
`
`If you're not
`careful, identity
`thieves may hijack
`yourpersonal
`information and
`masquerade as you
`page 48
`
`News
`
`§ Hewlett-Packard recruits part-
`hers to use its E-speak elec-
`tronic-commerce technology.
`8 Oracle prophesies that the
`demandforits delayed Linux-
`based 11ii suite will remain
`strong come 2000.
`
`12 The enterprise-storage war
`heats up with EMC’s acquisi-
`tion of Data General.
`
`
`
`14 Business-app behemoth SAP
`lumbers into the Web arena,
`but the move maybe too late.
`20 Microsoft and the U.S, govern-
`ment draw conflicting conclu-
`sions as to whether the com-
`pany abused its power.
`24 Street Prices: Pentium desktops
`28 Hologix's Attricom lightens
`the electronic-commerce load
`for heavy industries,
`28 The Bug Report
`32 Comdisco tackles same new
`projects,including data center
`services and an IT investment
`tracking tool.
`34 IT's influence spreads as manu-
`facturers integrate production
`systems with ERP and Internet-
`based supply chains.
`Platforms & Infrastructure
`39 Review: Symantec's
`pcAnywhere 9.0 connects
`remote employeestocritical
`data, applications, and users’
`systems,
`39 Review: Mobile Essentials,
`Version 2.0, from Symantec,
`eases connecting mobile users
`to the corporate network.
`
`
`SecurityWatch
` 7
`
`
`Mats&infrastructure
`
`
`
`
`
`Symantec's
`latest tools help
`you support
`your mobile
`workforce
`page 39
`
`
`
`Go onlineforall
`the latest news,
`discusston
`.
`5
`foTurns,
`interviews, and
`:
`-
`Test Center
`productreviews.
`
`
`
`
`
`
`
`
`|et
`| > Maggle Biggs: Have you
`|
`taken a vacation this sum-
`mer? If so, did you check
`you wereaway?Whydo
`1
`e-mail of voice mail while
`have troubledisconnecting?
`the promise ofcustomerrelationship
`|» Test Center: What do you think about
`management tools? Are these products
`too much work for the return, or are you
`willing to take the plunge to suit your
`business needs?
`
`you think some people
`
`|
`
`> Bob Lewis: Do exercises thattry toinstill
`4n appreciation for the perspective of
`variousidentifiable groups work, or do
`they just make the problem worse by
`emphasizing the groups’ characteristics
`to the detrimentof the individuals’?
`
`www.infoworld.com
`
`G INFOWORLD AUGUST 16, 1999 www.infoworld.com
`
`
`
`Newsletters
`Go online to subscribe
`to any orall of our six
`e-mail newsletters.
`
`> Nicholas Petreley: We are willing
`accomplicesto the negligent software
`publishers because wetolerate inferior
`software. Do you see a brightfuture for
`software, or will everyone take bugs and
`security holes for granted?
`» From the Ether,
`by Bob Metcalfe
`» Notes from the Field,
`> Dan Briody: Whydid Intel blame PC
`by Robert X. Cringely
`makers for the delayofits own Mobile
`» Security Wotch,
`Pentium fll chip? And who should we
`believe,Intel or the OEMs?
`by Stuart McClure
`and Joel Scambray
`» The Tweney Report,
`by Net Prophet
`Dylan Tweney
`» Wireless World,
`by Dan Briody
`» The Linux Report
`
`> Steve Kiely: In the age of Website
`outages, the CEO of Stratus Computer
`talks about why such mission-critical
`systemswill increasingly depend upon
`a solid serverinfrastructure of fault-
`tolerant systems.
`
`
`
`PLLUSTRATOON87BERNDSCHPODCR(CEMIERLEFT)
`
`
`
`
`
`Petitioner Apple Inc.
`
`- Ex. 1064, p. 2
`
`Petitioner Apple Inc. - Ex. 1064, p. 2
`
`
`
`
`
`INTRANETS & I-COMMERCE
`
`
`
`e‘a’y V it:
`learningto spell
`the new economy
`
`seaof“e's,
`
`TOP THE INSANITY.I'm drowning ina
`
`It all started innocently enough. “E-
`commerce”
`was an understandable,
`pronounceable abbreviation for “elec-
`tronic commerce.”
`Co
`But then people started addingthe“e" pre-
`fix to one damn thing after another, IBM
`
`ridiculousness in the term e-con-
`
`
`
`
`
`
`
`
`started talking about e-business.
`omy. You can almost hear the pun-
`Hewlett-Packard helped Microsoft
`launch eChristmas.com and then
`dits patting themselves on the back
`went on to offer e-Services. Then
`for coining that one.
`came an avalanche of e-terms,
`And yet — hello? — thisisn’t
`
`even a new word, Someone just
`both literal and poetic: eToys, eBay, E-
`dropped a hyphenintoa perfectly good oe
`Loan, eConcert, eMachines, and even eEye.
`This e-mania has reached its apex of
`lish word — onethat already began with “e,
`in case you hadn't noticed.
`I, for one, have had e-nough,
`Yet, as a pundit myself, I have a profession-
`al obligation to coin terms, Besides, | want to
`inIp shore up the embattled forcesbehindthe
`I” prefix, short for “Internet,” of course.
`(InfoWorld, bucking |the trend, has long pre-
`ferred “I-commerce™ to“e-commerce.”)
`Thus,in the spirit of rampant neologisms,
`I propose that we call the next-generation In-
`ternet the I-nternet.
`The term I-nternet, of course,refers to the
`fact that now even the Internetitself isn't im-
`muneto the disruptive, decentralizing forces
`of the Internet.
`Three recent battles over Net technologies
`— the DNS,instant messaging, and Web page
`annotations — illustrate the point.
`TheInternet's DNS,the key to readable Net
`addresses, has long been administered by a
`single government contractor, Network So-
`lutions Inc. (NSI). The U.S. government pro-
`posed a more open,decentralized system, to
`be organized by the nonprofit Internet Cor-
`poration for Assigned Names and Numbers
`(ICANN). Yet ICANNis provingitself inca-
`pable of creating a workable alternative, and
`NSI meanwhile remains firmly in control.
`In other words, the entire l-nternet, which
`ostensibly empowers small com panies to
`compete with the biggest ones,is being held
`h ostape by a single government contractor.
`Another I-nternet attraction is the topsy-
`turvy farce of Microsoft lashing out at Amer-
`ica Online for refusing to makeits chat client,
`AOLInstant Messenger, interoperable with
`Microsoft's chat client, MSN Messenger.
`Microsoft, the champion ofopenness? Give
`mea break, At no point has Microsoft offered
`to open its own chat client to AOLor anyone
`else — opennessonly goes one way here.
`On the I-nternet,“openness” may be noth-
`ing more than a verbal cudgel wielded bythe
`public relations groupsin big corporations.
`Andyet, once in awhile something comes
`experience, and 24 x 365 support.
`along that really does open things upabit.
`If you want to speed things
`Onesuch technologyis Third Voice (www
`thirdvoice.com), a browser add-onthat lets
`anyonestick virtual Post-it Notes on any Web
`page,for the whole world to see.
`Third Voice has provoked strongreactions.
`The companyandits proponentscall the
`plug-in a powerful tool for free speech. Yet
`Web publishersare aghast that their Websites
`are getting“tagged” by Third Voicegraffiti.
`Nowadays, wheneverythingstarts with an
`“e,the Webitself almost seems passé. That's
`why’m glad there are still new technologies
`capable of provoking outrage and debate.
`Doesthe I-nternet really have revolution-
`ary potential left in it, or is it e-business as
`
`usual? Write to me at dylan@infowarld.cam.
`
`With a Cache databaselicense,
`you can speed up your development.
`[0 SPEED
`LICENSE.
`soeicst ata ave
`performance
`e+(ACHE
`Post:EcCMDatabare
`
`With Caché, the post-relational database,
`
`you can develop complex applications so
`fast it's like owning a “License to Speed."
`
`With advanced object and Web technologies,
`
`Caché can dramatically speed up your time-to-
`
`market, But Caché gives you more than a rapid
`
`application development environment.
`
`d ar
`pment
`
`Once deployed, Caché-based applications are
`
`so fast we've had customers get up to a 20x
`
`boost in SOL performance after switching their
`
`database, And without changinga singleline
`
`of application code.
`
`Do youstill peddle applications
`that run on a relational database engine?
`
`All this is made possible by Caché's
`multidimensional data server and applica-
`tion server, offering you multiple ways to
`
`access data, multidimensional storage
`
`architecture, scalable performance, plus
`richer technology for faster Web and
`
`object development.
`
`Caché comes from InterSystems, the
`
`leader in high-performance database
`systems, with over 2,000,000 licensed
`
`users worldwide, 20 years of database
`
`up, start by moving quickly tocall
`us at 1-800-753-2571. We'll rush infor-
`
`mation to you about the DBMS thatis so
`advanced, it won the "Best New Database
`of 1998" award.
`
`
`
`InterSystems
`
`E. CACHE
`
`Post-Relational Database
`
`www.LicensetesSpeed.com One Memorial Drive, Cambridge, Massachusetts 02142 1.800.753.2571
`CD iectipetenss Conpereten Ad rights reeereed Cachd are “Lacenee Tn fered’ are crateredtredenarts of inedyaters Corperenon
`
`5G INFOWORLD AUGUST 16, 1999 www.infoworld. com
`
`Petitioner Apple Inc.
`
`- Ex. 1064, p. 3
`
`Dylan Tweney is the content development
`managerfor the InfoWorld Web site. He has
`been writing about the Internet since 1993,
`
`Petitioner Apple Inc. - Ex. 1064, p. 3
`
`
`
`
`
`
`
`Petitioner Apple Inc. - Ex. 1064, p. 4
`
`It practically floats.Weighing just 3.1 pounds and measuringless
`than one inch thin, our newsvelte Compaq Armada M300 was
`truly designed to meet the needs of your mostfrequenttravelers.
`Built with Intel’ mobile processors, its performance is anything
`but lightweight. An optional Mobile Expansion Unit
`‘nitel
`frees yourtravelers from having to deal with the hassle
`celeron-TTTTree
`Pagettnen
`of wires. While a choice of commondocking solutionsoffers youflexibility and investment
`protection. And,like every Armada,it features Intelligent Manageability that simplifies network
`management. No wonderour whole Armadalinehasliterally flown off the shelves. Any
`questions? Call 1-800-AT-COMPAQ.Orvisit us atwww.compaq.com/armada.
`COMPAG. Better answers:
`
`Armada M3o0 Series at $1,999°
`+ 3.1 lbs, 0.9" thin - Intel” Mobile Celeron” processor 333 MHz » 11,3" color TFT display
`+ 4. GB" Hard Drive « 6q MB RAM = 56K V.go integrated modemt« Optional Mobile Expansion Unit
`
`Petitioner Apple Inc. - Ex. 1064, p. 4
`
`
`
`It’s whytheynever
`seem to callanymore
`
`
`
` Symantec Mobile Esse 7
`
`
`
`
`
` Now, mobile professionals can instantly set up
`
`
`
`
`
`in multiple locations, with a single click.
`INTRODUCING THE NEW CORPORATE EDITION OF SYMANTEC MOBILE ESSENTIALS
` Supporting a
`large mobile workforce can wreak havoc on a
` help desk. For one thing, users call at all hours from all around the
` world asking for help adjusting network and
`
` IP settings. Face it, manually adjusting to new
`
`
`sites can be a real problem for even savvy users.
` But with the new corporate edition of Symantec Mobile
`
` Essentials” 2.0, you can centrally create and deploy an unlimited
`
` number of location profiles that will automatically re-set users’
`
` laptop configurations to new locations witha single click.
`
` And that’s true whether they're logging on from Bombay,
`
` working in the Boston office, or telecommuting from home. Call
`
` today for more information,
`to be ready for the June release of
` Symantec Mobile Essentials.
`It’s one more way Symantec helps
`
`
` maximize user productivity and minimize support from IT.
`
`
`SYMANTEC,
`
`Call us at 1-800-745-6054, ext. 9E87 orvisit
`
`
`www.symantec.com/mobileessentials
`
`for a FREE white paper and a special trialware previewedition.
` Offer valid only in the United States, Syrnantec and the Symantec logoare US registered trademarks and Symancec
`EST
`
`Petitioner Apple Inc. - Ex. 1064, p. 5
`
`Mobile Essentials is a trademark of Symantec Corporation, All other brand names and trademarks are the property
`of their respective owners. © 1909 Symangec Corporation. All rights reserved
`
`Petitioner Apple Inc. - Ex. 1064, p. 5
`
`
`
`Advertising Supplement
`
`S
`
`ie
`
` a |
`
`ENTERPRISE CONNECTIONS
`
`atFOR PRIMETit
`
`Petitioner Apple Inc. - Ex. 1064, p. 6
`
`
`
`
`
`Check Point.
`With more than 27,000 VPN installations
`and millions of remote VPN users.
`
`CHECK POINT
`
`
`
`Petitioner Apple Inc. - Ex. 1064, p. 7
`
`
`
`Advertising Supplement
`
`—____ AAAAAAAA
`
`
`Th
`
`REALITY
`
`OF VIRTUAL PRIVATE NETWORKS
`
`
`
`
`WHATTYPE OF
`VENDOR DO USERS
`CH OOSE FOR VPN 5
`
`
`IRTUAL PRIVATE NETWORKS (VPN) solve a number of
`networking challenges. These include greater security
`for communications across the network, the ability to
`quickly deploy additional users and locations, converging a
`number of enterprise communications capabilities, plus supporting
`a number ofstrategic applications, such as electronic commerce,
`voice and video conferencing, telecornmuting, and remote access.
`The positive effects that
`that can lead the network
`VPNs can have on an organi-
`manager down that positive
`Fathon can be dramatic, ac-
`path, These inchede:
`intranets:
`for commu-
`cording to VPN equipment
`fication between various cor-
`vendor Check Point Software
`porate
`departments
`and
`Technologies Lid. of Red-
`wood City, Calif. These posi- co
`branch offices
`tive effects may include: an
`Service
`= Remote access: to keep
`increase in sales, accelerated
` eweare
`the remote of mobile em-
`product development cycles,
`wane fl
`ployee connected with home
`base
`and strengthened strategic
`Not sure
`= Extranets
`for connee-
`partnerships. Prior ta the ad-
`10
`tivity between a corporation
`vent of VPNs,
`if additional
`0
`communication
`facilities
`eee
`and its business partners,
`were needed, the network manager had one option:
`customers, and suppliers
`Call the telephone company and order up rere
`leased lines. Not only was thisan expensive solution
`in-many cases, but the associated lead times forin-
`
`20
`
`30
`
`40
`
`50 40 70%
`
`ARE VPNs MORE VIRTUAL OR REAL?
`Are VPNs truly the holy grail that net managers have
`
`Petitioner Apple Inc. - Ex. 1064, p. 8
`
`
`
`Advertising Supplement
`
`AAAAUAAAA,
`
`defined in REC 2411. Note that the
`
`,
`
`ig
`Key
`
`
`
`THE |? Sent)Y PROTOCOLS
`vost VPN vendors will throw 2409TheInternetKeyExchange—
`the term “IPsec” at thelr cus-
`(HE)
`tomers when discussing the
`2410 TheNULLEncryption
`capabilities of their products
`Algorithm and its use with
`and services. But what does thisPRE
`mean for the network manager?
`2417
`IP Security Document
`IPsec,shortforInternetPratocol See‘etasesh(lament
`Security Protocol Suite, provides
`2412
`OAKLEY Key
`privacy (the process ofencrypting
`Determination Process:
`the data) and authentication (the
`The inter-relationships of the
`process ofidentifyingthe originator
`above documents, plus the proto-
`ofthat data) for (P-based internet
`cols and algorithms thatare docu-
`mented within the IPsec suite, are
`works. The protacoly are docu-
`mented in a series of Request for
`security architecture document
`Comments (RFC) documents:
`CRETE RFC 2403) covers the general con-
`249) Security Architecturefor the
`of |Psec technologies. There
`Internet Protocol
`antwo: key protocols: the En-
`
`capsulatingSecurity Payload (ESP, ©)7"mt
`defined in RFC 2406), which pro-
`and RFC 2412).
`vides privacy, and the Authentica-
`Hit sounds like this és abotofma-
`within ESP and AH
`tion Header (AH, defined in RFC
`terial todigest, it is:The Internet En-
`2404 TheUseofHMAC-SHA.1-g6
`zqoz], which provides authentica-
`gineering Task Force labored for
`WeNESPaadAn
`
`2405 The ESP DES-CBC Cipher—tion. Variousalgorithms in support several years on these IPsec docu:
`Algorithm with Explicit IV=of the ESP and AH processes have ments. For starters, check out RFC
`2406iPEncapsulatingSecurity
`theirown documents (suchas RFCs
`2411 (the document roadmap] and
`
`+
`
`4
`
`2407 The Internet IP Security
`Domain of Interpretation for
`SeatsISAKMP...
`2408 Internet SecurityAssociation
`and Key Waar
`Py
`
`of Interpretation (DO1, defined in
`RFC 2407) decuments default val-
`wes and other specifications. The
`Key Management documents de-
`fine
`various
`key management
`schemes (see RFC 2408, RFC 2409,
`
`and then continue the research
`based on your network's specific se-
`curity requirements.
`All ofthese documents are avail-
`ableontheIETFWebsite:wwwileft.
` org/ric.himl.
`
`got it night? Should network managers re-architect
`their networking infrastructures one more time or
`stay with the tried-and-proven leased-line solutions
`forthe WAN connections?
`Network managers responsible for geographi
`cally dispersed systems, typically connected via low:
`speed links. and_.also lacking the staff or time to im-
`plement a peece-part solution, are food candidates
`for VPN technologies, according to john McConnell,
`president of McConnell Associates in Boulder, Cola
`
`a shared public network,” says Atul
`tions ower
`Kapoor, senior vice president and managing direc-
`tor of research and analysis for the Toly Group in
`Manasquan, Wj. “VPNs are a natural for the in
`tranet/estranet ape, and therefore should be with us
`as faras one can safely predict these things.”
`But given sucha broad definition ofVPM service.
`what networking challenges do end users count om
`this technology to solve? “For row, the top applica-
`tion by far is remote access to corporate network
`
`Petitioner Apple Inc. - Ex. 1064, p. 9
`
`
`
`Advertising Supplement
`
`AAAAAAAA
`
`
`
`
`“The real battle sions, additionallatency is nota
`consultancy, As security and per-
`in the VPN indus- major issue, But for real-time ap-
`formance issues are addressed
`plications, such as voice or
`little by lithe, Zines predécts
`more interestin site-to-site VFN try is guaranteed video, excess latency results in
`connectivity for heavy-duty ap.
`poor application performance,
`performance.”
`and ultimately, end-user dissat-
`plications, and eventually, same-
`isfaction with that service. And if
`day, all applications. “The goal
`for this technology is converged Eric lines, Telechoice the end users are unhappy, net-
`networks and applications,” so
` work managers know thatit is
`thal network managers can reap
`only a matter oftime before their
`the economic advantages and management bene-
`phone will start to ring,
`$0.4 little preventive medicine in the form af a
`fits of running everything over a single infrastruc-
`ture, Zines says.
`Service Level Agreement, or SLA,is typically includ:
`ed in the contract with the VPN provider, And if the
`HOW WELL D0 VPHs PERFORM?
`provider misses a performance bogey, there is typi-
`tally some type of sennce refund or credit given, as
`you ask most network managers to list their lop
`specified in the service contract, for the timethat the
`three concerns, the performance oftheir networks.
`network did not perform as advertised. But these re-
`is likely to bead thatlist. “The real battle in the VPN
`funds may be in the toc-little-too-late category,
`industry is guaranteed performance,” says Zines.
`Having some network management systems.
`“Availability and latency guarantees are nice, but they
`available to measure, and document, VPN perfor-
`SPONSORED Bt.
`don't cut itin a mission-critical emaron-
`marice can be ertical when it comes me to settle
`ment.
`up with the provider at the end of the month, Not
`veoraevttakCoen
`Much of this boils down to the qualie
`only should you know ifyou are getting what you pay
`chek oo ty of service, or QoS, and the measure:
`for, but whether what
`Hewlett-Packard
`‘Tents that go inte QoS determinations.
`you are petting is ad-
`“Unfortunately, there is still more quality
`THE IMPACT OF
`equate to meet your
`oflip service, as opposed to quality of service,” says
`
`Frank Henderson, chief technical officer ofthe Net: infrastructure=re:
`VIRTUAL PRIVATE
`Plex Graup, an loelin, N,J., consultancy,
`quirements, Hewlett
`NETWORKS ...
`Packard Co.'s Met-
`But one ofthe keys to cracking the VPN challenge
`on Leased Lines
`is to be well-armed with details concerning the
`work System Test
`Division has devel-
`specifics of your network, and how its various ele-
`ments are operating. In many cases, this boils down
`oped a number of
`scalable network test
`to a clear understanding of network performance
`metrics, which include network availability and la-
`solutions,
`ranging
`tency,
`from software-only
`systems that run un-
`Network availability is a ratio ofthe tinve that the
`der
`Windows
`network is operational, compared with the total time
`of the measurement period, and then expressed as
`95/93/INT,
`to fully
`a percentage. A number that is frequently tossed
`configured dedicated
`around ts 99.9999, or “five nines"ofnetwork avail-
`analyzers that sup-
`port both switched
`ability, which means that the service prowideris guar-
`and shared network
`antecing that the network will only go down .oor%s
`architectures,
`of the time, a very small amount that would take lit-
`The HP LAN An-
`erally years of measurements to accurately verify,
`Latency ia the delay, typically measured in mil-
`alyrer is a Windows-
`liseconds, to get from one location to another via the
`based
`protocol
`service provider's network. Typical latencies across
`analysis and: moni-
`
`on Connectivity
`@ Will VPNG enable pau commeetivity?
`
`Q. Will VENrepioce leased lines?
` Seed ont eaters Be fll eteet eeeeee
`
`Petitioner Apple Inc. - Ex. 1064, p. 10
`
`
`
`Advertising Supplement
`
`
`—______________ /AAAAAAAA
`
`SURFING FOR )-))-0)\1: WEB INFORMATION
`
`he Web ‘surfing" business is an
`extremely fickle one. Few kmow
`this better than Excite [nc.,
`which has expanded from its in-
`ception as a search engine to a point
`of presence for the Web, including
`search, a personal channelized front
`page, chat boards, communities, E-
`mail, and instant messaging.
`Since Excite has expanded its busi-
`ness model beyond the search en-
`gine by adding a variety ofnew ser-
`its users are creating new
`demands ondata availability. For Ex-
`cite, easily and automatically prop-
`agating index data from its single-
`source query server
`to remote
`read-only mirrors is essential.
`Eric Anderson, UNIX Systems
`Administrator at Excite, turned to
`VERITAS Software in Mountain
`View, Calif, with his network storage
`challonge, Anderson agreed to beta
`test VERITAS Storage Replicator for
`File Systems (SRFS) because au-
`tomation is keytoenablingthe cam-
`pany to go forward with its business,
`“Using SRFS will save time for our
`
`administrators and maintenance
`overhead. Currently we have one
`person spending about 20 hours
`maintaining the mirrors. Using
`SRFS, we may be able to reduce this
`to just two hours per week,” Ander-
`SON Says.
`Excite is testing SRFS to create
`and maintain up to 12 remote world.
`wide read-only mirrors ofits source
`query server index data.
`The company primarily uses Sun
`Solaris servers and arrays, Initially,
`Excite startedtesting with two Sun
`servers, and grew the configuration
`tothe currently used 10 Sun Eqooos
`with two SPARC storage arrayseach
`on the West Coast, and six on the
`East Coast. Query servers handle
`the search words typed by users an
`the Web. The query servers process
`the search words, and deliver a list
`of related concepts rather than just
`key words. The company has a set
`of“fetchers” that collect information
`from the Internet. That information
`is then updated and merged onto a
`120 GB volume database. The 120
`
`GB in Excite's database is being
`managed by the underlying file sys-
`tom. That merged information is
`then manually copied to a series of
`array servers, which the query
`Servers use to gather and post re-
`sults bo users,
`Using SRFS, the newly merged
`data set is then replicated over the
`Internetto Excite’s: designated hosts
`on the EastCoast, Anderson is hape-
`ful
`that SRFS will automate this
`process, saving time in the copying
`process that in turn will enable Ex.
`citeto deliver a quicker, more up-to-
`date index at all “local” locations.
`VERITAS Software is the de-fac-
`te standard for application sterage
`management, with over bo of the
`world’s leading servers and operat-
`ingsystems integrating its software.
`VERITAS provides these custorners
`with onterprise-class application
`storage managementsoftwaresolu-
`ions to manage the explosion of
`data and the growing complexity
`and scalability of networked envi-
`ronments that exist today. &
`
`Distributed software modutes, The distributed met-
`work analysis and management module is an ewcel-
`lent resource for VPN manapers with multiphe phys-
`ical locations an the network. This module enables
`the network manager to centrally view and tharhage
`all LAN Analyzer data collecthon resources on the
`network. Each manageable device appears with its
`
`UP, UP AND AWAY
`ssaaa Muivkgt Revenise
`
`00
`4,200
`
`600
`
`:
`
`IP address of user-defined name
`All of the troubleshooting and monitoring fea
`tures that are-available locally with HP LAN Analyz-
`er are-vallable for distributed deyvices.that are also
`part of the management systern. in the case where
`@ technician is on site at a remote location to help
`troubleshoot a problem, the Distributed module
`greatly minimizes the time to resolve a problem
`This module lets both the network manager and the
`local support technician stmiultaneously ew and an
`alyze the segment in question, The network manager
`and technician can then collaborate to solve the
`probler, thus optimizing the lime necessary to re
`store the network to full operational status,
`
`Petitioner Apple Inc. - Ex. 1064, p. 11
`
`
`
`Advertising Supplement
`
`AAAAAAAA,
`
`
`
`“The goal for this
`technology is
`converged networks
`and applications.”
`Eric Zines, Telechoice
`
`
`been scrambling oflate to
`make their products com-
`pliant with the recently pub:
`lished Internet Engineering
`Task Force (IETF) standards
`for Internet Protocol Securi-
`fy, or IPsec.
`According to IDC, lead:
`ing solutions and products
`for VPNs should incorporate
`the following key features:
`©The ability to transparently interface with ex
`isting local-area network services and infrastructure
`= Integration with firewalls
`Integration with public key infrastructures and
`digital certificates
`Encryption and security association hardware
`acceleration, either embedded in the system or of-
`fered as an optional add-on
`©The ability to interface with existing authentica-
`tion systems, management systems, and directories
`
`policies and performance-ori-
`ented quality-of-service (QoS)
`policies
`= Unique product sets for
`the enterprise and service
`providers.
`And with somecareful at-
`tention to network design,
`data throughput, security, and
`management schemes,
`the
`current VPN offerings promise bo meet and exceed
`the challenges of their leased-line predecessors, W
`
`Mark A. Miller PLE, (mark@diginet.corn) 1 pres:
`dent afDigiNet Comp., ¢ Denver-based intermetwork
`consultingfirm.
`nowOLD BYNT JOLUTIORG TEA
`DMECHOR HILARY CaELR
`BURR) MOET Tk CaitGeit aT
`RODCT MANAGER: #1) LAMBRA ASSOCIATES
`DESIGN; PORN CAMPCE- DERN ORPON
`MAWAGING EINTOR Alice mftes
`RCORUCTIOM: 00882 COILPOWLE/CHEeE COI
`eC1 ATW OOCOeS
`
`a
`WORLD
`oan
`
`
`
`=The ability to deal with both security-oriented
`
`
`
`If Your NetworkControl Center
`Looks Like This, HP Has the Perfect
`Troubleshooting Solution For You.
`Introducing the NEW HP LAN Analyzer.
`isa Windows” based network anadroer thot nus on ys
`mobebiks 1 oan helyeu thekbeshoot, moniior
`ene mae
`your (O°) Erhermet menor. Ir provices deunilest intar-
`iilion jibal neterk sindeies do find anil sehr probes, Gai
`boca prow wilh your nenwork,
`its prbomi uncer ©) io (1S
`het price) nef iS PronHEF
`Aurnye equiessithens
`
`
`
`www.hp.com)qo/lananalyzers
`
`heb pica tas illc
`your new HPLAN Analyzer
`Veit aner Wile
`citer auinal
`three >
` inkl iB
`PACKARD
`WT LASS Anecdyaest
`texckay
`ty HEWLETT
`
`Petitioner Apple Inc. - Ex. 1064, p. 12
`
`
`
` NTERPRISE COMPUTING
`SalesLogix offers flexible CRM
`
`> Customerrelationship managementsoftware
`
`i ks
`
`www.infoworld.com
`
`
`
`
`SALESLOGIX'S WORKGROUPCLIENT has a consistent,friendly interface
`that canbe personalized by system administrators or users,
`
` H
`
`Developers Den:
`Vacation contradiction
`Many people are taking some
`time off this summer. However, all
`too often, technology pros
`announcetheir time away from
`the office by saying thatthey will
`check voice mail and e-mail occa-
`sionally. Why can't some technol-
`ogy pros disconnect? Have you
`‘taken a vacation this summer, and
`if so, did you check e-mail or voice
`mail while you were away? Did
`you b