Windows 7 May Spur Virtual Desktops, On and Off the iPhone

Predictions from analysts and virtualization vendors that desktop virtualization will take off during 2010 may be off the mark. VMware, Citrix and a range of other companies are putting clients on smart phones, minimalist thin-client hardware and USB keys in an effort to find something about Virtual Desktop Infrastructures (VDI) that will hook a customer's imagination, says Andi Mann, head of systems and storage-management research at Enterprise Management Associates. "VMware and Citrix both announced support for the iPhone, which is sexier, even though Blackberries have a greater penetration in business," Mann says. "Virtualization on handhelds is a kind of halo project -like the Chevy Corvette that dazzles customers who come in and end up buying a Chevette." The Chevette, in this case, is the aging desktop PC or laptop used by any one of millions of corporate workers stuck with Windows XP and looking to upgrade to Windows 7 when it comes out later this year, says Chris Wolf, virtualization and infrastructure specialist at The Burton Group. "Windows 7 is going to drive a lot of the activity around desktop virtualization for companies that want or need to upgrade to Windows 7," Wolf says. Sales may take off, but the desktop PC may not have much to do with it.

Bulk migrations will take a long time, but many companies will at least begin moving users to the new OS within weeks or months, Wolf says, and will try to avoid spending the money it would take to upgrade every PC while they do it. [ For timely virtualization news and expert advice on strategy, see CIO.com's Virtualization Drilldown section. ] "Strategically, both Citrix and VMware have been planning that Windows 7 would be a major catalyst for desktop virtualization, and have been working toward it for a long time," Wolf says. Citrix Systems demonstrated its iPhone client in May. "Right now, it's a race to produce client-side hypervisors," according to Wes Wasson, chief marketing officer of Citrix Systems. "With that, [enterprise applications] are just a URL to the user. VMware announced more than a year ago that its VMware Infrastructure (VI) Client would run on the iPhone. You could be using a home-office PC or a Mac or a smartphone; as long as the client is there, you have secure access." Racing to an Anywhere Virtual Client Other software and hardware developers are also racing to build add-ons to make virtualization usable, and devices to make it easy to acquire. AppSense, whose code is part of both VMware and Citrix's VDI offerings, stores all that data and code on the server and reloads it all every time that user logs on, no matter through what device the access comes, according to Martin Ingraham, VP of strategy for the company. "We have to make it transparent across all the delivery technologies, so a user can set preferences on one, and go home and sign on using a different one, and have it exactly as they left it," he says.

The User Environment Manager from AppSense, for example, is designed to make a virtual desktop mimic the real thing by allowing end users to make changes, install software add photos, store cookies and do all the other things they'd do on an actual "personal" computer. Competitor Moka Five's desktop suite offers similar functionality adding the ability to personalize PCs and Macs without disturbing the "golden" PC image on which the company relies. It's just a hub to connect a keyboard, mouse, monitor and other peripherals to a Windows desktop image running in the data center. Thin-client manufacturer Pano Logic sells what it calls a "zero client" that has no CPU no operating system, drivers or moving parts. A starter kit of five, plus one remote USB key that can turn any computer into an authenticated thin client, starts at $1,989. LG Electronics is trying to streamline the hardware by building a thin client from NComputing a Pano Logic competitor directly into its SmartVine line of LCD monitors.

NComputing sells a range of mini- to micro thin computers. The 19-inch version retails for $199, can save 70 percent on maintenance, 60 percent on hardware and 90 percent on electricity compared to a PC, the company says. Big VDI Question: Management Tools "The hardware can really be anything, which is the great thing," according to Steve Bonney, vice president of business development at Bayscribe, a software developer that builds high-volume, server-based dictation systems for medical facilities. But questions about how to manage those assets, protect intellectual property, and even measure the amount of risk involved are holding many companies back. "The fundamental problem is not getting access to the application from a phone," Mann says. "We can do that with a Web application. Bonney is hoping VMware will push its client out on all the major phone operating systems to save his company development costs and show that even heavy duty applications work on very thin clients if the client is ubiquitous enough. "This will completely reshape the way enterprise IT is done," Wasson says of Citrix' client-side hypervisor. "It shifts the information flow model back to pull-so you're not pushing things at users they don't want, and it simplifies things for IT." Even without the fancy hardware, VDI can save a ton of money for IT in support, capital costs and licensing, Mann says. It's all about the manageability, without that, there's no question it's cool, but no one is really sure if it's practical." Follow everything from CIO.com on Twitter @CIOonline.

Akamai pitches Hollywood on its HD Network

Akamai Tuesday began pitching its new HD Network as the perfect solution for entertainment companies that want to deliver high-definition video streams over the Internet. During a live videoconference Tuesday, Akamai executives pitched the network to entertainment companies as a compliment for live TV and DVDs that would let content providers stream higher quality videos without the traditional problems of jitter and long buffer times that users regularly encounter. The CDN provider's new HD Network utilizes its HD EdgePlatform and combines it with digital video recorder technology and an adaptive bitrate streaming technology that adjusts users' delivery bitrates based on their network capacity. Separated at Birth: Tech Honchos and Their Famous Lookalikes "Our HD Network has been designed for large-scale broadcasters and studios," said Akamai CEO Paul Sagan. "Our goal is to meet and surpass the needs of the film and television industries… TV is now possible online at HD bitrates." Akamai cofounder and chief scientist Tom Leighton said that Akamai's HD Network had a unique advantage in delivering HD streams because it had roughly 1,000 servers located on networks' last miles in 750 cities around the world.

Users streaming content over the Akamai HD Network will be able to watch video using Flash, Silverlight and iPhone protocols. Leighton said that this access to the last mile has enabled Akamai to deliver content at a rate of 2Mbps or greater to two-thirds of users in the United States and at a rate of 5Mbps or greater to around a quarter of users in the United States. The network also features an HD content analytics that allow providers to monitor and understand who is accessing their content and an HD player based on the open source standard provider through the Open Video Player Framework.

Three-year-old Office patch stymies most attacks

Users running Microsoft Office can stump nearly three-fourths of all known attacks targeting the suite by applying just one three-year-old patch, according to recently published data. The flaw was fixed in the MS06-027 security update issued. Almost three-out-of four attacks - 71% of all those spotted in the first half of 2009 - exploited a vulnerability in Word that was patched in June 2006, Microsoft said in its bi-annual security intelligence report, released Monday.

The second-most popular exploit, with a 13% share, aimed at a bug that was quashed in March 2008, Microsoft said. The 2006 update patched Word 2000, Word 2002 and Word 2003, while the 2008 fix affected Excel 2000, Excel 2002, Excel 2003 and Excel 2007. Microsoft made the point that patching Office was as important as keeping Windows up-to-date with security fixes. "The majority of Office attacks observed in [the first half of 2009], 55.5%, affected Office program installations that had last been updated between July 2003 and June 2004," the company said in its report. "Most of these attacks affected Office 2003 users who had not applied a single service pack or other security update since the original release of Office 2003 in October 2003." Unfortunately, users are far less likely to update Office than they are to patch Windows. The flaw was one of seven patched by the MS08-014 update. According to Microsoft's data, the median amount of time since the last Office update was an amazing 5.6 years, compared to just 1.2 years since the last Windows update. "Users can keep Windows rigorously up to date and still face increased risk from exploits unless they also update their other programs regularly," Microsoft warned. They do what's required of them," he continued, hinting that they often do little more than that. "Windows' security has a high profile, and so they're patching Windows.

Wolfgang Kandek, the chief technology officer at security vendor Qualys, echoed Microsoft's take on Office patching patterns. "We see the same in our data," Kandek said. "People just don't patch Office, and when they do, they patch it much slower than Windows." That especially holds true in the enterprise. "This is a major security hole in the enterprise," Kandek said. "IT admins are not focusing on Office as they are on Windows. I don't think they're looking at Office, to tell you the truth." Qualys obtains its data from PCs that it manages for its clients, most of which are companies. Office 2007 SP2 hit the street in April 2009. Nine out of 10 Office exploits in the first half of 2009 involved a Trojan downloader, or backdoor malware. "These kinds of threats allow attackers to access compromised systems later to install more malware," Microsoft said. One way to stay up-to-date without patching every month is to apply the infrequent service packs that Microsoft issues for Office. "If the Office 2003 RTM users in the sample had installed SP3 [Service Pack 3] and no other security updates, they would have been protected against 98% of observed attacks," Microsoft said. "Likewise, Office 2007 RTM users would have been protected from 99% of attacks by installing SP2." Microsoft delivered Office 2003 SP3 in September 2007, fixing more than 450 bugs in the application suite, and adding other security measures, including file blocking of older formats, a move that confused users well into the following year. Microsoft urged Office customers to use the Microsoft Update service, a superset of the better-known Windows Update that pushes patches for Windows and Office.

Office was last patched Oct. 13 when Microsoft unveiled a record number of security updates and fixed flaws. Here, too, Kandek was stumped by Microsoft's practice of offering two separate update services. "I'm not sure why that's the way they do it," he said, speaking of Microsoft's providing Office updates to consumers and small businesses only through Microsoft Update. "I don't see why they simply can't replace Windows Update with Microsoft Update, and patch everything." Microsoft offers Office, as well as Windows patches, to businesses that use its Windows Server Update Services (WSUS) patch management system. The security intelligence report can be downloaded from Microsoft's site in PDF or XPS document formats.

AMD graphics chip shortage hitting PC vendors

An offshore Advanced Micro Devices Inc. foundry is having trouble ramping up on production of a new 40-nanometer graphics processing unit, forcing PC makers to delay shipments of desktop and laptop computers, AMD confirmed today. He added that the foundry is in full production but so far yields are below expectation. The Taiwan Semiconductor Manufacturing Company Ltd. (TSMC) is struggling to get up to speed manufacturing AMD's 5800 series, 40-nm GPUs (graphics processing units), according to Jim McGregor, an analyst at In-Stat.

Matt Davis, a spokesman for AMD, confirmed to Computerworld that TSMC is having issues in ramping up production of the chips. It's just a matter of trying to get TSMC to a point where they can yield. He added that it's not clear how far behind the foundry is on production expectations. "The design is sound. They're feeling the manufacturing crunch," said Davis. "We're a little bitter under yield but we're working back into a manufacturing schedule we want for these parts. They're getting a huge swing on this. TSMC can only kick them out so fast at this point." Davis said that PC vendors are being affected but declined to say how many vendors are feeling the pinch or which ones. "It's the end of the whip," he added. "[The vendors] are going to have a hard time." Davis also said AMD is working with TSMC on the issue and hopes to have production up to speed by year's end. "They haven't been producing these chips for long, so you'd expect some ramp issues," said McGregor. "AMD is being affected because these are great parts and they're getting a lot of demand.

When you have more demand for a product than expected and lower yields than expected, you get the perfect storm." McGregor said AMD has a little time to get manufacturing in line before PC vendors start looking for greener pastures and turn to a graphics chip from rival Nvidia . "It's not something you can move away from overnight," said McGregor. "They're set up for that GPU. They could switch over to Nvidia but it would take some effort. It will all depend on how bad the shortage gets." Dan Olds, principal analyst at Gabriel Consulting Group, said that if projections of slow tech sales, especially of high-end products, hold true, AMD should survive the production slowdown rather well. They could switch. If the economy was strong, and buyers were clamoring for desktops and laptops, a production slowdown would significantly hurt the struggling AMD . "If the problem goes on long enough, or gets worse, it may prompt system vendors to reexamine their decision or hedge with products using other suppliers," said Olds, who added that he expects AMD to rectify the problem soon. "It's not unusual to see low yields when a chip is shrunk to a smaller process. I would expect to see yields rise over time as the glitches get fixed, but that doesn't do AMD much good right now." But most of these problems are ironed out well before the product is introduced into the market, which ensures that there will be enough supply to handle demand.

NASA watching “perfect storm” of galactic cosmic rays

Astronauts and satellite integrated circuits are at most risk of an ongoing tempest of galactic cosmic rays that scientists say is at an all-time high. Cosmic rays cause showers of particles when they hit Earth's atmosphere but they pose their greatest health hazard, radiation, to astronauts in space. According to NASA's Goddard Space Flight Center, galactic cosmic rays come from outside the solar system and are made up of subatomic particles accelerated to almost light speed by distant supernova explosions.

They aren't too healthy for satellites either as a single cosmic ray can disable the unit if one hits an unlucky integrated circuit, NASA said. "In 2009, cosmic ray intensities have increased 19% beyond anything we've seen in the past 50 years," said Richard Mewaldt of Caltech in a release. "The increase is significant, and it could mean we need to re-think how much radiation shielding astronauts take with them on deep-space missions." Network World Extra:  Top 10 cool satellite projects 10 NASA space technologies that may never see the cosmos   NASA says the surge is being caused by what it calls a "solar minimum," a deep lull in solar activity that began around 2007 and continues today. Right now solar activity is as weak as it has been in modern times, setting the stage for what Mewaldt calls "a perfect storm of cosmic rays." Mewaldt also says the solar wind is flagging. "Measurements by the Ulysses spacecraft show that solar wind pressure is at a 50-year low, so the magnetic bubble that protects the solar system is not being inflated as much as usual." A smaller bubble gives cosmic rays a shorter-shot into the solar system. Researchers have long known that cosmic rays go up when solar activity goes down. Once a cosmic ray enters the solar system, it must "swim upstream" against the solar wind. Still the Earth is in no great danger from the cosmic bombardment. Solar wind speeds have dropped to very low levels in 2008 and 2009, making it easier than usual for a cosmic ray to proceed, he stated.

The planet's atmosphere and magnetic field combine to form a formidable shield against space radiation, NASA points out. The study, conducted by the National Academy of Sciences noted that besides emitting a continuous stream of plasma called the solar wind, the sun periodically releases billions of tons of matter called coronal mass ejections. Earlier this year a NASA-funded study looked to show some of the first clear economic data that quantifies the risk extreme weather conditions in space have on the Earth. These immense clouds of material, when directed toward Earth, can cause large magnetic storms in the magnetosphere and upper atmosphere, NASA said. One of the driving reasons for the study is that the sun, as we mentioned above, is currently near the minimum of its 11-year activity cycle but solar storms will increase in frequency and intensity toward the next solar maximum, expected to occur around 2012. Such space weather can impact the performance and reliability of space-borne and ground-based technological systems, NASA said.

Keep Your Passwords Private--and Handy--With LastPass

This fall, more than 20,000 stolen usernames and passwords for such Webmail providers as AOL, Gmail, Hotmail, and Yahoo appeared on Pastebin.com, a programmer's Website. Dixon removed the stolen info, which Microsoft and some security researchers theorize was gathered through phishing attacks. The Webmaster, Paul Dixon, wrote that "for reasons unknown," some "miscreants" posted the data on his site. A researcher at ScanSafe argues that the data may have come from password-stealing malware, not phishing.

They also want access to your Webmail. Either way, crooks clearly aren't after only bank accounts and other financial log-ins. But why? After her Hotmail account was hacked, every message she sent included an unwelcome advertisement. A friend of mine was recently hit by a scam, and her experience helps answer that question.

Crooks have also begun using stolen Webmail and Facebook accounts to send pleas supposedly from a victim to friends or contacts. Don't Pass the Password To guard against password thieves, I use LastPass. Some bogus messages claim the sender is stranded overseas and needs an urgent wire transfer of funds. The tool offers a free password-managing add-on for Firefox on Windows, Linux, or Mac OS X; Internet Explorer on Windows; and Safari on Mac OS X. An add-on for Google Chrome is under development. And because you don't type your password, keylogger malware can't capture your keystrokes and nab your password. LastPass fills in your username and password for verified sites that match a real URL; phishing scams that use similar but fake Web addresses won't deceive it.

Other apps, like Password Hash, offer similarly worth­while protection, but LastPass stores all of your data on its servers (using 256-bit AES encryption) as well as on your PC. Since the company never has the software decryption key or your password, nobody at LastPass can get to your info. Even without the add-on, you can log in to LastPass's site to get to your information. Because your data is stored centrally, you can use the add-on with any browser, log in with your LastPass master account info, and access all of your passwords. That means you should create a fairly complex master password for the LastPass site, but it also means you have a de facto backup if your PC goes kaput. For instance, it normally keeps you logged in to your LastPass account for two weeks, even if you close and re-open the browser; to prevent someone from sitting at your desk and accessing your accounts, click Preferences and check Automatically logoff after idle. Instant Entry The handy add-on can automatically log you in to sites and can fill in forms, but for better security you should change some of its default settings.

I set mine to log off my LastPass account after an hour. You can enable this when the add-on automatically asks if you want to save a newly entered password. It's also smart to require a password reprompt for sensitive accounts; the app will ask for your master password before filling in the username and password, even if you're already logged in. LastPass offers applications for the iPhone, BlackBerry and other mobile devices, too, but those will cost you $12 per year.

Check Point tackles Web 2.0 apps and social-site widget control

Soon businesses that run Check Point security tools will be able to understand how thousands of Web applications and Web 2.0 widgets are used, giving executives better control over what employees do with their computers at work. 12 tips for safe social networking The company is developing a software blade that customers can buy to address use of social Web sites and Web applications. With the blade, due out next year, businesses could see not only that employees use Facebook, but also whether they are participating in Facebook groups or playing games available through the site, for example. Check Point has licensed extensive libraries from FaceTime that identify 4,500 Web applications and more than 50,000 Web 2.0 widgets.

Or they could keep an eye on applications that do file transfers, Check Point says. Initially, Check Point plans to incorporate the libraries in a blade that is just a monitoring tool, but later it will incorporate them in a firewall to create an access-control blade that can enforce restrictions on the use of applications and widgets. Business use of Web 2.0 sites brings its own security concerns and can run afoul of regulations from governmental agencies and business consortiums. Later still, the company says it will incorporate the libraries into IPS and QoS blades. For instance, customers might buy firewall, intrusion-detection system and antispam software blades and run them on a single hardware chassis.

Under Check Point's software blade architecture announced earlier this year, customers can buy individual security tools to create packages of custom security features. Before, Check Point sold monolithic multi-function unified threat management platforms that might include more functions than customers wanted. The libraries support FaceTime's own Unified Security Gateway product.

Gmail, Yahoo Mail join Hotmail; passwords exposed

Google's Gmail and Yahoo's Mail were also targeted by a large-scale phishing attack, perhaps the same one that harvested at least 10,000 passwords from Microsoft's Windows Live Hotmail, according to a report by the BBC. Microsoft , for its part, said late yesterday that it had blocked all hijacked Hotmail accounts, and offered tools to help users who had lost control of their e-mail. The BBC also said it has seen a list of some 20,000 hijacked e-mail accounts; the list included accounts from Gmail, Yahoo Mail, AOL, Comcast and EarthLink. Gmail was the target of what Google called a large-scale phishing campaign, the company told the BBC . "We recently became aware of an industry-wide phishing scheme through which hackers gained user credentials for Web-based mail accounts including Gmail accounts," a Google spokesperson told the news network. The latter two are major U.S. Internet service providers. "As soon as we learned of the attack, we forced password resets on the affected accounts," the Google spokesperson also told the BBC. "We will continue to force password resets on additional accounts when we become aware of them." Neither Google's or Yahoo's U.S. representatives responded to e-mails from Computerworld seeking confirmation that their Gmail and Yahoo Mail services were targeted by phishers, or answers to questions about how many accounts had been compromised and what the firms are doing to help users.

Late Monday, Microsoft said it was blocking access to all the accounts whose details had been posted on the Web last week. "We are taking measures to block access to all of the accounts that were exposed and have resources in place to help those users reclaim their accounts," the company said on its Windows Live blog . Microsoft posted an online form where users who have been locked out of their accounts can verify their identity and reclaim control, and also pointed users to a support page from October 2008 that spells out steps users can take if they think their accounts have been hijacked. Neowin.net, the site that first reported the Hotmail account hijacking early Monday, today added that it had seen the same list of compromised accounts as the BBC. "Neowin can today reveal that more lists are circulating with genuine account information and that over 20,000 accounts have now been compromised," said the Windows enthusiast site . "[The] new list contains e-mail accounts for Gmail, Yahoo, Comcast, EarthLink and other third-party popular Web mail services." Microsoft has acknowledged that log-on credentials for "several thousand" Hotmail accounts had been obtained by criminals, probably through a phishing attack that had duped users into divulging their usernames and passwords. After a slump earlier this year, phishing attacks are on the upswing, according to the Anti-Phishing Working Group (APWG). Its most recent data - for the first half of 2009 ( download PDF ) - noted that the number of unique phishing-oriented Web sites had surged to nearly 50,000 in June, the largest number since April 2007 and the second-highest total since the industry association started keeping records. Yesterday, Dave Jevans, the chairman of APWG, called the Hotmail phishing attack one of the largest ever, but cautioned that the usernames and passwords may have been harvested over several months, and not by a single, defined attack.

Users nervous about Oracle's acquisition of MySQL

The European Union is not the only one antsy about Oracle taking possession of the open source MySQL database should the commercial database giant's merger with Sun Microsystems get final approval. On its Web site, Oracle merely notes that "MySQL will be an addition to Oracle's existing suite of database products." "I wish that Oracle would broadcast its intentions a little bit more" on the Sun acquisition, says Duane Kimble, a Linux technologist who works in the banking industry. So are MySQL users. (The E.U.'s executive arm has held up approval of the merger, fearing that Oracle's acquisition of MySQL could reduce competition in the database market, as well as harm the open source nature of MySQL. Sun's stockholders and the U.S. Justice Department have approved Oracle's $7.4 billion acquisition of Sun.) "We've got a fair number of databases and Web applications that use those databases in MySQL. If Oracle does something that sort of makes it look like MySQL's days are numbered or something is going to change that we don't like, we'll probably look at alternatives," says Ernest Joynt, a contractor for the National Oceanic and Atmospheric Administration. [ Relive Sun's storied history in InfoWorld's slideshow "The rise and fall of Sun Microsystems." | Learn why attendees at the JavaOne conference were skeptical of Oracle's buyout of Sun. ] Anand Babu Periasamy, CTO of clustered storage technology company Gluster, expresses doubts that Oracle would add enterprise capabilities to MySQL. "I hope that they will retain MySQL. [But] I am doubtful [that] they will ever improve MySQL to take it mid-enterprise level, but at least it will help them compete with Microsoft SQL Server on the low end," he says. (Gluster uses MySQL for its Web site operations.) Thus far, Oracle has said little about its intentions for MySQL and declined to discuss the issue with InfoWorld. For him, Oracle's ownership of MySQL is a specific cause for caution.

His firm has begun looking at other enterprise-scale open source databases such as EnterpriseDB's Postgres database in case it has to replace MySQL. Standing to reap a harvest from unease about the Oracle-MySQL pairing are open source database vendors EnterpriseDB and Ingres. MySQL users start looking at alternatives A key issue is that Oracle is a main competitor to MySQL, notes Timothy Dion, CTO of mobile and Web apps builder Sensei. "I'm very concerned about what that means," he says. EnterpriseDB, which builds its products on the PostgreSQL open source database, has been hearing from concerned MySQL users, says Larry Alston, EnterpriseDB's vice president of product management and marketing. "They're telling us that they're nervous" about the future of MySQL, he says. Doubts remain over the fate of other Sun technologies Users remain concerned over the fate of other Sun technologies such as Java and Solaris, not just of MySQL. "We are rethinking our Solaris deployments," says Linux technologist Kimble. "We are moving swiftly toward more of an AIX and Linux environment, depending on the size or the scale of the project." Although Kimble notes it is "too early to say whether we'll move off [Solaris] or not," he does say his employer is rethinking its Solaris commitment: "Certainly, we're not going full-bore with Solaris as we were before the merger." Kimble does see a positive side to the Sun acquisition: "I think it kind of simplifies the platform offering somewhat. Ingres also sees opportunities. "The phones ring a lot," says Ingres CEO Roger Burkhardt. Oracle is a strong company and if they keep Sun Java, which I'm sure is what they bought [Sun] for, I think it will make Java a better product." But Bryce Pier is not so sure.

Another large company buying another large company reduces competition," he says. The senior systems engineer at Target sees no benefits of the buyout - at least not yet. "I'm not really certain that it's going to be good for anybody. Pier expects the acquisition to cause Target to move away from Solaris to Red Hat's Linux over time. Oracle, said Craig Muzilla, Red Hat's vice president for middleware, was very active in the Java Community Process for updating Java and has strived for openness in Java. "We don't see anything from Oracle that [would indicate that] they would do anything" that would differ with the past, he said. One reason is the uncertainty: "We're just not sure what Oracle's commitment is going to be to the Java stack and to maintaining it as an open source project." Another is Oracle's reputation for extracting revenues from customers: "We certainly fear that all of the subscription fees are going to change for everything from Sun." At its recent conference, Red Hat sought to reassure customers about the continued openness of Java-based JBoss technology, which Red Hat owns, now that Oracle is buying Java founder Sun.

Microsoft Internet Explorer SSL security hole lingers

Microsoft still does not acknowledge a weakness in its Internet Explorer browser that was pointed out seven weeks ago and enables attackers to hijack what are supposed to be secure Web sessions. If Microsoft doesn't fix the problem, Apple can't fix it on its own, Apple says. The company says it is still evaluating whether the weakness exists, but Apple, which bases its Safari for Windows browser on Microsoft code, says Safari for Windows has the weakness and the Microsoft code is the reason.

Apple has fixed the problem for Safari for Macs. Once our investigation is complete, we will take appropriate action to help protect customers," a Microsoft spokesperson said via e-mail. "We will not have any more to share at this time." The weakness can be exploited by man-in-the-middle attackers who trick the browser into making SSL sessions with malicious servers rather than the legitimate servers users intend to connect to. Black Hat's most notorious incidents: a quiz "Microsoft is currently investigating a possible vulnerability in Microsoft Windows. Current versions of Safari for Mac, Firefox and Opera address the problem, which is linked to how browsers read the x.509 certificates that are used to authenticate machines involved in setting up SSL/TLS sessions. The attacks involve getting certificate authorities to sign certificates for domain names assigned to legitimate domain-name holders and making vulnerable browsers interpret the certificates as being authorized for different domain-name holders. In July two separate talks presented by researchers Dan Kaminski and Moxie Marlinspike at the Black Hat Conference warned about how the vulnerability could be exploited by using what they call null-prefix attacks.

For instance, someone might register www.hacker.com. In that case, the authority would sign a certificate for bestbank.hacker.com, ignoring the sub-domain bestbank and signing based on the root domain hacker.com, Marlinspike says. In many x.509 implementations the certificate authority will sign certificates for any request from the hacker.com root domain, regardless of any sub-domain prefixes that might be appended. At the same time, browsers with the flaw he describes read x.509 certificates until they reach a null character, such as 0. If such a browser reads bestbank.com\0hacker.com, it would stop reading at the 0 and interpret the certificate as authenticating the root domain bestbank.com, the researcher says. An attacker could exploit the weakness by setting up a man-in-the-middle attack and intercepting requests from vulnerable browsers to set up SSL connections.

Browsers without the flaw correctly identify the root domain and sign or don't sign based on it. If the attacking server picks off a request to bestbank.com, it could respond with an authenticated x.509 certificate from bestbank.com\0hacker.com. The user who has requested a session with bestbank would naturally assume the connection established was to bestbank. The vulnerable browser would interpret the certificate as being authorized for bestbank.com and set up a secure session with the attacking server. Once the link is made, the malicious server can ask for passwords and user identifications that the attackers can exploit to break into users' bestbank accounts and manipulate funds, for example, Marlinspike says. These certificates use an asterisk as the sub-domain followed by a null character followed by a registered root domain.

In some cases attackers can create what Marlinspike calls wildcard certificates that will authenticate any domain name. A vulnerable browser that initiated an SSL session with bestbank.com would interpret a certificate marked *\0hacker.com as coming from bestbank.com because it would automatically accept the * as legitimate for any root domain. Such a wildcard will match any domain, he says. This is due to "an idiosyncrasy in the way Network Security Services (NSS) matches wildcards," Marlinspike says in a paper detailing the attack. The differences between what users see on their screens when they hit the site they are aiming for and when they hit an attacker's mock site can be subtle.

A Microsoft spokesperson says Internet Explorer 8 highlights domains to make them more visually obvious, printed in black while the rest of the URL is gray. "Internet Explorer 8's improved address bar helps users more easily ensure that they provide personal information only to sites they trust," a Microsoft spokesperson said in an e-mail. The URLs in the browser would reveal that the wrong site has been reached, but many users don't check for that, Marlinspike says. Marlinspike says the null character vulnerability is not limited to browsers. "[P]lenty of non-Web browsers are also vulnerable. Outlook, for example, uses SSL to protect your login/password when communicating over SMTP and POP3/IMAP. There are probably countless other Windows-based SSL VPNs, chat clients, etc. that are all vulnerable as well" he said in an e-mail.

Ncomputing kit talks to virtual desktops over USB

Ncomputing is launching a device that can be used to add a virtual client to a host PC via a USB connection. Multiple U170 boxes can add extra users to a host machine, which can be cheaper than buying separate machines, said Carsten Puls, vice president of strategic marketing at Ncomputing. The U170 can run full multimedia applications when it is connected to a host machine's USB port. The device has a video port, audio port and two USB ports for the keyboard and mouse. "The only thing you have to connect back to the PC is a single USB connection," Puls said.

Users must still buy a monitor and peripherals to complete a workstation. The device is priced at US$99 and will be available by the end of the year, Puls said. Beyond reducing the need for a PC, the device also helps reduce energy costs, Puls said. Virtual desktop software from Ncomputing called Vspace on host machines sets up individual desktops as new U170 boxes are connected. It draws about 2 watts of power, Puls said, far less than a full clients PC. In this case, the USB cable takes the place of the Ethernet cable for a client to communicate with a host machine. One host PC can support up to four boxes.

The typical USB cable extends up to five feet, but USB extenders can lengthen that. Vspace is compatible with multiple versions of Windows, including Microsoft's upcoming Windows 7 OS. The company is targeting small-and-medium businesses with the device. The company has set up configurations where the device connects to PCs from up to 50 feet. The company has other products that let users access host PCs over Ethernet. USB has advantages as the ports are included on most PCs, but over longer distances it may be better to use Ethernet, Puls said.

Hackers exploit year's fourth PDF zero-day

For the fourth time this year, Adobe has admitted that hackers were using malicious PDF documents to break into Windows PCs. The bug in the popular Reader PDF viewer and the Acrobat PDF maker is being exploited in "limited targeted attacks," Adobe said yesterday. Adobe promised to patch the vulnerability on Tuesday, Oct. 13, the same day that Microsoft plans to issue its biggest-ever collection of security updates . The bug exists in Reader and Acrobat versions 9.1.3 and earlier on Windows, Mac OS and Linux, said Adobe in a security advisory published Thursday, but as far as the company knows, it is being exploited only to hijack Windows PCs. "There are reports that this issue is being exploited in the wild in limited targeted attacks," said Adobe. "The exploit targets Adobe Reader and Acrobat 9.1.3 on Windows." Adobe will plug the hole next week as part of its quarterly security update for Reader and Acrobat. That phrasing generally means hackers are sending the rigged PDF documents to a short list of users, oftentimes company executives or others whose PCs contain a treasure trove of confidential information. Last June, Adobe announced it would follow the lead of companies like Microsoft and Oracle, and release regular security updates for Reader and Acrobat.

It said more than a month ago that it would instead push the patch date into October. Originally, Adobe was to post patches last month, but a scramble during July to fix several flaws, including some introduced by Microsoft in a code "library" used by its own developers, as well as those in other companies, wreaked havoc on Adobe's schedule. Until a patch is released next week, Windows Vista and Windows 7 users can protect themselves by enabling Data Execution Prevention (DEP), a security feature designed to stop some kinds of exploits - buffer overflow attacks in particular - by blocking code from executing in memory that's supposed to contain only data. Windows XP users should disable JavaScript in Reader and Acrobat, added Adobe. Instructions on how to enable DEP are available on Microsoft's support site.

That wouldn't block all possible attacks, but will stymie the exploit now in the wild. In March, the company quashed a PDF bug that attackers had been using for more than two months . It again patched Reader and Acrobat in May to block another zero-day . In July Adobe fixed a Flash PDF-related flaw that was being used by hackers. Adobe has struggled this year to stay ahead of hackers. Next Tuesday's Reader and Acrobat updates will also patch a unknown number of other vulnerabilities, Adobe said.

Malware Threat Emanates from Growing Unemployed Ranks

Looking at the statistics, February was a positively brutal month for workers being idled. There were 2,769 mass layoff actions putting throwing 295,477 out of work. Last Friday, the Bureau of Labor Statistics (BLS) released the ugly numbers. That's 542 mass layoff actions more than January and 57,575 laid off.

The BLS only obliquely breaks out what could represent IT workers as "professional and technical services." Not surprisingly, manufacturing bore the brunt of February's layoffs accounting for 47% of the unemployment claims, but IT folks could represent a small piece in all the 19 industry sectors that BLS follows. I wondered how many of those were IT people and what percentage might turn to cyber crime. Suffice it to say there's plenty of IT folks with little or nothing to do. The story explores how idled workers in China are turning to cyber crime. That out of work IT professionals turn to cyber crime should come as no surprise so the headline China becoming the world's malware factory on top of an IDG News service is to be expected.

Everyone needs to be vigilant (but not turn into vigilantes). Indeed, a story at Chief Security Officer cites a Symantec study that says 98 percent of organizations suffer "tangible loss" as the result of cyber crime (more than a little self-interest on Symantec's part should be noted). With the third variant of the Conficker worm set to strike on April 1, take the message of vigilance to heart (let's hope it's as tepid as Y2K). By the way, the BBC reported this morning that the U.K. Government is monitoring social networking sites like Facebook to "tackle criminal gangs and terrorists." That's vigilance of a controversial nature. It's obvious: the latter. Is this just another day in the cyber jungle or is the cyber crime problem exacerbated by the expanding ranks of the idled? So if you want to freshen up your knowledge of malware, check out the many primers on the subject. I like Wikipedia's or check out the Chief Security Officer web site.

ProMOS plans to sign R&D pact with Taiwan Memory

ProMOS Technologies may soon sign a deal to work on DRAM manufacturing technology with Taiwan Memory Company (TMC), the government-sponsored entity designed to take over debt-ridden DRAM makers in Taiwan. "We have reached a mutual understanding to start working with them," ProMOS vice president Ben Tseng said by phone on Monday. ProMOS has been manufacturing DRAM in Taiwan since 1996 and was the first company on the island to run a factory making chips on 12-inch wafers. The cooperation will begin with research and development work, but Tseng says ProMOS is hopeful it will turn into a manufacturing partnership as well. "It only makes sense," he said. "Once the R&D is done, then you do the manufacturing on the same site." TMC could not immediately be reached for comment.

TMC is a brand-new company designed by the government to bail out its heavily indebted DRAM makers. DRAM prices have rallied over the past several months, recently hitting profitable levels for most DRAM companies. Taiwan's five big DRAM makers ran into financial trouble amid the global recession and after suffering two years of losses caused by a massive chip glut. Before ProMOS and TMC can enter an agreement, TMC needs to finalize its funding plans. The company slashed production as the DRAM downturn bit, and is currently producing chips on fewer than half of its production lines. The Taiwan government has discussed investing NT$30 billion (US$925.9 million) in the new company, while TMC chairman John Hsuan has said private investors will also be invited to put money into TMC. ProMOS needs money to move forward.

It has used up most of its cash paying off debt. The coming launch of Microsoft's new operating system, Windows 7, has stirred demand for new PCs and they need DRAM chips inside. New funds from TMC would help ProMOS reopen closed factories just as DRAM prices are hitting profitable levels. Tseng said his company must also soon decide whether to invite workers back full time after keeping some on unpaid leave for months due to the global recession. Once the company ends the unpaid leave, however, it will have to start paying full salaries again. Under Taiwanese labor law, companies putting workers on unpaid leave must do so for fixed periods of months at a time, but ProMOS may need them back quickly to ramp up factory lines if it signs a deal with TMC soon.

Microsoft shows off Bing tool for measuring ad effectiveness

Microsoft on Monday demonstrated a new tool for its Bing search engine that will allow advertisers to measure the effectiveness of their ads with online users. Mehdi pointed out that statistics show that 39 percent of Web users do 65 percent of the online searches, so it would be beneficial for advertisers to see which of those "heavy users" are targeting certain ads, versus which ads are favored by "light users." The tool Microsoft created shows where the interest in a marketing or advertising campaign is specifically coming from, he said. Speaking at the IAB MIXX Conference and Expo 2009 in New York on Monday, Yusuf Mehdi, senior vice president of Microsoft's Online Audience Business group, showed off what he called a "user-level targeting" tool that allows Microsoft to see which search-based ads that appear in the Bing search engine are getting the most traffic and from where. "What we're doing with Bing for vigorous measurement is we're matching the exact ad online with the exact user," he said. This measuring ability for Bing was demonstrated as part of Mehdi's presentation, in which he discussed how Microsoft is applying lessons it's learned from studying advertising campaigns and creating technology to reflect that learning.

You have to pick and focus." Microsoft revamped and rebranded its Live Search engine "Bing" in June, and making it more effective for search advertising is something the company continues to work on, Mehdi said. One of those lessons was what he characterized as "relentless measurement and optimization" to find out what ads are most effective so they can be better targeted to their proper audience. "One of the big things is trying to build a loyal fan base for the product," he said. "You can't just go out and put your message everywhere. It was unclear from Mehdi's presentation whether this technology is available for advertisers using Bing today or whether it's just something Microsoft is using internally. This kind of ability to measure what kinds of online advertising is working with users is becoming essential as more and more business is being done on the Web. A representative from Microsoft's public relations firm, Waggener Edstrom, declined to answer follow-up questions about the technology or his presentation. In fact, Microsoft competitor Adobe Systems - an executive from which spoke before Mehdi on Monday - last week said it was purchasing Web analytics company Omniture to build measuring technology directly into Adobe's tools for creating online media.

Report: Apple to unveil new iMacs by mid-October

Apple will refresh its iMac desktop computer within a matter of weeks and will unveil the first revamp of the all-in-one's exterior since mid-2007, a prominent Apple enthusiast site reported Thursday. But details are few and far between. According to AppleInsider , Apple will introduce new iMacs sporting a new enclosure "anytime between next week and mid-October." Taiwanese manufacturers have been producing the redesigned iMacs for the past two weeks, sources told the Web site, and other clues, including $100 to $200 discounts on existing models to volume customers, point to an imminent release, said AppleInsider. Although the site said its sources claimed the redesigned iMacs will sport a thinner design, perhaps one that mimics the look of Apple's LED-backlit Cinema Display line introduced last December, information about other enhancements, tweaks and additions was scanty.

The last time Apple updated the iMac was in early March 2009, when the company doubled the amount of RAM, increased storage space and dropped in faster Intel Core 2 Duo processors while keeping prices stable for all but one model, the least-expensive 24-in. One possibility: an internal Blu-ray optical drive. iMac. But they split on whether the timing is on the mark. "Apple's desktops, as a percentage of their total [system] sales, continue to decline," said Stephen Baker, an analyst with retail research firm NPD Group. At the time, one analyst called the refresh "underwhelming" and "exactly what you'd expect from Apple, more stuff for the same price." The recent gossip of upcoming new iMacs got the attention of a pair of industry analysts, who agreed that an iMac overhaul is long overdue.

Baker said the talk of an iMac refresh made sense because of the long stretch since the line last saw a redesign, and because Apple would like to give its desktops a chance to compete with laptops, long its strength. Apple currently sells the one 20-in. He also suggested that Apple would be smart to cut prices of its iMacs, rather than take its traditional approach of keeping prices flat while beefing up the components' specifications. "The pricing for iMacs is almost the same as for Apple's notebooks," he observed. iMac model at $1,199, and the three 24-in. configurations at $1,499, $1,799 and $2,199. In comparison, the company's MacBook Pro line of laptops are priced between $1,199 and $2,499. Ezra Gottheil, an analyst with Technology Business Research, however, was skeptical of a September or October refresh. "I think it looks likely that Apple will do this, but not until early 2010," Gottheil said, noting that virtually every major component in the desktop systems had been upgraded in March. In the second calendar quarter, Apple sold 2.6 million Macs, 4% more than the same quarter the year before . Only 849,000, or 34% of that total, however, were desktops, which the iMac dominates.

He also cited Apple's strong sales during the recession as another reason why the company wouldn't feel pressured to retool the line. That was down 10% from the 943,000 desktops sold in the same period of 2008. Gottheil also hedged his bet. "The iMac is the longest in the same box," he said, referring to its case design while and acknowledging anything's possible from the Cupertino, Calif.-based computer maker. "Apple is completely unpredictable." Another hint that Apple may do the unpredictable comes from history's timeline: Last year, Apple unveiled the new "unibody" design for the MacBook Pro in mid-October. According to the guide, the iMac has been updated every 220 days, on average, since it's 2003 introduction. Also worth noting is the MacRumors Buyer's Guide , which tracks the product cycles of Apple's hardware, and makes recommendations based on the average time between refreshes. As of Thursday, 203 days had passed since the March 2009 revamp. "Buy only if you need it - approaching the end of a cycle," the buyer's guide warns.

Gartner: Turn server heat up to 75

Data center managers should turn server temperatures up to 75 degrees Fahrenheit, and adopt more aggressive policies for IT energy measurement, Gartner says in a new report.  Five tools to prevent energy waste in the data center After conducting a Web-based survey of 130 infrastructure and operations managers, Gartner concluded that measurement and monitoring of data center energy use will remain immature through 2011. Only 7% of respondents said their top priorities include procurement of green products and pushing vendors to create more energy efficient technology. In a troubling sign, 48% of respondents have not yet considered metrics for energy management. In general, data center managers are not paying enough attention to measuring, monitoring and modeling of energy use. "Although the green IT and data center energy issue has been on the agenda for some time now, many managers feel that they have to deal with more immediate concerns before focusing attention on their suppliers' products," Rakesh Kumar, research vice president at Gartner, said in a news release. "In other words, even if more energy efficient servers or energy management tools were available, data center and IT managers are far more interested in internal projects like consolidation, rationalization and virtualization." About 63% of survey respondents expect to face data center capacity constraints in the next 18 months, and 15% said they are already using all available capacity and will have to build new data centers or refurbish existing ones within the next year. Gartner issued four recommendations for improving energy management: • Raise the temperature at the server inlet point up to 71 to 75 degrees Fahrenheit (24 degrees Celsius), but use sensors to monitor potential hotspots. • Develop a dashboard of data center energy-efficient metrics that provides appropriate data to different levels of IT and financial management. • Use the SPECpower benchmark to evaluate the relative energy efficiency of servers. • Improve the use of the existing infrastructure through consolidation and virtualization before building out or buying new/additional data center floor space.

CDW surveyed 752 IT pros in U.S. organizations for its 2009 Energy Efficient IT Report, finding that 59% are training employees to shut down equipment when they leave the office, and 46% have implemented or are implementing server virtualization. In addition to Gartner's report, a recent survey by CDW illustrates trends related to data center efficiency. The recession has helped convince IT organizations of the financial value of power-saving measures, with greater numbers implementing storage virtualization, and managing cable placement to keep under-floor cooling chambers open and thus reduce demand on cooling systems. Data center managers are finding it easier to identify energy efficient equipment because of the Environmental Protection Agency's new Energy Star program for servers. CDW found that 43% of IT shops have implemented remote monitoring and management of their data centers, up from 29% the year before. But data centers are still missing many opportunities to save money on energy costs. "Energy reduction efforts are yielding significant results … Still, most are spending millions more on energy than necessary," CDW writes. "If the average organization surveyed were to take full advantage of energy-savings measures, IT professionals estimate they could save $1.5M annually." Follow Jon Brodkin on Twitter 

It's hard to find anyone who likes audio conferences. Or play Facebook Scrabble and check e-mail until it's their turn to talk. Sure, worker bees can put themselves on mute to chat with fellow cube dwellers.

Yes, for true lows in productivity, the fuzzy, disembodied, dial-in audio conference is hard to beat. Office voice mail, cell phone voice mail, office e-mail, personal e-mail, texting, instant messaging, social media communiques. And what about all those mail and messaging systems anyway? Make it stop, you cry! At its most basic, UC makes real-time communication systems, such as instant messaging, share information with non-real-time systems, such as e-mail or voice mail, and runs them over the same network. Unified communications won't do that, but depending on which communications and messaging systems you integrate, UC could make it better.

Ideally, there is one simple interface or dashboard for users to access these systems. Using voice over IP to cut the traditional phone bill (the foundation for UC) doesn't hurt, nor does reducing travel costs as employees meet in video or audio chats rather than fly to faraway hotel conference rooms. With UC, CIOs aim to speed up communication and collaboration internally and perhaps raise customer satisfaction externally. About 31 percent of 466 organizations surveyed recently by Forrester have deployed some form of unified communications. In Forrester's survey, 42 percent of respondents who said they weren't investing in UC cited lack of money or the absence of clear business value to justify the investment.

Half of those who haven't say they are investigating or piloting UC, up from 30 percent in 2007. Yet UC isn't on fire this year, as the recession continues to batter IT spending. To read more on this topic, see: How to Get the Most From Unified Communications and Video Conference Software Now Works with Other Apps. "Certainly it does make sense to connect voice mail, e-mail and mobile systems," says Jerry Hodge, senior director of information services at appliance distributor Hamilton Beach. "Unfortunately, the current economic situation has limited my aggressiveness in moving forward." The same is true at movie-rental chain Blockbuster and food and beverage maker Shaklee, their CIOs say. The Original Social Networking UC has evolved from a back-room effort to simplify networking by, for example, running data and voice traffic on the same infrastructure, to applications that let employees share information no matter the device in front of them. Still, if you have money and want to move forward with UC, early adopters have advice about planning projects and measuring returns. Well, almost. But it's coming, predicts Steven John, CIO of manufacturing company H.B. Fuller.

We're not quite at the point yet where a BlackBerry, say, can get you into any corporate system and connect you to any colleague. The rise of consumer social networking platforms such as Facebook, Flikr and Twitter reinforce daily the desire among corporate employees to strip the friction from communicating at work, too, John says. Presence, meanwhile, is moving from a cool, gadgety technology to real corporate tool. He says he feels that heat and is studying potential UC systems, but he hasn't yet decided on any. That's when computer devices detect each other and indicate the fastest or preferred way to reach the person on the other end.

One simpler UC move is to integrate voice mail and e-mail so that users can listen to e-mail or read voice mail. It's like instant messaging for every kind of connection you might make to your corporate network or, if configured for it, the public Internet. Another is to allow instant messaging or document sharing during video conferences. Autodesk went whole hog into Cisco's TelePresence system, which involves super high-quality video conferencing that can connect up to 48 locations at once, along with on-screen, interactive data sharing. According to Autodesk VP of Strategic Initiatives Billy Hinners, the ultimate in video istelepresence technology.

Cisco calls it an "immersive" experience-think Star Trek's Holodeck. Autodesk spent $350,000 to outfit its first six-person TelePresence room. Of course, the price for such a system is steep. It runs 15 rooms now, ranging from two-person to 12-person sites, and spends about $10,000 per month on networking costs. "Cost savings was not a big driver for us," Hinners says. Subsequent installations have also been aimed at improving sales communications and efficiency as well as reducing travel and carbon emissions. Rather, the company initially wanted better collaboration between software designers and engineers in the United States and its 1,000-plus software engineers in Shanghai to pump out products faster at an improved quality.

Employees embraced the technology right away, he says. UC projects are some of the most technical ones that CIOs have to contend with today, integrating data and voice in ways that some IT groups have never done before. Time booked in the TelePresence rooms for regular video conferencing has become "a precious commodity." In fact, if there is any project for which success depends on users rather than IT guiding the planning and rollout, it's unified communications. But communicating is, by nature, a personal act. What you really want are users who push for a UC project, says Michael McTigue, CIO of Saint Barnabas Medical Center.

Foisting upon people unwanted changes to how they talk and type to each other makes people uncomfortable, says Don Lewis, president of consultancy Strategic Intersect. "You think all you're doing is taking away someone's phone and giving them another one but you're not," says Lewis. "Changing the button they push to forward a call to someone is hugely disruptive." Is There a Doctor on the Device? The hospital group-which provides cardiac services, burn treatment and organ transplant among its offerings-wanted to speed up the time for doctors, nurses and technicians to reach each other. Indeed, the archaic process of dialing a beeper, hoping the page goes through, waiting for the recipient to get it and call back slowed communications, and therefore reaction time during critical situations, McTigue says. The time-honored pager method was no longer good enough. Fifteen minutes might pass before a physician could reach someone in the telemetry group to order machines to monitor a given patient's heart rate, blood pressure and breathing. "Everyone was looking for a communications vehicle that would give better turnaround time," he says.

In March 2007, Saint Barnabas launched a pilot of Vocera Communication's badge devices. Walkie-talkies, while quick, didn't pan out because the crackly speakers made the hallways noisier and they ran through a lot of batteries. The 2-ounce rectangles are worn on a lanyard around the neck or clipped to a collar or pocket. A nurse might press the activation button and speak into it the name of a physician who is needed to check a medication order. They allow hands-free voice communication.

Via a wireless network, the device pings a database to look up the doctor's name and relay the call. Saint Barnabas spent $500,000 for devices and software for 450 concurrent users, starting with the telemetry group. The doctor taps his button and speaks to respond. That 15-minute wait time plunged-responses now take nine to 15 seconds, McTigue says. Within nine months, the hospital spent $250,000 to add another 300 concurrent users, giving 2,700 employees access to the system. Such dramatic results convinced the hospital to get as many of its 3,000 employees on the system as quickly as possible.

IBM managed the initial training, helping new users enunciate and speak directly into the Vocera device. The training helped get Saint Barnabas to a high rate of calls recognized and completed on the first try: 83 percent. In the emergency room, where there's more noise than in other parts of a hospital, the staff uses headsets rather than dangling the device at chest level. Seventy percent is more typical, McTigue says proudly. They had to fiddle with wireless access point configurations to get all areas hot. "If you don't have tight infrastructure, the application will get a bad name," he warns. Along the way, the hospital worked with IBM, Cisco and Vocera to identify and fix wireless dead spots in stairwells, elevators and the lead-walled radiology area.

The system works only on campus but the hospital is testing a Vocera smart phone with the same capabilities for off-campus use. The hospital expects to connect 1.5 million to 2 million calls through the system, eliminating the need for one full-time switchboard operator, according to McTigue. Yearly operating costs are $75,000 to $85,000, mainly for Vocera software maintenance, he says. The hospital has saved another $70,000 by getting rid of its backup phone system used during power outages. Payback from UC projects doesn't typically come from savings on networking equipment because those prices are low already, says Lewis of Strategic Intersect. The wireless Vocera system replaces a traditional dedicated circuit for that old emergency system.

But hard returns can be calculated: Obviously, meeting virtually can cut travel costs. Softer results, Lewis says, can also be important: By merging voice mail, e-mail and BlackBerry messages, your sales organization may save 30 minutes every day. Setting up call center staff to work from home, but access integrated voice, e-mail and document capabilities frees up physical room at the company for other uses. How valuable is that in productivity and morale? The more people on the system, the faster and more frictionless their communication. Try It, They'll Like It As the experience at Saint Barnabas shows, unifying the communications for lots of people at a company can be more beneficial than unifying communications for only some people.

In a hospital, that can save lives. Woods Bagot, an architectural design firm with offices in Dubai, Hong Kong and London, among other cities, has built elaborate buildings worldwide. At a corporation, that can make money. Recent projects include the oval dish-shaped campus of the United Arab Emirates University, a mixed residential and commercial district in Shenzhen, China, and the Cesaria beach resort in the Cape Verde islands. Exchanging drawings is key for an architecture firm, of course. In 2007, the board at Woods Bagot decided that it wanted the company to operate like one big studio no matter where its clients, engineers and architects lived.

But the people who work at Woods Bagot are visual thinkers, so any new communications tools would have to let them see each other, not just share data and documents, says CIO Nectarios Lazaris. "Being a design firm, we don't sit in a boardroom and look at Excel spreadsheets," he says. "We walk around and interact with people." Not to mention swap 3-D visualization files that are a couple of gigabytes unto themselves. Same with Polycom's Web conferencing product, he says. He tried at least five products, including Microsoft Live Meeting, whose video quality users found poor. Lazaris chose Microsoft Office Communicatorfor desktop video conferencing and collaboration, products from Tandberg for boardroom video conferencing and Blue Coat's software for secure Web connections. The first test came when a week after the video system went live, the Woods Bagot board opted to try the new toy instead of meeting in person. "It was a nervous time for us," he says, noting that Blue Coat had people on-site to troubleshoot should something go wrong during the pivotal meeting. He was impressed that Blue Coat sent engineers-not salespeople-to Woods Bagot during the decision phase and let them stay as long as needed during and after launch.

The company saved $450,000 by not flying the 12 board members to Sydney or providing their accommodations for that meeting as well as the remaining ones planned that year, Lazaris says. The technology lets Woods Bagot work with cream-of-the-crop designers and architects residing anywhere in the world, according to Lazaris, which is a point the firm makes in presentations to potential clients. But it was the experience that sold the board. "When they see their investment in play, that's a bigger win than trying to show them a PowerPoint that says, 'I saved you $450,000,'" he says. He says it's gotten the firm work it might not otherwise have won. "This is not follow-the-sun like in outsourcing. Volvo Group wanted a better way to work across time zones with colleagues who don't necessarily respond to e-mail-however red-hot urgent it's marked, says Magnus Holmqvist, director for the IT innovation center at the company.

We're not handing over projects but collaborating in a live environment," he says. "It's comforting to them." How UC Helps IT The mere thought of coordinating a global supply chain project will send many IT managers quivering under their project management software and spreadsheets. Volvo Group makes Mac trucks and Volvo busses and construction equipment; Ford now makes the famously rectangular cars. Previously, various team members would meet every 12 weeks to test versions of the new SAP and Red Prairie applications they are building. An IT team of 70 people around the world are working on a project to streamline Volvo's spare-parts supply chain, which reaches 60,000 mechanics in 180 countries. Early this spring, Volvo started virtual test rooms online, using Microsoft Office Communicator and Hewlett-Packard's TestDirector quality-check tool running over VoIP. So far, half of the in-person meetings have been eliminated, but plane trips have been reduced by more than half because the technology is so good, Holmqvist says.

He declines to say how much money Volvo has saved in travel costs but says the system has cut carbon dioxide emissions by 630 tons-about the equivalent of taking 250 cars off the road for a year. Even people in the same city sometimes opt to attend meetings virtually rather than trek across town. Don't underestimate the mileage, so to speak, that you may get from promoting the green ROIof cutting travel, Homqvist says. "People don't feel too good about flying across the Atlantic when we know we have climate change going on. Linking that idea to cost-cutting has helped IT get the new technology more eagerly accepted across the company, he adds. "That is real." Homqvist predicts work quality and productivity will rise because employees will spend less time planning meeting logistics and traveling. "Our perception is that we're already earlier on these test-suite sessions. But people feel much better about eliminating those kinds of meetings," he says.

Instead of a 12-week cycle, we may reduce the cycle." Defining the ROI Some organizations, however, aren't seeing the returns they expected on UC projects. The softer benefits of smoother collaboration are hard to quantify and therefore, Dewing says, hard to justify. Or rather, they don't know how to tie a dollar figure to them, says Henry Dewing, a principal analyst at Forrester Research. Especially now. It's hard to pin down the dollars generated or saved by faster project completion or product launches, Dewing says.

Twenty-four percent of the telecommunications and networking managers surveyed by Forrester say they aren't getting all the benefits they expected from UC. Another 11 percent said they didn't know whether they were or not. John, the H.B. Fuller CIO, isn't sure yet what mix of tools will produce the best return. The adhesives company does business in 100 countries, with offices in 36. The pressure is on John to find technological ways to overcome such geographic diversity, he says. As a $1.5 billion company, Fuller's revenues aren't huge but its global footprint is. But he doesn't want to jump too quickly. But standardizing hardware is something Fuller has only recently started to do.

For example, it's easier to unify communications when PCs and laptops are standardized, in part because tweaking the configurations takes less time. He doesn't want to buy more products than he needs. How about accessing your computer calendar by voice, over the phone? Say a Fuller engineer in China views a document created by a U.S. counterpart and can hover over his colleague's name with his mouse to automatically dial that person for a PC-based call. That's the kind of razzle dazzle UC application vendors pitch that isn't available in, say, SharePoint, Microsoft's document sharing and collaboration system. "It's fun, fancy, very sexy but is it needed?

One part of the calculation, he says, will be trying to predict how much bandwidth different combinations of UC technologies would eat and whether the network costs will be worth the UC benefits. Would that be a competitive advantage?" John wonders. He hasn't reached any conclusions yet, but a product like SharePoint might provide enough collaboration for Fuller employees so that a big UC investment isn't necessary. "That's what we're debating." Loomis, the armored car company, has been installing UC components for two years, expecting to cut telecommunications costs and make some business processes more efficient. Wayne Sadin, Loomis' CIO, began contemplating UC a few years ago, when the company was outgrowing its existing phone systems. But first, the company had to lay some infrastructure. Loomis had acquired several smaller armored car companies along with their mix of different PBXes.

Loomis replaced those PBX systems at headquarters and, so far, a little more than 10 percent of its 200 branches with Cisco VoIP. Now those tasks can be done by Loomis' own IT staff, centrally. "You just call the help desk. If a branch's voice mail needed reprogramming, they had to call local providers who would drive over to do the work for $100 to $200 an hour, Sadin recalls. It's 10 minutes of work or even one minute of work," he says. In 2007, Loomis finished putting its Microsoft Exchange e-mail system on VoIP. Meanwhile, Microsoft Office Communicator supplies video conferencing, instant messaging and presence, including a BlackBerry IM client. Not paying PBX vendors for move, add or change orders is a big part of Loomis' ROI, he adds.

Employees can forward voice mails as if they were e-mail and they don't have to log in to separate voice mail, e-mail and BlackBerry messaging systems, Sadin says. When Pacific Medical Centers put in VoIP to let data and voice traffic run unified on its network, it had to rearrange some job responsibilities, says consultant Lewis, who was the hospital's CIO at the time. A Unified Mind-Set Melding all of these capabilities takes some forethought and, perhaps, changes to how the IT group works together and with outside vendors. Network administrators, for example, had to learn to plan for spikes in traffic during peak application usage times as well as for telecommunications. But as UC takes root, CIOs and IT staff must make sure those different vendors coordinate their work, he says. For many companies, separate vendors supply networking gear, servers and software.

For example, Loomis planned to upgrade Cisco's Call Manager administrative suite last spring, in part to more fully integrate Cisco phone handsets with Microsoft's Office Communications Server. But the morning of the scheduled upgrade, the teams discovered that the need for a schema change to Microsoft's Active Directory got overlooked. Loomis' network and server teams planned and tested the upgrade with a local VoIP consultant for two to three months. The upgrade was aborted. Do you Tweet. Loomis tried again in late August, after the Active Directory tweak was tested and rolled out. "I guess the phone-oriented vendor didn't realize how carefully our server team guards Active Directory from untested changes," he says. "The hardest thing about integrating communications is integrating people's mind-sets." Senior Editor Kim S. Nash can be reached at knash@cio.com.

Follow me on Twitter @knash99. Follow everything from CIO Magazine @CIOMagazine.

No app store for make-or-break ZuneHD

Microsoft's ZuneHD, set to go on sale Tuesday, will not feature an open application store like its competitor the iPod Touch. Those capabilities will determine whether the ZuneHD sells well - and whether Microsoft decides to keep selling its own music player, said Matt Rosoff, an analyst at Directions on Microsoft. It will come with some unique features, though, like an HD radio tuner, and with software that has been well-received by users.

After observers noticed a Marketplace folder during earlier demos of the ZuneHD, many had hoped the new device would feature an open application store like the one accessible from the iPhone and the iPod Touch. But the Zune Marketplace will be a closed store, meaning third-party developers won't be able to easily build applications for it. Marketplace is the name of the open app store that will be available on Windows Mobile 6.5 phones, to be released in early October. The new device will include the same casual games that came with earlier Zunes, plus a few other applications like an MSN weather application and a calculator, said Brian Seitz, group marketing manager for Zune. Zune customers will be able to download the applications they like for free.

In November, Twitter and Facebook applications will become available, as well as a "Project Gotham" racing game, he added. Seitz said the timing wasn't right to include the Windows Mobile Marketplace application, which isn't due out until next month, with the ZuneHD, but he also said it's not certain that a similar open Marketplace will come to the Zune in the future. "Down the line, if there's an opportunity for us to snap into what they're doing from a mobile application perspective, I'm sure it's something we'll look at," he said. He acknowledged that people are likely to criticize the decision. "I'm not saying we won't get dinged for that because I know we will," he said. However, Microsoft may decide it makes more sense to limit the applications in the Zune market and offer them all free, he said. That's for good reason, Rosoff said. "When you look at it as a head-to-head comparison with the iPod Touch, people will see it as a shortcoming," he said. It will feature the "smart DJ," which allows the user to pick an artist and then automatically creates a playlist of similar songs.

Microsoft will also debut new Zune software on Tuesday that customers use on their PCs to manage their music. Microsoft will also start offering people who subscribe to Zune Pass a way to access the Zune music collection from a browser. A Zune Pass subscription lets users stream any song from the entire Zune catalog and download 10 songs each month. That means subscribers will be able to listen to music from the entire catalog from any PC, including one at work, rather than only from a PC running the Zune software. Microsoft also revealed a few more details about a Zune feature that will start showing up in Xbox Live later this year.

That's part of a strategy to move the Zune software experience into other products from Microsoft, Seitz said. "Going forward, we hope more people think of a 'holistic Zune business,' as opposed to how many of these things we sell," he said, pointing to the Zune hardware. Xbox users will be able to buy or rent movies from a new Zune store that will be featured in Xbox Live. The most important upcoming product that will include Zune software will be Windows Mobile phones, Rosoff said. "The Zune interface will show up in Windows Mobile," he said. Rosoff suspects that Microsoft will eventually get out of the MP3 player market altogether. "We'll just see the Zune as a consumer component of Windows Mobile," he said. "This is sort of the last [Zune], if it doesn't sell." Even Zune hardware elements, like the touch screen and the form factor of the device, will likely make it into Windows Mobile phones, he said.

DOJ expands review of planned Microsoft-Yahoo agreement

The U.S. Department of Justice has asked Microsoft Corp. and Yahoo Inc. to hand over more information regarding their proposed search partnership. Nina Blackwell, a spokeswoman for Yahoo, said both companies are cooperating with federal regulators. "[We] firmly believe that the information [we] will be providing will confirm that this deal is not only good for both companies, but it is also good for advertisers, good for publishers, and good for consumers," she added. A Microsoft spokesman confirmed in an e-mail to Computerworld today that the DOJ requested additional information, but added that it came as no surprise. "As expected, we received additional request for information about the agreement earlier this week," wrote the spokesman, Jack Evans. "When the deal was announced, we said we anticipated a close review of the agreement given its scope, and we continue to be hopeful that it will close early next year." Evans declined to disclose exactly what information the DOJ is looking for.

Microsoft and Yahoo announced late in July that they had finalized negotiations on a deal that will have Microsoft's Bing search engine powering Yahoo's sites, while Yahoo sells premium search advertising services for both companies. Microsoft officials contend that the deal with Yahoo will improve competition in the search market. The partnership, which was a year-and-a-half in the making , is aimed at enabling the companies to take on search behemoth Google as a united force. Matthew Cantor, a partner at Constantine Cannon LLP in New York and an experienced antitrust litigator, disagrees. He argues that since Yahoo will cease being a competitor in the search market, the DOJ is likely to say the Microsoft/Yahoo partnership is anticompetitive . In an interview today, Cantor applauded the DOJ's request for more information. "Most deals clear without a request for additional information.

Cantor said last month that when Yahoo's own search tool disappears, only two major search engines will remain - Google and Microsoft's Bing. This is not run-of-the-mill," said Cantor. "The government believes there are potential antitrust concerns raised here. Nonetheless, Blackwell told Computerworld that Yahoo is still hopeful the deal will close early next year. They would only request additional information if there was some kind of presumption that the deal will cause antitrust effects." Cantor added that he thinks it could take months for Microsoft and Yahoo to pull this new information together, perhaps until the end of this year.

Beyond HandBrake's defaults

If you're a Mac user interested in ripping your commercial DVDs to a format playable on an Apple TV, iPod, or iPhone, the free video transcoder, HandBrake 0.9.3, is one of the easiest ways to go about it. With a copy of the free VLC installed on your Mac, HandBrake can rip most DVDs made today, and the results it produces are quite watchable.

But suppose you want to go beyond the defaults-tweak HandBrake to produce videos that take up less room on your iPod, dispense with a movie's closing credits, or bear subtitles? It's all possible with HandBrake, but it takes some tweaking. And tweaking HandBrake is what this article is all about.

From the top

We'll work our way from the top of the HandBrake interface to the bottom, pointing out useful features along the way.

Title When you insert a DVD or load a Video_TS folder from a DVD that contains a feature-length movie, HandBrake will automatically choose the portion it believes to be the main feature. But click the Title pop-up menu and you'll likely see some other entries. Much of these reflect parts of the disc you're not interested in-FBI warnings or an opening logo, for example. But some of the longer entries might be previews or extra content. How to tell? From this menu choose an entry other than the one selected by HandBrake and click on the Picture Settings button near the bottom of the window. In the resulting sheet, you'll see a preview of the selected content. If that preview shows the FBI logo, you can safely move on to a different entry.

If, instead, you're ripping a DVD full of TV episodes, you'll want to rip more than just the single episode recommended by HandBrake. Before you begin, choose HandBrake -> Preferences and in the General preference enable the Use Auto Naming option. This ensures that each episode will have a unique name.

Now click on the Title pop-up menu and select an episode. Configure your settings, and click on the Add to Queue button. Repeat these steps for all episodes on the disc. Because you've enabled the Auto Naming option, each will have a unique name. (Without that option on, there's the danger that you'll overwrite one episode with another because they bear the same name.) Click on Start and HandBrake will encode each episode in the queue.

Chapters It's a good bet that a movie's credits will be found in its last chapter. If you'd like to do without these credits, choose the penultimate chapter from the second chapter pop-up menu. So, for example, if a movie has 32 chapter, choose 31 from the second pop-up menu. When you rip the disc, that last chapter won't be included in the final product.

Format HandBrake can output video in four different container formats-MP4, MKV, AVI, and OGM. For those using Apple's media players (QuickTime, iPod, iPhone, Apple TV) there isn't a good reason for using any container format other than MP4.

The Video tab

Select the Video tab and you find settings for controlling the encoding of a movie's video settings.

Video Codec Each container format supports its own collection of encoders. We'll concentrate on those offered with MP4. HandBrake supports three encoders for its MP4 files-MPEG-4 (FFmpeg), MPEG-4 (XviD), and H.264 (x264). FFmpeg is faster than XviD, but you pay for that speed with a slight compromise in quality. H.264-the default setting used for many of HandBrake's presets-produces good looking results at low bit rates. But it's slower to encode than the other two encoders and requires more processing power from the device that plays the video. If you're creating video for an old computer and find H.264 playback choppy, try FFmpeg or XviD.

Framerate You can reduce the size of your movie by cutting its framerate but you'll suffer some quality loss in the process as your video can be choppier than it would be at the original framerate. None of HandBrake's presets do this, but if you'd like to give it a go because you have very little storage space to work with, choose a different framerate from the Framerate (FPS) pop-up menu. For best results, choose a framerate that fits into the original neatly. For example, 15 fps for a 30 fps (29.97) source.

2-pass encoding When, in HandBrake's Quality area, you've chosen either the Target Size or Average Bit rate settings (discussed shortly), a 2-pass encoding option appears within the Video tab. Enable this setting and HandBrake will run through your movie twice. The first time, it records information about the density of information within the video's frames. On the second pass, it uses that information to better allocate bit rates during the encoding process, resulting in better-looking video. The downside is that 2-pass encoding takes twice as long. To speed it up (and lose a measure of quality), enable the Turbo First Pass option, that knocks 50 - 75-percent of the encoding time off the first pass.

Quality The settings in HandBrake's Quality area are where you can make a real difference in the size of your resulting movie and, of course, its quality. Enable Target Size and you can tell HandBrake how big you'd like the resulting movie to be. (The larger the file size, the better the quality.) The Average Bit rate (kbps) option works the other way around. You tell HandBrake what you'd like the average bit rate to be and it creates a movie whose bit rate hovers around that size. (Be sure to check the capabilities of the destination device in this regard. A bit rate of 2500kbps looks good on an Apple TV but is too much for an iPod.) Again, the higher the bit rate the better the quality and the larger the resulting movie.

The Constant Quality slider is your way of telling HandBrake, "I want the resulting movie to be X good." HandBrake then does everything it can to grant your wish, but "everything it can" may result in a movie that consumes a lot of storage if you've chosen a high quality setting or one that won't be compatible with a device such as an iPod because its bit rate is too high.

Picture Settings

Within the Picture Settings sheet (accessed by clicking the Pictures Settings button) you can preview frames from the video and change its look. These are your options.

Size You use this option to reduce the dimensions of your movie (you can't increase its size using the arrow buttons next to the Width and Height fields). For a widescreen movie, the Width will be 720. The Height number will vary, depending on the source. Enable the Keep Aspect Ratio option and reduce the Width or Height setting and the other setting will follow, maintaining the same aspect ratio as the source movie.

You also have the option to choose Anamorphic encoding. Choose Strict or Loose from the Anamorphic pop-up menu, and the dimensions of the movie increase. The Strict option ensures that the aspect ratio conforms exactly to the ratio of the original movie. A Loose setting alters the dimensions so they are more efficiently encoded.

Changing the dimensions of your video does very little to reduce the amount of storage it consumes. You'd use this setting specifically to meet the limitations of a particular player-one that can't play video larger than 640 x 480, for example.

Crop By default, HandBrake attempts to remove black bars by cropping them away. If you're unhappy with its performance in this regard, you can do it yourself by enabling the Custom option in the Crop area and then entering the values you like in the four fields below. If your source material is a DVD burned originally from a video tape and that video shows scan lines at the top or bottom of the video, you can use crop to remove them.

Filters Normally you shouldn't have to touch the settings found in the Filters area if you're working with a movie ripped from a commercial DVD. If your source material is made up of TV shows or animation, however, or comes from a disc you've created from movies you've shot, you might find some of these settings helpful.

The Detelicine option switches on an inverse telecine process. Telecining is the act of converting film to video and adding frames in the process (because film runs at 24 fps and NTSC video uses 30 fps). The detelicine process removes those extra frames so your video plays back smoothly. Generally, only animation and TV shows require this setting but there's no harm in leaving it on all the time as it will have no effect on content it can't work with.

Take a gander at your video's preview image. If you see jagged lines where hard edges should be (called "combing" or "teeth"), the video is interlaced. Interlacing is a technique used in standard-definition TV for painting images in a series of odd and even lines. Interlaced video displays these jagged lines on a computer screen and some high-definition TVs. To remove it, you must deinterlace the video. HandBrake offers a couple of options for doing this.

First, choose Fast from the Deinterlace pop-up menu. If the jagged lines go away, you may want to deinterlace your video. The Fast setting is indeed faster, but you lose quality. To produce better results (though you still lose some quality), choose Slow or Slower.

I used the word "may" in the paragraph above because HandBrake offers another option for dealing with these jagged lines-Decomb. This option searches your video and applies deinterlacing only to those frames where the lines are visible. This helps maintain better overall video quality because not everything is deinterlaced.

If your source video is really grainy, give the Denoise option a try. This filter is a trade-off. You may lose some of the grain but you also lose overall quality (gain some blocking in the Medium and Strong settings, for example). There are three settings-Weak, Medium, and Strong. Weak is the first to try on a sample (a chapter, for example). You have to try it on a sample because its effects aren't reflected in the preview image.

And finally, there's a Deblock slider that can get rid of blocky artifacts. Again, you won't need this setting if your source is clean. If the source is poor to begin with, this is something to try on a sample chapter.

Audio & Subtitles

The Audio & Subtitles tab is the means for choosing which audio tracks you'd like to encode as well as placing subtitles on your encoded movies.

Many commercial DVDs contain multiple language tracks-English, French, and Spanish, for example. You can reduce file size by stripping out the tracks you don't want. HandBrake will choose the English track by default and exclude others, but you can optionally add them back by selecting additional language tracks from the Track 2, Track 3, and Track 4 pop-up menus.

Within the Audio Codec pop-up menu you can choose the codec used for the movie's audio-the default is AAC, but you can maintain the source movie's existing audio encoding by choosing AC3 Passthrough from this menu. File size will be larger, but the sound will exactly match the quality of the original. Even if you go with the default AAC (faac) setting, you can choose the output format-Mono, Stereo, Dolby Surround, Dolby Pro Logic II, or 6-channel Discrete. Choose Dolby Pro Logic II and the audio will play on both stereo and surround-sound systems (though it's not true surround-sound). The setting you choose should match the gear you intend to play the movie on.

If you don't mind the larger file, you can add both Pro Logic II and AC3 pass-through tracks using the Track 1 and Track 2 pop-up menus so that you have a movie that will play in stereo on your iPod or in full surround-sound on a device such as an Apple TV.

With HandBrake you can add subtitles to your encoded movies if they're available on the original source DVD. Note, however, that you can't turn them off when viewing the movie-they're burned into the movie.

Chapters

HandBrake takes note of a source's chapters and, by default, adds chapter markers to videos it encodes. The default is to list them by number-Chapter 1, Chapter 2, etc. You're welcome to double-click on a chapter and type in a name of your own-Phase One: In Which Doris Gets Her Oats, for example. If you'd prefer to do without chapter markers you can turn off that option in this tab. Note, however, that chapters add no bulk to the file and make navigating through a movie far easier.

Advanced

HandBrake's Advanced tab is an area where many mortals fear to tread due to some pretty arcane options. While we don't fear it, the choices you might make here are meant for only the most hard-core tweaker. Should you wish to become one of those tweakers, I urge you to carefully read through x264 Options in HandBrake.

The risks

The advantage of using HandBrake's default settings is that they produce videos that absolutely will play on their intended destination-on your iPod, iPhone, or Apple TV, for example. If you go the manual route and tweak your own settings, it's possible that you'll choose a bit rate or size too large for a particular device.

For this reason, you should pay careful attention to the video playback specifications for the device you wish to encode for. Apple publishes these specifications for the iPod and iPod touch, iPhone, and Apple TV on its Web site.