Byte Magazine Vol 23-05 Soup Up Java PDF
Byte Magazine Vol 23-05 Soup Up Java PDF
focus on NanoprocessorS/pm
Beat Internet
Traffic Jams1ps9
DSL MODEMS:
What You Need to KnOW/p129
0 '
l.O
(/) +
0 +
c r-:>
"O ~
c :::J
"O ~
..... >
~ t:
l> 0
• V'l
W O
w5
(.) 1-1
I ::2:
s:: '
:::c 0
N r-..'.
"O UJ
m c:::::
z <(
-4 :s:
c: ~
s:: z
- :::J
- uo
(II
• V'l
c "
(/)
r ~
"'
s::C»
o ·s;
c
m )
C»
S:: V'l
(/)
60
a:l
LJ..J
l
o
z:
u
<(
< ::2: North America
Q_ 0 5>
Cl
l'V z:
w <(
z u
c 0....
3
CY
(D
~
""'~
32MBSDRAM
16MBEDORAM
32MB ECC SDRAM
5!2KB pipeline hurst cacllc. D\11 2.Ll rnmpliaru. Singlt' or dual Im el !\ ·rumm II processors
256KB L2 pipeline hurst cacllr
Microsoft !ntl'lliMousc.. ,
2-way infrared por t
64MBSDRAM
3GB remova ble hard drive
4GB Ultra Wide SCSI-3 hard dri ve
il2KB 1.2 pi1lL'l111c hur11 cache Sing!t' or dual hud Pcmium ll processors
1l2Kll internal L2 sccom\,1ry liK ll l'. DMI 2.Ll rnm plia111. ~ modular expansion bar'i
il2KU imegra1ect C'1chc inSEC package
i.;· floppydrive
!.IX CD-[(OM 1lril'L' will1 A111ol'lay'" 1,·chno lo ~ 1·
'l oxp;msion slms: 6 !'Cl. 2 ISA. I sltaf('c! IS1\/l'CI
.
MICRON
PC')WER'"
WARRANTY
J -yilar limiti:d v:amrnty on m1croprocessor and main memory
" .l-year limi!ed parts-only system warranty (1-year for Trar. ~Port systems)
Micron Sales He; Mon-Fri 6am-10pm. Sar 7am-5pm. Srn1 lOam-ipm (MT)
Technical Support i\vailablc 24 Hours 1\ Day. 7 Days A\\leek. '"""" '"
'.bll-frcc Iro:n Mexico 9i-800-708-1755 • loll-free from Cana~a
~00 708·17'8 • Tol l-lrec from Pueno Rico: 800-708-17)6 ·::::ILi.
1111crna1 ion;u S;ues 208-893-8970 • lmernatiornl Fax 208-893-7393 ~:~;,c:,i:;·
::mlllD
l
• 1- 2- or3-yearcptlonal o1r!liteserviceagreementfor Microridesktopandservcrsystcms
• 30naysof lree Micron -suµpliedsoftware suppor1forMicrontlesklop syslems: 3optional
l@J998MicrO!l El'1:tronit'l, lnc. All Righhresemd. MicfonElecl10nics isnotreSjlOl!Siiletor ominionsore.rorsinl)l!OJl'it'
netwnrl<opcrating cys tcrn lnr.ident rccn lu tio ns lncludr.rlfn ·MlcrnnscrrrSWJtern~ phy or photoguptr,. All ptl'clwts aresulrjtctto a1ailabililJ PrittsandSjleCificali1111smay bt than&tdlllitbout 110lict:i:r1tts
• ;;n.r:::ivmoneylJAc.kpi:.llr.y do notilldlldeshiiJpiog ind handlingandanJ~ IJXts. ~money.tlidpoliqcbsnot inc:lllle 1tbrnfrtiglr\ and
• 'l t.-r.our1achnlcals1Jppo rt ori&iul ~nr;/handlin1 cha'1ts, app6es OlllJ to Micr on brnl producls nl btgins fr om !bit of s~tnl All $Mes ;re~
jtct toMicron lltttronics' C11Tentterms ~ coruitions ol ult. llu$inen lel.Stirictslwtd0113&iiiontb ltist, n l
•t
lust prices lwtd ~ JO.~tb leoi:st. Tbr Intel lllsidt Loeo nl Pratilln •trflislertd tr~ ¥1d MMI is 1 nle
!~~ =i~i~~~i~~~~1j!cir~~~~~~~~:~~~l~yn~~~r~1:~\;~:~!~~~~~~~~~n~W;u~~~~e~~is
. rn;rl ol lnlel C.pon!IOll. Microsott.Windows,WindossKT aidthtw.dowslor:o•t rtgistertd trnru Uol Microsotl
•t
·-. .... ---
Cm1les r 11:-::;. l.ml1ed warranti!"l mAybe obtained on our Web !:•te or by callinn Micron Corpontion. PrOlb:t 1Y111t$ ol Microa ~s tram.b or rtJisttrtd trmn.b of Miaoa Uec:trooics. Inc~ or
NtlfRAM ESp \tms h!colpol1ied. O\btr product nnes lstd in Uris pbic.ltion •t lor idea~ioll parpow only 11111 llllJ bt
___ . ..
,;-_ ........,... . ~, ---- - --
!n dtm;rl 1ol lhtir rts11tdiTt campaniu.
WE GIVE VDU INDIVIDUALLY ASSIGNED SALES
~I
SUPPORT IS
ALWAYS
BEING ABLE
ID CALL FOR
BACKUP.
ESPECIALLY WHEN VDU GET
You want a sales representative who knows about the product, your business
and your networking needs. And you want fast, expert assistance and issue resolution that's just a
phone call away But most of all, you want your day to go smoothly Micron's total-value proposition
gives you what you want - and more. Weve streamlined our entire purchase process to ensure your
orders and service needs areexpedited. Wegive youpersonal service fromdedicated sales and technical
support representatives assigned to your account. Their intimate knowledge of your business promotes
quick action and fast resolutionof your computing-related issues. Wealso give you a comprehensive
selection of servers, desktops and portables to choose from And no matter which Micron system you
select, you get oneof the best limited warranties in the industf)! Service and support that's always
there to back you up. With a personal touch. Call us today anddiscover the manyadvantages Micron
calendar management, object repository, and With the TNG Software Development Kit and FREE Unicenter TNG Framework,
virus detection are just a few of the dozens FREETNG training programs, you'll be able or VisH www.thetramework.com.
of services that are included for free. to develop for the broadest variety of UNIX Call today and give yourself a free head start
nm
41hArnJalTedlnologyAwards
and NT platforms. In fact, Unicenter TNG is
the most open , interoperable, and scalable
management solution available. Today, over a
on every single application you develop.
It just might be the competitive edge
you need.To finish first, every time.
(AOMPUTER®
.r.SSOCIATES
So ftware superior by des ign .
Unicenter®TNG.Framework ©1997 Computer Associates International, Inc., Islandia, NY 11788-7000. Alt other product names referenced herein are trademarks of their respectivecompanies.
BYTE
COVER STORY BUILDING NETWORK APPS
May 1998, vol. 23, no. 5
~
"'~
"-1
0
Gl
~
I
-<
0
Gi
PARTI ~
,.;::
Gl
rn
By Tom R. Halfhill ~
z
'O
c
The rap on Java is that it's too slow. Proponents are ~0
;<!'
<O
O>
4 BYT E M AY 1 998
EDITORIAL LAB REPORTS CHAOS MANOR
14 SO FT WARE HARDWARE Four Ways to More Storage
Nine Recipes 333-MHz Pentium lls: 131
for Fast. Easy Java Slow-Bus Swan Song By Jerry Pournelle
INBOX 76 11 4 Jerry tests five methods to
By Peter Wayner By Dan Tanner increase storage, from adding
17
Java tools are prolifer We test 19 NT disk drives, to RAID, to digi tal
ating. We sort them workstations video.
out with hands-on powered by Intel's
BITS testing of the top Deschutes
products. processor. WHAT'S NEW
Pentium II: Going Mobile 24
Unixes for Merced 25 155
Big backup on a budget, image
Iris-Scanning Security 26 WEB PROJECT REVIEWS editing tools, easy Web access,
Build an E-Store Fast 32 Deploying Effective HTML LOW · COST PC s and PA-R1SC notebooks.
GartnerGroup: 98 or NT? 38 Forms Cheap PCs: Bargain
103 or Blunder?
By Jon Udell 125 IMPROBABLE
EVAL 10 tips for crearing the best By Robert L. Hum mel
Web forms you can . They cost less than a grand. The Click of Doom
PROGRAMMING TOOLS 160
Are they worth it?
Java for Windows By Marc Abrahams
41 JAVATALK UTILITY A Delete key that could save
Microsoft's Visual J+ + 6.0. Remote-Control Registry civilization and sanity.
Toplink Bridges Two Worlds
107 128
GRAPHICS ACCELERATOR
By Rick Crehan By William Wong
3D Labs Puts a Glint
A pure Java object-relational KeyVision removes a lot of SERVICE
in Graphics World's Eye
database system maps Java the hass le and lets you manage
42 Product Information
objects to relational databases. Windows 95 and NT registries
The Glint GMX 2000. http: //www.byte.com/
from afar.
hotbytes/
OPERATING SYSTEM
Unix Gears Up for Merced FUTURE VISION FIELD TEST :
ADSL MODE MS Index to Advertisers
45
The Smallest Components Remote Access for Short Alphabetical Order 152
SCO's new UnixWare.
111 Attention Spans Editorial Index
NET MANAGEMENT By Udo Flohr 129 by Company 154
SMS: Ready for NT 5.0 Deep inside IBM's R&D labs, By Michelle Campana le
46 the futur e of computing looks We check out Covad' s
TeleSpeed ADSL service. THE BYTE WEB SITE,
Systems Management Server 2.0. nanomechanical and optical.
HOTBYTES, and THE VIRTUAL
PRESS ROOM
http://www.byte.com
CORE
PROGRAM LISTINGS
OPERATING SYSTEMS automatically locate and use classes offer better perfor FTP: ftp.byte.com
A Tiny OS That Scales Up resources on the network. mance than CG! programs. From BIX: Join "listings/
What's Your Service? dows database connected to the 29 Hartwell Ave., Lexington, MA 02173. Periodicals
postage paid al New York, NY, and additional mailing
49 PROG RAMMING Web need not be an expensive offices. Postage paid at Winnipeg, Manitoba. Canada
Post International Publications Mail Product Sales
By James Kempfand Servlets: CGI the Java Way and time-consuming task. Agreement No. 2464g2. Registered for GST as The
McGraw-Hill Companies, Inc ., GST # 123075673.
Postm aster: Send address changes and fulfillment
Charles Perkins 55 questions to BYTE Subscriptions, P.O. Box 552, Hights·
The new Service Location By Paul Clip town, NJ 08520.
Protocol enables computers to These server-oriented] ava Printed in the United States of America.
WINDOWS
More PC Power to Go . • . . . 24
You don 't have to host your CGI . ...... . ........ . . . .... . 55
blends an enhanced Visual Need to publish data, locked standards problems. Deschutes .. . . . .. . . . . . . . . . . 114
Basic IDE with Java's object up in a Unix database, on the Desktop PCs ... . . 114, 125, 131
oriented programming toolset. Web? This article shows you A look at the beta of Development tools . .... ..... 76
World's Eye . .. • . . • •. • . . • 42
inexpensive tools. ment Server 2.0 shows smarter E-commerce . . .. . ..... . . 25, 32
and lighting processor screams Here's how to set up your data standards. Embedded technology . . . 47, 51
Should you wait until the faster Two Worlds .... ...... ... 107
their functions and features on Holography. .. . . . .. . . . . .. . . 111
bus arrives? The linchpin of this object-rela an intranet. Computers and IA-64.. . . . ... . . . ... . . . ... . . 24
Spend one thousand dollars structure (and object relation Java .. . 41 , 55, 60, 76, 107, 155
Servlets:
and what do you get? A good ships) to a relational database. Low-cost PCs . . . . . .. . . . .. . 12 5
Remote-Control Registry 12 8
J + + 6.0 a good tool for run 57 , 60,89, 103, 129, 131 , 155
Four Ways
Servlets: CGI the Java Way 55
applications through a congest 45,47
Our man at Chaos Manor finds designed to provide CGl-like sion of more bandwidth.
POSIX .. . . . . . . . . . . . . . . .. ... 47
"It's Java, Captain. She canna HTML form. Here are 10 rules 60, 76, 103, 107
MACINTOSH go any faster." (Obviously for making your forms better. Protocols . . . . .. . . . . . . . .... . 49
More PC Power to Go • . . • . 24
Scotty hasn't read this month's
Remote-Control Registry l 28
Query techniques . . .. . . .. . .. 81
OS Vendors Race
Sentinel Express
Secures software distribution,
and comprehensive
usage, ensu.res license
license managem ent agreement compliance.
for PC, UNIX,
and Java.
... M
E-1000
Departmental Servers
©1998 Gateway 2000, Inc. All rights reserved. The Intel Inside Logo, Intel and Pentium are registered trademarks, and MMX is a trademark of Imel Corporation. All brands and
product names are trademarks or registered trademarks of their respective companies. Many Gateway products are custom engineered to Gateway specifications, which may vary
from the retail versions of the softWare and/or hardware in funcrionalit)I, performance, or compatibility. Ali prices and configurations are subject to change without notice or
obligation. Prices do not include shipping and handling and any applicable taxes. Gateway 2000 Major Accounts, Inc. is a wholly owned subsidiary ofGateway 2000, Inc.
May 1998, vol. 23, no. 5
EDITOR IN CHIEF VICE PRESIDENT/PUBLISHER HOW TO CONTACT
EditoriolAssistont: Chrystie Terry Publisl1er'sAssistant: Lois Beninati MAIN OFFICE: 29 Hartwell Ave., Lexington, MA02173,
EDITOR Senior Technical Editorat Lorge: Micha el P. Wa lsh Son Mateo: 1900 O'Farrell St. #200, San Mateo, CA
Cynthia Morga n Lexington, MA, 78 1-860-6714 GERMANY/EUROPE: Emil van Behring Strasse 2, 60439
Lexington, MA, 781-860-6298 Lexington, MA, 78 1-860-6302 mike_walsh @mcgraw-hill.com Frankfurt, Germany, +49 69 5801 123.
cynth ia.morg [email protected] tom.thompson @by te.com ELECTRONIC MAIL: Send to "[email protected]." Most
News Editor: David l. Andrews rowland.aertker @byte.com Senior Financial Analyst: Fax requests for BYTE award logos to 781-860-6307.
Lexington, MA. 781-860-6296 ASSOCIATE TECHNICAL EDITORS Cha rl es Barber Please include e-mail address for prompt processing of
[email protected] request.
Dennis Barker, Ca thy Ki ngery, Manager, Information
PHOTOCOPY PERMISSION:
Lexington, MA, 781-860-6207
Peter Wayner Back Issues: 603-924-928 1
Where necessary, permission is granted by the copyright
[email protected]
fax: 603-924-2683
owner for those registered with the Copyright Clearance
DESIGN Peterborough, NH
Technical Editor: Pete Loshin
Design Director:Cha rl es Di xon Ill ADMINISTRATION Center(CCC), 222 Rosewood Dr., Danvers, MA01923, to
Lexington, MA, 781-860-6830
photocopy any article herein for personal or internal ref
Associate Design Director/Design & Human Resources Administrator: erence use only for the ftat fee of $1 .50 per copy of the
[email protected]
Pat Bu rke
Photography: Sharon Price article or any part thereof.Correspondence and payment
Technical Editor: Dan Tanner
Associate Design Director/Graphics: should be sent directly to the CCC, 222 Rosewood Dr.,
Lexington, MA, 781-860-6425
Danvers, MA 01923. Specify ISSN 0360-5280, $1.50.
Joseph A. Gallagher Copying done for other than personal or internal refer
[email protected]
Designers: Cindy Sands, ence use without the permissio n ofThe McGraw- Hill
Technical Administrative Assistant: Companies, Inc., is prohibited. Requests for special per
Donna Sweeney
Robert Pickering
mission or bulk orders should be addressed to Faith
Lexington, MA, 781-860-6241
Ellington, copyrights manager, 603-924-2525. BYTE
robe rt.pickering @byte.com
is available in microform from University Microfilms
International, 300 North Zeeb Rd.. Dept. PR, Ann Arbor,
Ml 48106or 18 Bedford Row, Oept. PR, London, WCl R
4EJ, UK
Home Page · · ······ · · ·· ··· ·· · ··· · · · · ····· · ···· · http ://www.byte.com/ BYTE
Story Archive · · · · · · · · • · • · · · • · • · · · · · · • · • · • • • · · · · http://www.byte.com/art/art.htm A Di11isio11 o{Tht Mc.Graw·HiU Ccmpanies
'iZ
Conference · · · · · · · · · · · • • • · · · • • • • · · · • • • · · · · · · · · · http://www.byte.com/disc uss/disc uss.htm Copyright <> 1998 by The McGraw-Hill Companies, Inc.
Benchmarks · • • • · · · · · · · · • · · • · · • • • · · · • • · · · · • · · · · http ://www.byte.com/bmark/bmark.htm All rights reserved. BYTE and !llil1 are registered trade
marks ofThe McGraw-Hill Companies, Inc. Trademark
Virtual Press Room · · · · · · • · · · · · • · · · · · · • · · · · · · · · · http ://www.byte.com/vpr/vpr.htm registered in the United States Patent and Trademark
Product Information · · · · · • · · · · • · • · • · · · · • · · · · · · · · http ://www.byte.com/hotbytes/ Office.
Media Kit ········ ·· ··· ·· ·· · · · · · · ·· ··· ·· · · ···· · http ://www. byte.com/media/kit.htm
Subscriptions · · · · · · · · · · · · · · · · · · • · · · · · • · · · · · · · · · https://www.byte.com/orders/mporders.htm
~ Member Audit Bureau of Circulation
OF FI CERS OF THE MCGRAW -HILL COMPAN IES: Founder: Jam es H. McGraw (1860-1948).
Chairman and Chief Executive Officer: Joseph L. Dionne; President and Chief Operating Officer: Harold W. McGraw Ill; Senior Vice President and General Counsel: Kenneth M. Vittor; Executive Vice President
and Chief Financial Officer: Robert J. Ba hash; Senior Vice President, Treasury Operations: Frank D. Penglase; Presiden t, Information Services Group: Michael K. Hehir; Group Vice President. Information
TechnologyandCommunicotionsGroup: Kevin C. Harold.
~:t:~
Processor
. . h999
£ ~ 1-888-480-4559 www.winbook.com
U.S. sales only. 30-0ay unconditional money-back guarantee from date of purchase.
MictOsoft·
* Includes a limited license for development and testing only; BackOffice license limited to ten (10) simultaneous connections. ** Offer good through June 30, 1998. While supplies last. No shipping or handling costs.
© 1998 Microsoft Corporation. All rights reserved. Microsoft. BackOffice, Visual Basic. Visua l C++, Visual Studio, Windows, and Windows NT are either registered trademarks or trademarks of Microsoft
Corporation in the United States and/or other countries.
power you need
ignore.
For a limited time, get the power and stability of
Microso~ Windows NT. Workstation or BackOffice~
Server 4.0 Developer Editions, free when you
acquire a select Visual Too l.
Take your pick.
Choose the Professional Edition of the Microsoft Visual Basi<A version 5.0,
Visual C++., version 5.0, or Visual Studio,M 97 development systems, and
get Microsoft Windows NT Workstation 4 .0 Developer Edition· free.
That's right. The most powerful desktop operating system for developing
business applications with the reliability and security of Windows NT.
Absolutely free. No shipping, no handling - Free.
••
Either way you get the high performance and stability of Windows NT, Microsoft•
along with the most powerful, easy-to-use visual development tools for
building client/server, Internet, Intranet, and Windows..-based solutions. BackOffice•
Microsoft•
This offer is too good to ignore. But it's only good for a limited time··.
So act now. Visit your nearest reseller or ca ll (888) 229-0738 to order.
Then go to www.microsoft.com/developer/offer to get further details and VISUAL
to find out how to redeem your free co py of Windows NT Workstation 4 .0 Studio·
VisuatBMlc"
or BackOffice Server 4.0. All redemption will be accessed via a coupon VisualC++•
Vosu1111n1er0ev'"
Visu111 J++
on the web.
ith last month's cover story, Who needs MTBFs of hundreds of years
"Crash-Proof Computing," when computers are obsolete in four? Yes,
we put a stake in the ground but that M stands for mean; that average
for reliable computing. In the is a combination of happy clams and less
past, we've been as guilty as anyone of fortunate individuals whose hard drives
being dazzled by clock speeds and feature fail in the first year of operation.
sets. These are important, but reliability So, no more excuses. Time to get seri
has become a critical issue, and at BITE ous about quality. I'm mad as hell and I'm
we're not closing our eyes to it anymore. not going to take it anymore!
In the aforementioned cover story, I have some definite ideas about where
senior editor Tom Halfhill took a bal computing has to go to become more reli
anced look at the whys and wherefores able. I'll be on-line May 11-15 (http: //
of today's woefully crash-prone PCs. At www.byte.com/discuss/ discuss. htm) to
the top of this page, it says "Editorial," so talk about them with you. We'll put
I don't have to be balanced. In my opin together a Manifesto for Reliable Com
ion, there's absolutely no excuse for com puting and lobby for it in the industry. As and take any appropriate actions.
puting that requires multiple reboots a first step, we'll add to our awards at PC 4. All computers should monitor their
each day. The typical excuses sound awful Expo and Comdex and our annual Edi own temperature and power consump
whiney to me: Everything's so complex; tors' Choice Awards to recognize prod tion (for high and low voltage) and warn
people want so many features; it's a com ucts that contribute to this cause, if and of out-of-limit operations.
petitive market. when they appear. So, let me throw down 5. All peripherals should run a POST
It's oft been pointed out that only in the gauntlet and get the dialog started: like diagnostic at start-up and have an
computing do we tolerate the shoddy
work that passes for mainstream operat I'm hard-pressed to think of any other piece of hardware
ing systems and apps. And I'm hard you can buy for $3000 that's as failure-prone as a PC.
pressed to think of any other piece of
hardware you can buy for $3000 that's 1. All OS and application installs invocable diagnostic routine that can be
as failure-prone as a PC. should have absolute rollback capabili run when trouble occurs.
Sure, the culprits are often the cut ties, for multiple generations. The PC will Beyond such a list of engineering prin
corners that make PCs affordable: the never live in as small a universe as the ciples, we should all exercise stern judge
cheap video card, the marginal memory mainframe, where packaged software ment in purchasing. Replace that smile
chip, the inexpensive drive controller. tends to be much better behaved. In with a frown when vendors say they pro
But how often do PCs fail because of bad such a diverse world, rollback at least pre duced their app on "Web time"-what
cooling, improper voltage regulation, or serves workability. they mean is that it's late alpha code and
other fundamental design flaws? I'm bet 2. General-purpose computers need you're the beta tester. We all complain
ting pretty often. Preventing those fail some real-time capabilities. Specifically, about buggy software and unreliable
ures with better components would not what good is network administration if a hardware-now let's put our money
be that expensive. For example, while it's computer is so locked up that it can't where our mouth is.
nice that disk drive capacities have been communicate over the Net? All operat
on a serious price/performance ramp-up, ing systems should keep a channel open
I'm sure we'd all take a slightly less steep to network admin traffic.
ramp if it were combined with increas 3. All OSes should be self-healing. If
ingly rugged and foolproof drives. Yet any component of the OS becomes cor
several years ago, some in the drive indus rupted or fails (due to version conflicts, Mark Sch lack, Editor in Chief
try adopted the reverse tack. They said: for example), the OS should know that [email protected]
after it. You created it, you developed it, you saw
• Australla Coolab 03 98985685 • China (Beijing) Feitian 010 62567389 (Hong Kong) Hastings 02 5484629 (Shenzhen) Haslings 0755 2328741 • Czech Alias 02 766085 • Denmark Bercndscn 039 577316 • Egypt Zeineldein 02 3604632 • Finland ID·Systems 09 8703520
• Greece Unibia!n 01 6756320 • India Solution 01 1 2148254 • Italy Panner Data 02 26147380 • Korea Dae·A 02 8484481 • Mexico SiSolt 091 80055283 • Poland Systherrn 061 480273 • Portu gal FuturntaticaO\ 4116269 • Romania Ro Jnteract!ve 064 140383
• Singapore ITR 065 5666788 • South Africa D Le Roux 011 8864704 • Spain PC Hardware 03 4493193 • Sweden KordalJ 455 307 300 • Swllzerland 01rng 061 7169222 • Taiwan Teco 02 5559676 • Turkey Mikrobeta 0312 4670635 • Yugoslavia Asys 021 623920
" 1997BSAISPAStudy
Enter HotB YTEs No. 85 at http ://www.byte.com/hotbytes/
Kudos forced to use SQL tools, I fee l how well it works. For an
like I have entered a rime overview, see http://
Kudos to Scott Mace and his warp and come our around www.microsoft.com/
fellow authors. "Weaving a 1975. I want to get back to hwdev/pc98.htm. -Mark
Better Web" (March cover my 1997 integrated develop Sch lack, editor in chief
story) is timely, comprehen ment environment!
sive, and understandable. It Michael Nachison VBABashing
has provided me wi th a H orizon Real-Time Systems
clearer understanding of the [email protected] In "VBA and COM" (March
interrelated concepts of feature) , Mr. Gates repeated
Extensible Markup Lan Wake-Up Call his tired mantra: Buy Visual
guage (XML) , cascading style Basic for Applications and
sheets, and Dynamic HTML I was lucky enough to use use it to bludgeon other
than any other article or Sun workstations 8 years ago Microsoft products into an
book that I have read. Keep at university, and now my Intel, w ith input from others, application stew. After all,
up the excellent work. Pentium lI system is proba provides a sleep capability with the declining purchase
Thomas P. Chester bly equal in clock speed, if similar to that in laptops. cost of hardware, who cares
Chief technology advisor nor in MIPS, to those The problem with laptops is about such archaic concepts
Securities and Exchange machines. Yet, one thing is that not everything wakes up as speed, parsimony, and
Commission missing : power manage upon Resume; for example, efficiency? I do. Besides
ment. Those Sun monsters you may have to reboot to wanting to avoid bankrupt
Limited were never switched off; it get modems and network ing my clients with perpetual
Vocabulary was essential that they were interface cards to work. PC equipment upgrades, I want
ready to kick in at the touch 98 is supposed to fix that. It to avoid bankrupting myself
Sorry, but I didn't get the of a spacebar. As a home also is supposed to have with the time-consuming
point of "Stored Procedures: user, with out a network, you "OnNow" capability, part exercise of trying to make
Threat or Menace?" (March would think that I have no ofwhich deals with LAN incompatible off-the-shelf
feature). Did the authors need of such a technology. wake-up events. A specific components do something
mean that we all should It's just for lapto ps, yo u say? set of packets sent across the productive together. Before
become SQL gurus? That I am convinced it would be LAN will turn the machine Microsoft talks about bash
would be a step backward. welcomed by milli ons of PC on, enabling, for example, ing modules, it should get
The real reason developers users. For a start, my Win a network administrator to the infrastructure of its pro
go back to the familiar way dows 95 machine is even install software on desktops gramming languages in
of doing things when they slower to boot than my old at night. A similar facility working order.
can't think of a simple way 486DX. Second ly, I wou ld could allow you to contact Jill McLeester
to solve a problem nonpro like to leave it ready to check your computer remotely Three Systems
cedurally is that SQL is limit my e-mail account, receive and turn it on. We 'll see j iI/@three-systems.com
ed, restrictive, and non fax messages, and possibly
;---·· . - -- - HOW TO CONTACT u-s
expressive in comparison to handle voice mail. I'd like to
c++, Delphi, Visual Basic, be able to do this without ON THE WEB BY E-MAIL SUBSCRIPTION
Visit The BYTE Site! Address letters to CUSTOMER
o r even plain old C, BASIC, having to listen to a noisy Search our archives. [email protected]. To SERVICE
or Pascal. SQL development fan, or have glowing LEDs Doumload articles. See reach individual U.S. only: 800-232
environments are about 20 watch over me at night. industry press releases. BYTE editors, see The 2983; international:
j oin on-line confer BYTE Site on the Web 609-426-7676; or see
years behind the times. Please raise this issue with ences with other BYTE for a directory. Letters http://www.byte.com/
Interactive debuggers, trac a wider audience. readers! See http:// may be edited for admin/mpcstsvc.htm.
www.byte.com. p11blication.
ers, watches- all the things Christopher G D Tipper
For advertising and
that allow developers to Athens, Greece BY FAX BY POST other noneditorial
debug and validate today's [email protected] 781-860-6522 Editors, BYTE, contacts, see pages 10
29 Hartwell Ave., or 153 or click on the
complex applications- are Lexington, MA information links on
virtually absent. I work with The PC 98 specification, 02173 The BYTE Site.
Delphi 3, and when I am developed by Microsoft and
include everything you need to create, deploy and manage the new apps yo u're countin g on for a business edge. The "back room"
functions extend seamlessly to legacy systems, leveraging enterpri se assets on Windows®desktops. And all IBM software for Windows
NT is Web-enabled, ready for e-business when yo u are. So yo u ca n exte nd critical functions to users, suppliers and customers
anywhere, without anybody's platform getting in the way. For the whole lineup and free b·ial code, visit www.software.ibm.com/ nt
The IBM home page is located at www.ibm.com. !BM. Solutions !or asmall planet. thee-business logo and other marks designated • or '"are trademarks o1 lntemational Business Machines Corporation in the U.S. and/or other countries. Lotus and Lotus Notes are
trademarks al Lotus Development Cmporation in the U.S. and/or other countries. Java is a tradema1k of Sun Mic1osystems. Inc. Microsoft. Windows and Windows NT are registered trademarks of Microsoll Corporation. © 1998 IBM Corp. All rights resefved.
Enter HotBYTEs No. 1 02 at http ://www.byte.com/hotbytes/
_rm,
164SX, which housed a 4.5 - test. N ot surpr isingly, the
GB, 10,000-rpm , Ultra Wide three syst ems had similar
SCSI hard disk and an 8-MB performance n umbers.
Diamond FireGL lOOOa AGP Though all are solid
graphics card. Tri-Star sent a machines, we give our nod
$2383 StarS tatio n SXS, with to the $2383 Tri-Star, which
a 4.3 -GB, 7200-rpm, SCSI-3 had the right mix of config
Ultra Wide hard drive, uration and p rice for
14/32x IDE CD-ROM, and performance. We also liked
4-MB M atrox Millennium II its large cabinet with easily
PC! graphics adapter. We replaceable cover, roomy
measured performance with inside fo r accessing RAM,
our low-level processor test, extra fa n, and space to sup
BYTEmark, and BAPCo's port t hree high-speed
SYS mark 4.0 application drives.
•!tH,f1i*'·'d·l·tJ~
COMING UP IN JUNE
COVER STORY
Available
separately.
The Truth About Windows
Scheduler Should you upgrade your company desktops to Windows
98, or wait for Windows NT 5.0? We look at the real
differences-as they now exist-between Windows 95,
dtst}nct
bSSSss
Free evaluation at
www.distinct.com
408-366-8933
Windows 98, NT 4.0, NT 5.0, and Windows CE.
FEATURES
What's New with IA-64
BYTE reports on developments that have come to light
since our December '97 in-depth analysis of Intel's
next-generation microprocessor architecture.
Scripting Languages
So you wouldn't trust your business to free
REVIEWS
Lotus Notes 5.0
The groupware leader completes its transition to a
Webbed world. Our reviewer tests the redesigned GUI,
with its browser-like features and support for major
messaging standards, among other new capabilities.
LAB NOTES
The Real Deschutes
The BYTE Lab tests second-generation Deschutes PCs
with the new 100-MHz system bus, designed to take full
advantage of 350- and 400-MHz. processor speeds.
Conventional OS Architecture
The monolithic OS on Joe's machine
clumps all OS components into a single
address space. One subtle programming
error in just one driver, and whoomp!,
Joe has to reboot - again.
Dave hasn't
www.qnx.com (don'tmissourdemo!)
call 800 676-0566 ext. 1064 ~-"'---
The Leading Rea/time OS for PCs
BYTEmark integer performance over In 2Has 66-MHz system bus, 133-MHz l2 cache bus, 512-KB l2 cache, 66-MHz graphics bus, and Win 95.
tel's previous fastest notebook CPU, the 3Has 33-MHz system bus, 66-MHz l2 cache bus, 512-KB l2 cache, 33-MHz PCI bus, and Win 95.
Mobile Pentium with MMX, running at 4Has 66-MHz system bus, 133-MHz l2 cache bus, 512-KB l2 cache, 66-MHz graphics bus, and Win 95.
5Has SQ.MHz system bus, 100-MHz l2 cache bus, 512-KB l2 cache, 33-MHz PCI bus, and 96 MB of RAM.
266 MHz. In addition, we found almost 6Has 66-MHz system bus, 133-MHz l2 cache bus, 512-KB l2 cache, 33-MHz PCI bus, and NT 4.0.
For example, last year Dell 's Latitude ease ofnavigation and speed of the Web. The Source: Ernst & Young (http:// www.eyi.com}
4
Index
6 8 10
Hewlett-Packard has been at it for three
years. Sun and Digital Equipment an I
Contents
ly. For one thing, vendors estimate that nounced a port to IA-64. Meanwhile, Build E-Commerce Sites
the battery life of a Pentium II-based Novell, at the Brainshare conference in for Less Money
notebook is about 10 percent to 15 per March, anno unced that after NetWare 32
cent less than that of an equivalent Til 5, its next release will be a new OS for
lamook (your m il eage may vary). And the IA-64 chip. GartnerGroup on Windows
heat dissipation is always a concern in Perhaps the most surprising state 98 vs. NT
notebook and hand-held designs. Pen ment to date regarding IA-64 was Digi 38
tium II designs that require a fan might tal and Sequent's joint announcement
be too bulky for a mini-noteboook, for that they are collaborating to port Dig Interview on E-Mail Security
example. But if performance is what you ital Unix to Merced. Today these com Standards
•Already has 64-bit Unix •Increasing popularity of NT scalability, reliability, and than previous Intel architectures, which
•Possible benefit from Sequent Cons: performance would mean more choices for customers.
relationship •Currently lacks 64-bit OS • UnixWare 7 has limited 64-bit
Cons: •NT needs improved sca lability capabilities
That means every OS vendor will need to
• Late sta rt on porting efforts and reliability for enterprise provide a smooth migration path to Mer
•Weak Unix market share SUN
THE SANTA CRUZ OPERATION Pros:
ced or risk losing customers. -J. K.
HEWLETI- PACKARO (SCO) •Now working more closely
Pros: Pros: with Intel
•Already has 64-bit Unix •Leader in Unix-server licenses Cons:
•Close ties with Intel
•Three-year head sta rt
•Two-year head start
•Recent support from Compaq,
• No 64-bit OS
• Solarisfor Intel currently
Security for
Cons:
•Only big-endian OS on Merced
• Has not signed key ISVs
Data General, ICL, and Unisys
• 64-bit capabi lities
not equal to SPARC version
Your Eyes Only
for 12 months and nearly signed on to
collaborate on a similar effort for Solaris,
ch itecture in favor of IA-64. This relation
ship bodes well for HP-UX on Intel, but
A new method that identifies peo
ple by analyzing their eyes might
soon be coming to a bank, store, or
but it backed off at the last minute. HP is challenged by the fact that HP-UX building near you. Iriscan (Mt. Lau
Solaris is a leading contender on Mer will be the only big-endian OS on Merced rel, NJ, 609 -234-7977; http://www
ced, with a strong market share, indepen (Merced will be bi-endian, supporting .iriscan.com), whose identification
dent software vendor (ISV) partnerships, big- and little-endi an OSes). This might technology can recognize the unique
and a reputation for reliability. But, ac scare off some ISVs. pattern in the iris of the human eye,
cording to Jeff Pancottine, vice president Of course, Windows NT w ill also be is partnering with technology and fi
of marketing for Sequent, "Sun's focus is competing with the vario us flavors of nancial organizations to market prod
on SPARC, and while Solaris on Intel and Unix o n Merced. Microsoft believes it ucts for app lications that require non
Solaris on SPARC share a common source will release a 64-bit NT almost concur intrusive, noncontact, and extremely
base, Solaris on Intel is not equal to Solaris rently with Merced's introduction and accurate electronic identification. Iris
on SPARC." Today, Solaris on x86 lacks says it wi ll provide SDKs by the end of this can is also currently developing a low
the scalability, partitioning, and hot-swap year. NT continues to evolve, and Micro cost version of its solution for the PC
capabilities of Solaris on SPARC. soft believes it will be competitive with market.
Sun officia ls respond that Solaris on more high-end Unix OSes. "SMP [sym Iris technology id entifies people
Merced will have advantages that Solaris metric multiprocessing) scaling, graph th rough an electron ic analysis of pat
onx86 never had. "Sun has reached a lev ics performance, 1/0 subsystems, mem terns found in the iris of the human
el of cooperation with Intel for Solaris on ory support, ATM [asynchronous transfer eye. Scientifically accepted as a per
Merced that we never had on x86," says mode] supp ort, and all the necessary sonally unique human characteristic,
Brian Croll, director of product market pointers are ready for a 64-bit implemen th e iris, th e colored ring of tissue that
ing for Solaris. Unlike previous x86-based tation of NT," says Ed Muth, group prod surrounds the pupil of the eye, fea
development efforts, Sun has early access uct manager for Personal Business Sys tures a complex combination of pat
to Merced's inner workings, thanks to a tems with Microsoft. terns that can be recorded as a 25 6
nondisclosure agreement. Sun has also OS vendors might be eager to port to byte "Iriscode." An iris-recognition
opened a porting center for ISVs, applica a chip that doesn't exist yet, but analysts product captures a photographic im
tion developers, and OEM partners, such and IS directors are more blase. "We have age of the iris, analyzes its unique vi
as NCR, to tune Solaris applications on a few applications th at co uld benefit sual structure, and then compares it
Merced simulators. from Merced, but probably not anytime to previously stored Iriscodes for au
SCO had initially planned to develop soon," says Todd Wright, a system archi thentication of identity. The technol
a single binary specificat ion for Merced tect with Wells Fargo in San Francisco. ogy can be used for access control,
with HP, but the company eventually set "First we've gotto take care of Year 2000 point-of-sale (POS) solutions, and data
tled for a technology-sharing agreement, compliance issues. Maybe in 2001 we can protection.
which has since ended . Analysts point look at Merced." Sensar, of Moorestown, New Jer
out that SCO's Unix Ware is a general "IA-64 is not a compelling reason to sey, is now using Iriscan technology in
pu rpose enterprise platform and must be lose sleep right now," admits Tom Henkel a test pilot program for the banking
upgraded in order to compete on IA-64 . of GartnerGroup. "But I would be uneasy industry. Pilot programs using iris
UnixWare 7, announced in March, al if I were an IT manager committed to a recognition products in bank ATMs
ready includes 64-bit capabilities, and second-tier vendor and I had to migrate are under way with Citicorp in the U.S.
Compaq, Data General, !CL, and Unisys to a new OS in order to implement Mer and NCR and NationWide Bank in the
are today committed to Unix Ware. ced ." For example, Henkel points out U.K., and in cooperation with Oki In
HP is Intel's parmer in developing Mer that Sequent customers wi ll have to mi dustry Co. and other financial institu
ced, and it will phase out its PA-RISC ar grate to Digital Unix if they plan to use tions in Japan. Although Sensar's cur
-
computer. Each one is custom-built to EASY ORDERING.
..·~ .·
~-.,..,.-.. • u........., your exact specification-no standard
"""'"
-·
W .i;.:..,.. 5----- .
. An Account Representative can help you determine tl1e
...,__ _ "I
.~/
\
options or features, just qualltyand value. best level of power, options and add-ons to meet your
And each CompUSA PC is built around the highest quallty company's needs. Sin1ply call 1-888-421- 8986 to speak to an
motherboards, processors and chassis.So the quallty inside is as Account Representative, or shop our Web site at
dependable as the name on the outside. www.compusa.com. Either way,orde1ing has never been easier.
COMP USA PC™ AMERICAN COMP USA PC™ AMERICAN COMP USA PC™ AMERICAN PRO
AS233 ASII233 ASPII333
Intel 233MHz Pentium®Processor wid1 MMX"
Intel 233MHz Pentium®rr Processor • 32MB Intel 333MHz Pentium®rr Processor • 32MB
Te::hnology • 32MB SDRAM • 4.3GB Hard Drive
SDRAM • 4.3GB fL'll"d D1ive • 32X CD-ROM SDRAM • 6.4GB Hard D1ive • 24X CD-ROM
• 24X CD-ROM D1ive • 56K*/14.4 Data/Fax D1ive • 56K*/14.4 Data/Fax Modem • 17" D1ive • 56K*/14.4 US Robotics Data/Fax
Modem • 2MB Video C.ard • 15" SVGA, .28 NI SVGA, .28 NI Moniror (15.8" Viewable Image Modem • 17" SVGA, .28 NI Monitor (15.8"
Moniror (13.8" Viewable Image Size) • 16-Bit Size) • 4MB 30 Video Outl • 16-Bit PNPAuclio Viewable Image Size) • 4MB 30 Video Out!
PNP Audio Carel • 1-3.5" 1.44MB Floppy Outl • 1-3.5" 1.44MB Floppy • ACS43 9Watt • 1-3.5" 1.44MB Floppy • ACS45 26Watt
• 6.SWatt Speakers • Microsoft Wmdows®95 Speake1:; • Microsoft \Vtndows®95 • Microsoft Speake1:; • Yamaha Waverable 16-Bit 30 Sound
• 104-Key Keyboard Office 97 Small Business Edition • 104-Key • Microsoft Wmdows®95 • 104-Key Keyboard
Keyboard
#818583 .' .. .. $119995 #81 8645 ... ........ ............. .. .... $169995
#818623 ........... ........ .... ...... $2299 95
- - - - . . _TM
•s tandard shipping and handting- $48.00.Delivery time dependenl upon customer shipping preference. •55K Modems are capable of downloads at 56Kbps. but speeds in actual use may vary.
Courses not offered as vocational training or as qualifying one for any particular employment. Course credits not transferable to any accredited educational institution. Licensed by the Oklahoma
Board of Private Vocational Schools. Connecticut customers: Please note that our introductory classes in word processing provide an orientation to new so\~u are and.not training in word
processing skills for employment. All trademarks are the property of their respective companies. The Intel Inside logo and Pentium are registered trademarks and MMX is a tradema!\< ol \n\e\
Corporation. CompUSA PC and Custom Built for You are trademarks and CompUSA is a registered trademark of CompUSA Management Company. © 1998 CompUSA Management Company.
t
I
. .............. •t•..
U •I• I
Ill •IH
•I I•• •1
•I••
I• ••• • I •11111 •
•I
-
•11•
• ••1• •
......... '·- ..........
11•1•U1111
u -1•1
IU 1111 • • I
n• I H I •
• •• • •.I• I •1 • •• I • •I II• I I• •II
pricey. For example, the company's Sys I •• • • •• - I I • • l•t I •••I ••11 al
• I 1• - I•• I I I I •1111
•I 11• • Ill • I I 1111 I I
tem 2100, which includes a comp uter,
a frame grabber, and other components
needed for access contro l, costs abo ut
$5 000 . "The costs assoc iated with iris
recognition are high compared to other
forms of authentication," ex plains Erik
Bowman, biometrics analyst with Ca rd
Tech/SecurTech, an indu stry watc her
based in Bethesda, Maryland. "In addi @ Foraccess
control and other
ti on, there are issues with social accep
applications, the
tance. The ge neral public wi ll need to be code can be stored
come more comfortable with it." at a networked
Despite th ose drawbacks, Bowman central database,
says Iriscan has advantages over oth er ac eliminating the
need for a card.
cess soluti ons that are based on sma rt
cards and fingerprint analysis. "Iris recog 8 The camera captures an image of the
nition represents the least intrusive fo rm person's iris and assigns a 256-byte lriscode.
An x86-based PC that's on-site compares the
of biometrics ava ilable today," he says. new code to the code stored on the access card.
The nonintrusive, noncontact natm e of
iris recognition, coupled with an extreme
ly low error rate, makes the technology
attractive. According to IEEE studies on lriscan technology can be used for a variety of security
the technol ogy, the proba bility of two applications, including digital certification.
irises producing the same iriscode is ap
proximately 1 in10 78 . merce transactions are also biometrical card purchases and securing informa tion
In addition, a proj ect under develop ly secured, requiring the sender and recip contained in e-mail. According to Iriscan,
ment between Iriscan and GTE, known ient to possess the digital-certificate keys !CS prototypes are expected to be oper
as Iris Certificate Security (JCS), adds a and a personal iris-recognition lriscode ational in the third quarter of this year.
security element that might increase the to access data. Another advantage is that iris recog
tec hnology's appeal. res binds the iris Targets for this initiative range from nitio n isn 't burdened with the negative
recognition process to digita l certificates. busin ess-to-busin ess e-com merce a nd stigmas associated with other forms of
In essence, encry pted electro nic-com- stock and commodity trading to credit- biometrics, such as fingerprinting. " Iris
recognition has never been associated
~ceed
Version 6
The world leader now brings the world 1o you.
Exceed, the fastest growing PC X server,
outsells all other PC X servers combined,
with over 55% of the world market.
We packed the new
Exceed Version 6 with
highly enhanced features: new web
capabilities, improved performan
advanced functionality and an enric
and simplified interface. Then we add~
w d>stffplorer Terminal Emulation Suite
including TN3270E for today's enterprise
computing environment. Exceed Version 6
for Windows NT and Windows 95 and
HUMMINGBIRD®
COMMUNICATIONS LTD.
Exceed Version 5.2 for Windows are all
I!
e.. W'''
~
1.· ITTfiihoP
lrmTIII!]lml
exceeding...it's in our name.
Web site can be daunting, es pecially to CSP PSI Net MindSpring NetCom GoSite
ware, and connectivity, plus about $2000 Monthly fee $125 $350 $250 $189
f -.......~~~~~~~~~~~~~~~~--'==,.--"-=---.~~._..;"--~~~~~~n·'--~~~ -~ ~
~
.ii
"walk away" (i.e., get lost or th eir portability. But users have
i
What Users Dislike About Notebooks stol en) wh en users aren't look spoken, and th ere'sa lot th ey still
creens and price tag s. Those Power to Go" on page 24). re ing. Pricesarecurrently dropping don't li ke about notebooks
S are the top two things users spondentsto the survey seemed for PC notebooks, but th e sys which wou ld expl ain why, in a
found not to like with PC note sa tsified wi t h th eir CPU perfor t em s are still more expensive situ ation wh ere they need to
bookswhen comparing them to mance overall. Inst ea d, th ey are th an equival ent desktops. givean employee asecond PC to
th eir desktop counterparts, ac- dissatisfied with inferior displ ays Perhaps users will always have work on at home, many respon
I cording to a recent survey by (comp ared to th ose on desk to pay apricein exchangefor the dents buy anoth er desktop PC
i BYTE Research . Although Intel's tops); high pric es; sm all key most- liked aspect of notebooks, instea d of a notebook.
I new mobile Pentium II processor boards; lack of durability, relia
addsa performance boost to th e bility, and expand ability; and
latest notebooks (see "More PC their unfortunat e tend ency t o Disadvantages of Portables Compared to Desktops
• . Display
Price
Strategies for Employees' Work-at-Home PC Durability/reliability
• Give portable lo complement desktop Keyboard
Expandability*
21.5%
D Give portable instead of desktop ' I
Battery life
'.'~
f • Employee uses own PC
I , Pointing devices
,1l
/f
~ Give spending allowance ' Hard drive capacity
.. ." '
11.3%•...•...
I Ji.
Other (m• •
. ' , (;#i l
• System comes from loaner pool
I
. ' • Other
'
10 20 30 40 50
4%
:
* Expandability refers to memory a:::::: :::~pondents~ ·)
Source: BYTE Research, telephone survey, 149 responses
-' Source: BYTE Research, 150 respondents (multiple answers accepted) .. )
"I
- - -- ··-.:..,,.....; __ _..._...__._ ---- _._. ..... _ -- - - - --------- -------- .... u
32 BYT E MAY 1998
APC Smart-UPS®delivers unmatched
I
I
I
I
-- -....
i
!
I
I
I
i
L.J
1
I
• •• •=..
•
'&• •
~ •",_Q
•
-
I I
I r'v
@ ~
I
! •
! I
I
_.,;.. •".!l
I M:rn:tm~
EDITORS'
CHOICE .
I C 0 0
I attack networks
relentless ly. To
protect ha rd
wa re a nd data from syste m
crashes, ex perts, network
Smart- UPS with your
ex isting SNMP man age
ment stra tegy.
Sma rt-UPS a nd
managers and co mpute r use rs PowerChut c plus pro
wo rldwide p refer one so lution vid e the co mp lete so lu
above a ll othe rs co mbin ed: ~:..:::=---;...--J..ji!-"'"oJll-::~:= lion in one co nvenient
APC Sma 11-UPS. Now, a ll l 20V bo x. Serve r protecLion a nd peace or
Smart-UPS includ e FR EE mind have neve r been easier.
Powe rChute plu s pow e r ma nage
ment softwa re. r------------------- --,
I Server
The most reliable protection you can buy
Plan for and control crisis situations
Powe rChute plus FlexEve nts"' le ts yo u
FREE
• Solutions Kit
Just mall or lax this completed coupon
I
I
I
I
I
for your FREE Server Solutions Kit. I
Sma rt-UPS pro v id e co mp lete protect ion co ntro l UP S reac ti o ns to power eve n ts. Better yet, order It today at: 1
aga inst pow er spikes, surges, brow no u ts, You ca n configure PowerChute plu s to http://promo.apcc.com IxEv coaE ca24z I1
a nd blackouts. You'll a lso ga in ma x imum pro v id e g race ful, un atte nd ed se rve r sh u t
server up-time a nd dec rea se man age me nt down d urin g a n exte nd ed powe r outage
D YES! Please send my FR EE Server Solutions Kit. :
costs. Award-winning features in clude: o r a lert you LO out-of- bou nd s env iron D N0, I'm not interested at this time, but plea se
add me to your quarterly newsletter mailing list.
i
• Cell Gu a rd"' inte ll ige nt bat1ery manage- me n ta l co ndi tio ns be fore Lh ey result in Name:_ _ _ _ _ _ _ _ _ _ _ _ __
ment mon itors battery performance and costly downt ime. Title: _ _ _ _ _ _ Company: _ _ _ __
Add ress: _ _ _ _ __ _ _ _ _ _ _ __
extends battery life.
" Sma11Slot'" inte rn a l 0 Web server and City(Town: _ _ _ _ _ _ _ _ _ _ _ __
accessory s lot lets yo u SNMP ready State: _ _ Zip: _ _ _ Country _ _ _ __
customize and en hance APCs NEW WebAgcnt'" Phone: _ _ _ __ _ _ _ _ __ _ __
©1998 APC. All Trademarks are the property of their owners. SU0 1EF (800)347-FAXX PowerFax
L----------------------------J ~Z
E-mail: apcinfo @apcc.com 132 Fairgrounds Road, West Kingston, Al 02892 USA
f
>
w
0
I
ii;
c
w
We admit that on occasion we've even asked you
to rip and replace what's inside your head.
© 1998 Microsoft Corporutlon. Al! righ ts reserved. M icrosoft, Visual Stucllo, Where do }'OU wanr to go Coday? cind Windows NT arc {~ithcr regis tered trude1m:irks or trademarks of Microsoft Corpormion in the
United S t ~tes and/or other countries. Other p1oduct and company narnes mentioned herein may be the trndemarks of their respective owners. Boris Karloff licensed by Karloff Enterprises. Represented by
the Roger Richman Agency, Inc., Beverly Hills, CA. Frankenstein is a tr.:-tdemork and copyright of Universal City Studios, Inc. licensed by Universal Studios Licensing. Inc. All nghts reserved.
Microsoft·
--
Microsoft·
BackOffice·
Microsoft•
VISUAL
stud i 0
Visual Basic'
Visual C++•
Visual lnterDev·
Visual J++·
Visual FoxPro
co mpa ni es, w hil e Ne tCo m 's a nd Go ly might be even mo re important, at least Eugene Mondrus is a senior product analyst
Site's partnership with iCentral, th e pub in the sho rt term. By using a CSP, yo u can for Progressive Strategies (http://
lisher of Sho pSite Express (http://www get started quickly, eve n if yo u' re o per www.progstrat.com), a technology
.shopsite.com), might appea l to smaller ating o n a budget . assessment and research firm.
co mpanies. Bo th Me rcantec's So ft Ca rt
a nd iCe nt ra l's Sh o pSite Exp ress pro
vide basic store functi onality, including a
virtual shopping cart, a collection of cred
it-card in for mati o n, extre mely fl exibl e
calculati o n of taxes and shipping charges, ancing the IT portfolio for risk/return and
and no tificatio n of orders via e-ma il to
How to Invest in the
appraising the investment on a balance
both bu yer and me rchant. New Infrastructure
sheet.
But Sho pSite Ex press is des igned fo r nterprises everywhere are scrambling In today's evolving business environment,
merch ants w ith a small selectio n of items E to build an internal infrastructure to the enterprise infrastructure is directly tied
to a firm's strategic direction. It dictates the
(25 or less) and a li mited kn owledge of support the new
business reality: way in which a company does business and
HTML (i Centra l also offers progra ms,
virtu al store how quickly the company can respond to
such as Sho pSite Pro, fo r managing big
front s, Web - competitive challenges and customer de
ger e-co mm erce pro jects.) Yo u can eas mands. Given the essential role of infra
based customer
il y se t up a Sh o pSite store usin g just a structure, the final investment decision be
se rvices, inte
Web browser, but this app roac h offe rs longs not to IT managers but to executives
grated call c en
onl y limited fl exibility regarding Web ters, electronic at the very top of the enterprise. Leveraging
Howf.tar\:et l eaders Capitalize!
page layo ut; yo u'll p robabl y wa nt to use supply channels, - -o·nTnformalion 1"edinologyj the New Infrastructure will acclimate these
Sho pSite w ith an HTML edi to r, such as and shared data executives to the strategic issues and help
Adobe PageMill. Sho pS ite Ex press sup across business articulate a blueprint for a successful IT
po rts o n-line orderin g, inclu d in g pu r units. Three new •nd
investment portfolio.
books can help Two other books provide a practical,
chase o rd ers, bu t it doesn't support rea l
IT managers create and implement tech "how-to" approach to buying and outsourc
time credit-card au thorizati o ns.
nology strategies that best suit their or ing information technology. The Smart Way
One of Sho pSite's negati ves is that it r - - - - i• to Buy Information
ganization.
uses coo ki es to sto re a user 's sho pping Technology makes ex
According to Leveraging the New In
ca rt during sho pping. M a ny users elect tensive use of num
frastructure, 50 percent of all capital spend
to turn o ff th e cookies o pti o n o n thei r ing in the U.S. goes into IT investments. The bered lists and bullet
co mputer beca use o f th eir co nce rn for authors, Peter Weill and Marianne Broad ed points to illuminate
privacy. T his is somewhat problematic to bent, offer a strategy for devising a success vendor negotiating,
the software. ful IT investment portfolio. contracting, consult
M erca ntec's SoftCarr is design ed for The key to successful investments is ing, and strategic al
more so phi sti cated ve nd ors with up to avoiding a hair-trigger technological re ""'"-"""'"""'=- liances. The book deliv
sponse and instead following a focused ers a rich set of guide
10,000 pro du cts and a n un dersta ndin g
plan that matches infrastructure to the firm 's lines for making IT pur
of HTML. The package supports o n-line
strategic objectives, acc ording to the au chases and developing
o rdering and real-time credit-card auth o vendor relationships.
thors. Using research results and case stud
rizatio ns th ro ugh CyberCash. It also lets Outsourcing Informa
ies, they analyze different types of IT invest
shoppers printand fax or mail their ord er. ments and develop methods for assessing tion Technology, Sys
SoftCa rt can ge nerate a transacti on log risk and return. tems and Services
fil e th at can be di rectly imported into In Their conclusions suggest going with the covers several issues:
tuit's QuickBooks. SoftCart does no t use right type of investment to meet company . whether or not to out
11
cookies for sto ring sho pping-cart in fo r goal s. For instance, c ompanies seeking 1 source, what to out
"revenue growth and fast response to mar source, outsourcing trends, writing re
matio n. Instead, it stores this data o n the
ket shifts are better served by more infra quests for proposals, negotiating contracts,
merchant's host server.
structure;' while a successful strategy "to and managing th e' transition to an out
Limited space preve nts us fro m cover
maximize short-term profit is to minimize sourced IT infrastructure.
ing all the CSP optio ns a nd e-store soft
infrastructure investments and focus on Stanford Diehl is a freqent contributor to
ware ava ilable. Eac h CSP offers a vari ety
transactional uses of information technol BYTE and former director of BYTE reviews. You
of hosting plans to suit yo ur needs, so
ogy:' The book details a framework for bal- can reach him at [email protected].
yo u sho uld sho p aro und a nd compare .
And if you ca n' t find exactly what yo u're
leveraging the New The Smart Way to Buy Outsourcing Information
looking fo r, as k the CSP if it can custom Infrastructure by Peter Weill Information Technology Technology, Systems and
ize a plan fo r yo u. and Marianne Broadbent; by Brad l. Peterson and Services by Robert Klepper
H osting yo ur ow n e-commerce solu Harvard Business School Diane M. Carco; and Wendell 0 . Jones;
Press, 1998; AMACOM, 1998; Prentice Hall PTR, 1998;
ti o n might be a better idea for yo ur or
ISBN 0-87584-830-3 ; ISBN 0-8144-0387-5; ISBN 0-13-281578-8;
gani za tio n in th e long term, especiall y if $29.95 $35 $39.95
yo ur e-co mm erce bu sin ess grows . But
getting in fro nt of yo ur customers qui ck
·~
BandWidth
"ADAPTEC.
GartnerGroup Report
Win 98 or NT for the PC Desktop? It .Depends
his year will mark the peak of the hype cycle for the next itera Group expects Win 98 to be the last Windows release to be based
T tions of Windows 95 and NT. Although Windows 3 .xwas adopt on non-NT code. Organizations deploying Win 98 for better appli
ed by many companies as a single enterprise-wide standard, Win cations compatibility need to begin their 16-bit applications migra
dows 98 and NT 5.0 will coexist in most enterprises through 2001 . tion. Enterprises that have limited dependency on legacy applications
GartnerGroup believes that NT 5.0 will become generally available will be much better candidates for NT 5.0 when it ships.
in the second quarter of 1999. In addition, we recommend that you Issues of PC hardware diversity and mobile computing also play
shouldn't deploy NT 5.0 Workstation until the first service pack is an important role in choosing among the different versions of Win
released and proven to be stable, which GartnerGroup believes will dows. NT 5.0 and Win 98 offer robust support for a wide variety of
be six to nine months after NT 5.0's initial release. new hardware, but many systems purchased prior to mid-1998 will
Win 98 will become generally available in the second quarter of be unable to take advantage of at least some of the new features
1998. However, because Win 98 is very similar to Win 95, OSR 2, planned for Win 98 and NT 5.0, such as Advanced Configuration and
and Internet Explorer 4.0, we believe that organizations will be able Power Interface (ACPI) support. Although the new Windows Device
to deploy Win 98 upon its release, without having to wait fora service Driver Model will alleviate some of the issues associated with hard
pack. ware working on both Win 98 and NT 5.0, it will apply only to new
With these time frames in mind, how does an organization break classes of devices, such as universal serial bus (USB) or IEEE-1394
through all this noise and decide which OS is appropriate for its par (also known as FireWire). Drivers for older devices will still need to
ticular needs? Defying the conventional wisdom, GartnerGroup be be created individually for both Win 98 and NT 5.0.
lieves that both Win 98 and NT 5.0 will be applicable to business and PC laptop users in particular will face a greater hurdle in deploy
consumer markets alike. Organizations should consider the follow ing NT 5 .0. Although NT 5.0 will finally support such mobile fea
ing considerations before deploying Windows 98 or NT 5 .0 : tures as advanced power management, it w ill do so only on systems
that are purchased after the second half of 1998. GartnerGroup
•The importance of legacy (16-bit) Windows and DOS business
believes that existing mobile systems running NT 4.0 will not migrate
applications that are running on the desktop.
smoothly to NT 5.0 and will be hampered by compatibility and per
•The diversity of PC hardware that must be supported. formance issues. As a result, those older mobile PCs should contin
•The organization 's desktop-management strategy. ue to run NT 4.0.
One of the key features of NT 5.0 will be support for a wide variety
Although Win 98 and NT 5.0 share a common 32-bit applica of management technologies aimed at lowering the total cost of own
tions architecture, Win 98 retains a significant amount of legacy ership (TCO) through better centralized control. Known as the Zero
16-bit code that helps it achieve better reliability running 16-bit leg Administration Initiative (ZAW), its features will exist on both NT 5.0
acy applications. Organizations that continue to rely on these older and, to a lesser degree, W in 98. Features available only on NT 5.0
applications will be better served by Win 98 than by NT. This back that enable the best manageability and TCO reduction include true
ward compatibility, however, is expected to be short lived. Gartner- server-based roaming profiles; side-by-side machine replacement,
which provides simplified moves and installations; and better sys
tem stability. This stability is due to the use of ZAW-enabled and brand
Which Windows? ed applications that will have a much more restricted installation
process and no access to the system directory.
Stay with Windows 95 Despite the attractiveness of the ZAW features set, NT 5 .0 will
•if your PCs use older (e.g ., 486) CPUs incorporate a host of unproven technologies. As a result, Gartner
•if your PCs have modest (e.g ., 16-MB) RAM Group recommends that you should wait at least six to nine months
•if you don 't want to upgrade your older hardware until the first NT 5.0 service pack is released and proven stable before
•for mobile-computing support deploying.
•if you still rely on 16-bit legacy Windows and DOS
Windows NT Workstation and Win 9.x are both powerful 32-bit
applications
OSes that can meet a variety of business-computing needs. Orga
nizations should not be swayed by marketing hype; instead, they
Upgrade to Windows 98
should choose the OS that best fits their computing requirements
•if you need support for new features, such as ACPI, USB,
based on the three major areas outlined above.
multiple displays, and FAT32
Although NT technology will eventually become the standard for
•for improved mobile computing with new notebooks that
all Windows users, this change will not happen for at least three years,
support ACPI, USB, or Card Bus
with the major impediments being legacy hardware, software, and
•if you rely on legacy 16-bit Windows and/or DOS apps
mobile-computing needs. Organizations should not withhold deploy
Migrate/stay with NT 4.0 ment of a 32-bit OS waiting for NT 5.0 but should instead proceed
•if you're running 32-bit applications exclusively with migration efforts to Win 98 or NT 4.0 as appropriate. This will
•if you need better security and stability than Win 95's help them reap the benefits that 32-bit OSes bring to the desktop
Upgrade to NT 5.0 and avoid the death throes of 16-bit Windows and DOS.
•if you need improved security, performance, and reliability Michael Gartenberg is a research director for GartnerGroup, where he focus
•if you're running 32-bit Windows applications exclusively es on end-user computing, particularly the implications of personal comput
er technologies on end users and enterprises alike.
38 BY TE MA Y 1 998 w w byte.com
• 128MB ECC EDO'Memory
• 512KB Integrated l2 ECC·Cache
• Integrated PCJ Ultra-Wide SCSl-3 Controller
*9GB Ultra-Wide SCSl-3'Hard Drive
(7200 rpm)
• 24X Max! Variable SCSI CD-ROM·Drive
• Intel Pro/1008 PCI Ethernet Adapter
* APC Smart-UPS 700 Power Supply
• H~ OpenView'" NNM Special Edition
• 6 Expansion Slots: 3 PCJ/3 EISA
• 6 Drive Bays: 3 External 5.25'/
3 Internal 3.5'
* 3-Vear Next-Business-Day On-site•
Service
• 7x24 Dedicated Server Hardware Technical
Telephone Support
*2nd 333MHz Pentium II Processor..add $99q.
*Add a 9GB Ultra-Wide SCSl-3 Hard
Drive, $899.
*12/24GB Variable SCSI DAT Tape Backup
Unit, add $849.
$3999
THE DELL POWEREDGE 2200 SERVER. NOW WITH 333MHz FOR YOUR GROWING BUSINESS.
Do your PC capabilities measure up to your company's growing needs? Then take a look at TO ORDER TOLL-FREE
the Dell"' PowerEdge°' 2200 server. the feature-rich server with the perfect mix of performance
and expandability, that can be yours for one of the best prices in the industry. Relevant 800-695-3544
technology like dual Pentium"' II processor capability, ECC EDO memory and an optional RAID TO ORDER ONLINE 24 HRS./DAY
feature delivers outstanding performance in its workgroup class. And our www.dell.com/buydelI
service offering includes three years of next-business-day on -site• service Mon-Fri 7am-9pm CT• Sat 10am-6pm CT
and lifetime 7x24 server hardware technical telephone support. So give us GSA Contract #GS-35F-4076D
a call or visit our website today. With the PowerEdge 2200 server on your I Keycode #01319 I
P.!'lr!\iHin~H team. managing growth won't be such a stretch.
For acomplete copy of Guarantees or Limired Warranties. please writeDell USA LP., Ann:Warranties. One Dell Way, Round Rock. TX 78682. Oflusiness leasing arranged by Dell Financial Services LP..an independent entity, to qualified customers. Above lease payments based
on 36-monrhlease. and do norincludetaxes. fees. shipping charges;subject to credit apprnvat and availability. Above lease terms subject to change without notice. A.On-si1e service guarantee provided pursuant to a s.e.M~ ttin\I-att with athird-party provider. May not be
a:.tiiY;;t;Jein.12mc:e~a li~X Max/1 2X Min. * Prices and specifica1ions valid in the U.S.only and s.ubject to change without notice. The Intel Inside logo and Pentium are registered trademarks and MMX is atrademark of Intel Corporation.MS and"\I :Xf:J:~ a ia 1aj1S\e1ed
uademarks of Microsoh Corporation. HP is aregistered trademark and OpenView is atrademark of the Hewlett Packard Company. Oell. the Oell !090 and PowerEdge are registered trademarks of Oell Computer Corporation.©1998 Oell Computer Corporation.All rights reserved.
I NT ERV .I E W
Blasts from
Double Trouble for E-Mail Security
the Past
Paul Hoffman, director ofthe Internet Mail Consortium,
***** Outstanding ****Very Good ***Good * * Fair * Poor MAY 1998 BYTE 41
Graphics Accelerator
ear and trilinear texture mapping, anti a variety of transform ations on them with ~
z
aliasing, multiple light sources, fog, trans excellent results. The 2-D perfo rmance David Em (Sierra Madre, CA) is a digital ill;u
Gl
parency, and reflection. on the refere nce board was adequate but artist and writer. You can contact him at
"'
sluggish. Previo us 3 D Labs chip sets have davidem @earthlink.net.
42 BYTE MAY 1998 ***** Outstanding ****Very Good ***Good **Fair * Poor
s&K Faxmodem
mllllll U.S. Robotics
ITU standard and x2 technology compatible
1•~···~ both
~ Compatible
the with
determined 56K
s tandard and
• x2 'M techno logy.
Includ es a
CD·ROM jam-packed with + 600 x 1200 opl icnl r esolution + 30 ·bit.
greal software for work and play. color; IO·bit. grayscale + Single pass flatbed
scanner + Pa rallel interface + 6 pages
Intern al $157 .00 CDW 107570 per minu te at 100-clpi color, lett er size
CALL US TO DAY!
• 8 .5" x 11.69" m:Lximum sca nning n r ea
Exte rnal $177 .00 CDW 107571
~
HP NetServer E 45 servers
['i] ~!~:ri
0
2.1GB ID E ..... . .............. ............................. 135.91
Stylus
Stylus
Color 3000 .... ............................... 1999.00
Photo .... . .... ...................... ............. 399.00
Hayes OPTIMA 56K ............. ..................... .. 199 .24
Hayes OPTIMA 56K w/EZjack ............ ... .. ... 199.24
Intel EtherExpress PR0/ 100
233/Pl l 32MB no hdd 24X 10/100 Ena! .... 15BB.68
233/P ll 32MB 4.2GB 24X 10/100 Enel .. ... 1998.57
2.55GB IDE ................................. ................ 157.99 [A~ ~!~.Z.:~6 16·bit PC Card Enet/56K ..
4.5GB Ultra SCSI ....................... ............... 589. 84 ~~----si Practical Peripherals 56K Flex cellular
266/P ll 32M8 no hdd 24X 10/ 100 Enet .... 1898.37 9. 1GB Ultra SCSI........................................ 796. 09 Simple 33.6K Communica tor
266/Pll 32MB 4.2GB 24X 10/100 Enel .....2175.87 HP DeskJet 340 portable inkjet printer ....... 265.85
w/SimpleJack ............................................ 139 .89
266/Pll 64MB 4.2GB 24X 101100 Enel ..... 2345.58 HP OeskJot 672C color prinler ... ..............199.00 Simple 33.6K cellular ..................................1 49.53
HP DeskJet 694C color printer ................... 239.00 Simple 56K Communicator. . . .... 154.50
HP DeskJet 722C color printer ................299.00 Xircom 56K ... . . .. .. . ... .. .. .... ................... 165.84
HP DeskJet 890Cse printer .......... .. ............ 399.00 Xircom 10/ lOO+modem 56K ............. ....... ... 327.28
PC Server 325 servers HP DeskJet 1000Cse color printer ..........387.07 Xircom 10/ 100+modem 56K w/MiniDock .... 299.85
233/P ll 32MB no hdd BX ........................... 2399.58 HP LaserJet 5Si printer ............................ 2438.03
233/Pll 32MB 4.SGB BX ........................... 3165.67
266/Pll 64MB no hdd BX .......................... 2699.56
DIGITAL IMAGING .. .489.25 HP LaserJet 6Lse printer ............................ 399.00 MODEMS
HP LaserJet GMP prinler ...........................877.26
266/Pll 64MB no hdd ex
rack model ........ 3179.87 .. .828.33
HP LaserJet 6Pse printer ........................... 799.00 ,!!!!!
PC Server 330 servers ... 299.00
... 499.00 HP LaserJet 4000se printer .................. 1149.00 56K x2 Internal
61200 64MB no hdd BX. .. ................. 3718.27
HP PhotoSmart photo printer ...................... 399.00 56K x2 external ...................................... .
233/Pll 64MB no hdd ex .......................... 3345.47
.. . 699.00 l· modem lSDN V.34 faxmodem external
266/Pll 64MB no hdd BX .......................... 3528.57
.......... 699.00 LEXM 1\RK.
[gj]LJNKSVS'" .......... 799.00
.......... 268.58 Color Jetprinter 1000 ..... . .......... .......... 139.02
ll'.@ffillfj@®itzW
Combo Ether16 LAN card ............................ 35 .38 ... .. ... .. 399.28 Color Jetprinter 7000 ................................. 347.80 Winmodem V.34 33.6K internal w/lax........... 57.87
Combo EtherPCI LAN card .......................... 49 .17 ............99. 11 Optra E+ ..................................................... 394.27 V.34 33.6K internal w/fax.. .. ................ 84.32
Combo PC/Ethernet card 10BT ................... 69 .07 ........ .. ... .. 409.4 4 V.34 33.GK external w/fax .......... ................... 99.07
...... ........... 844 .80 Optra S 1250 ............. .. ............................... 999.94
10BT 5-port workgroup hub ................ ....... 42 .74 Voice V.34 33.6K Internal w/fax .................. 109.44
EtherFast 10/ 100 LAN PC Card .. . ....... 11 5.4 1 1216 .69 Optra S 1650 ........ ...... ........................ ...... 1089.28
................... 399 .00 Voice V.34 33.6K external w/fax ... .............. 137.30
EtherFast 2·port 10/ 100 swi tch ................... 239.16 Op1ra S 2450 ................. .......... 1979.48 56K x2 internal.. . ......... .... 139.93
StackPro 8-port 1OOBTX desktop hub ........ 299.81 Optra SC 1275 .......................................... 3289.89
StackPro 16-port 1008TX rackmount hub .. 499.86 SCANNERS 56K x2 external ............. ...... ...... ... ............... i58.92
56K x2 Voice internal .................................. 155.62
Epson Expression 636 Exec..... . .... 799.00 Ol(IDAUX
NETGEAR Epson Expression 836XL ......................... 2499.00
OklJet 2020 .......................................... .. 199.00
56K x2 Voice externa l ............................ ..... 169.68
56K Winmodem ................................... .. ...... .93 .69
101100 Fast Ethernet PC I adapter. ................ 35.97 Hewlett-Packard PhotoSmart photo scanner ..399.00
Okipage 4w .......................... 199.00 ISDN 128K terminal adapter ....................... 176.25
EN1 04TP 4-port 10BT slimline Ethernet hub ..42.26 Hewlett Packard ScanJet 5s scanner .......... 199 .28
Okipage 60 .. .. .............. .. ... .. ......... 299.00
EN108TP 8·port 10BT slimline Ethernet hub .. 56.58 Hewlett Packard ScanJet 5100cse scanner .. 299 .00
Okipage 16n ............................................. .. 899.00 (IlHayes
FE104 4·port 100BT Fast Ethernet hub .. .... 124.43 Hewlett Packa rd ScanJet 6100cse scanner .. 799.00
Logitech PageScan Color Parallel ... .. ............ 98.20 ACCURA 56K internal .................................135.06
FE108 8-port lOOBT Fast Ethernet hub ...... 209.19
Microtek Color PageWiz ............................ 154.83 MONITORS ACCURA 56K external ................................159.01
8£' seagate
Software Microtek ScanMaker E3 Ptus ..... 147 .93 MAG lnnoVision 410V2 14· 0.28mm .......... 159.68 ACCURA 56K speakerphone internal ......... 168.35
ACCURA 56K speakerphone external ........ 179.78
Backup Exec for Windows NT V7 .0 Microtek ScanMaker E6 standard .............. 277 .92 MAG lnnoVision DJ530 15" 0.28mm .......... 267.18
OPTIMA 56K external ................................ 289.30
~i~~~-~~~~~grd~?~d~~~i~'t ~.Po............249.76 Minol1a Dimage Scan Dual ................ 669.88
UMAX Astra 6 10S .. . ..................... 129.00
r
MAG lnnoVision DJ700 1 0.26mm .......499.29
MAG lnnoVision DJ800 19· 0.26mm ..... .. .. 679. 14
ACCURA ISDN ............................................229.04
S:~~~gr~ie~~~oW~~g~~ ~~9v?: o· ........... 364.28 UMAX Astra 1200S w/Photoshop LE .......... 299 .00 NEC MulliSync E500 15· 0.25mm .............. 336.52
UPS SYSTEMS
UMAX Mirage Ilse w/MagicScan .. . ...2995.00 NEC MulliSync E700 17" 0.25mm .. ............ 668.17
single-server edition ................................ 428.17
~-·
Backup Exec !or Windows NT V7 .0 Visioneer PaperPort mx .. .. 139.55 NEC MulliSync E1100 21" 0.28mm ..........1059.80
enterprise edition................... . ........... 789.88 Vlsioneer PaperPort 3100 flatbed ................ 149 .33 Philips Magnavox 105S 15" 0 .28mm ........187.78
Backup Exec for NetWare V7 .5 Visionee r PaperPort 6000 llatbed ..............199 .99
Philips Magnavox 107S 11· 0.28mm .......... 349.55 Back-UPS Office ........ ......... ...................... 104.76
25-user single-server edition ................. 307.58 Visioneer PaperPort Strobe ..................249.99
Princeton EOSO 1s· 0.28mm .....................238.64
cowsTELEPHONE HOURS Princeton E070 11· 0.28mm .................... 389.14
Princeton E090 19" 0.26mm ........ ............... 699.53
Back-UPS Pro 280 PNP ............................. 134. 14
Back-UPS Pro 420 PNP .............. 219.93
Back-UPS Pro 650 PNP ............................265.91
800-959-4239 Sales Samsung Sync Master SOOS 15" 0.28mm ...215.00 SurgeArrest Personal ..... . ............... .......... : 19.7 5
Sony Multiscan 100es 15" 0.25mm ............ 327.70 SurgeArrest Proressional .............................. 27.91
800-509-4239 Monday-Friday 7 a.rn.-9 p.rn. CT Sony Multiscan 200es 17" PnP 0.25mm ....605.80 SurgeArrest Network ................................. ... 31 .59
Saturday 9 a.rn.-5 p.rn. CT Sony Multiscan 300sl 20" PnP 0.30mm . ..11 29.56
800-280-4239 Viewsonic E771 1r 0 .27m m ..................... 389.54
flf't11p"'ffi"E
Tech Support/Returns for Customers -~-
Corporate software sales 800-294-4239
8()().383-4239 Viewsonic G773 17" 0.26mm .................... .469 .00
Viewsonic GS771 17" 0.27mm .................. 469 .00
800-615-4239 Viewsonic G790 19" 0.26mm ................865.83
800-661-4239 Viewsonic G810 21 · 0.25mm .................1089.70
~co'w
BUY WITH CONFIDENCE
CDW9 IS A NASDAq TRADED COMPANY
TICKER SYMBOL COWC 0 & B rated 5A1 Duns 11).762-7952
Credit caid chargu aie not submitted un11l t1me of shipment For your pro!tetJOn, we snip only 10 your cred11 ca1d's venlied billing add1ess. Freight is
calculated asthtca11~!'si11ual\t~\\\~~t:1S~raoceandpacka11ing material. The costol insuranceis 0.35,.. {0.0035) ol theorder!otal.
Packaging materials will not exceed $4.00 !or sin11le package sh1pmtnls 01S0.00 101 mullt·package sh1pmenls. Belore returning any producl, you mus!
{CDW} COMPUTER
DISCOUNT
, . . . . . . , . WAREHOUSE
obiain an AMA number. Non-defe<:tive returns are subject 10 a restockil'l!j ltt. So!tvme. chips and other ele<:!ronic components are not retumable. Allow
10 business Gays tor shlpp1nv when payino by personal c:h!c.k. Aii plidtltJ sOOjtd ro change. For all pflces, producls and oflers. CDW 1eserves the ngh!
to make adjus1men!s dueto ch.Jngingawi?J~ rrot!uctdiscontmuation. manufacturer p1ice changes, errors in advtnisements or 01he1
~::n:::J/O'.Jt.111a5. ~i'Ganr1 regis tered11ademarksaret hesole property ol!helr respective_o_wo_" _' ·- - - - - - -
THINKING
OU
R for
your
MISSION-CRITICAL
data
0 Then THINK about this: many RAID storage vendors list the same
features, but not all companies implement those features in the
same way. Before you purchase a RAID system, ask each vendor
how their products provide the following features ...
@ Given Ultra SCSl's cable length restrictions, can the system maintain
@ Does the system support the new higher performance 10,000 RPM @]
and vibration requirements of these higher performance drives?
@ Does the system include free storage management software? If so, does
Does it include a common GUI interface to configure and manage bot
***** Outstanding **** Very Good *** Good ** Fair * Poor MAY 1998 BYTE 45
Network Management Software
46 BYTE MAY 1998 *****Outstanding ****Very Good *** Good ** Fair * Poor
Operating System s
NX Software Systems, Ltd. interrupt redirector and scheduler over same interfaces and calls (there are no
(QSSL) created the QNX OS in see thread-leve l sc hed uling, interrupt hidden system AP!s), QNX /Neutrino is
the early 1980s. QNX started handling, and timing, as illustrated in easy to extend: just write a service-pro
life as an embedded real-time the figur e "QNX OS Architecture" below. viding module, which is a process that im
OS. You accessed its services through stan The kernel itse lf is never scheduled for plements a new service.
dard Unix AP!s instead of a set of pro execution; it's only entered through ker Furthermore, device drivers are th em
prietary AP!s. A decade late r, QNX 4 was nel calls that are invoked by a process or selves processes and can be either sys
introduced, which built upon the capa fr om a hardware interrupt. tem or standard processes. A driver 's in
bil ities of the earlier versions. Notably, it
supp lied many Posix features, had a Posix
AP!, and was Posix-certified. QNX OS Architecture
Last year saw the introduction of QNX/ System space
Neutrino, which offers a Posix-based rni
crokernel; Posix support, such as Posix File System
threads and rea l-time processing; and Manager
better scalability. This third capability
makes QNX / Neutrino readily adapt 4>
u
able-through the addition of extensi
ble service-providing modules- from a
a
Cl)
Network
interface
Network
Manager
small kernel suitable for embedded sys 'ii
tems up to a full-blown OS with network
ing, a file system, and a GUI that handles
c...
4>
::.:
Sdleduler
t
jobs on large, high-end systems.
The key to QNX / Neutrino's ability to
offer both real-time performance and
scalability is its design. What follows is a
look at the OS's architecture that will re
veal how its designers man aged ro ac
Standard
process aSystem
process
the Internet, SLP uses a particular URL the table below for a brief description of tory agents, and user agents that share a
scheme, called a service: URL, for service these messages. public-key cryptographic algorithm and
advertisements. It consists of the string a public key. Every service advertisement
serv i ce :, followed by a string describ
Inter-Agent in a protected scope is validated twice
ing the kind of service, followed by infor Communication once when it registers itself with a direc
mation indicating how to contact the ser Inter-agent commun ication in SLP is tory agent and once when the user agent
vice. An example of a service: URL is designed to efficiently scale from net validates the URL received in a service
works containing very few nodes up to reply. This protects the use r against mali-
service : printer : lpr : //printserver
. fiction . org/colorprint
This service: URL designates a print SLP Messages
50 BYTE MAY1998
CPUs
ColdFire Revisited
he microprocessor has made customers to leverage the 19-year legacy employs a variable-length RISC instruc
its mark on the world since its of code, tool sets, and engineering know tion set that maximizes code density
introduction three decades how from 68 000-based designs. Repre (the "packing efficiency" of instructions
ago. It has changed not just senting a major upgrade, the MCF5307's and operands he ld within registe rs,
the electronics industry, but how we V3 ColdFire core continues its prede buffers, and on-chip memory) . The core's
work, communicate, and play. While cessors' goals while boosting processing fruga l use of system memory greatly min
desktop processors routinely get the throughput. This was accomplished imizes the need for off-chip memo ry,
lion's share of ink, the market for embed through arc hitectural improvements, which in turn lowers a product's cost
ded processors (often called microcon
trollers) has grown to titanic proportions:
It literally dwarfs the desktop computer 5307 Architecture
market. Hundreds of millions of embed
ded processors are used each year in a
wide variety of applications ranging from
communications devices, business ma
Multiply·Accumulate
module (MAC)
MCF5307
General-purpose
1/0 h Para8el ilterface
~ Serial interiace
*:r
Coldfire V3
DUART
chines, and automobiles to toys, home core
L
Debug module rmers rnner support
Lasting Legacy OMA module OMA interlace
System designers today look at the whole
8-KB unified cache
12c module ~ l2c interface
picture regarding an embedded product's
life cycle . Issues such as price, system I 4-KB SRAM I .-~..-----.._.._
la" _ _ _controler
DRAM _ _... DRAM interiace
development environment (i.e., devel
opment tools, debugging tools, OS sup ~':tace~ !TAG I j'.i .,__...___..
Interrupt controUer lntenupt support
port, and modeling support), reuse of ~s External bus
existing software, ease of integrating cus ~~ --;I Clock-nwltiplied PLL I ilterface External bus
tom logic, and the ability to migrate to
newer processors in the future are impor
tant factors when selecting a CPU.
Moto;ola's 32-bit RISC ColdFire archi
The processor fe atures an optimized core
tecture re adily addresses these issues, and a wide variety of pe ripheral interfaces.
because its instruction set is founded on
the venerable 68000 architecture. Since better mathematical performance, and because. memory is one of the m ost
many 32-bit embedded app lications the addition of DSP-like functions . These expensive elements of a design.
today use the 68000 processor or its enhancements, alon g with sufficient The 5307's primary performance in
descendants, ColdFire lets designers pre built-in peripherals (as shown in "5307 crease comes from the clock-m ultiplied
serve their investment in time-tested, sol Architecture" above), enable the 5307 to V3 core, which boosts data throughput
id code. The latest progeny of this fami implement a single-chip system capable to 70 MIPS at 90 MHz. When using the
ly, the MCF5307, combines a third version of handling a wide range of consumer and same external memory subsystem, this
(V3) of the ColdFire core, along with an business electronics. It is a 3.3-V part represents nearly a twofold improvement
integrated package of communications fabricat ed using a 0.35-micron TLM over the 68040 processor, and a 2.5 to 3
peripherals. CMOS process, and it is available as a 208 times increase over the MCF5202 (which
The previous-generation ColdFire pin quad flat pack. uses the ColdFire V2 architecture).
core (V2) was designed to address two Besides a faster CPU clock, the 5307
complementary goals. First, it enabled At the Core also sports other V3 core performance
the rapid, low-cost deployment of new Fundamental to the 53 07's design is its related upgrades. A four-stage instruction
embedded systems. Second, it allowed compact and modular ColdFire core. It fetch pipeline and a two-stage execution
y ace
Not your usual lightwe ight. For more information on this exciting
new KVM switch, contact us today.
Start with you1- favorite web develo pment tool - like Easy. Orchestrate
prise systems.
Based on open development standards, the app lications yo u build with HostPublishing System
looking for: And you get the security you demand thanks to
Attachmate's comprehensive support for authentication, authorization For a Reviewer's Guide
and encryption.
and evaluation copy call
© 1998 Attachmate Corporation. AU Rights Reserved. Printed in USA Attachmate is a registered trademark of Attachmate
Corporation.Visual lnterOev,Visual Basic and Windows NT are registered trademarks of Microsoft Corporation. 8-0050a.0398
710.47
Attachmate™
Programmin g
• • •• hen Web servers made their are Java classes loaded into and invoked Finally, servlets inherit the advantages of
appea rance on the Internet, by a Web server. They're the server equiv the Java language, such as cross-platform
they were built to serve Web alent of ap plets on the browser side. Once portability, garbage collection, multi
pages and nothing mo re. load ed, they become part Web server. threading, and synchronization.
Now, server-oriented Java classes, known This provides improved performance
as servlets, give Web servers the abi lity to because they load only once, instead of Servlet Architecture
exchange information with applicati ons being spawned at every request. Although this article mostl y discusses
without sacrificing speed or reliability. Given Java's poinrerless nature, aJava servlets from the point of view of replace
Early Web servers had no way to access based servler is less likel y than a C++ ments for CGls, they play other roles in
a database and return th e results of a
query as HTML. This was soon remedied
with the introduction of the CGI, a rather
Servlet Architecture
unwieldy specification that defines how
Web serv ers exchange information with Client Server Server
external software. repository
Using CG! programs (or CG!s), it then
became possible for Web servers to spawn db_seri
these programs (i .e., start running a new
copy), communicate with them via the Database
CGI, and perform ar bitrary yet useful
functi ons, including accessing databases.
While CG ls represented a major break
through in extending the Web's capabil
ities, many problems are associated with
th em. The chief one is performance.
Every time a request is made t o a Web 0 Intranet client makes HTTP request e Senlet accesses database.
server that requires runnin g a CG!, the f} Dispatcher has senlet loaded from repository if it 0 Results are passed to next senlet in the dlain.
server must spawn it and suffer the per is not present
0 Senlet formats rWts as HTML and sends them
formance impactofhavi ngthe CG! load, e Senlet is given the request to the c&enl
initialize, execute, and final ly return
HTML. Fielding many simultaneo us
CG! requests can quickly bring a high You can load servlets on demand and pipe
traffic server to its knees. their results to other servlets for more processing.
The dispatcher, the part of the server (Http ServletReque s t reque s t, Http Servl e tRe s pon s e
A Sample Servlet in a server's administra ti o n interface. case, this is a socket back to th e client, but
Th e sampl e co d e Bro 1vse r Cou n ter , Th e ser vi ce ( ) meth od is called each had thi s se rvlet bee n p a rt of a chain, I
shown in th e listin g "A Simple Servlet," time a servlet is invo ked. Two parameters wo uld have written ro th e next servlet's
determines what ki nd of browser accesses a re passed in . T he first, request , encap input stream tra nsparentl y.
th e site. It returns a line of tex t sta tin g sul ates th e in for mati on abo ut the HTTP
ho w o fte n th e site has bee n hit by tha t requ est (e.g., the cli ent's IP address, host Future Services
type o f browser. Th is shows how servlets na m e, a nd r eq ues t para m e t ers ). Th e Servlets a re set fo r a br ight futur e. The
can maintain state across invocati ons and second, response , contains meth ods fo r servlet classes a re no w pa rt of th e J ava
generate custom HTML. BrowserCounter settin g the type of data we are return ing Develo pm ent Kit (JDK ) 1.2 distribution
is invo ked by embedding the foll owing (e.g., tex t or HTML), findin g th e o urput as the first of JavaSoft's Sta ndard Exten
servlet ta g in a n HTML fil e : <serv l et stream we sho uld write to, and-in o ur sions. Servlets are also being combined
class= ' ' BrowserCou nter ' ' > </ser v case- sendin g HTTP-spec ific heade rs. withJavaBea ns to fo rm Servlet Bea ns.
1 et> . Yo u can al so invoke se rvl et s as N o tice th at becau se servlets are inhe r These servl ets have the add ed advan
CGis via URLs or as part of a chain. e ntl y multith rea d ed , I mad e th e ser tages of serializing their state and enab
Bro wserCou n ter is a s ubcl ass o f vi ce ( ) meth od synchro nized to prevent ling their insta nce variables to be modi
HttpServl et, w hich adds HTTP-specific the data in Browse rCou nte r's has h table fi ed via co nfi gura ti o n inter fa ces . This
meth ods to the generic servlet interface. var iable fr om being corrup ted . would have let Browse r Counte r 's hash
In this exa mple, o nly two m etho ds a re The se rv i ce ( ) method wo rks as fol table be saved to disk wh en the server is
sh o wn: service() and getServl et lows. I d ete rmin e th e client's brow ser shut down, preserving a ny statistics gath
Jnfo( ) . Oth e r s (e.g., init<) a nd ty pe, or User - a ge nt in HTTP parl ance. ered. Serv lets' simple interface, perfo r
destroy ( ) ) are prov ided by superclasses N ex t, I ch eck w heth er this type has an mance, and th e independence they pro
and can be overridden as necessary. For entry in the hashtable. If it does, I incre vide are likely ro prove attractive to many
in stance, db _ serv mi ght co nn ect to a m e nt its co unt er (a simpl e Integer develo pers. Ill
database in in it ( ) and release th e con o bj ect). If it doesn't, I create a new entry
n ec ti o n in destroy(). And get in th e has h ta bl e, wi t h th e n ew typ e's Paul Clip ([email protected]) is a Java-certified
Servl etlnfo() e n a bl es a se rvle t t o co unter set to 1. Finall y, I print the m es consultant wo rking at Sapient 's San Francisco
return a sho rt description that's displayed sage ro res pons e's o utput stream. In my office.
-- . .~... --L::l
to be free, and ideally I'd want to exploit loads the driveis and
JBuilder 2 is the only Java·· development solution that delivers on the promise of.Java.
While other development tools use proprietary extensions, compromising the true
platform benefits of Java, ]Builder generates applications that are truly portable by
adhering to the Pure Java sta ndard and by supporting JDK 1.1, ]D K 1. 2, .JFC/Swing,
Enterp1ise JavaBeans'", JDBC, RMI , and Serv lets. Corvorations benefit by being able to
create applications once and then run the m o n all their computing platforms.
]Builde r 2 Client/ Server Suite comes w ith VisiBro ker·· fo r Java , Borland 's CO RBA
technology. Now applications ca n be integrated in distributed computing
environments and cooperate with other applications whether written in Java or nor.
JBuilder 2 excels in productivity as well. It comes with over 200 JavaBean components
with source code and visual tools fo r creating and managing Java Bea ns. lt fa cilitates
drag-and-drop creation of database applica tions. It also has a DataStore for pu re
Java data caching and persistent storage of data , objects, and fil es. Develo pers will
build better Java ap plicatio ns in less time than ever before.
Borland®
www.borland.com
Get to know ]Builder better. Download a free self-running de m o from our
Web site at www.borland.com/ jbuilde r/ de mo2 to find our how ]Builder can
mean increased productivity, competitive advantage, and improved profitability fo r
Meet the ]Builder experts at
your company.
the 1998 Borland Conference!
Cop>'righ1 C J9CJ8 Borbnd lntl'nt:Uion:11. Im:. All rights n..."'ierYt'CI. All Borl:tml pnxlut1 na1m.:s arc tradt."11urks of Uorbnd lntt•mation:1 I. In\.'.. Jav.1 and
alt Java-b:1sL"d marks arc trademarks or regis1cr1..'<i 1r:1dc.:rnarks of Sun f\fa:ro:-.1'sh.!ll1S, Inc:., in 1hc: Unih.:d St3!es and other l·ount rics. Bl 5606
HOW TO
OUPUP
JAVA
PARTI
Will Java always be noticeably slower than C+ +?It's a
By Tom R. Halfhill
(.java files) into Java bytecode (.class files) • Static native compilers. These tools the first place. One reason is that Java is a
for execution on Java virtual machines translate Java source code or bytecode into dynamically bound object-oriented lan
(JVMs). native object code at design time, just like guage. Java programs don't bind their
• Faster JVMs. The JVM is the software compilers for CIC++. classes until run time; only then can they
layer in a Web browser or OS that inter • Native method calls. Java applications resolve polymorphic method calls inside
prets Java bytecode and handles run-time can invoke native executable files, includ their deep hierarchies of inherited objects.
operations such as garbage collection. ing DLLs written in C+ + and services in When a method in a child class overrides
• Bytecode optimizers. These tools the native OS. (See the text box "Calling a method in a parent class, a dynamically
apply additional optimizations by recom Native Code" on page 68.) bound program won't discover which
piling the bytecode produced by other Java • Java chips. A new breed of micro pro- method takes precedence until run time,
Java Chips:
he Java virtual machine (JVM) isn't virtual anymore-it's real. New Java
T chips can execute Java bytecode as their native machine language,
making it unnecessary to interpret or compile the bytecode into some
other CPU 's machine language.
In theory, this could allow Java to run as fast as native code on other
CPUs-if Java chips were as powerful as other CPUs. In practice, most
Java chips will be sub-$50 processors, because they're designed for
network computers (NCs), TV set-top boxes, smartcards, and other
embedded devices. Only one company, Sun Microelectronics, is known
to be developing a high-end Java processor (ultraJava).
Nine companies are working on Java chips: Sun, NEC, IBM, Fujitsu, LG
Semicon, Rockwell , Siemens, Patriot Scientific, and International Meta
Systems (IMS). Seven of them (Sun, NEC, IBM, Fujitsu, LG Semicon,
Rockwell, and Siemens) are designing their chips around Sun's picoJava
core, which is available for licensing. Patriot modified an existing pro·
cessorto run Java, and IMS is working on an independent design.
Sun plans to ship its first Java chip, the microJava 701 , in the second
half of this year. Later, Sun plans to introduce additional 700-series
microJava chips, plus some lower-end 500-series and 300-series chips.
For the high end, Sun is designing the ultraJava for 1999 or later. It's for
graphics workstations and will compete against high-end CPUs of other
architectures, says Harlan McGhan, technical marketing manager.
So far, nobody has shipped actual products with Java chips. Sun has
announced the JavaBlaster, a $99 ISA card that turns old PCs into Java· Java chips execute bytecodes directly, without
based computers, but it won't appear until after the microJava 701 ships.
the need for interpreting or compiling.
Siemens is designing a picoJava·based smartcard. Rockwell might use
its JEM 1 chip in navigation and communications systems. Patriot has that generate bytecode. The picoJava architecture defines about half a
shipped more than two dozen development kits for its PSC1 000. dozen extended bytecode instructions to support CIC++ and low-level
Java chips aren't limited to running software written in Java, any more hardware functions, such as memory writes, on-board cache control ,
than other CPUs are. Programmers can use any high-level language that access to control registers, and power-up/power-down diagnostics.
has a bytecode compiler. In fact, Sun is introducing CIC++ compilers Is this heresy? No, says Sun. Java chips must support those functions
compilers, yielding faster class files that cessors can directly execute Java bytecode and the precedence can change i£ the pro
still consist of standard bytecode. as their native machine language. Most gram loads another class. (A method is the
• Just-in-time (JIT) compilers. W hen a of these chips are designed for low-cost Java counterpart to a function, procedure,
JVM loads a program's classes, a JIT com devices. (Seethe text box "Java Chips: The or subroutine in other languages.)
piler quickly translates the bytecode into Hardware Solution.") C compilers statically bind a program
native machine code and then caches it in • Writing better code. (Last but not during compilation by inserting pointers
memory. JIT compilers are common in least!) Developers can follow good pro to the function calls, so the program does
Web browsers. gramming practices and exploit Java's not have to resolve those references at run
• Dynamicoradaptivecompilers. These idiosyncrasies. (See the text box "Speed time. But c+ + allows virtual methods that
high-tech compilers intelligently translate Tips for Java Coders" on page 72.) are late-bound and polymorphic like
Java bytecode into native machine code at Java methods, and C+ +also suffers from
run time based on profiles of how the pro Why Java Is Slow the hierarchical nesting of objects. That's
gram is running. An example is Sun ' s To grasp how these techniques work, it's why c+ + is generally slower than c, a clas
upcoming HotSpot technology. crucial to understand why Java is slow in sic procedural language.
To recover some of the efficiency of consumes more CPU cycles. Fortunately, alty applies even to single-threaded pro
static binding, Java defines a bytecode that penalty is largely hidden by a parallel grams that call synchronized methods
instruction called INVOKE VI RT UA L trend in hardwa re : Moore's law. The cir and hundreds of methods in Java's stan
_OU I CK that a smartJVM can substitute at cuit density (and thus the performance) of dard classes are synchronized.
run time for the more common INVOKE CPUs rough ly dou bles every 18 months. Don ' t forget Java's dynamic loading.
_VIRTUAL instruction. The quick version Java carries abstraction to a new height. The JVM can load new classes at any time
bypasses a few table lookups after the JVM It's a progra mming language that's also a while a program is running, which means
has already resolved a method call. In gen platform. The JVM contains a software it needs resources to load, verify, and ini
eral, though, dynamic binding and object representatio n of a CPU, complete with its tialize the new class. Most native platforms
hierarchies play a relatively minor role in own instruction set. (Java chips turn that can dynamically load and link, too- that's
virtual CPU into rea l hardware.) The byte
codes in Java class files contain instructions
so developers can write OSes, device drivers,
for the virtual CPU, and the classes will run Java's Run-Time Overhead
and other low-level programs. Regular Java
can't do it because Java source compilers on any native platform with a compatible Bytecode execution
don't generate the extended bytecodes. Even JVM. Bywritingto theJavaAPis and com If a compiler converts all or part of a
if they did, the bytecode verifiers built into piling to bytecode, developers don't have program into native code, the JVM has little
or no run-time interpreting to do.
JVMs would reject the extended bytecodes to worry about th e nati ve CPU or OS.
as illegal. This preserves the safety of Java
applications while permitting developers to
To make this work, the JVM has an inter
preter that translates bytecode instructions
l . ./~!.~:,.,.
&/;; ~Y'i ~Wi::'T:::~
write low-level system software for Java chips. into native CPU instructio ns at run time.
Patriot was the first company to demon Interpreted programs always run slower
strate a working Java chip (November 1997).
than natively compiled programs, because
Instead of licensing Sun's picoJava core,
Patriot took an existing Forth chip and repro
a compiler has already turned a native pro ~~f~~@ -·;(~itJ.izr.\·: ~~~!~~~ is using
grammed the microcode to recognize byte
gram into a binary executable file at design
time. No run-time translation is necessary. ..,, ·:;i~:~ Thread
codes. The PSC1000 already had a stack
Run-time interp reti ng alone would synchronization
architecture, because Forth , like Java, is a
Varies according to
stack-oriented language. Patriot's PSC1000 put J ava at a disadvantage, but there's the thread monitor's
costs less than $10 in volume. much more. Java removes another burden Miscellaneous
Includes class loading, efficiency and how
Marc Tremblay, a chip architect at Sun, pre from programmers by automatically han bounds checking, many threads a
dicts that low-end Java chips based on the program is spawning.
dling memory manageme nt. In CIC++, exception handling,
picoJava core will run Java about 20 times programmers are responsible for allocat reflection, and native
price of slower execution. Of course, like tors, thanks to pioneers who faced the memory consumption. Because most Java
all software, Java will ride the coattails of same problem with Lisp, Smalltalk, and vendors license their ]VMs from either Sun
Moore's law. But even if CPUs never get other languages. Later this year, the JVM or Microsoft, these advances will ripple
any faster, Java's performance would still that includes Sun's HotSpot technology through the entire Java community.
get better. will introduce a new collector based on an Thread synchronization is another run
advanced generational algorithm. time task that's ripe for improvement. Like
The Garbageman Generational collectors are more effi garbage collection, it might account for 15
To begin with, JVMs are getting faster. cient because they sweep smaller parts of percent to 25 percent ofa]VM's work load.
]VMs based on Sun's Java Development the heap more often. They're called gen Symantec licensed Sun's JVM and exten
Kit (]DK) 1.1 are about twice as fast as erational because they base their sweeps sively modified the thread monitor-and,
those based on ]DK 1.0.2. One reason is
that Sun streamlined the event model.
into method A. This makes it unnecessary
The old model would "broadcast" AJava Glossary for A to call Bat run time, thereby speeding
events (e.g., mouse-clicks, mouse move up execution-at the expense of code size.
ments, and keystrokes) throughout an
entire program until an object trapped the Bytecode: Java's object code or machine Polymorphism: The ability of methods in
event with event-handling code. That was language. A compiler turns Java so urce object-oriented programs to override meth
code into bytecode and stores it in a class ods of the same name in other classes. If a
very inefficient, especially for high-vol
file . Java chips can execute bytecode di child class has a method whose name is
ume events such as mouse movements.
rectly, but all other CPUs require an inter identical to a method in a parent class, the
Under the new event model, objects can child method takes precedence.
preter or a compiler to translate the byte
register with another object called a lis code into the CPU's native object code.
tener to hear only those events in which Thread: A process within a program. A mul
they're interested. For example, a button lnlining: Copying the body of a method into tithreaded program can execute two or more
the body of another method . Exampl e: If threads by distributing time slices from the
might want to listen only for mouse-clicks.
method A calls method B, a programmer or CPU , so the program appears to be exe
From the button's point of view, all other
compi ler can copy the code of method B cuting multiple operations simultaneously.
events are like trees falling in an uninhab
ited forest: They don't make a sound.
Changing the event model might seem on the "age" of objects. "Most objects die according to Al Bannon, Symantec's direc
like a small thing, but it makes a big dif young," explains Tim Lindholm, a senior tor of developer relations, thread syn
ference at run time. ]VMs spend roughly staff engineer atJavaSoft. In other words, chronization is now 80 percent to 150
50 percent of their time interpreting a program tends to use an object briefly percent faster. Symantec licenses those
bytecode (assuming there's no JIT com before discarding it. Sun's new ]VMkeeps modifications to other companies.
piler), so anything that speeds up that pro the references to newly created objects in Sun improved the performance of its
cess yields big gains in performance. a special part of the heap called the "nurs own]VM for Solaris by rewriting itto map
]VMs may spend another 15 percent to ery." The garbage collector sweeps the individual Java threads onto native OS
25 percent of their time on garbage col nurser y often to make room for more threads. The earlier version piggybacked
lection. Why so much? Because object-ori infant objects. all Java threads on a single Solaris thread,
ented languages such as Java make heavy Objects that outlive a few sweeps in the which meant the OS couldn't dispatch Java
use of memory. nursery move on to another part of the threads to different CPUs on multiproces
Classes are templates that define objects. heap reserved for middle-aged objects. sor systems. Microsoft's JVM for Windows
A program can create any number of The garbage collector doesn't visit them NT also maps Java threads directly to
objects from a class, and each instance of as often. Longer-lived objects eventually native threads. But it isn't feasible with an
an object stays in a memory heap until the graduate to a third area of the heap that OS such as Windows 3. 1, which has little
program no longer needs it. The garbage the collector sweeps the least often of all. or no native support for multithreading.
collector in Sun's current]VM uses a sim And to optimize the technique still further, This is one area where application pro
ple mark-and-sweep algorithm that peri Sun uses different collection algorithms grammers can make a difference, too.
odically marks all unreferenced objects for each region of the heap. For example, Sun's HotJava browser used to require the
and sweeps them away in a single pass. the collector sweeps the oldest region with JVM to spend 25 percent of its time mon
If you chart the memory usage of a a "train" algorithm that divides memory itoring thread synchronization in the pro
JVM with this kind of garbage collector, into chunks called "cars." If the collector gram, says Peter Kessler, a senior staff engi
you'll see a jagged sawtooth pattern (see is pressed for time, it can sweep individual neer at J avaSoft. By rewriting the browser
the screen on page 66). The memory cars instead of the whole train. to optimize threading, Kessler says Sun
consumption goes way up , then way The garbage collector in Microsoft's reduced that work load to 10 percent to 15
down, then way up again. The ]VM could JVM uses similar techniques, according percent.
smooth out those jaggies by scavenging the to Joe Herman, Microsoft product man
heap more often, but it would steal CPU ager for Internet platforms. It keeps a Better Compilers
cycles away from other processes, includ dynamically ordered table of objects and Despite the ongoing improvements in
ing the program's execution threads. collects only part of the list at a time. As ]VMs, that's not where Java will realize the
Luckily, JVM vendors can draw on two with Sun's new garbage collector, it tends greatest gains in performance. Interpreted
decades of research into garbage collec to level out the jagged peaks and valleys of execution simply isn't fast enough for most
ON CREATING KILLER
esuite. lotus.com/devpackpreview
I 1(1111 Iii
That's all it takes to get afree evaluation copy• of our LotuseSuite• DevPack· (or, about $99 for asingle-user edition
gets you the whole magilla). And just what is eSuite DevPack? Only the most comprehensive set of kick-butt
DevP3cit ·· prebuilt, reusable, time-saving integrated Java·-based applets around. Use the sublimeskillsyoualready possess,
"Evaluation copy oller gooduntil June 1. 1998. R eslli ~ t ions mayapply. for mme info1mation, call 1800 812·338i. exl. 0770. In Canada, call I 800 GOlOlUS. © 1998 lotus Development Co1poration. anIBMCompany. 55 Camb1idge Parkway, Cambridge. MA 02142.
All rights merved. talus andWorking Together a1eregisteredlrademarks andeSulteandDevPact are liademarks of lotus Development Co1p. Java is a trademark ol Sun Mit1 osyslems, Inc.
Cover Story How to Soup Up Java
purposes. That's why computer science ognizes that Java's virtual CPU has a stack ing for child methods. Drawback: There
graduates who are pondering their uncer instead of registers. When a program will be a problem if the program dynami
tain futures should consider compilers. swaps the values of two variables, an ordi cally loads a class that tries to override
There are five types of compilers rele nary Java compiler generates three pairs the inlined public methods.
vant to Java: source code compilers, of stack load and store instructions. DashO • Method desynchronization. Tyma says
bytecode optimizers, ]IT compilers, dy uses the stack in a smarter way to generate a future version of DashO will use this
namic/adaptive compilers, and static only two pairs of stack loads and stores. Java-specific technique to fix the thread
native compilers. It's possible for a single • Loop unrolling. This is a classic opti synchronization problem described ear
Java program to undergo as many as three mization that replaces short loops with a lier. DashO will analyze the bytecode to
different levels of compilation with these series of instructions that duplicate the see if a synchronized method really needs
tools. And because today's Java compilers
are relatively primitive, the potential gains ~Memory Usage: jcla.ss.bwt.exa.mples .multiColumnlist ~ lfi!!~
are enormous. File
Source code compilers turn Java source
1200
§ 600
Allocated
much optimization. The JAVAC compiler
in Sun'sJDK-th~ benchmarkJavasource 400 • Available
compiler-has only one command-line 200
30 50 70 90 110
only a few simple optimizations, such as Seconds
method inlining. (See "Better Java Pro
gramming," September 1996 BITE.)
Other Java tool vendors have their own Available: 345 Kb, Allocate·d: 103 Kb
source compilers. Most vendors concen
This sawtooth pattern is typical of mem~ry usage when Java's
trate on making their compilers work
faster, rather than making the compilers garbage collector disposes of objects en masse.
produce faster code. Fast compilers
shorten the edit-compile-test cycle for pro function of the loop. It's faster because it to be synchronized; if not, it removes the
grammers but do nothing for users. Tool eliminates a compare instruction and a lock. For example, if method A is the
vendors are just starting to add the opti branch instruction for every iteration only method that calls method B, and if
mizations found in mature compilers for through the loop. method A is synchronized, there's no need
other languages. • Loop-invariant code motion. Some to synchronize B. Removing the lock on
There's nothing especially new about loops contain statements that execute dur B reduces the overhead of calling the
those optimizations-most of them are ing every iteration but always yield the method without compromising the thread
straight out of computer science text same results. (Example: a+l=b, where safety of the program.
books. It's just a matter of bringing Java neither variable is a loop variable.) Good It's possible that these optimizations and
compilers up to date. For those who can't compilers move this code outside the loop more will eventually find their way into
wait, one alternative is a bytecode opti so it executes only once. Java source compilers, reducing the need
mizer. This tool recompiles bytecode (you • Common subexpression elimina for a recompiler such as DashO . But tool
don't need the source code) into optimized tion. Given a statement such as x= (y+ 5) vendors seem to be focusing on three
bytecode that's still platform-indepen + (y+ 5), a smart compiler will re use the other types of compilers: ]IT compilers,
dent. Some examples are DashO and result of the first expression rather than dynamic/adaptive compilers, and static
DashO Pro, from Preemptive Solutions. evaluate the second expression. native compilers.
DashO is the brainchild of Paul Tyma, • Tail-recursion elimination. In some
president and chief scientist of Preemp rec ursive algorithms, only the tail portion Going Native
tive, who's writing his doctoral disserta is recursive. Often, it's more efficient for At some point, bytecode must become
tion on Java performance at the Univer the compiler to transform the recursive native machine code so it can execute on
sity of Syracuse. Tyma says DashO can algorithm into an iterative algorithm. a real CPU (unless the real CPU is a Java
speed up typical logic code by about 30 • Statically analyzed polymorphic in lin chip). The slowest way is to let the JVM's
percent, with loops and matrix multipli ing. This lets an optimizer inline public interpreter translate the bytecodes one
cation showing even greater improve methods. (Java compilers can inline pri by one, over and over again. A much faster
ment. DashO applies several classic com vate, final, and static methods, but they way is to bypass the interpreter by com
piler optimizations to Java bytecode, and can't inline a pub lic method, because a piling the bytecode into machine code and
Tyma says future versions will introduce polymorphic method might override it.) then to cache the machine code in mem
some of his own Java-specific optimiza First, the optimizer ana lyzes the byte ory. The main difference between ]IT com
tions. Here are some examples: code to find public methods that aren't pilers, adaptive compilers, and static native
•Transient variable caching. This tech overridden. Then it inlines those methods, compilers is when they do that translation.
nique (for which a patent is pending) rec eliminating the JVM's overhead of check The first two types do it dynamically, at run
time; static compilers do it at design time. delay execution. That's the weakness of a Sym antec are similarly in tellige nt, an d
There's a fin e line, or perhaps no line, JIT compiler-it has to be quick and dirty. they're making rapid progress. Symantec's
between JIT compilers and adaptive com "A lot of optimizations take a lot of ti me," first JIT compiler appeared in M arch 1996;
pilers. Both are really dynamic compilers. notes Tyma. "JITs can't take too much time six months later, version 2. 0 was 50 p er
The simplestJIT compilers translate byte or the user will say, ' Whoa, when is this cent fas ter, according t o several b ench
code into machine code immediately after program going to start? '" marks. Sym antec says version 3.0, intro
the JVM lo ads each cl ass into me m ory. The solution: smarter JIT compilers. duced last December, beats that by another
Then the JIT compiler steps out of the way Borland's JIT compiler can compile in di 50 p ercent. Depending on the n ature of
and lets the program run. If the JVM dy vi du al m eth o d s with o ut co mpil in g a the code, today's JIT compilers can run a
n amically loads an other class at a lat er whole class. It doesn't bother to compile program fr om five times to 20 times faster
time, the JIT co mpiler may compile the static init ializers (which a program calls than an inter p re t er. (See t h e t ext b ox
new class as well. only once per class), and it wo n't compile "Benchmarking Java" on page 70.)
H owever, a JIT compiler may decide not an object constructor meth od unless the Java p rograms that are compiled with
to compile every class, especially if a class program calls it more than once. M icrosoft's JIT compi ler can achieve 30
is so large that compiling it would seriously The JIT compilers fro m Microsoft and percent to 40 p ercent of th e performance
S ome say it's cheating. Others say it breaks the promise of write
once, run anywhere. Could it even be a Communist conspiracy?
Nope, it's a native method call-a controversial technique for
constructor that uses J/Direct to invoke the button function in USER-
32.DLL, a standard Windows library that has basic GU I components.
According to Microsoft's informal tests, a WFC window with 12
squeezing more performance out of Java. Java applets normally can't miscellaneous components opens and closes about 600 percent
do it, because Web browsers have a security manager that prevents faster than an identical AWT window. Line drawing is about 50 per-
hostile applets from doing evil things to
your system. But stand-alone Java appli
cations can do virtually anything native
appl ications can do, and that includes
calling native executable files such as
DLLs and OS services.
Critics say it threatens Java's integ
rity. Perhaps they don 't realize Java has
always allowed it. Java has a built-in key
word (n at i v e) that declares a Java
method as the gateway to a native bi
nary. Java Development Kit (JDK) 1.1
defines a native interface called native
method invocations (NM ls), and JDK
1.2 will introduce a better one called the
Java native interface (JNI) .
NM ls neatly partition a Java program
into platform-dependent and platform
independent modules. As Java gets
faster, developers can rewrite the native
modules until eventually the whole appli
cation is pure Java. That's the vision.
Native methods are also a good way
to integrate Java programs with existing
systems-a big point for businesses that Microsoft's Windows Foundation Classes are faster than Sun's Abstract
.....
Viewsonic®
See The Difference!'
Enter HotBYTEs No. 98 at http ://www.byte.c om /hotbytes/
Cover Story How to Soup Up Java
of native C+ +programs, says Bill Dunlap, execution, identify the performance bot cute. It balances the time required for com
product manager of Visual]++. He esti tlenecks, and then compile or recompile pilation against the time saved by faster
mates that ]IT-compiled Java could even parts of the program to relieve the bottle execution.
tually attain 60 percent to 70 percent of the necks. This is the cornerstone of Sun's It can apply additional optimizations by
speed of native C+ + . Symantec is more HotSpot technology, which will proba recompiling code that's already been com
optimistic, predicting that fast]VMs and]IT bly appear later this year in ]DK 1.2. piled. It can flush compiled code from
compilers could eventually match C + + . HotSpot (a code name) isn't new tech memory to make room for newly com
To reach those goals, ]IT compilers are nology. It grew from research that began piled code. It can inline the parameters of
doing some am az ing things. Borland's at Stanford University in 1987, based on method calls if the program always calls a
]IT compiler doesn't stand on the sidelines earlier work on Smalltalk at Xerox Palo method with the same parameters. It can
Benchmarking Java
...........................................................................
the floating-point tests more than five times faster than the baseline.
Note that jBYTEmark is a fairly straight port from the C version of
BYTEmark. It's a CPU-intensive synthetic benchmark program that
after compiling part of a class-sometimes Alto Research Center (PARC) . Stanford even turn byrecode into buttered popcorn.
it compiles add iti onal methods later. researchers created an object-oriented lan (OK, that last claim was a joke.)
Microsoft'sJIT compiler performs a quick guage called Self to explore dynamic com Or maybe it's not a joke. Critics accuse
data flow analysis during the initial com pilation. Several of them later founded a Sun of overselling HotSpot. Last year, Sun
pile and then continues to analyze and small company known as LongViewTech specu lated that HotSpot could bo ost
compile parts of the program during exe nologies (or Animorp hic Systems). Sun Java even beyond the performance of
cution (except for small app lets, which acquired the company to make HotSpot. C+ +.Lately, Sun has been more conserva
.ar-en 'tworth the trouble). Sun is using HotSpot as an umbrella tive. "We think it's going to be a horse
"I think we've only seen the tip of the term for several acceleration techniques, race," says J avaSoft's Peter Kessler. "But it
iceberg for ]VMs and J!Ts," says John Rob including the generational garbage col would be irresponsible to say at this point
bins, engineering product manager for lector described earlier and a new thread that a Java program will be faster than the
performance tools at NuMega. "There are monitor. But the most interesting part is same program written in C++."
a lot of smart companies working on this, adaptive compilation. One of the foremost authorities on
and I think the real breakthrough is going HotSpot is like a hyperactive ]IT com dynamic compilers is Dr. Craig Chambers,
to happen two or three years from now." piler-it profiles, it compiles, it recom an associate professor in the University of
piles. It can start compiling when the pro Washington's department of computer sci
The Great Hype Hope? gram launch es or wait to see how the ence and engineering. Chambers worked
program runs. It can make decisions about on the Self project at Stanford in the 1980s
The bestJIT compilers are really adaptive which parts of a program to compile and continues to develop experimental
compilers. Adaptive compilers create a according to how often the code executes languages (such as Cecil) and adaptive
profile of a program before and during or how much time the code takes to exe compilers (such as Vortex). "There will be
scrolling and editing of complex objecL' in 32x re:tl zoom mode) , compound (nested)
OLEdocuments, 11111/tiple-Graflb Autoli(J'Ollt !Vizard, lempl:ues, speci:tl effecls, icons,
page layo ut control for slides and printouls; unmatched speed of graph redraw •
Interactive rotmion , perspective and cross-sections of 30 displays • Large selection of
tools for graphical exploration of data: extensive bmshing tools with animation, fitti ng,
smoo1hing, nverla);ng, speclral planes, projections, layered compressions, marked sub
se1s • Price $995.
Quick STATISTICA (for Windows) • Asubse1of .l"/il1'l.17'lCA; comprehensive
sclccLion of b:tsic s1atislics :md the full :ui:tlytic :md presenlation-quality gmp hics c:1pabiti
ties of .1'1il7'l.17'lGI • Price $495.
STATISTICA Industrial System (rc,1uires S'l i l11S11GI or Quick 57it11S11
CA) • The larges! selection o~indus1rial stitistics in a single package; qu:tlilycontrol charts
(real-time d:ua acquisition op1ions), process capability an:tlysis, R&R, Weibull An:tlysis,
s'"npling plans, :md :m ex1remelycomprehensive selt'Ction of cxperiment tl design (DOE)
metho<L<• Flexible tools to customize and autom:lle :di :m:tlyses :uul reports (incl. "tum
kc•y" systemopuons, and tools to add custom procedures) • Price $995.
STATISTICA Neural Networks (interfaces wi1h, but does not
' NEW,- require STATI5TICA) • The most comprehensive NN application available on
1
H statSoft"
1!!l StatSoft Ltd. (London, UK), ph: +44 1234 341 226, fax: +441 234 341622
~ StatSoft GmbH (Hamburg , Germany), ph: +49 40/468866-0, fax: +49 40/468866-77
~ StatSoft Fra nce (Paris, France), ph: +33 01 -45-185-999, fax: +33 01-45-185-285
~ StatSoft Polska Sp . z o. o. (Krakow, Poland), ph: +48 12-391120, fax: +48 12-391121
~ StatSoft Italia (Padova, Italy), ph: +39 49-893-4654, fax: +39 49-893-2897
~ Statsoft Pacific Pty ltd . (Australia), ph: +613 9521 4833, fa x: +613 9521 4288
[,@ StatSoft Japan (Tokyo, Japan), ph: +813 3667 1110, fax: +81 3 3668 3100
~ StatSoft Taiwan (Taipei, Taiwan, H.0 .C.), ph: +886 2 5786587, fax: +886 2 5793179
Cover Story How to Soup Up Java
Java systems that match the performance pilers: virtually unlimited time to analyze They know which way branches are fork
of C+ +,"he says. But he adds that some and optimize a program. Programmers are ing, how many objects the program is
programs-perhaps 5 percent-will accustomed to lengthy builds, while users creating, and the actual size of arrays.
always be faster inc++, because ofJava's are not. Besides that, static compilers usu Indeed, they can adapt to the different
run-time overhead and dynamic nature. ally work from source code, not bytecode, ways that different people use the same
Others, however, denounce HotSpot as so it should be easier for them to deduce program. Working from bytecode instead
an overhyped JIT compi ler. "Dynamic the semantics of a program before opti of so ur ce code isn't a huge problem,
processes like garbage collection are one mizing it. And static compilers can glob because bytecode isn't nearly as obscure
of the things that will keep Java from ever ally analyze a whole program, so they can as native object code. In fact, bytecode is
achieving the performance ofnative com app ly more aggressive optimizations. similar to the intermediate code generated
piled languages like C+ +," declares Micro Dynamic compilers are limited to peep by the front ends of some compilers, says
soft's Herman. hole (local code) optimizations. Jim Russell, manager of Java technology
But dynamic compi lers have a big for IBM Research.
Dynamic vs. Static advantage, too: They profil e a program Static native compilers for Java are avail
Static compilers would seem to enjoy an while it's running, so they don't have to able from SuperCede, Symantec, Cosmo
enormous advantage over dynamic com guess where the actual bottlenecks are. Software (a Silicon Graphics spi n-off),
diately, even before you need them. Or delay class loading by not cre
ating objects until later. - Stein
-+ Strings are slow. Use StringBuffers or cha r arrays instead. String -+ If all objects of a class require some identical initialization
concatenation is particularly costly, because the JVM must convert the code, put that code in a static initializer, not a constructor method. It
String constants into String Buffer objects, join them together, and will execute only once. -Richard M. Fogel, technical product manager for
convert them back into Strings. -Doug Stein, an engineer at Active KL Group 's )Probe
Software, who created the GridBag Layout manager while at Sun
-+ Find bottlenecks with a profiling tool. Examples are JavaScope
-+ You have control over dynamic class loading. If you'd rather (SunTest), JProbe (KL Group), Optimizelt (Intuitive Systems), TrueTime
take the hit when a program first launches, initialize all objects imme (NuMega), Visual Quantify (Rational Software), and VTune (Intel).
UltraView. With UltraView you'll see h ow VISIT OUR WEB SITE AT WWW.ROSEL.COM
simple it is to switch from CPU
~) ROSE
~;I ELECTRONI CS
lot easier and faster. Call our
port names, colors, fonts, and sales s taff today for detailed
display window placement so information on any computer
that the entire syste m makes system application. 10707 Stancliff Road Ho uston, Texas 77099
sense to you. Phone 281-933-7673 Fax 281-933-0044
Enter HotBYTEs No. 95 at http ://www.byte.com/hotbytes/
Cover Story How to Soup Up Java
IBM, Tower Technology, and the O pen no logy can make Java as fast as C+ +.But tomers won't tolerate it on their mission
Group, with more on the way fro m Micro that isn't necessarily stopping them fro m critical servers, and they're growing more
soft, Borland, Instantiations, and others. developing static compilers. "The move is aware of what it's costing them on clients.
They target platforms as varied as Win toward native compilation," says Micro That's why mainframes are still popular:
dows (x86), IBM OS/2, AS/400, AIX, Mips soft's H erman. "We have to get to t he They really work. To build reliable sys
RxOOO, HP-UX, and Linux (x86 ). point where we have performance com tems, PC developers must trade the guns
M ost of these compilers work from parable to native code, and we' re going and knives of C+ + for the seat belts and
bytecode, not source code, so developers to need native compilers to get there." air bags of a modern language.
can compile third-party JavaBeans and M eanwhile, users are learning the hard
class libraries that don't include source Fast Enough way that mission-critical code often lives
code. The compilers produce native-code Does Java really need to be as fast as C+ + for decades. Consider the year 2000 prob
executable files- which are, of course, to succeed? H istory says no. lem or the U.S. government's troubles with
limited to a single platfo rm.
That doesn' t necessarily violate th e WHERE TO FIND
write-once, run-anywhere religion. A com Borland KL Group Patriot Scientific http://www.sun.com/
piled Java program still exists in its origi International Toronto. Ontario, Canada San Diego. CA java/
nal cross-platform source code and byte Scotts Valley. CA 416-594-1026 619-674-5000
http://www.klg.com/ http ://www.ptsc.com/ SuperCede
408-431-1000
code, unless the programmers lose their http://www.borland
Bellevue, WA
disks. M ore important, static compilation .com/jbuilder/ Metrowerks Preemptive Solutions 425-462-7242
Austin, TX
Cleveland, OH http://www.supercede
makes sense when developers are deploy Instantiations 512-873-4700
216-732-5895 .com
ing a Java application on a known plat Tualatin, OR http://www
http://www
503-612-9337 .metrowerks.com/
.preemptive.com/ Symantec
fo rm, especially a server. This wouldn' t Cupertino, CA
http://www
ma ke sense fo r an applet, which down .instantiations.com/ Microsoft Sun Microe lectronics 408-253-9600
Redmond, WA Palo Alto, CA http://www.symantec
loads at run time to an unknown client. .com/domain/cafe/
Intel (Vfune) 425-882 - 8080 650-960-1300
Dynamic compilers are better for applets. Santa Clara, CA http://www.microsoft http ://www.sun.com/ deved/index.html
Just because a J ava program is statically 408-765-8080 .com/java/ developers I j avach ips
http:/1147.229.124.84/ .html Tower Technology
compiled doesn't mean it escapes Java's lntcl/support.intel.com/ Nu Mega Austin, TX
ru n- ti me overhead. The program still 512-452-9455
design/perftool/vtunc/
Nashua, NH Sun Microsystems/
indcx-1 .htm
603-578-8400 Java Soft http ://www.twr.com/
needs a run-time system to handle garbage http://www.numega Palo Alto, CA
collection, thread synchronization, bounds .com/ 650-786-7737
checking, exception handling, and-ide
ally-dynamic class loading. That's why a
statically compiled Java program often Keep in mi nd the 50-year trend toward the air-traffic-control system.
isn't faster than the same program ru nning high er levels of hardware abst rac ti o n. Millions of lines of code written today
on a good ]VM with a smart JIT compiler. Al though Java needs competitive perfor will still be ru nning 30 years fro m now.
T hat may change as the compilers get mance to succeed, it doesn't need superla Nobody can predict what platforms will
better. M ost of them don't do much opti tive performance. When t here's a trade be popular at that time. A virtual plat
mizing, and some are rather crude. One of off between raw performa nce o n o ne fo rm such as Java is cross-platform not
them converts Java bytecode into C source side and code productivity and portabil o nl y in t he horizo ntal dim ension, but
code, which then fee ds through a regular ity on the other, developers rarely choose also in the temporal dimension. N o mat
C compiler to produce native obj ect code. performance. ter what new platforms appear, only the
Anoth er co mpiler ch okes o n fin alize () T he C language replaced asse mbly lan JVM and native compilers will have to be
me th ods, an d few of them ca n h and le guage for the vast majority of develop ported-not the applications.
dynamic class loading. ment, because it's an easier, more portable All those facto rs will outweigh Java's
Several sources told BYTE that static language than asse mbly language. C++ laggard performance, as long as Java can
compilers fo r Java could eventually out has been replacing C for the same reasons. achi eve at least 50 percent of C+ + native
perform the bestJIT compilers and deliver Likewise, Java will replace c+ +. Sure, performance. That's a much smaller gap
near-native performance. Those sources so me program mers still resort to C o r tha n th e di ffere nce b et wee n c + + and
include Tim Freehill, the engineering man assem bl y lang uage w hen t hey need to assembly language. Even Microsoft thinks
ager for M e t rowerks' Code Warrior; write low-leve l code, device dri vers, or Java can reach 60 percent to 70 percent of
Robert "Rock" H oward, chief technology critical loo ps. Java programmers can do native performance, and most experts are
officer a t Tower Techn ology; J ayso n that, too . more optimistic. The enormous amount
Minard, the product architect fo r Bor Besides high productivity and p orta of effort invested toward that goal and the
land's ]Builder ; Jim Russell, manager of bility, Java offers two additional advan numerous ways of getting there virtually
Java technology and applications at IBM tages that help make up for its slow per guarantee that if J ava fai ls, it won' t be
Research ; and Allen Wirfs-Brock, chief formance: run- tim e safe ty and co d e because it isn't fas t enough. Iii
technology officer at Instantiations. longevity. Both will become more impor
On the other hand, Sun, Sybase, Syman tant in the future. Tom R. Ha lfhi ll is a BYTE senior editor based
t ec, a nd Microsoft are leani ng toward The PC industry gets away with buggy in San Mateo, California. You can reach him at
dynamic compilers or doubt that any tech co de o n cli ent systems to day, bu t cus t om .ha lfhi ll@b yte .com.
~ " ~=r"'~~i..
ond a 11lo»oty J'~1111
• Mailef TCl'/IP prindpl.i
quic: Uy
• 8'.illdond ~·
TCP/ lPf'otf'wOrki to1ily
• Gt•l.l'P"°-'f>"(fonM
• Ma~tTCl'/IPnetwa<lt1
Order from a
Bet@book store near you
-·
wilh: Ner v--.Opel'!
• CO Rom pcx;ltedw~h
IYOl• ffOll'lfi~
V"-. SUN,,.1 MohQ!Jtr
and mare
Firewalls
Madison Books and Computers store Rbooks
205-771-9250 katzma [email protected] www.ReadersNdex.com/rbooks
Corporate Di scou nt Books [email protected]
ARIZONA www.pri vatei.com/cdb University of New.Mexico
Computer library cdb@ privatei.com Bookstore
li:rf~~~~~~l~~;!~i~::rycom
McKinzey-White Booksellers [email protected]
www.mwbooks.com
Uof ABookstore [email protected] NEW YORK
COMPLETE
COMPLETE www.bookstore.arizona.edu
oleigh@u. arizona .edu
CALIFORNIA
Softpro Books
www.softpro.com
[email protected]
Stone Lion Bookstore
Benjamin Books
212-432-1103
Coliseum Books
[email protected]
0-07-024645-9 • $54.95 (with CD-ROM) 0-07-063400-9 • $69.95 (with CD-ROM) ASUC Bookstore
970-493-0030 Computer Book Works
[email protected].
www.cnct.com/bookworks
berkeley.edu CONNECTICUT [email protected]
Bookshop Santa Cruz YaleCoop Cornell Campus Store
408-423-0900 800-ELl -YALE www.cbs.cornell.edu
Capitola Book Cafe McGraw-Hill Bookstore
www.cruzio.com/-bookcafe O.C. (WASHINGTON) www.bookstore.mcgraw-hill.com
[email protected] Reiter's Scientific &Prof ess ional [email protected]
Codys Books Books NYU Computer Store
www.codysbooks.com www.reiters.com 212-998-459 1
[email protected] [email protected] Syrac use University Bookstore
Computer Literacy syracuse.univ.bookstore.syr.edu
(Bookshops+On line) FLORIDA
www.clbooks.com Downtown Book Center OHIO
[email protected] [email protected] Book Stacks Unlimited, Inc.
D i~i:~(~~:~~omputer GEORGIA
www.books.com
[email protected]
www.digitalguru.com Engineers Bookstore Business Outreach Books
orders@digita lguru.com [email protected] www.bizoutreach.com
Fry's Eleclronics, Inc. Micro Center [email protected]
510-770-3797 www.microcenter.com Micro Center
Web Tel
415-496-6000 www.microcenter.com
408-733-1770 ILLINOIS
310-364-3797 Books & Bytes OREGON
408-364-3700 www.bytes.com Powell's Technical Books
714-378-4400 [email protected] www.powells.com
818-227-1000 Illini Union Bookstore
408-487-1000 www.union.uiuc.edu./iu bstore PENNSYLVANIA
714-688-3000 iubstore@uiuc .edu Micro Center
818-526-8100 Micro Center www.microcenter.c om
COMPLETE
COMPLETE
MINNESOTA
wel/[email protected]
Utah State University Bookstore
www.bookstore.usu.edu
Stanford Bookstore Palo Alto Baxter's Books [email protected]
medtechbooks.stan ford.org [email protected]
medtechbooks@bookstore. Un iversity of Minnesota VIRGINIA
stanford.org Bookstores East Bank Store Computer Literacy
UCD Bookstore www.bookstore.umn.edu (Bookshops+Onlinel
www-bookstore.ucdavis.edu [email protected] www.clbooks.com
[email protected] Micro Cent er
UCLA BookZone MISSO URI www.microcenter.com
www.uclastore.ucla.edu Li brary, ltd
[email protected] www. libraryltd.com WASHINGTON
COMPLETE
COMPLETE
UCSD Bookstore
www-bookstore.ucsd.edu
[email protected]
leigh@ libraryltd.com
NEW JERSEY
University Professional
Bookstore
www.bookstore.washington.edu
USC University Bookstore Princeton University Store [email protected]
0-07-913701-6 • $44.95 (with CD-ROM) 0-07-91 3703-2 • $44.95 (with CD-ROM) www-bookstore.usc.edu [email protected]
[email protected] WISCONSIN
NEW MEXICO
Schwartz Business Books
_J
Software
forFast,EasyJava
ava has come a long way from tive code doesn't run everywhere, as good come complete with compilers and often
Sun's old javac compiler. To Java code should. While Internet-based with debuggers, ready for building Web
day, all the major develop and cross-platform programming will based applets, while the high-end tools
ment-tool manufacturers are continue to drive Java development, Su include the client and server software
putting out serious Java efforts. All this perCede is too good for people building necessary to build complete enterprise
vendor activity is good news for anyone native app lications to ignore. applications. These usually include mid
preparing to use Java. The available op Filling out the list is Sun'sJava Studio, dleware that sits on the server and access
tions have never been better. a high-level Bean-editing tool meant for es the databases through more tradi
We tested nine such products for this connecting compiled Beans rather than tional C++ interfaces.
report. At one extreme, Lotus BeanMa hacking Java source code. We tested all these products on a low
chine might provide the easiest way for Each of these tools focuses, more or cost Cyrix Media GX system running at
someone with no programming skills to less, on simplifying the process of remote- 150 MHz with 64 MB of RAM and a 1.6
produce sophisticated applets for Web GB disk. They all ran well on this system,
pages without writing any source code. although loading more than two or three
It shows how powerful the JavaBeans
model can be for making programming
BEST of these disk-intensive applications at a
time proved impossible.
accessible to a wide range of people.
At the other extreme li e Symantec's Borland's JBuilder Lotus BeanMachine 1.1
Visual Cafe for Java, Borland's ]Build J Builder stands out because it's fast; Lotus BeanMachine, deceptively simple
er, CosmoCode, and Microsoft's Visual crisp, and built around ASCII text.
yet surprisingly powerful, at first glance
]++,which all have a look and fee l simi Th ese are the hallmarks that made
seems to be an idiot-proof design tool that
lar to that of those companies' C++ prod Borland's Turbo Pascal so popular, and
lets you string together basic Beans to cre
ucts. Traditional programmers will feel they shou ld serve Java programmers
ate slick Web sites. With tools for basic
well. J Builder's compiler is very fast and
right at home with these tools, which input and output and slick multimedia ef
have a familiar look, focus squarely on well integrated with the debugger. This
fects such as animations, ticker tapes, and
source code, and have debuggers that are makes it easy to compile, tweak, test,
headlines, BeanMachine lets yo u join
much improved over earlier versions. and repeat again and again.
these widgets together and compile them
We also tested IBM's VisualAge for Java into applets for Web sites without touch
and Sybase's Power], both of which offer ly accessing databases. Java looks like a ing source code. Lazy coders, neophyte
more elaborate tools that incorporate the great answer for custom programmers programmers, and even nonprogram
source code into their own internal for looking to solve database-access prob mers will find it useful.
mat. Java is a highly structured language, lems in a heterogeneous world with a sin BeanMachine surprised us with its
and ASCII source files are far from the best gle piece of code. power, letting us inject source code and
way to store data internally, so these so That said, there are also big differences. invoke methods when an event was gen
phisticated tools might be indicative of Lotus's BeanMachine is a low-cost tool erated. This simplifies generating forms
Java programming's future. offering rudimentary database access. that animate and do useful analysis. You
SuperCede's SuperCede Java Edition Aimed at large-scale enterprise develop can go a long way gluing in methods that
2.0 blends Java and c++ development ers, Sybase's high-priced Power] comes link into the event hierarchy.
into one package, making it easy to pro with a wide range of more sophisticated Still, there are limitations: BeanMa
duce app lic ations that use both lan server and client tools. The others all fall chine lacks a debugger, so you must resort
guages- although the resulting x86 na in between. Most of the low-end versions to the usual black-box debugging tricks
......
- t.e (} [)
i nc I I 11
:
'
}
!lit....,<a:t,;
tes LFr a ae s ho w( ) .
Java tools differ mostly in the deg re~ to which they expose source code to direct manipulation.
to catch errors. Also, there's no easy way its limitations, BeanMachine can help you tions. The main product, a Java develop
to subclass a Bean or wrap substantial func get plenry done. ment tool named Cosmo Code, turned out
tionaliry around it. We couldn't find where to be good enough to port to the Windows
it hides the source code for the applets, Cosmo Code 2.5 platform. The latest version, 2.5, includes
and it would be great if you could devel Si licon Graphics started its Cosmo Soft all the major features of its competitors and
op an applet here and extend it in a full ware un it to make it easier for people to provides them all in a richly detailed visu
programming environment. But even with develop Java code for their SGI worksta- al-design environment. continued
Wizards for development V' V' V' V' V' V' V' V'
Built-in components 100+ 300+ 150+ 22+ 100+ 120+ 120+ 70+ 50+
Code obfuscator V'
Native database gateway With top V' V' w/Enterprise V' V'
Database-access tools V' V' V' V' V' V' V' V'
J++ users will feel a bit behind the times. cution can be more controlled. the new code and drop it into place with
There are still plenty of other reasons to There are downsides to this approach. out restarting the entire program. This is
recommend}++. Its Java virtual machine It's more complicated for developers to a great feature. We also like the fact that
(JVM) is one of the best in the industry, and use the best compiler or tools for advanc SuperCede registers its own special sounds
its tools come with extensive documenta ing a project. And you must export the Java for alerting you to breakpoints and errors.
tion. And the Visual Studio is a great envi source to use it with other tools. Tools like SuperCede will certainly be
ronment that provides a good breakdown part of Java's future. The language is too
of methods and code. SuperCede 2.0 good to be relegated to developing byte
SuperCede might be the most advanced code for cross-platform use. SuperCede is
IBM VisualAge for Java 1.0 tool in this roundup because it integrates a great tool for leveraging these advantages
IBM's VisualAge takes a sophisticated ap Java projects with C++ so that you can and using them for serious development
proach to Java development. All the source mix and match code. This approach might for native Win32 platforms.
code is sucked into a central file, and the be the most attractive for developers who
bytecode is kept attached to it. When you want to produce native code for machines Sun Java Studio 1.0
want to publish the code on a Web site, like the x86 while leveraging the capabil Java Studio is not a complete development
you push a button and it emerges as a JAR ities of the Java language. It will likely be package like the others. It's more a visual
file or the class files. less attractive to developers who want to development tool than a compiler and
The advantages of this approach are produce cross-platform Java applets. source-code-editing environment. You
speed and flexibility. ASCII source code is In either case, the rapid application de drop components into a window, where
a pretty inefficient way to represent object velopment (RAD) tool incorporated with they appear as boxes with pipelike fittings
oriented software with many methods and SuperCede is excellent. It provides a so for routing the events. You then design an
variables. The source code must be contin phisticated graphical development envi applet's behavior by linking these boxes
ually parsed and reparsed as it's edited. If ronment and an excellent visual editor. with pipes.
the methods, classes, variables, and so on The compiler is fast and produces code This might seem like taking the saying
are kept in custom-designed data struc that can be hot-patched. If you find a small "a picture is worth a thousand words" to
tures, then searching, compiling, and exe- error and want to fix it, you can compile the extreme. But we found Java Studio ele-
Somers, NY
(for Windows 95, NT, Solaris)
408-253- 9600
Java or Microsoft Visual]++ . To a large
770-863-1234
SunSoft, Inc.
http://www.symantec.com/
extent, you get what you pay for. liJ
http://www.software.ibm.com/ad/ Palo Alto, CA Enter HotBYTEs No. 1083.
800-786-7638
650-960-1300 Enter HotBYTEs No. at Peter Wayner is a BYTE consulting editor and
http://www.sun.com/studio http ://www.byte.com/hotbytes/ writer based in Baltimore. You can contact him
Enter HotBYTEs No. 1081.
at his Web page: http : //www.access .digex
.net/ - pcw/pcwpage.html.
By Russell Kay
Balancing Act
Des igning a po rtable computer is o ne of the ultimate ex
pressions of the phrase "engineering trade-offs"; when you
change x, you must also change y. If yo u want a larger mo ni portable com
tor, yo u're going to add weight and power consumption. Con puter, looking at what is (and
versely, if you want a 2-pound computer, yo u're going to sac isn't) possible with today 's technology (see the
rifice things like battery life , moni tor size, and ke yboard size. text box " Pro posing the Perfec t Portable" on page SONA 2).
Everything must balance. As for what we ca n exp ect durin g
H ere are the 15 areas where most of the trade-offs hap pen : the next few yea rs, let's look at it while 1 Mitsubishi Amity CN
perform ing a modified versio n of that
1. Case design, size, 9. Storage 2 WinBook K6-233
hoary old party dance, the hokey-po key.
and weight 10. Comm unications
"'m 2. Processing power and networking HP620LX
~ You Put Your Data In...
0 3. Memory 11. Battery li fe PageWriter 2000
ffi Getting data into a computer is a neces
4. Keyboard 12. H eat dissipation
z"' sary first step. Right now, fo r most pur 5 TI Avigo
UJ
UJ 5. Navigation devices 13. Conn ectors
c: poses, that means a keyboard. Some of
(!)
6. Display 14. Additi onal 1/0 n HPSojoum
~ the ultra-thin systems coming o ut this
a; 7. Video circuitry devices
l;; year have keyboards with a very short
;:
8. Video in put 15. Expandability
throw: a millimeter or two. This makes a keyboard fee l stiff. The
il::
~ We can examine so me po rtabl e-co mputi ng issues, including ultra-narrow systems have narrow keyboards-in many cases,
~ how these machines interact and where they might be headed, too narrow for touch-typing (witness Toshiba's Libretto and most
il:: by designing what at least one BYTE editor considers an ideal of the Wind ows CE hand-h eld PCs). IBM has exp erimented
·············································································································································
with its "butterfly" collapsing keyboard. tappable on-scree n key board grids, like already good enough, big enough, and
All these examples have drawbacks, and the T9 keyboard in Texas Instruments' bright enough for most users; they don't
no "savior keyboard" is on the hori zo n. Avigo, or handwriting recognition, like need significant improvement. "The 14
But speech recognition, already surpris the Graffiti alphabet in the 3Com Palm inch TFT [thin-film tra nsistor] display is
ingly effective, is developing fast, and some Pilot. But this works simply because yo u actuall y significantly better than most 17
full-size laptops now come with built-in don't enter much data that way. According inch CRT monitors," says Greg Munster,
software. Micron, for example, bundles to several vendors, a stylus will be aro und product marketing manager fo r Hewlett
Dragon Systems' Naturally Speaking with for some time in sma ll-screen dev ices, Packa rd 's mobil e-com puter division,
its notebooks. Speech will likely become simply because fingers are too big and "a nd thus it's all most users really need
much more widespread in the future, but regular pens damage display screens. For or want." But the big screens don't cut it
it's unlikely to replace the keyboard com serious data entry, such as getting 1000 in terms of price and power consumption.
pletely in the foreseeable near term-ei addresses into a PDA, yo u down load the Ironically, the worst problem of all might
ther on the road with po rtables or in our informa tion from your PC over a cable be size. We all want a bigger screen, but
open-door, open-top office cubicles. or IR lin k; there's no practical alternative. we want the total package to be as small
What about graphics-based input? To and light as possible.
shiba' s Tecra 750CDT laptop was the first You Get Your Data Out... H ow do yo u shrink a display screen
to include a video camera for conferenc With a portable, output is normal ly the witho ut shrinking the image? There are
ing and scanning. This shou ld also be a display screen; printi ng is rarely an issue. three li ke ly possibilities: a display whose
boon for those who do library research. Displays represent a problem in terms of physical size can be reduced for tra nsport
Smaller machines (i.e., PDAs) can get by futur e development, for several reasons. and enlarged for use (e.g., some kin d of
with stylus-based input, eith er through First, today's flat-pan el LCD screens are fo ldable LCD or mirror-based system) , an
image projector with a folding screen, or (see "Wearable Pentium," September 1996 moving data physically.
a tiny image that's magnified by a lens. BYTE). Kopi n has demonstrated a display Digital versatile disc (DVD) drives are
The first would be useful, but so far no one small enough to be built into a Motorola starting to appear as options on some full
seems to have invented one. The second Starrac, the smallest cellular phone on the size laptops. Apple's Greg Joswiak says
is really just speculation, because it raises market, so getting faxes on the run might that "the availability of DVD will be im
even more severe power and brightness someday be trul y easy. portant for our newest generation of Pow
questions than the current technology. er Book laptops, which are heavily used
But the third might soon be possible.
You Store It on Your for graphics presentations and video-in
A number of companies, including Dis Hard Drive tensive applications."
playTech, Kopin, and Siliscape, are devel Disk drive technology is, for the moment,
oping small LCD displays that you can advanc ing faster than Microsoft's at And You Bake It All About
hold up to your eye behind a lens (think tempts to occupy it all for Office 9x, so Heat has been a constant concern of de
storage capacity isn't much of a prob signers of full-function laptops and asso
:s one-eyed View-Master slides, and you get
Q
8 the idea) to see a decent color image. lem . IBM is currently suppl yi ng 8.4-GB ciated peripherals. The first 5-V Pentiums
ffi
() At the present time, the resolution is hard drives in some ThinkPads, and more and older DRAM chips ran at shockingly
,_
z
0
at VGA levels and the number of colors will come. Solid-state or other nonmag high temperatures and required fans for
I
\; is limited, but the potential is there (see netic technologies might eventually re cooling. Earlier hard disks were also se
<(
z
"Mini Displays Get Sharper Focus," place magnetic disks, but not soon . And rious heat producers, and we've had more
0
September 1997 BYTE, page 24). Indeed,
high-capacity removable drives-those than one PC Card modem that ran hot
g Rockwell incorporated such a display into of the Zip/Sparq/Shark/SuperDisk/Jaz/ enough to fry itself. However, the mod
"'~ its body-mounted computer, the Trekker Quest ilk-will take care of the need for ern versions of all these components run
Smart pagers Easy paging and e-mail; Difficult keyboard; Paging Motorola PageWriter; Airtouch;
real OS; graphical display tiny display; no Research In Motion lnter@ctive Pager
for future application expandability;
development limited storage
PDAs Fits in shirt pocket; Text entry awkward; Address books, calendars Apple MessagePad ; Tl Avigo;
easy synchronization screens dim; add-on 3Com PalmPilot; IBM WorkPad;
with PCapps applications limited Zaurus SE-500; Psion Siena
Hand-held PCs Color displays bright Mono displays dim ; Light-duty computing, e-mail Win CE PCs from Casio, Compaq,
and sharp; dedicated touch-typing Hewlett-Packard, LG, NEC, Philips,
application buttons impossible and Sharp; Psion Series 3 and 5
Subnotebooks Small; under 3 pounds; Limited expandability Real work in tight quarters Hitachi Traveler; Mitsubishi Amity;
serious power; runs and battery life (although keyboards and IBM Nimantics Persona; Toshiba
full Windows 95 apps displays are marginal) Libretto; ThinkPad 735 (Japan only)
Superthin Sleek; attractive; Expensive; Instances where a floppy HP Sojourn; Mitsubishi Pedion
laptops attention-getting; needs add-ons or a CD is not needed
233 MHz; 64 MB;TFT forl/O
display; under 3 pounds
Full-size, Everything in one 2 inches thick; weighs Anything Too numerous to list
full-function package; easy desktop 8 pounds or more;
laptops replacement expensive; limited
battery life
much cooler, and heat-control methods can deliver, and with manufacturers quot
have a lso improved through the use of ing highly optimistic specs. Today's lithi
conductive fluids, heat pipes, innovative um-ion cells represent the third genera
heat sinks, and, yes, fans. tion of laptop battery technology, and at
Increases in clock speeds that would the moment there's no near-term replace
otherwise present a serious thermal chal ment in sight that offers greater energy
lenge to laptops have been largely offset density in a compact package. (Zinc-air
by accompanying decreases in physical and starved-electrolyte cells have been
sizes and operating voltages. The highest shown for laptops, but they're currently
speed mobile Pentium CPUs made with too bulky to build in and are suitable only
0.25-micron technology today run at only for add-on battery packs.) For the busi
1.8 V internally, while memory and l /0 run ness sky warrior, ai rlin ers with the new
at 3.3 V. Intel's Mobile Power Guidelines generation of computer-friendly power
for 1999 targetthe core at 1.6 V, and mem plugs are a welcome development that
ory and l /0 at 2.5 V. According to Intel, will take some of the pressure off laptop
average laptop power consumption (ex and battery designers alike.
cluding displays) has doubled (from 10 to
20 W) from 1994 to 1997, and if heat dis You Do the Clickey Pokey... If it were any smaller, and if the case
sipation isn't addressed, it's projected to With GUI screens and most modern soft were tan, you might mistake this
nearly double again by 1999. ware usable on portables, you absolute lnter@ctive Pager for a big walnut.
With proper management, however, ly need to have a pointing/navigation de
the thermal load can be restricted to 23 vice. Yes, you can certainly perform a lot others-and we will likely see even more
to 25 W. For smaller portable devices, low of operations in Windows 95 or NT or the ingenious systems in the future .
er-powered, non-Intel CPUs, such as Hi Mac OS using keyboard shortcuts, but you
tachi's 53 and Digital Equipment's Strong can't do everything.
And You Connect
Arm, simplify heat-control issues. So, you need a (choose one): mouse, Yourself Around
Closely allied with heat is battery pow mouse-on-a-stick, touchpad, trackpoint, One problem facing portable designers
er, since excessive heat means wasted elec joystick, trackball, digitizing pad/pen, or is the number of different connectors they
tricity. Therefore, heat reduction contrib touchscreen. The mouse was there first, must incorporate into their machines for
utes to longer operating time between and most desktop systems still have one, communications and peripheral hookups.
recharges, as well as increased battery lon with trackballs coming in a very distant A typical full-size laptop these days can
gevity through reduced thermal stress. second place. The other pointing devices have almost two dozen l/O connectors
Battery life (i.e., time of operation) were all designed to concentrate finger and switches on the outside of its case .
has always been a point of contention, tip screen navigation into a small, fixed And there still have to be bays for remov
with users needing more than portables space. They all work- some better than able drives and batteries, plus upgrade
$5.65/day
(Effective Ratei )
or Buy for $4649
Business Lease0 : $171/Mo., 36 Mos.
Order Code#250113
Looking for technologies used by big business -without the big business expenses?
Then take a look at thi sDell®PowerEdge" 2200, specially configured with Microsoft
BackOffice Small Busine ss Server software . You get a comprehensive solution
tailored to bu sinesses of 25 users or less with applicationsthat allow multiple
ii usersto share files, databases and printers. Plus software that allows you to faxto
and from your desktop, send and receive e-mail from the office TO ORDER TOLL-FREE
as well as from the road, and create/manage your own website. f1 '"\ 800·289· 1155
The PowerEdge 2200 server is certified as 3Com Network Ready ~ V ITO ORDER ONLINE 24 HRSJDAY I
with a pre-installed, configured and tested network interface card. And we made it - ~-..
I-:'!
available through the business lease program 0, configured to start effectively as low www.dell.com/smallbus/pe2200
as $5.65/dayt- perfect for your growing business. Call us today or vi sit our website. Mon-Fri 7am-9pJT1 CT· Sa t 10am-6pm CT
For a co mplete copy of Guarantees or Limited Warran ties. please write Dell USA L.P., One Dell Way, Ro und Rock, TX 78682. 1$5.65 effective rate based on
Sun 12pm-5pm CT• In Ca na da~ call 800-233-1589
monthly pay:":lents of $171, over a 36-month lease. OBusiness leasing arranged by Dell Financial Services L.P., an independent entity. to qualifi ed customers. GSA Contract #GS-35F-4076D
Above lease payments based on a 36-month lease. and do not include taxes. fees. shipping charges; subject to credit approval and availability. Above lease
terms subject to change without notice. 6Qn-site service guarantee provided pursuant to a service contract with a thi rd-party provider. May not be available in
certain remote areas.§ 24X Max/12X Min. * Prices and specifications va lid in the U.S. only and subject to change without notice. Pentium is a registered
I Keycode #01 323 I
trademark of Intel Corporation. 3Com and U.S. Robotics are registered trademarks of 3Com Corporation or itssubsidiaries; 3Com Network Ready and the 3Com
Network Ready logo are trademarks of 3Com Corporation. Microsoft and BackOffice are registered trademarksof Microsoft Corporation. HP is a registered
trademark and OpenVi ew is a trademark of the Hewlett Packard Company. Dell, the Dell logo and PowerEdge are registered trademarks and Directline is a
service mark of Dell Computer Corporation. © 1998 Dell Computer Corporation. Al l rights reserved.
Computers to Go
access to the memory and hard drive. Compaq, HP, and Toshiba, seems to be idly. Still, all the smaller machines are ad
The universal serial bus (USB) standard, even considering such a machine . Mark equate for taking notes and doing minor
which can hook up to 127 different de H anson, a prod uct manage r for Com data entry in the field, they 're a lot easier
vices, is one good possibility for replacing paq's Armada laptops, thinks the great to carry around, and you can easily upload
many, though not all, of those varied con number of legacy peripherals will limit your work and information to your desk
nectors. Also, eliminating the number of US B's acceptance. "lEEE-1394 will be more top or full-laptop PC.
different components would noticeably likely to replace some other connectors
reduce the manufacturing cost of the sys and will also be implemented in drive What's Next?
tem for both parts and labor. bays, although it raises some power-man As we approach the twenty-first century,
For all its potential, however, USB has ageme nt issu es," he says. For better or we're more likely than ever to have some
been slow to catch on, and it's not clear worse, USB seems to be not a replacement type of portable computer with us. To
when it will reach the critical mass of but just one more connector standard day's mainstream laptops are too big and
acceptance. There's still only a trickle of aggravating, not solving, the problem. heavy for general carry, and they're suit
USB peripherals available, and most of ed only for sit-down, tabletop or desk
the things people want to plug into their That's What It's All About! top operation. Thus, the smaller porta
portables need some other connector. Finally, we come to the matter of software, bles we've discussed-PDAs, hand-helds,
A pure USB machine is an interesting without which none of these machines mini-notebooks-are where the real ac
idea, but it seems to be science fiction. No is more than a paperweight. The larger tion and innovation are called for.
portable maker we talked to, including machines use full-function desktop OSes We could use one more development:
and applications, so you need make no standardization. Today's portables have
compromise when selecting them. Cer just too many limiting incompatibilities
tainly Windows 95 (and soon 98 ?) and NT among their hardware, accessories, and
are widely available on laptops and sub system software. You can interchange PC
notebooks, and Macintosh fans have the Card modems, but you don 't get much
Power Book laptops. beyond that. Docking stations? A painful
For hand-helds and PDAs, though, you subject. Is it too much to ask for hardware
must consider your needs and choose care that's usable with several different brands
fully. Do you go with Windows CE, now instead of being specific to a single ven
in version 2.0, or a proprietary but more dor's line? Desktop architectures have
efficient (and perhaps more limited) OS, failed precisely because ofsuch incompat
such as Psion's EPOC, Apple's Newton, or ibilities-remember Micro Channel?
the 3Com PalmPilot's Palm OS? The mass (and mess) of device-driver
There's been significant application de software is another place where unnec
velopment for the PalmPilot (http://www essary individu alism rears its head and
.pilotgear.com /index.htm.l lists over 1100 makes interoperability difficult. Standard
PDAs such as Tl's Avigo organizer Pilot applications) and Psion machines; izing on fewer connectors, as discussed
let you carry an extensive amount the current crop of CE applications is lim earlier, would simplify life for everyone.
of data in yo ur pocket. ited by comparison but likely to grow rap- Will we ever see such standardization?
Somehow, we don't think so. The indus
WHERE TO FIND try will muddle along for the next few
years on an incremental path. But until
Apple Computer, Inc. IBM PC Co. http://www.mot.com/ http://www.ti.com/
Cupertino, CA Research Triangle MIMS/MSPG/Products/ organizers/Avigo/
(or unless) someone develops a really new
800-776-2333 Park, NC Two-way/pagewriter/ approach to computing, we'll carry ever
408-996-1010 800-772-2227 3Com Corp./
Dallas, TX
Russell Kay is a BYTE technical editor for re
http://www.hp.com 847-576-5000
800- 842-2737 views. You can contact him by sending e-mail
to russell .kay@ bix.co m.
LEL
that require access to
detailed transaction
level data, and the cor
porate longing to
WHEN
documents, pictures, video, and anything else that exists in digital form. best per(ormance
Large and rapidly growing databases strain the abilities of traditional out of para/le/
hardware platforms. Just storing all this data will stress most existing plat
forms. But an even more serious problem is the ability to query these moun processing systems.
tains of data in a reasonable amount of time. Traditional single-processor By Ken Rudin
machines don't have the raw number-crunching power to sift through these
large and growing
databases efficiently.
In response to these
needs, hardware ven
dors have created
multiprocessor ma
chines (historically
referred to as "paral
lel" platforms, and
now more frequently
referred to as "scal
able" platforms).
These systems can
hold from two to hun
dreds of processors.
The resulting com
puters give you
enough aggregate
processing power to
handle all your data
more quickly.
However, these
scalable hardware
platforms are only
one part of the solu
tion. Their strength in
numbers won't help if
the database software
is not able to take
advantage of the hard-
Partitioning Data
Efficient Data Queries
Graph shows efficiency of query vs.
number of partitions for several sizes
D ue to the large size of modern databases,
you might find it beneficial to divide an entire
database into smaller partitions. Each partition
in the second, and so forth . If you do a lot of
searching by customer name, for example, you
should place part of the alphabet in one data
of queries. Usually, the more
partitions, the better.
then resides on a different disk or another data store, another part in the next, and so on. Then
store. In a multiprocessor system, especially a when you perform your search, you know which
shared-nothing hardware architecture, the data store to go to immediately, saving consid
CPUs in each node are responsible for their own erable time. You would do similar partitioning if
data stores. Since these CPUs must respond you do a lot of searching by date, product, or
to requests for either data or results from their
owned data stores, it is important to create the
other specific field in the record.
The disadvantage here is the danger of data
..t'
-~ 0.50
partitions judiciously for optimum processing. skewing. If you're storing things alphabetically, !fl
For example, each partition should have it may take a lot of effort to ensure that the par
approximately the same number of records. titions have comparable numbers of records .
Why? Because if some partitions are larger than This can be easier if you have a large database
others-a condition called data skew-tasks per already. You can determine the percentage that
formed on those partitions will take longer. This each part of the range occupies in the database,
10 20 30
will mess up the parallel processing because then combine ranges into roughly equal parti Number of partitions
one processor has to do more work than the oth tions. You can be confidentthatfuture additions
Query Sizes
ers. Because of this unequal distribution of labor, to the database will be in similar proportions, • .8 0 .6 El .4 • .2S D l • .05 • .01 • .005
the query takes longer than it should. thus maintaining the same relative sizes.
Unfortunately, it's easy to choose a partition Naturally this won't work if the percentages
scheme that results in data skew. An example change-for example, if you partition by year and records with the hash of that value are.
would be partitioning a sales table by month your sales keep growing. One major disadvantage of hash-based par
when most of your sales are during the Hash-based partitioning is a more abstract titioning is that it doesn't help with range search
Christmas season. As a result, nearly all the data version of range partitioning. With this approach, es. Since a range of values does not correspond
would end up in the December partition, and you compute a hash value modulo n from one to a range of hash values, you must do many sep
very little data would be in any other partition. or more fields in every record , then store the arate searches instead.
Partitioning by customer name would also result record by its hash value. A sufficiently random Obviously, no one method does everything.
in data skew, since more names begin w ith some izing hash function will ensure that each parti That is why people invent hybrids. Knowing the
letters (like M and S, in English) than with oth tion is about the same size. Hash-based parti type of data your database contains, and espe
ers (like X and Z). Partitioning by year is proba tioning can also help in searching for records cially knowing the most common types of
bly the worst choice , since most queries w ill with specific values, since you know where the queries run against that data, you can probably
probably be looking for the most recent data,
and the CPUs that own that partition will get run
into the ground. (This is known as the problem of
access frequency.) How to Partition Data
There are three basic forms of partitioning :
round robin, hash-based, and range (see the fig The basic methods of partitioning data are round robin, hash-based, and
ure "How to Partition Data" at right). You can range. Hybrid methods use combinations of these three.
create hybrid methods, based on these three,
for specific purposes. File Partitions File Partitions
Round robin is the simplest way to partition.
record1 record1
With n data stores, the first record goes in the first
data store, the second in the second store, and
so on until the nth record goes in the nth data
store. Then the next record goes in the first again,
record2
record3
...
record2
•
record4
the next in the second, and so on. Round robin
record3
thus guarantees nearly equal partition size. The •
major drawback of round-robin partitioning is that
it does not help expedite searches for specific • Round·robin partitioning
•
*
queries, unless indexes are available. For on-line stores the first record in Hash-based partitioning
----
the first data store, the
• computes a hash value
transaction processing (OLTP) , an index is likely
second in the second store,
• modulo n for one field in
to be available. If so, round robin balances the
and the nth in the nth. Then - - - - every record, then stores the
OLTP workload over the processors.
the next record goes in the record by its hash value.
On the other hand, range partitioning does
first store again, the next in
help with some kinds of queries. With range par the second, and so on.
titioning , a certain defined range of a record val
ue goes into the first data store, another range
82 BYTE M A Y 19 98
When Parallel Lines Meet Managing Data
dabdali
dab dab~
dab'"'
ITll Minutes
Total
perfonning that stage.
Query Pipelining
~~" ~~" ~~"
'-/'.~
..........
...~~ cj>~ .~
...~~ cj>~ .~
cj>~
••
c§' c§' ,i:.<$1-
Table 1
data data
datadata ~
data dat? . -
d .t data
~datadall
0 :
•
•
::
••
••
:
•
•
, •••••••••••
o:···~:···~
•D
:::---+ :............
..........
:: :
•D
datadata
data data ~
~dll7~11ata
INll'".datadata
data data dab
data dab data~
Table 2
....
D : ...':
D:...'
:
•
•
: ::
Time=! minute
::
••
••
............
:
•
; ••••::••••:
and which are not. Also, we must keep in as accessible to all processors. "owns" a partition of each table. If a pro
mind that we're now talking about the The theoretical advantage of this data cessor needs to query rows that reside on
architecture of the database server soft base architecture is increased flexibility a remote node, the database does not
ware, not the hardware. As we'll see, regarding how your system's resources send the rows back to the original pro
despite their names, both the shared-disk are used during a parallel query. The data cessor for local processing. Rather, by
and shared-nothing database architec base management system can dynami employing function shipping, the data
tures can (and do) run on shared-noth cally choose not only how many proces base sends the query to the remote node,
ing hardware. sors and how many nodes to involve in processes it there, and then returns only
executing a query, it can also choose the query results back to the original pro
Share and Share Alike which processors and which nodes to use. cessor. (See the figure "Data Shipping vs.
Briefly, a shared-disk database architec This improves your ability to perform Function Shipping" on page 88.)
ture means that at a conceptual level, when load balancing. The theoretical advantage is reduced
the DBMS is executing a parallel query, any The theoretical drawback, however, is internode-communications overhead
processor is allowed to query data resid that this flexibility incurs additional com during parallel query execution (and
ing anywhere in the entire database. munication overhead between nodes due therefore more efficient use of intercon
The situation is obviously different on to data shipping (that is, because many nect bandwidth). Rather than sending all
a shared-nothing hardware architecture, rows may need to be sent across the inter the rows across the interconnect network,
since a processor can't directly issue an I/O connect as messages). This additiona l you just send the query itself, and you get
request to a disk residing on a remote overhead can have a detrimental effect on back only the results of the query (rather
node. So, if a set of rows that a processor performance. than each row that was queried).
needs happens to be on remote disks, then However, there are a few theoretical
the appropriate message passing will auto Does Not Share Well drawbacks as well. The first drawback is
matically occur behind the scenes. The In contrast, a shared-nothing database simply reduced flexibility, because a query
processors that "own" the disks in ques architecture focuses on minimizing the that involves a particular database parti
tion will issue the I/Os and will then send message-passing overhead required to tion can execute only on the CPUs of the
all the data read from the disks back to the process a parallel query. It does so by node that owns that partition.
original requesting processor for local dividing each table into "partitions," The second drawback is that r,esponse
query processing. This technique of send based on some partition scheme that you times for these parallel queries are very
ing all the rows back to the requesting pro choose, and assigning each partition to a sensitive to data skew. Data skew occurs
cessor is called data shipping. different node. For example, if you have when a poor partition scheme is chosen,
With this architecture, the DBMS has fo ur nodes, a trivial partitioning scheme leading to one partition having a dispro
no notion of a certain node "owning" a for your customer table could use the cus portionate amount of data.
certain set of disks- it views all the disks tomer's last name as the partitioning key
as logically shared, even though they are and assign names in the range A-F to node Parallel Realities
not physically shared. The "behind the 1, G-L to node 2, M-S to node 3, and T-Z I very carefully used the word "theoreti
scenes" message passing is responsible for to node4. cal" when referring to the advantages and
allowing the database to treat all the disks In essence, each node exclusively drawbacks of the shared-disk and shared-
THEY CALL ME
A SHERPA.
PEOPLE COME TQ ME
ALL O VER F OR MY S H ER P A NE S S.
0 N T K N 0 W H 0 W
Lost in the mountains? Use a Sherpa guide. Lost on the Web? Use Lycos, the Web 's most
powerful search engine. Lycos is a free , fast Personal Internet Guide that divides the Web into 22
topic areas, making it easy to find the information you want from over 100 million Web sites. We 've
got features like StockFind, CityGuide, Yellow Pages, PeopleFind and free Classifieds-e ven a special
search tool to help you find just the pictures and sounds you 're loo king for. Thro w in the silly hat,
y;'PC
r• Lvc o s·
www.lycos.com
and Lycos is everything you'll ever need from an Internet guide.
Managing Data When Para l lel Lines Meet
ala data
data data
- - - - - - -data data data
.,....,._.,_"':~:~::~::~
data data data
4
-1 -1
Nodel
0 Request for data goes to remote node.
@ Local CPU issues VO request to local disk.
@ All requested data from disk goes to the local CPU.
® l/O
nothing database architectures. How architecture. This wi ll likely be true for Th e larger the test, th e more yo u will
much should you believe th e th eories years to come, unti l the products are ful learn, because larger tests will put more
about these arc hitectures and how well ly mature. stress on a system, highlighting its
they will run data warehousing app lica For exampl e, the qua li ty of a vendor's strengths and exposing its weaknesses.
tions? Can you make your technology query optim izer often has a far greater
and product choices based solely on these effect on performance than any of the pros
The Most Effective
theories? and cons I've mention ed . In another Approach
No-it would be a mistake to d o so. examp le, one database vendor's code path If your database is strategic, sooner or lat
Although understanding the theoretical to perform a certain operation might be er it will scale up to a size that only mul
pros and cons of these two architectures 50 percent the length of a competitor 's. tiprocessor platforms-such as SMP, clus
is critical to understanding whatever tech For this operation, the first vendor has an teri ng, MPP, and NUMA architectures
nology you choose, in reality the actual enormous advantage over the competi can h and le. To use these platforms to
quality of a database vendor's implemen tor, regardless of the architecture. In these effective ly imp rove query-processing
tation is much more important than the and many other cases, the differences in performance, yo u will have to employ
how well the ve ndor's developers wrote parallel queries. Though parallel queries
WHERE TO FIND vario us parts of the products are the true are not magic, and will require yo u to
IBM 800-633-0596 determining factors of performance. This learn new approaches to query tuning,
Armonk, NY 650-506- 7000 is the issue on which yo u shou ld focus. they are the most effective technology
800-426-3333 http ://www.oracle.com
Although this might soun d like heresy, available today for quickly processing
914-765-1900
http://www.ibm.com Sybase architecture is currently only a secondary large amounts of data. Ill
Emeryville, CA
consideration.
Inform ix Software 800-879-2273
Oracle 937-445-5000
use, since they are highl y specified and cles on designing and implementing scalable
Redwood Shores, CA http://www.ncr.com
highly controlled. The only way to really so lutions . You can reach him by sending
know is to test your own database queries. e-mail to krudin@e merge nt.com.
intranets and extranets. Meanwhile, Guarantees rate of reliability Solution: Class of service
Guarantees amount of delay Tries to aDocate requested bandwidth
the use of these long-distance links is Tries to guarantee rate of reliability
exploding. New high-bandwidth ap Performance gain When Tries to guarantee amount of delay
L____J ~
plications, including push sites and Performance gain When
Low High Now 1999
multimedia, must run across an entire ~~
enterprise. Low High Now 1999
By simply throwing more band
width at the problem, corporations
are wasting millions of dollars each
year in misused or unused network
bandwidth. T his is because it isn't a
real solution; it results in demand al
ways outpacing supply. TCP/IP was Application: Web browsing
Requires variable bandwidth
primarily designed to support FTP Sensitive to reliability
and telnet applications, but today's Not very sensitive to delay
higher-speed networks are placing Solution: Caching
greater demands on bandwidth, ex Gives apparent increase in bandwidth
aggerating delays and bottlenecks. Does not change refiab~ity
The result: lost productivity and lost Decreases delay
business. Performance gain When
Currently there are few good avail ~
Low High Now 1999
able alternatives for managing TCP/IP
traffic. That's because such traffic
wasn't designed to be managed. This
situation is beginning to change, however. Low-priority appli to obtain a higher quality of service (QoS). This situation is still
cations can now be controlled, given lower priority, and other a rare offering on the Internet today.
wise made to go to the back of the line waiting to pass through
a bottlenecked portion of a network. Because so much data is Clearing Up Congestion
redundant, caching and multicasting can reduce network traf Wherever there's traffic, there's bound to be congestion. Many
fic problems by keeping packet-copying to a minimum. systems that process large amounts of traffic-human or other
The bad news is that some bandwidth-control techniques, such wise-have specific ways of dealing with it. The California De
as class of service (CoS), still don't guarantee a given amount of partment ofTransportation throttles traffic with metering ramps.
bandwidth, although they offer "better than best effort" service Macy's increases its sales capacity by adding more staff mem
to priority traffic. Other techniques can guarantee bandwidth, bers. The U.S. Postal Service decreases delivery time with Prior
but only in networks that are under your control. ity Mail. United Airlines maintains capacity with reservations.
Finally, caching technologies are getting sophisticated enough The Internet uses (or will use) techniques that are roughly anal
to deliver Web pages in a snap, so even if your particular bottle ogous to all these techniques, which are outlined below.
neck situation persists, or if the Internet backbones or your ISP Metering ramps. Metering ramps are at the heart of the Inter
offers substandard performance, you or your users might not net, but they're a little different from traffic ramps, which, in
notice as much as before. stead of throttling cars at an on-ramp, tell drivers to stay away.
These caching technologies will become critical in a situation When congestion occurs, devices running TCP/IP begin drop
where ISPs provide differentiated services and you pay more ping packets and send messages back to the originators of the
admirably. But even though they are effi places traffic in the Queues are scheduled
proper queue. acconing to traffic
cient and fair, metering ramps cause wild poficy.
swings in network utilization, leading to Application
the burstiness of the Internet. This makes
the Internet's metering ramps as much a Presentation
••••
• ••• ••
part of the problem of delivering consis Sessions
tent QoS as they are a part of the solution .
•••• ••
Increased capacity. Why not just make
Transport
the pipes bigger? For a long time, we were
able to live with the idea of just throwing
bandwidth at the problem. But two cir
cumstances are bringing things to a head.
First, WAN traffic is way up : It's growing
Network
Data link
Physical
Important IP
addresses.......
........
••
••
more quickly than we can throw band
width at it. In a LAN, it might be possible In this example, scheduler gives
Ifyo u're a corporate professional looking for real solutions Software. Peripherals. Notebooks. Servers. Storage. Networking.
to your most challenging IT problems, PC EXPO is the one event that Telecommunications. Mobile/ wireless. Computer telephony. NT.Java.
delivers all th e goods. We mean all. Including an explosion of new Web and
More than 800 IT suppliers will come to PC EXPO e-commerce solutions at our best-ever WEB.X - T he Internet
with one thing in common: corporate IT solutions Event for Business, held concurrently during PC EXPO.
and to attend over 50 sessions within our Corporate The world's full of!T events. But for corporate
Education Program. professionals, there's really only one. PC EXPO in NewYork.
We deliver virtually every techn ology for serio us profit
along with the resources and information you need to leverage To attend, call 800-829-3976, ext. 2980 or register
them. From the desktop to the enterprise, it's all here. H ardware. online atwww.pcexpo.com.
Network Integration Breaking Bandwidth Bottlenecks
l..----ll ~------b~an\~.....:::;;~
dth-;b-~-~-ch~ra'ten~i-re_mm-·ns_.____, ~I
prioritizing packets at the desktop, net
work administrators can lessen the load lime
on core network devices. And later this
year, 3Com will deliver an LDAP-com l
CJ
patible Policy Server to store policies and
push them out to switches, routers, and Web server
Hthe browser confonns to new HTTP ll spec, and
desktops, instead of requiring individual lime-To-Live exceeds zero, newer cache servers,such
configuration of each device. I -I as lnktomi's Traffic Server, can return objects immediately
Browser to browser from cache.
Private Bandwidth Cache
Sometimes CoS's "better than best effort"
isn't good enough. This is particularly true Typical cache servers conserve bandwidth but might not eliminate
if an application requires a guarantee of
bandwidth and latency. To get this kind the World Wide Wait and similar latency problems.
of control, you need to manage all the net
work devices in your network end-to-end. to offer guaranteed bandwidth to tenants. TCP window sizes that are too large, caus
Then bandwidth-management products Check Point Software, best known ing a huge amount of unnecessary pack
can dole out dollops of bandwidth by ap as the leading maker of firewalls, offers et retransmission." Packet Shaper detects
plication, group, or user. Floodgate-1, server-based software that these redundant premature transmissions
Using leaky-bucket algorithms, band allocates bandwidth by a committed rate, and drops them, which can help reduce
width-management products queue up but Floodgate adds the ability to allocate and smooth out traffic more quickly. But
or drop packets that don't fit bandwidth by an abstract number. The advantage of every dropped packet requires a TCP
policies. (In a leaky-bucket algorithm, the this ratio method: If a network adds band slow-start, with its accompanying drop in
queue allows a limited stream of packets width, the individual bandwidth alloca performance.
out at any time but has a maximum depth, tions don't all have to be readjusted to By contrast, traffic managers, such as
so packets exceeding the bucket's drain reflect the increased available pipe. Access Point and Floodgate-1, attempt
age rate are discarded.) The latest gener Packeteer' s Packet Shaper devices to eliminate dropped packets entirely with
ation of these products, which typical use TCP Rate Control (see the table on queuing. However, the larger the queue,
ly sit at the threshold of the narrow pipe page 94) to tell devices they should not the bigger the potential for latency dur
being managed, also provide separate burst traffic into the network due to con ing congestion.
queues for each class of traffic. gestion. Although it works with Web traf So, for now, bandwidth managers are
That's the high-level view. Once you fic, TCP Rate Control is not universally ad doing the best they can with a protocol
examine these products, at least three dif mired because it lacks support for UDP which, poor implementations aside, will
ferent approaches emerge. packets, such as voice and video. Packet continue to rule the Internet.
Xedia's Access Point devices offer ba eer acknowledges this but denies allega
sic Layer 3 traffic management, giving tions that TCP Rate Control is risky stuff. Cache in Hand
administrators the capability to allocate a You might think that at least one of CoS and guaranteed bandwidth have
committed bandwidth rate to each appli these three approaches could solve band their problems. So, if you can't keep the
cation and guaranteeing that the band width problems. But even TCP Rate Con information where it is and get at it fast
width allocated will never drop below trol can't cure all congestion woes in a er, then why not bring the information
that committed rate. Xedia's Class-Based network. "There are implementations of closer? That's exactly what caching does.
Queuing also lets applications borrow TCP/IP, such as some versions of Solaris, Already, the leading Web browsers main
spare bandwidth from other applications. with bad default values going to dial-up tain small caches of viewed pages on local
Xedia is targeting not only corporations users," says Bob Packer, chief technical hard drives. Many of the caching tech
but also ISPs and office buildings seeking officer at Packeteer. "These values create niques being deployed today on servers
The prize package consists of one year's worth of hosting (80MB website storage and
full CGI access). The prize package is provided by lnterland, Inc. Land:1nc
1 Do you currently have a private web 7 Rate on a scale of 1 to 5 ll=no
site? (Choose one.) experience, 5=expert) your knowledge of the
0 Yes following technologies:
9 If you have a web site/intranet'extranet
0 No I 2 3 4 5
Security 0 0 0 0 0 today, what do you use it for?
2 Does your company have a web site? Certificate servers 0 0 0 0 0 D E-mail
(Choose one.) Virtual private D Groupware
0 Yes networks 0 0 0 0 0 D Displaying product/company information
0 Not currently but plan to have one soon Electronic D Remote access
0 Not currently and have no plans commerce 0 0 0 0 0 D Electronic commerce
0 Very dissatisfied
D Extranet organization have?
6 How proficient would you say you are with 0 Java 0 Under JOO
web technologies? (Choose one.) 0 Dyniunic HTML D 100- 499
0 Expert
0 XML D 500- 999
0 Advanced
0 HTML D 1000 or more
0 Novice
12 If you win the free web site, what will you do with it?
~
The Future of Information Technology Today A Division ofThe McGrawHill Companies
- - - -----------
Contest Rules The odds of winning depend on the total number ol entries re·
The contest is open to all U.S. residents 18 years of age or old McG raw·Hill Companies, Inc., lnterland, Inc., their agencies,
Name: _ _ _ _ _ _ _ _ __ _ _ _ _ _ __ _ __
er. No purchase necessary. An individual may enter regardless subsidiaries. employees and fami lies are not eligible to partici·
of whether or not he or she chooses to participate in the survey. pate in the contest. The McGraw·Hill Companies, Inc.. is not re ·
Tille: _ _ _ _ _ _ _ _ _ __ _ _ _ _ _ _ _ _ __
Entrants should fill out their daytime telephone number where in spon sible for lost. late. or misdirected mail or ineligible entries.
dicaled. Limit: one enl ry per person. All federal. state, andlor local rules and regulations apply. Void
Entries musl be received by May 29, 1998 to be eligible for the where prohibited by law. One prize will be awarded. Total val
drawing. The finalist will be determined in a random drawing to ue of prize is $250. The prize is not redeemable for cash, nor is Company : - - - - - - - -- - - - - - -- -- -
lake place at BYTE. The winner will be contacted by telephone substitution of the prize by the winner allowed. The winner is
on June 1, 1998. Personal contact with the individual specified responsible for any and an taxes associated with the acceptance Addre~ : _ _ __ _ _ _ _ _ _ _ __ _ __ _ _ __
on the entry card must be made for the finalist to be declared the of the prize. BYTE reserves the right to substitute a prize upon un
winner. If the winner cannot be contacted within 15 days ol lhe availability.
drawing, then the unclaimed prize will be awarded to an alternate For the name of the winner. send a sell-addressed. stamped City: _ _ _ __ _ _ __ _State: _ _ _Zip: - -- -
winner selected at random. The winner shall be required to sign envelope after June 1 to lnterland. Inc. Sweepstakes,
an aHidavit releasing The McGraw· Hill Companies. Inc., from Resea rch Department. BYTE Magazine, 29 Hartwell Avenue,
liability in connection with use of the prize. Lexington. MA 02173 . Phone:_ __ __ _ _ _ _Fax: _ _ _ _ __ _ _ __
l -
mi estimates that 60 percent of the traffic
on the backbone of one ISP it works with CacheAow prefetches updated objects based on
predicted usage patterns and object-update
is redundant. schedules,considering size and distance to object Web server
But caching is not as simple as storing
HTML pages. The trick, of course, is fig Browser issues request for cached
uring out how often to refresh each object objects;cache returns data in less
in the cache. Each page is actually made Browser than 01 second.
up of many objects-sometimes dozens. Cache
Each of those objects changes over time,
but not at a constant rate. Making matters
worse, the original HTTP 1.0 protocol did CacheFlow eliminates latency problems, even for pre-HTTP-1.1
not let page publishers dictate the typical objects, by prefetching objects based on usage and update schedules.
time interval before a cache must fetch a
refreshed object. of the first user 's bandwidth. A simple That default can be changed.
How does Traffic Server approach the get - i f - modif i ed HTTP request is the Traffic Server can also take advantage
problem? After a user requests a page for only thing that travels across the Internet of HTTP 1.1 's Time-to-Live (TTL) HTML
the first time, Traffic Server keeps all the and back if a page is unchanged. tag. To reduce latency, HTTP 1.1 lets Web
objects on that page in its cache. Since In addition, Traffic Server is mildly pro publishers attach a TTL tag to each object,
pages don't change quickly, future users active in updating the cache. By default, which gives them more granular control
of that same page consume only a fraction the cache refreshes each object hourly. over when the cache requests a new copy
of the object. Banner ads might have to
be excluded from such treatment because
Beyond Queuing Traffic Server doesn't return hit informa
tion to servers for the all-important Web
ad click-through information. But the
TCP Rate Control is achieving new prominence through technology such as
bandwidth savings derived from caching
Packeteer's Packet Shaper.
every object on a page except the banner
Queuing TCP Rate Control ad is still substantial.
Efficiency Tosses packets. More efficient; no
CacheF!ow, from the company of the
queues form.
same name, takes caching a step further.
Induces packet loss; Reduces packet loss
The company started with the observa
generates retransmissions.
and retransmissions.
tion that the typical browser fetches only
Precision Limited traffic
Rich traffic
four objects at once. A page containing
classification.
classification .
many objects might take many fetches to
No bit·per-second
Bit-per-second
pull down everything. CacheFlow gets
control.
control.
around this problem by fetching all objects
No flow-by-flow QoS.
Rate-based QoS for
on a page at once.
individual flows.
Web pages are starting to contain more
Inbound/outbound No inbound control.
Both inbound and
objects, so the savings can be substantial.
outbound control.
For instance, http://www.cnn.com has
Ability to react Reactive.
Proactive.
so many objects that, in the best case,
Congestion has already
Prevents congestion
electrons have to travel something like
occurred.
before it occurs.
600,000 network miles to deliver the home
page coast to coast. Given the limitation
IUUllUlllll
High Performance Data Access Driver Suite ...... * ...
Pllfflllltl
* ***
SC>FTWARe
Web Site: http://www.openlinksw.com Making Tochnolagy W ork Far You
of the speed of light, that's nontrivial. statement when a second user requests a weren't enough, within the next year mul
The CacheFlow engine is also con page and its objects. This saves not band ticast traffic will proliferate. The band
stantly prefetching Web pages based on a width, but latency: When demonstrated, width-management wizards all agree that
complex form ula of a page's popularity CacheFlow easily fetches pages faster than multicast will change the Internet again
and the cost in time and bandwidth of the eye can blink. and help hasten the system wide CoS stan
fetching the page. According to the com Traffic Server might approach that kind dards that companies such as 3Com are
pany, this prefetching is so much more of low latency, but only if the entire Web evangelizing. Time will tell if multicast is
efficient than the fetching done by prod adopts HTIP 1.1. Just how fast that's hap a ki ller ap plication, but its introduction
ucts such as Traffic Server that Cache Flow pening is a matter of controversy. For var hastens the day when no network device
doesn'tneed to send a ge t -i f - mod i f ied ious reasons, CacheFlow claims that the can be indifferent abo ut where a packet
latency reduction with HTIP 1.1 wi ll ap came from, where it's going, or what it's
WHERE TO FIND proach only 20 percent, and then only be carrying.
CacheFlow, Inc. Packeteer, Inc. cause HTIP 1.1 also sup ports persistent Meanwhile, the more control you have
Palo Alto, CA Cupertino, CA connections. over your network, the more possible it is
650-849-1400 408-873-4400 One thing is for sure: Nothing will force to guarantee bandwidth to critical appli
http ://www.cacheflow http ://www
.com .packeteer.com Web publishers to cache ads unless hit cations and to begin to shape bandwidth
rate info rmation can be returned from . priorities for other applications. Even if
Check Point 3Com Corp.
Software Santa Clara, CA the cache to the Web server. CacheFlow's you don't control your network, caching
Technologies, Inc. 408-764-5000 cache can do this; Traffic Server's can might offer a quick way out of the World
Redwood City, CA http ://www.3com.com Wide Wait. Either way, the old solution
not. Inktomi officials point out that Web
650-628-2000
http://www Xedia Corp. publishers are using sophisticated banner getting out the checkbook and ordering
.checkpoint.com Littleton, MA up more expensive bandwidth- isn'tthe
ad-rotation schemes, so they sti ll won't be
978-952-6000
lnktomi Corp. http://www.xedia.com thrilled about caching. only game in town. llJ
San Mateo, CA
650-653-2800
http://www.inktomi
Different Packets Coming Scott Mace is a BYTE senior editor based in
.com As if all the tricks employed to decongest San Mateo, California. He can be reached at
www.wibu.com
Software Protection www.griftech.com
Customer Satisfaction Guaranteed
WIBU-SYSTEMS introduces
the future of copy protection.
The newWIBU-BOX/U combines
the unmatched effectiveness of
hardware based copy protection
with the I00% t rouble free
operation of the Universal Serial Bus
(USB), giving you and your customers ISO .9001@;1 R \J
certified -~~
'>Q<:>'
something to cheer about. Member of USB
Implementers Forum
11~n.,.
Call now for your free Test Kit: UiJD a
·• GRIFFIN
<.....,... TECHNOLOGIES
North and South Am e rica:
IS TICKING
early 1990s, the academic community dis An expenditure of twice the dollars makes your adversary's attack twice as fast.
covered differential and linear cryptanal By Moore's law, these attacks will be 10 times less expensive (and 1O times faster)
ysis, and many symmetric encryption every five years .
algorithms were broken. Similarly, the fac
Type of Budget Tool 40 bits: Time 56bits:Time Key length
toring community discovered the num attacker and cost per and cost per for protection
ber-field sieve, which affected the securi key recovered key recovered in late 1996
ty of public-key cryptosystems.
Pedestrian Tiny Scavenged 1 week Unfeasible 45
There are many encryption algorithms hacker computer (No cos t) (No cost)
currently available; see the table "Encryp $400 FPGA 5 hours 38 years 50
tion Algorithms: Suitability to Task" on ($0.08) ($5000)
page 100 for classes of algorit hms and
Small $10,000 FPGA 12 minutes 556 days 55
their characteristics. What algorithms are business ($008) ($5000)
considered secure today? What about the
future? Predictions are dicey at best, but Corporate $300K FPGA 24 seconds 19 days 60
they are essential in the business of cryp department ($0.08) ($5000)
ASIC 0.18 second 3 hours 60
tography.
($0.001) ($38)
For instance, ifl design a cryptograph
ic system today, it may spend two years Big company $10M FPGA 0.7 second 13 hours 70
in development and be fielded for anoth ($0.08) ($5000)
ASIC 0.005 second 6 minutes 70
er dozen. The information it carries might
($0.001) ($38)
have to remain secure for six years after
transmission. This means I'm forced to Intelligence $300M ASIC 0.0002 second 12 seconds 75
make a decision today abo ut what the agency ($0.001) ($38)
state of cryptography will be 20 years from
FPGA =field-programmable gate array
now. Like it or not, cryptographers have
From the paper "Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security,"
to be futurists. available at http ://www.counterpane.com/keylength.html .
Fearful Symmetry
Symmetric algorithms use the same key would probably be used more if it weren't Candidates are due in June of this year,
for both encryption and decryption. impossibl e to get any reasonable licens and NIST will se lect an algorithm some
These algorithms are the workhorses of ing terms out of Ascom-Systec. CAST, the time in 1999 or 2000. Thus far, about lS
cryptography. They encrypt anything di g new algorithm in PGP, is similar to Blow people have indicated that they will sub
ital, including e-mail, telnet connections, fish. RC2 has been largely abandoned in mit an algori thm. Most will likely be pret
audio, and vid eo. You can divide sym favor of RCS . ty awfu l attempts by crypto wannabes, but
metric algori thms into two piles: stream If I had to choose an encryption algo expect to see an RCS variant from RSA
ciphers and block ciphers. Stream ciphers rithm to use today, I'd select Triple-DES Data Security, a CAST variant from Entrust
encrypt data in streams- a bit, byte, or (it's much harder to break via exhaustive Technologies, a variant of Square, and
word at a time. Block ciphers encrypt data searching than DES), IDEA (it has survived Blowfish II (based on Blowfish).
in fixed chunks, generally 64 bits. Since since 1991 without any serious cryptanal Those who need a stream cipher have
you can use block ciphers to build stream ysis), or Blowfish (it's fast, compact, and two choices. One option is to use a block
ciphers, most ciphers are block ciphers. simple; all ows variable key lengths; and cipher in stream mode. T his isn't difficult;
And there are a lot of them. The tab le has been the victim of no known success any block cipher will work, and you can
"Symmetric Algorithms and O ne-Way ful cryptanalysis) . A coup le of years ago, consult any cryptography text to find
Hash Functions" on page 102 lists the ma I and a group of other cryptograp hers out how to do it.
jor ones, comparing speed, block size, key recommended a 90-bit key as the bare T he other option is to use a dedicated
size, and patent and licensing terms. minimum for security today (see why in stream cipher. There are a few of these,
A few po ints are worth noting here. the table above); all three of these algo some optimized for custom hardware and
Triple-DES is the conservative choice, al rithms exceed that key length. others for 32-bit microprocessors. RC4 is
though it's the slowest. Everything else The block-cipher landscape will change one common choice. Once a trade secret
has received far less cryptanalytic atten soon. The National Institute of Standards of RSA Data Security, it was "o uted" to
tion. Blowfish is the fastest algorithm, but and Technology (NIST) is soliciting can the Internet in 1994 and has since become
it has a long key-setup time and isn't suit didate algorithms for an Advanced En public-domain. There's even an Internet
ab le for encrypting small blocks. And its cryption Standard (AES), w hich will re Draft for something call ed ARCFOUR,
large tables make it completely unsuitab le place DES. None of the aforementioned which is actually RC4: The draft's authors
for smartcards. The International Data En algorithms is suitable because AES must didn't want to use the real name.
cryption Algorithm (IDEA) got its fame as have a 128-bit block size and key lengths No one has succeeded in breaking RC4,
the encryption algorithm in PGP, and it of 128, 192, and 2S6 bits. but cryptographers have fo und some sta
BigMACs
Message-authentication codes, or MACs,
The Speed of RSA are hash fu nctions with a key: Only some
Task 512 bits 768 bits 1024 bits one who knows the key can create or ver
ify a MAC value. For instance, I can use
Encrypt 0.03 0.05 0.08 MACs for integrity checking. After creat
Decrypt 0.16 0.48 0.93 ing a fi le, I calculate its MAC (using a key
Sign 0.16 0.52 0.97 you and I share) and append it to the fi le.
Anyone can read the fi le, but only some
Verify 0.02 0.07 0.08
one who knows the key can create a new
RSA speeds in seconds (on a SparcS tation 2) fo r different modulus length s with an 8-bit public key. MAC. When you get the file, you can cal
cul ate the MAC and verify t hat it's th e
same as the MAC I sent you. If it is, you
tistica l anomalies in it, incl ud ing weak easy to calculate the hash of that fi le. But know that no one has tampered with the
keys. When I recommend RC4, I advise given a hash va lue, it's hard to create a file during transit.
the use of a more complicated key sched fi le that hashes to th at va lue. It's much There are severa l MAC algorithms,
ule, namely spinning t he key sched ule easier (by a factor of 2"/ 2 for an n-bit but the most promising ones are HMAC
twice. A key schedule is an algorithm that has h functi on) to find collisions for a hash and NMAC. T hey're based on hash func
expands a re latively short master key to fu nction tha n to reverse the function. This tions, generall y SHA-1; HMAC is an In
a re latively large expanded key for use in means that the function is " one-way," un ternet Draft (RFC 2104). There are other
encrypti on and decryp t ion . RC4 uses a like something like a cyclic redundancy MAC constructions based on hash func
key schedule to initialize the state of the check (CRC), where it's easy to create a fi le tions, but they're not nearly as good. And
stream cipher prior to generating the key with a given CRC value. I haven't seen any MACs based on block
strea m. Due to weak mixi n g in its key Hash functions also have to be "colli ciphers that I've li ked very much.
schedule, RC4 has a class of detec tab le sion-free": It must be hard to find two files
keys. The more comp licated key sched that hash to the same val ue (see the fig Playing the Public Keys
ule strengthens that. ure "Cracking Hash Functions with Col Public-key algorithms are the surprise of
lisions" on page 100). This means that if I the 1970s. Encryption and decryption use
Making a Hash of It give you a hash value and then later show different keys and, more important, you
A hash function is a fingerprint function you a fi le that hashes to that value, you can cannot calculate these keys from each
that takes an arbitrary-length input (i.e., be sure (to the extent of the security of the other. Thus, you can generate a key pair
a pre-image) and produces a fixed-length hash function) that I had that fi le at the and publish just the encryption key (see
outp ut (i.e., a hash value). Given a digital time I created the hash value. the table " Pick Your Enemy, Then Your
blob (a file, a message, or whatever), it's Most hash functions in use a few years Key" on page 102 for recommended key
'
and the discrete-logarithm problem. Both
are more o r less equ ally hard, so I'll dis
cuss th e fac toring pro bl em with the un
d erst and in g th at wh at I say a ppli es t o
8
If hash value matches, this "collision" cracks the function.
both. Facto ring the kind o f numbers used
in public-key cryptography- 1024 bits or
more- is hard. It wo uld take all th e com
puters in th e world years to accomplish. The "birthday attack" cracks a hash function by guessing
Patents are another issue to deal w ith
two messages that hash to the same value; a collision results.
when choosing a p ubl ic-key algo rithm .
RSA is patented, fo r example, and w ill re
mai n so until 2000. Diffie-Hellman and liptic-curve algorith ms. liptic curves. Therefore, prop onents of
E!Ga mal are both in th e public do main : Elli pti c curves are the newest kids on this technology argue, you don't need as
Any patents th at might have applied ex th e block. Poin ts on an elliptic curve fo rm long a key. For applicati ons w here bits are
pired last year. I usually use E!Ga mal, un a math ematica l gro up : Give n an y two very dear, li ke smartcard appli cati o ns,
less I have a stro ng reaso n to use RSA. points, th ere are operati o ns th at always th ese are enticing wo rds.
produce anoth er point on th e curve. Fur Th e qu esti o n is not wh ether ellipti c
Legible Signatures ther, yo u can use a number and a po int curve cryptosystemsare secure, but wheth
Digital-signatur e algorithms are simpl y on th e curve to give anoth er po int on the er th ey offer the same security with short
public-key-encryption algorithms turn ed cu rve-but it's hard to fig ure out what er key lengths th an comparable systems.
on th eir ears-the priva te key is used for number yo u used, even if yo u kn ow the Tod ay, th e di screte- logar ithm pro bl em
signing, th e public key for ve rificati on original point and th e resulti ng point. T his fo r elliptic curves is harder than the dis
and all the key-length discussion in th e one-wayness leads to cry ptogra phi c ap crete- logarithm problem modul o prime
previo us section applies. RSA digital sig plica ti o ns. And because cra ckin g this is numbers p: Th ere is no sub expo nential
natures are just as secure (o r as vuln era much hard er than cracking oth er systems, algo rithm for do ing th e calculation. (T he
ble) as RSA enc ry ption. The same is true it req uires much smaller keys to obtain discrete-logarithm problem involves find
fo r E!Gamal. There are other alternati ves: comparable encryption. in g th e ex p o n e nt t o whi c h yo u mu st
NIST has endorsed something called th e This normally wouldn 't be in teresting, ra ise a give n number to ge nerate a valu e
Digital Si gnatu re Algo rithm (DSA) as a but th e fast algo rithms used fo r findin g modul o some large prime number.) Thus,
fe deral standard. And th ere are several el- discre te logarithms don' t wo rk wi th el- peop le use elliptic-curve cry ptosystems
w ith signi fica ntl y shorte r key lengt hs.
T he fig ure " Elliptic-Curve Cryptogra phy
vs. RSA and DSA" on page 99 illust ra tes
Encryption Algorithms: th e di ffe rence between key sizes required
Suitabi Iity to Task fo r comparable securi ty.
It's unknown whether th e discrete-log
Algorithm Confidentiality Authentication Integrity Key ari thm prob lem is harder because of the
management fund amental mathemati cal nature of el
liptic cur ves or b eca use o f o ur limited
Symmetric encryption Yes No No Yes
knowledge of th eir math ematical pro p
Public·key encryption Yes No No erties. This is a ve ry new area o f research,
Digital signature No Yes Yes and recent discoveri es indicate that th ere
Key agreement Yes O ptional No is still much th eore ti cal work to be done.
One·way hash No No Yes
1 do not recomme nd assuming that th ey
can p rov id e t he sa me security over the
Message-authentication No Yes Yes
long term wi th shorter key lengths th an
code
cryptosystems using discrete logs modu
lo prime numbers p. contin ued
key personnel
• Presentations at conferences/seminars
And there's morel
• BYTE article reprints are
NOW AVAILABLE in hard-copy and
electronic formats
• BYTE reprints can be customized
'J .
-..-,
2048 ·i I
Cryptography (Jo/111 Wiley & Sons, 1994 and
- Il 1996). You can reach him by sending e-mail to
j \.
Recommended public·key lengths (in bits) . I I ,1 schneier @counterpane.com or to his Web
- ""\
page, at http://www.counterpane.com.
Forms
· NOTE: htunedi11.Le unrutzicltd online ac ces s ava.ilabl.e to credit... cud subscribers only.
Number: !.________.
Fonn-handling script in
mode 1 selects the input· <form method =post action= "/activate . pl ">
field version of the widget
<i nput type=hidden name=art value=ART>
<! - begin style 1- >
pair ... Subscriber Name: <input type=text name=subname>
Subscriber Number: <input type =text name=subnum>
<! -end styl e 1->
In mode 2, the script
selects the plain-text <! -begin style 2->
version of the widgets ...
<input type=hidden name=subnum value=S UBNUM >
<input type =hidden name=s ubname value=SUBNAME>
• •• and instantiates the fonn
Subscriber Name: SUB NAME
by interpolll_tllig-JJassed
Subscrib er Number : SUBNUM
values for theselwo fields.
<! -end style 2->
form elements, along with associated er errors, along with associated explanations. In my case, the dictionary is implement
ror-handling code and messages. For ex An unexpected benefit of this approach ed as a Perl hash table, but you can easily
ample, we collect e-mail addresses on four was that it greatly accelerated the process ac hi eve the same effect in any scripting
different forms. Clearly, each ought to in of testing the error-checking code associ language.
herit a common widget, along with asso ated with our forms . In a single cycle, yo u This method works in conjunction with
ciated error-handling code. can verify that a form's handler correct a standard error-message routine shared
ly reports an incorrectly confirmed pass by all form-handling scripts. When a script
6 Parse forms completely and report all word, an empty address field, and an ill checks the input sent from a form, it does
errors and omissions. In order to down formed account number. not report any errors directly. Instead, it
load the JDK 1.2 beta from j avaSoft's site, builds a list containing the keywords asso
I had to register. On my first try, the serv 1Accept all unambiguous inputs. When ciated with all errors found . For example:
er rejected my form with the "Username I last renewed a digital certificate on the
cannot match password" message. So I VeriSign site, the server rejected my order i f Cl eng t h($u se rnam e ) < 4)
backed up, corrected that, and resent the form with an "Invalid credit card num (p us h (@e rr s ."Name Too Shor t " ) ;!
form . It rejected my form again, this time ber" message . Why? I'd typed the num i f ( $pw 1 n e $ pw 2 )
with "Required address field is blank." ber with hyphens, but the app lication was ( pu sh C@e rr s . "B ad Pass word " ); I
This all-too-common behavior irks me. looking for unhyphenated input. That's
The app licati on saw all the fields I sent, just sill y. Here's the line of Perl that will Then, if the error list is nonempty, the
and didn 't send, on the first try. Why not reduce a mixture of 16 digits, hyphens, script sends the list to the error-message
do all the necessary griping immediately? spaces, or other junk to just 16 digits: routine, wh ich reports errors along with
I'd rather take care of everything at once. their associated explanations:
Finding multiple errors one at a time, by $num =- s /\D * //g;
bouncing repeatedly off a server, rapidly if ( $#err s > 0 ) {
erodes my patience. C'mon, VeriSign. You said that better ser ( errorM sg (@errs) I; ex i t ; \
To spare users this headache, I've settled vice was the reason you raised your rates
on an error-handling technique based on on digital certificates. Doesn't my extra I like this approach for two reasons. In
the assumption that it's better to deliver hundred bucks buy me one line of Perl? the source code, the error keywords bind
all the form-processing results all the time. closely to the tests that trigger them, so
I've implemented the technique in Perl, 8 Use short error messages linked to the code becomes self-documenting. The
but you could just as easily do it in any longer explanations. As I worked through same keywords, appeari ng on the page
other Web scripting language. the new batch of forms, I consolidated the generated by the error-message routine,
It's nothing fancy. I just accumu late the error messages into a dictionary of key are more explanatory than numeric codes
complete list of errors each time I pro word/value pairs. The keywords are short would be, yet they are more easily com
cess the form . If the list isn't empty at the phrases, such as ''AccountNotActive." The municated than the accompanying long
conclusion of the script's error-checking values are longer explanations, such as explanations. And, of course, since the er
phase, the script passes the list to a com "please activate your acco unt first, using ror-message routine is always prepared
mon library routine that displays all the the activate link on any protected page." to handle a list of keywords, the system
1/1Z/98'J200JPt.1 11
1/1Z/'J89102lPM 10
Web Project Effective HTML Forms
obeys principle 6: It always reports all er that transmits this data to activate . pl.
rors and omissions.
BOOKNOTE It took only a few tweaks to the template
and the script to empower bytesub.com to
9 Use forms as components. The de Understanding
Digital
t... •..11, ~I'l l
A new version of
Two Worlds
ometimes you can't get from
one place to another with
out crossing a bridge. The Toplink for Java
same is true if you want to
reap the benefits of Java object pro Toplink's Project Viewer aids in the mapping
gramm ing but need to work with data of class attributes to database fields.
that's stored in a relational database.
Top Link for Java provides that bridge. A
100 percent pure Java object-relational
database system, the program is the third . Project Name: Employee
in a line of object-relational database
Oass/Oescriptor Info:
products from Object People. Previous
Y Address (TOPlink.Oemos.Employee
versions ofTopLink supported Smalltalk
•,;. city•> CITY
and Gemstone.
•,;. country•> COUNTRY
TopLink (prices start at $4000 per •,;. id•> ADORESS_IO
developer for a four-developer license, •,;. postalCode •> P_COOE
and vo lum e discounts are available) •,;. province -> PROVINCE
works with databases equipped with a •,;. street=> STREET • STREET
Jav a Database Connectivity (JDB C) )> Ji. Employee (TOPLin1P . • • 1 W • • )> Im EMPLOYEE (OBA)
driver. The documentation gives exam ,.. Ji. EmploymentPerioclJM!fl!#.~~ )> Im LPROJECT (OBA)
ples for DB2, Oracle, Sybase, dBase, and ,.. Ji. LargeProjed (ToPliiill!!ililii ,.. Im PHONE (OBA)
Access. Object People has also built cus ,.. Ji. PhoneNumber (ToM•MliW )> Im PROJ_EMP (OBA)
tom back ends for mainframe systems. ,.. Ji. Project (TOPlink.D1MMMllltiliM ,.. Im PROJECT (OBA)
The linchpin of the TopLink system is Ji. SmallProjed (TO~~~M~~ )> Im RESPONS (OBA)
a descriptor, which is a data structure that
serves to map the details of the object
structure (and object relationships) to the
relational database. In other words, a A descriptor holds other information To help in this task, TopLink provides
descriptor tells the Top Link system how that's necessary for successful storage and the Builder tool. The Builder reads in the
an object's d ata is to be stored in the retrieval of database objects. For exam database schema (via JDBC) and the
relational database. ple, the Java object may contain a data class structure (Builder reads Java class
A descriptor includes the name of the type that is not supported in the relational files directly). With the schema and class
Java class it describes, as well as the asso database. A descriptor contains infor structure fed into the Builder, you then
ciated tables that the Java class will be mation necessary to transform data of have a visual view into both the database
mapped to (e.g., the table in the database one type to the other. and the application 's classes (see the
where objects of the class will be stored). A descriptor's information is actually screen). Using the Builder's Descriptor
Information in a descriptor describes the stored in a file. The application imports Editor, you can easily go through the pro
attributes and object-object relationships this file prior to the application's access cess of mapping attributes to table col
that exist for objects in the class. Neces ing th e database . As you might guess, umns. The Builder will construct a de
sarily, a descriptor must also carry infor building a descriptor is a complex under- . scriptor for you automatically and emit
mation describing the structure of the taking, because it inv o lves assign ing a file ready for import into the application.
table. This information includes the pri classes to tables, attributes to fi elds, appli At run time, a descriptor is imported
mary key of all records in the table, the cation data types to database data types, into a session object (TopLink defines a
fie ld names, and so on. and more. session class). A session object is an
G E 0 R G A w 0 R L D c 0 N G R E s s c E N T E R
i··~~:~~i:~:e~~~~:::,~.:::i~,~,'.:!1;~:~::····r
I~:::'.''
•Bridges/Routers/Gateways/ ·Data Communications •LANs/MANs/WANs
Hubs • Integrated Voice/
•Broadband Equipment DataNideo
·Multimedia Applications
• Network Management
Su<o ,:M::;IPM,; Wde i
and Services ·International Carrier Systems
Advanced physics
meets computer design
The Smallest at the atomic level in
IBM's laboratories.
Components
• • •• al k in g the corridors of an the STM to imaging conductive materi the wrong picture. Binnig is talking about
R&D lab at the world 's als. Instead, th e AFM measures attracting components so tiny they are invisible to
largest computer company, and repelling forces between atoms. A the naked eye.
you naturally expect to see all cantilever suspending the tip acts like a He predicts that nanoprocessors wi ll
manner of things electronic. Yet l was spring. The forces of inte ractio n deflect be more tightly integrated and less ener
struck on my visit to IBM's Zurich Lab, in the cantilever; gaugin g the amount of gy-hungry than today 's transistor-based
Ri.ischlikon, by the prominenc e of deflection yie lds an atom-level picture. chips. Several orders of magnitude less,
nanomechanical and optical techn olo Using th e STM to move si ngle atoms in fact, which is why "the VLSI age of
gies. As we near the limits of today's semi aro und, scientists have achieved a theo
conductor fab technology, will the new retical density of a million gigab its per PROBABLE IMPACT
millennium be a post-electronic world? sq uar e inch , but these exper im e nts
Will BYTE in 2010 be filled with new tech require temperatures near absolute zero. Storage
nologies layered on top of electronics in In a m ore practical approach, IBM's
the same way that electronic marvels like Almaden (Ca lifornia) and Zurich re A Atomic force microscope (AFM) tech
the integrated circuit now work side by search labs are experiment in g with nology could produce devices that write
side with antique electrical devices like probe-based storage using AFM technol a terabit of data on a 1.4-in ch -squa re
switches and coils? ogy. With a rota tin g, penny-size plastic area at a rate of 1 gigabit per second.
Probably, if Gerd Binnig is right. Get disk, Dan Rugar's group at Almaden con A Holographic storage could instanta
ting beyond the biases of electronic engi structed a kind of high-tech phonograph neously retrieve from large data sets the
neering has been a career for Binnig. In with a 0.008-micron rip. At a reliable den answers to complex queries.
1978, when he and Heinrich Rohrer first sity of 64 gigabits per sq uare inch, th e
starred their quest to map and manipu electrically heated stylus writes dents into Chip Manufacturing
late matter at the atomic leve l, they had the disk; it later dips into those dents for
a "beginner's innocence," Binnig re reading (see "Infinite Space," February A AFM could be used to overcome the
wisdom that their goal could be achieved The Zurich team has taken that AFM
layer chips.
result was the scanning tunneling micro between 1 and 10 mega bits per second. the size of chips, but they can reduce the
sco pe (STM) in 1981 and a subsequent Their answer is Project Millipede. In Jan price of less size-sensitive components
Nobel Prize in 1986. uary, they reported the construction of a5 because they are only 1Opercent of the
The STM offered the first view ever of by 5 set of rips; by year's end, they hope cost of photolithography.
Michel's case, he's looking at a centuries information; only the image's light inten Research labs should be near universities.
old technology to eliminate lithography sity suffers. Coufal, who is currently exper Evaluate the process, not the short-term
altogether: printing. Using an elastomer imenting with less expensive and more result. While some breakthroughs may
based "rubber stamp," the researchers reliable recording crystals, expects to have take decades of research, an experienced
transfer patterns of submicron resolution a prototype in about two years. manager will be able to judge the dynam-
to solid surfaces. Using "self-assembling"
molecules, they ac hieve "conformal con
tact" on a molecular scale across several How an Atomic Drive Head Array Writes Data
square inches. The process, called micro
contact printing, helps create medical tests
for very small sample quantities by " print
ing" live protein molecules, but it could Tips
also be used to simplify chipmaking: Print
ing circuits with a rubber stamp costs only
about a tenth of photolithography and is
more environmentall y compatible because
it requires fewer chemicals, Michel says.
But, he cautions, this technology will not
scale down to the highest levels of inte
gration achievable with lithography.
If Binnig deals with an arcane world too
small to see, H ans Coufal's work is some
thing you can hold in your hand. Looking
at the sugar cube-size crystal in my palm, it
was awe-inspiring that I was holding 10
gigabits, more than a gigabyte, of data. At
Almaden, Coufal is pushing the envelope
IBM's Project Millipede uses a 5x5
forward for holographic storage. Since array of 4-nanometer-long tips
BYTE first reported on it two years ago to simultaneously write data by
("Creating H o logra phic Storage," Apri l burning pits into a plastic substrate.
1996, page 48), Coufal's group has pushed
th e capacity of the cube up from 48
megabytes, nearly two orders of magnitude. Pair Visionaries
The cube is based on holography. Holo
grams store a pattern of interference
with Implementors
formed by a split laser beam, recording it M any of th e projects at IBM's labs are 10
on film or a light-sensi tive crystal. (One years away from practical app lication. But
part of the beam reflec ts off the original that's their ultimate goal, and one that has
object; the o th er part is the reference become institutionalized in the Gerstner
beam.) Illuminating the pattern with the era . Motivating sc ienti sts and keeping
reference beam (or with ordinary light) their work on track is the job of Paul H orn,
recreares a 3-D image of the object when director of IBM Research. How does he
tilted for different viewing angles. manage all that creativity without reining ics of the project. In addition to Horn's
In Coufal'scrystal cubes, however, each it in? In a recent Financial Times article, gu idelines, IBM labs have implemented
viewing angl e holds a different page of he laid out his bag of tricks: another program to improve th e applica
information. By changing the angle in tiny bility of research. Today, about a quarter
• Underdefine jobs, and people will rise to
incr eme nts , h e has been able to store the titl es and responsibilities bestowed of Res ea rch's emp lo yees work directly
10,000 pages of 1 megabit each (10 giga upon them. with customers . This is encouraged
bits) in a crystal th e size of a sugar cube. through the "First of a Kind" program,
A whole page is recorded and retrieved • Include customers and users in brain an effort to match research projects with
at once-yielding data rates up to 1 storming sessions. customers to create solutions that might
Gbps-which makes Coufal's approach • Do not overmap the journey. It is impos be applicable to others. One example is a
ideal for associative memory: Illuminat sible to anticipate all the risks.Just p rotect digital library project with the Vatican. The
ing the hol ogram with a search pattern the core idea from being dismantled. goal is to make tens of thousands of price
immediatel y returns the target page's ref less manuscript pages available on-line. Iii
• Pair yo ur visionaries with implementors.
erence beam and angle. Thousands of
fingerprints or satellite images, for exam • Encourage the flow of ideas outside Udo Flohr is a BYTE co11tributing editor who
ple, can thus be searched in milliseconds. work. Quite a few scientists can point to writes about advanced technologies. He is based
Finally, if a hologram is damaged or even ideas that developed from conversations in Hannover, Germany. You can reach him by
breaks, each piece still contains all the with their children. One suggesti o n : sending e-mail to [email protected].
JDBC's
Growing Pains
Full of promise, JDBC
is still too immature
for many.
Page 112M
The Road
to a Universal
Repository
They aren't for most of
us yet, but it's time to
check out repositories.
Page 1125
"'"'"'
lntraServer
Advanced
Multi-Function
Adapters are
worth a look...
sooo
- -i-·- I of single-port, dual-port, and our new Ultra Wide SCSI
l 0/100 Ethernet combination
adapters - just plug-and-play
to connect up to 30 SCSI
devices to a single adapter.
0 And all our adapters are
0 S 10 IS 20 ClusterReady™ for your high
NUMBER of DISK DRIVES availability configurations.
Need support? We're ready to leap into action .
Whether it's SCSI configuration or Clustering advice,
you won't have to chase after lntraServer - we provide
the highest levels of support in the industry.
For high performance, outstanding support,
and great value - contact lntraServer today.
Call toll·free: 888·429·0425
Visit us on the Web: www.intraserver.com
lntr&erver
T ECHNOLOGY , I NC.
Cracker Tracking:
Complementary Technologies
There are two kinds of intrusion-detection products: host .. Intrusion
based and network-based.
Host-based products have an agent running on each pro detection is for the
tected host. Examples include the Kane Security Monitor, from
Intrusion Detection; Omni Guard/Intruder Alert, from Axent customer who has
Technologies; and Stalker, WebStalker Pro, and ProxyStalker,
from Trusted Information Systems. The agent sends a regular taken the steps to
heartbeat, as well as alarms, to a management station. The
heartbeat ensures that the management station can detect a put together strong
denial of service aimed at overwhelming a host so that it's
unable to respond or do normal work.
firewalling and an
Network-based monitors sit on the network capturing pack
ets and matching what they see with known attack patterns.
authentication
Examples include Internet Security Systems' RealSecure, process. It offers
"'"'"' by Wheel Group but now a Cisco product). They, too, gener added security."
ate alarms when they see something suspicious and may also
Each approach has its strengths and weaknesses. Advantages N2N Solutions
of network-based detection include:
Faster detection: A network-based monitor will typically
detect a problem in seconds or milliseconds. Most host-based
www.byte.c:um MAY 1998 BYTE 112 C
Cracker Tracking: Tighter Security with Intrusion Detection
infonnation about
Network·Pased
Intrusion Detection
If you have to choose one
kind of intrusion-detection
system, a network-based one
is probably better.
Pros: Protects every device on
network, detects problems quickly, not
very vulnerable to attack, one flat cost.
Cons: Expensive, can't watch
Individual files on a specific host,
requires dedicated hardware, may
miss traffic due to network load. l. A network-based intrnsion•detectfon 2. w&e11 t~e network-based
system {possibly .consisting·of multiple intcuslon,deteetion system sees
Some Vendors: nodes) collects nelwo.tk traffic al)d analyzes som11tllibg sJ(spiciious, It reports
Internet Security Systems packets looklng for suspicipµs activities,
tlie activ.ity to a cenil'i!I consQle.
Network Associates
Cisco Systems
approaches depend on auditing logs ev need a monitor per host, too, because tomization is easy with a separate agent
ery few minutes. every host is on its own segment. for each host.
Less visible: A monitor is less visible Fewer resources: It doesn't take up any Fewer hosts: The host-based approach
and accessible than a host, and thus less resources on the protected device. may not require a dedicated hardware
vulnerable to attack. Unlike a host, a net The host-based approach also has its platform.
work-based monitor doesn't have to advantages: Less traffic-sensitive: An agent is un
respond to pings, allow access to its local More cost-effective: It may be more likely to miss any activity due to traffic
storage, let users run programs on it, or cost-effective for small numbers ofhosts. loads.
allow access to multiple users. More granular: It can easily monitor These two approaches complement
Bigger perimeter: The network-based activities, such as access to sensitive one another. One possible strategy is to
approach may be able to stop an attack at files, directories, programs, or ports, that implement network-based monitoring
the perimeter of the network, before the are difficult to deduce from protocol and add agents on particularly sensitive
perpetrator ever accesses a host. based clues. hosts.
Fewer monitors: You need fewer mon Tighter perimeter: Once a perpetrator Real-time intrusion detection also dif
itors because one monitor can protect a has obtained a password and user name fers from programs such as Trip Wire, a
shared network segment. In contrast, you for a host, the host-based agent has the freeware utility that creates checksums
need an agent per host, which can be best chance of distinguishing harmful for critical files. Normally run once a day,
costly and hard to manage. On the other from normal activities. Trip Wire notifies you if.a fiJe changes,
hand, in switched environments, you may More customizable: Per-host cus possibly indicating corruption or virus
f I
modems burdened with bandwidth limitations. upgrade yo ur network capacity by reducing data traffic.
In stead, use Cubix's Managed Server FarmsTMwith You can even run Wi ndows NT® ap ps on old 386
pre-loaded Citrix Win Frame® or a variety of remote desktop PCs w ithout sacrificing performance.
• CUBIX
Cubix Corporation. 2800 Lockheed Way, Car-son City, NV 89706-0719 USA Tel (702) 888-1000 Fax (702) 888-100 I http://www.cubix.com
Cubix Corporation Europe Ltd., One Hunter Road, Kirkton South, Livingston, Scotland EH54 7DH
Tel (44) 01506 465065 Fax (44) 01506 465430 France Tel 059081 14 Germany Tel 0 130815193
All product names mem1oned ere cmdemorks or re;;istered trademarks o( the" respernve o;•,ners
infection. While very useful, this is not perpetrator may access a port in charac
real-time intrusion detection. ter mode and then send one character per
packet. If a monitor thinks only in terms
Cisco's NetRanger of single packets, it will never see the
NetRanger, introduced in March 1996 by whole message.
WheelGroup, is based on years of field NetRanger is one of the most sophis
experience . The product has two com ticated network-based intrusion-detec
CHARGEN_DENIAL tigh
ponents: the sensor ($9000), which mon tion products on the market today, "' ONS_HOS TNAME_ High
itors packets and generates alarms, and according to Jude O 'Reilley, a research ONS_LENOTH_OVE High
ECHO.DENIAL_OF_ ligh
the director ($10,000), which receives and analyst with the GartnerGroup (Stam EMAIL_DEBUG ligh
~ EMAIL.DECODE High
correlates alarms and initiates responses. ford, CT).
You'll also need at least a Pentium PC However, NetRanger's very strengths
for the sensor and a Sun SparcStation run can turn out to be weaknesses for some
ning OpenView or NetView for the direc users. It is designed for use in a network
tor. Both run Sun's Solaris. Your hard operations center (NOC) and for inte RealSecure is inexpensive,
ware and software costs will be $13,000 gration under Open View or NetView. Its simple, and runs under Linux.
for a sensor and $25,000 for a director. configuration requ ires detailed Unix
NetRanger has a reputation for high knowledge. NetRanger is also relatively some enterprise features of NetRanger,
performa nce. It is also highly scalable. expensive . These won't suit the typical such as path doubling.
Directors can coordinate information LAN administrator very well. Network Associates plans a number of
from multiple sites and watch for attacks acquisitions and partnerships in the secu
th at span a n enterprise. NetRanger's
Network Associates' rity arena, says Katherine Stolz, product
biggest claim to fame is its enterprise CyberCop manager for CyberCop . "We will be set
focus. One indication of this focus is the Network Associates is the resu lt of a 1997 ting the tone for large-scale security. We
distribution channel, which includes merger between N etwork General, of are going to be a holistic provider."
companies such as EDS, Perot Systems, Sniffer fa me, and McAfee Associates,
and IBM Global Services-al l serving known for its antivirus expertise. Cyber
Internet Security
large clients with large global networks. Cop uses NetRanger's engine and data Systems' RealSecure
NetRanger works well across global base ofattack signatures, which Network RealSecure's strong points include sim
WANs. For instance, it has a path-dou Associates licensed from Cisco. Network plicity and low cost, says the Gartner
bling feature. If one link goes down, Associates created its own browser-based Group's O'Reilley. Like NetRanger and
graphical front end. CyberCop, RealSecure has a two-com
All Cy berCop is basic ally NetRa nger ponent architecture. Engines monitor
haw: packaged for the LAN administrator packets and generate alarms. Consoles
Record ID Count Sensor Network Associates' main customer base. receive alarms and provide a central point
107 C26· 101 The software is more expensive than Net for configuration and database report
105 c2s· 101
Ranger: $9000 for a sensor and $15,000 ing. Both run under NT, Solaris, SunOS,
103 C2S· 101
101 C2S·101 for a server. However, the platform is a and Linux. You can mix and match OSes.
99 c2a·101 Dell PC running Solaris 2.5 .1. (CyberCop They can run on commodity PCs.
97 C28· 101
is typically sold preinstalled.) The cost for For small installations, it is possible to
95 c2s· 101
93 cls-101 the platform is about $3000 for a sensor run the console software on the same
and $5000 for a server. machine as the engine. That's not possi
99 c2&· 101
In addition, CyberCop is designed as ble with NetRanger and CyberCop. The
91 Connection request- courter cls-101
95 Gonnectionrequest- shell c2s·101 a network appliance. Network Associates RealSecure engine costs about $10,000;
93 Connectfop ~quest· rogln c2s·1 01 says it should typically take 20 minutes to console software is free. One engine can
91 Connection reQuest- exec C2S·1 01
install. The company has created six stan report to multiple consoles. One console
79 Connection request- Ire c2s-101
77 Connection re uea. sun" c c2s·101 dard configurations for the typical situ can manage multiple engines.
ations it expects to see: mixed Windows RealSecure can reconfigure the Fire
CyberCop is based on NetRanger
NT and Unix subnet, Unix subnet, NT Wall -1 from Check Point Software. ISS
but has a browser-based interface.
subnet, remote access, perimeter (e.g., an has plans for reconfiguring Cisco routers,
Internet connection), and backbone. It according to Mark Wood, manager of
information can flow along an alternate lacks a NetWare configuration. intrusion-detection technology. ISS is also
path. It is feasib le to watch a global net The browser front end is designed for working on an Open View application for
work from a single point or to outsource ease of use and draws on Network Gen RealSecure, according to Wood.
monitoring to a third party. eral's experience in condensing packet
Another NetRanger strength is con data and making it easy for users to view
Intrusion Detection's Kane
sidering context (i.e., clues gained from and understand. Expert knowledge is Security Monitor for NT
multiple packets) as well as single-packet built into help files, as it is with the Snif Kane Security Monitor (KSM) for NT, a
contents when looking for possible prob fer. CyberCop can also create trace files host-based monitor, was introduced in
lems. This can be important, because a readable by a Sniffer. CyberCop lacks September 1997. It has three architectural
"56Kbps refers to server download speed only and requires compatible modems at both the user and server sites. Download speeds of 56K are currently unavailable in the U.S. Other country-specific
regulations may impose similar limits. Additional technical information on K56Fle.x'" performance can be found at www.xircom.com/ 56. ©1998 Xircom, Inc. Xircom is a registered trademark of Xircom. Inc.
Xircom U.S. Headquarters (800) 438-4526. Xircom Europe NV:+32/(0)3 450.08.11. Xircom Asia: (65) 323-1511. Xircom in Canada: (800) 565-3284. Xircom in Latin America: (888) 452-8467
components: an auditor, a console, and
agents. The agents browse NT logs and
forward statistics to the auditor. The secu
rity administrator uses the console GUI
to receive alerts and look at historical
reports and real-time activity. KSM costs
$1495 per protected server (auditor and
console includ ed) . Add workstation
agen ts to this for $295 each.
KSM is particularly strong in TCP/IP
monitoring, according to David Brussin,
To chang e your subscription mailing address, please complete the form a senior consultant with Miora Systems
below and send it to: Consulting, security specialist in Playa
Del Rey, California. But he also adds that
BYTE Magazine Intrusion Detection's products are not
Subscriber Services
designed for speedy WAN performance.
PO Box 555
Intrusi o n Detection will release an
Hightstown NJ
OpenView application for KSM in this
08520
quarter, according to Robert Kane,
founder and CEO. Integration with the
Fax: 609-426-7087
Tivoli M anageme nt Environment (TME)
Phone (9 a.m. to 8 p.m., Eastern Time will follow toward the end of the year.
Monday through Friday): In the future, Intrusion Detection plans
to support Unix, Microsoft BackOffice,
800-232-2983 (U .S.), o r and Novell NetWare.
609-426-7676
Axent Technologies'
Current/Old Address: OmniGuard/lntruder Alert
The three architectural components of
OmniGuard/lntruder Alert (!TA) are a
Account Number
manager ($1995), console (free), and
agen ts ($995 pe r server, $95 per work
Name station). They correspond to KSM's audi
tor, console, and age nts.
ITA offers much broader platform cov
erage tlrnn Intrusion Detection's KSM. lt
Add ress runs on Windows NT, 95, and 3.1; Net
Wa re 3.x a nd 4.x (manager and agent
City/ State/Zip on ly); and various versions of Unix, in
cluding Solaris, Sun OS, IBM AIX, HP-UX,
New Address: and Digital Equipment Un ix.
You can customize !TA using solution
packs for major OSes, firewall vendors,
Name Web-server vendors, database applica
tions, and router manufacturers. Axent
Company acquired firewall vendor Raptor in Feb
ruary and will enhance !TA to reconfig
Ad dress
ure Raptor firewalls.
Trusted Information
City/State/Zip
Systems' Stalkers
Stalker, introduced in 1993 by Haystack
Please allow up to 8 weeks for thi s change to become effective. Labs, is a host-based monitor for NT and
various versions of Unix, including
Solaris, AIX, HP-UX, and The Santa Cruz
::.
-
-·-~ · ----.
. ' -
:.:..
--
1. -. . " ... . .
Limit one per reseller. 50% off promotion on PM2554UWF. 40% off on Fibre Storage Array products. Cannot be co mbined with any other DPT
promotion . If not satisfied, PM2554UWF must be returned within 30 days of purchase date. Offer expires June 1, 1998.
DISTRIBUTED PROCESSING TECHNOLOGY• 140 Candace Drive• Maitland, FL 32751 • 407-830-5522 •Fax 407-260-6690 • [email protected]
WebStalker Pro, which was introduced able to terminate attac ks as well as detect
by H ays tack Labs in Jun e 1996, runs them. For instance, WebStalker Pro can
under the same OSes as Stalker. It specif terminate a log-in or a process, or restart
ica lly addresses Web servers . It costs the Web server. The Stalke r fa mily also
$4995 for Unix and $2995 for NT. Aver integrates with TME.
sion ofWebStalker ships with Sun's N etra
Web serv er. IBM Glo bal Services also An Alarming Conclusion
resells WebStalke r. Intrusion detection is only one part of a
Trusted Info rmatio n Systems, ma ker complete security program. It's no use
-·-~=====~========~-
.. - .... - . .......... . - . . . .
. - . - .
Haystack in October 1997. In December yo u do n' t lock th e doors with proper
1997, it announced ProxyStalker, a mon a uth en ti ca ti on, aut horizatio n , a nd
~ ---------------- -·
ito r that runs only un der NT and is de encryption.
ORGANIZING YOUR CABLING IS EASY WHEN YOU
HAVE THE RIGHT PATCH PANELS Meets EIA/TIA signed for Microsoft Proxy Server 2.0. At " Intru sio n detecti on is fo r the cus
Category
SSSA UTP5
standards. PCB
RJ-45 jack wilh
iji iiiiiiiiii
press time, ProxyStalker was expected
out in the firs t quarter. Pricing had not
tomer who has already taken the steps
to put toge ther good strong firewalling
been announced, but it was expected to and an authentication process. Intrusion
captive pin . 11 O
type. AT&T 110 M!ll!l!l!llllll!!~~~f!I be co mmensurate with Proxy Server, detection offers an added layer of secu
D-4 or equiva which costs less than $1000.
lent connector.
rity," says John Freres, president ofN2N
1.6 mm steel, All three Stalker pro ducts can reco n Solutions, a security integrator in M ount
black polyurethane figure Gauntlet firewa lls, and all three are
semigloss, baked
Prospect, Illinois.
finish. Up to 350
MHz.
In addition, many if not most security
WHERE TO FIND breaches are based on social engineer
ing- which, in plai n langu age, often
AxentTechnologies Intrusion Detection
Rockville, MD New York, NY
means tricking users into revealing pass
800-298-2620 212-348-8900 wo rds. Therefore, education is funda
301-258-5043 http://www.intrusion me ntal to makin g security technology
http://www.axent .com
.com work. Users mu st und ers tand wh a t
Network Associates they're supposed to do and what they' re
Cisco Systems Santa Clara, CA
San Jose, CA 800-764-3337 not supposed to do-like ever give their
800-553-6387 650-473-2000 passwo rds out over the phone.
408-526-4000 http://www.nai.com In the context of a well-planned secu
http://www.cisco.com http://www.ngc.com
rity program, intrusion-detection prod
Internet Security Trusted
ucts can help a security manager sleep at
Systems Information
Atlanta, GA Systems
night. Iii
800-776-2362 Glenwood, MD
770-395-0150 888-847-3477
http://www.iss.net 301-527-9500
COMPUTEX Taipei 98
The 18th Taipei International Computer Show
Booth #C1114
C~; CE
Enter HotBYTEs No. 121 at http ://www.byte.com/hotbytes/
Java Database Connectivity is a step in the right direction
but still too immature for some Java developers. By Alan ]och
JDBC's
Growing Pains
.,
tomJDBC drivers with their database products. These drivers make them go
O>
O>
w er for Oracle 8 might extend JDBC to support Oracle sequences. -Ward Mullins,
z
ffi
I
Oracle supplies driver Types 2 and 4. Moe Fardoost, senior Thought Inc.
5 product manager for Oracle's Data Server Marketing Division,
i
0..
<
a:
characterizes this support as the initial step in bringing Java
8 connectivity into the Oracle realm. Type 2 is for heavyweight,
0
5: three-tier architectures. "Type 2 drivers map JDBC to native
server code, written in Java, in a three-tier applets are Web-enabled, they' re the best
Type 4: Native protocol, all-Java driver
choice for Internet-based DB2 access,
architecture.
Purpose: Converts J DBC calls into the net
according to IBM's Escott. Applications
Type 2: Native API, partly Java driver work protocol used directly by DBMSes.
the client API for Oracle, Sybase, Inform ix, proprietary, DBMS vendors will be the pri
clients on a LAN accessing servers such as
DB2, or other DBMS. Note that, like the mary source for this style of driver.
DB2. Performance is better because there
bridge driver, this style of driver requires some Best for: Direct calls from the client machine
is one less communication layer to deal
binary code on each client machine. to the DBMS server; especially practical for
with, she says . The DB2 CAE must be
Best for:Taking advantage of characteristics intranet access.
installed on each client.
JDBC drivers are "a natural way for Java
ltlNGSTON'S --;.
DATA STACKER
IS JUST AS
ADAPTABLE
lrO .Cl-:IANGE.
.. ·>:·,~·
• Small footp1int
• Platfonn-independe nt
• Poly/steel construction
SCS I l.D. select Supports 3.5" drives (including lOK RPM)
• Compatible with SCSI 2, 3 & ULTRA
• Enhanced, auto ranging power supply(ies)
• Adjustable high speed fans
• Stac ked un its can support multiple hosts
• 100% tested in co llabo ration with major device mfrs.
Snap-n-Stack • 7-year wa1Tant)'
design
Call a Ki ngston'" representative at (800) 251-9059 to find
out how Data Stac ker can make adapting to change easier.
Removable
device
wiring
bracket
~ Kmgsto n Tcdmolog r Comp;mr. 17600 Ncwhop;: Street. Fount:iin \ ';dkr. C \ U2i08, LIS:\ (71-1 ) -IJ~. ] ~50. l'.1 x ( i' H ) ·+1H- 11Hi' it) 1()UH t' m~~wn Technology Comp;my. All rights rcsen·cd . .-\ll o the r 1r.1dcmark~ and rcgistl·n·d trndcma rks :ire
~~:'.'./ tht' ptopCfl}' of thl"LT TCSJWCll\"l" OWt11: rs.
- Enter HotBYTEs No. 11 6 at http ://www. byte.com/ hotbytes/
JD BC's Growing Pains
programmers to get data through stored .com/products/jdbc!jdbc.drivers.html for are no C libraries to download, making
procedure calls that you can send over the a list of driver vendors). In the short term, this type best for browser-based access
network," says JeffJones, IBM's program driver vendors like WebLogic work to to RDBMSes. When evaluating com
manager for data management market distinguish themselves by writing drivers mercial Type 3 drivers, you should judge
ing. Nevertheless, it's not the only way, in that can pass more of the modules inJava according to how they extend the gener
Soft's JDBC compatibility tests and by ic spec. For example, some drivers sup
WHERE TO FIND adding features beyond what the gener port IIOP, query caching, and pooling of
IBM Oracle ic spec requires. For example, WebLog database connections.
White Plains, NY Redwood Shores, CA ic says jdbcKona supports extended SQL Type 4 drivers provide essentially the
770-863-1234 650-506-7000
fax:770-863-3030 http:l/www.oracle.com
and multibyte characters. same capabilities as Type 2 interfaces but
http:l/www.ibm.com But a competitive advantage gained have the advantage of being all-Java.
Thought, Inc.
Sun Microsystems San Francisco, CA with extensions won't last forever, as
Palo Alto, CA 415-836-9199 RDBMS vendors continue to roll out new A Step Forward
888-843-5282 http:l/www er versions of their JDBC drivers. "Over Many programmers emphasize that
(North America) .thoughtinc.com
512-434-1591 time, most people will probably buy their despite its flaws, JDBC is a positive step
(Elsewhere) WebLogic Type 2 drivers from the database ven forward, especially with the help of
http://java.sun.com/ San Francisco, CA
415-659-2600 dors," concedes Scott Dietzen, WebLog RDBMS and third-party products that
products/jdbc
http:l/www.weblogic ic's vice president of marketing. flesh out the spec. Few are unhappy about
.com The future for driver vendors lies in leaving behind the time-consuming alter
Types 3 and 4, which offer benefits for natives, like writing CGI scripts, to marry
IBM's view. Net.Data, which comes bun application developers who want to cre Java applications and RDBMSes. As Jen
dled with DB2, resides on a Web server and ate better-performing and more sophis nifer McLean, a consultant with systems
maps requests from Java apps to the data ticated Java/RDBMS applications. Type integrator Clarkston-Potomac (Durham,
base, using native RDBMS language. 3 drivers, which reside on an application NC), puts it: "The advantage of using
server and communicate with all-Java JDBC is that it's all one Java program,
Third-Party Solutions clients, give Java applications the abili it's all object-oriented." Ill
Third-party driver vendors build any of ty to read and write to an RDBMS any
the four driver types and add nuances not where on the network. Because Type 3 Alan ]och is a BYTE consulting editor. His
spelled out in the spec (see http://java.sun drivers work with all-Java clients, there e-mail address is [email protected].
Rene Martinez
Senior Vice President & Co-founder
lntraServer Technology, Inc.
Universal Repository
Further Reading either Microsoft Access or SQL Server). which means that the behavior of UML
The second part is the OIM part, a meta is present inside the OIM. At each level of
Object-Oriented Strategies meta model that can support a variety of the OIM, you inherit behaviors of the pre
information-model extensions such as vious level. For example, the SQL Server
http://www.cutter.com/ itgroup
database and OLAP. model inherits behavior from the DBM,
Ovum : http://www.ovum.com Paul Harmon, editor of the monthly which inherits behavior from the OIM.
Hurwitz Group newsletter Object-Oriented Strategies ISVs and developers can build their own
http://www.hurwitz.com and author of several books on the Uni custom models based on information that
DAMA International fied Modeling Language (UML}, describes can be inherited from other portions of
http://www.dama.org a four-layer metamodeling architecture in the OIM. Other organizations and stan
The Data Administration Newsletter the January issue of his newsletter. Meta dards groups, such as those associated
http://www.tdan.com meta models such as the Object Man with creating a document-exchange stan
Proceedings from the Second IEEE agement Group's (OMG's) Meta Object dard, could also extend the model to sup
Metadata Conference Facility (MOF} or Microsoft's OIM, he port their own repository efforts.
http://www.llnl.gov/liv_comp/ metadata/ says, define the fundamental infrastruc The Microsoft Repository's first infor
md97.html ture for a metamodeling architecture, mation model basically offered support
Implementing a Corporate while metamodels such as UML and for UML, an analysis-and-design model
Repository Microsoft's da tabase model (DBM) are ing language that has gained widespread
Adrienne Tannebaum simply instances of a meta-meta model. industry support. That meant, for exam
ISBN 0471 -585378 Models and User Objects round out the ple, that you could create a Visual Basic
John Wiley & Sons, 1994
four layers. program, use another optional down
Microsoft's OIM is derived from UML, load-Visual Modeler, which is a subset
hTE ~
crashes and viruses-no software
installation required. Call about volume
discounts for your entire organization. 1..!l!·!l!,h 't
11 &4 :i·M,:!.!!3
f.\ ?M-1.
Window
. 'S--
. :
On The
lnfonnation 036432X $29.95 8823560 $39.99 5875764 $24.95 5878690 $24.99 0147221 $24.95
Su rhighway...
~'''<I ....
vq/~ ~
~. ~<Sq~-.....
eschutes is Intel's code name competitors from AMD and Cyrix sup P6 microarchitecture, including support
for the fast new Pentium II porting this interface later this year. for MMX, 32 KB of Level 1 (Ll} cache,
chips built using the 0.25 and (for the first Deschutes chip) a 66
micron CMOS process. Iron Where Deschutes Fits MHz frontside bus . Both include an
ically, these recently introduced 333-MHz This first Deschutes chip, and those ship external 512-KB BSRAM L2 cache con
processors are also the fastest Intel CPUs ping in the next few months, will still fit tained in the SEC cartridge. Both support
currently running on the soon-to-be the same proprietary Intel Slot 1 mother Intel's 440FX/440LX chip sets and others
updated 66-MHz system bus mother board interface as today's Pentium II. Lat from third parties . The current CPU
boards. That makes these machines er on, Deschutes-series PIIs will likely interface and chip sets, however, limit
somewhat akin to dinosaurs, albeit migrate to the newer Slot 2 connector. them to a two-way multiprocessing
extremely fast dinosaurs. Like the Klamath series, Deschutes Implementation. Error-correction code
BYTE Lab evaluated 19 333-MHz CPUs now come packaged in a single-edge (ECC) is available on the L2 cache of the
Deschutes systems running NT 4.0 Work Deschutes processor.
station. All use the 66-MHz bus and 440LX
chip set on the motherboard. The extra 33
MHz of clock speed might lead you to
BEST Pentium II's pipelined system bus
allows multiple simultaneous transac
tions. Like the Pentium Pro, the PU speeds
expect a roughly 11 percent increase in up performance at a given clock speed by
performance over the Deschutes' older DTKAPRl·76M/P333 using dynamic execution, Intel's term for
3 00-MHz cousins, and that's almost exact Although it didn't hit the top marl< in any branch prediction. The processor predicts
performance test, the offering from DTK
ly what we found on these machines. which way branch instructions will fork
Computer was fast enough to take first
Yet that performance doesn't actually (with a claimed 90 percent accuracy)
place in overall performance. It also took and speculatively executes some instruc
show the true worth of the Deschutes chip.
first place in Best Value/Low-Cost. The
Increasingly, it's slow components and the tions along the predicted path, rearrang
DTK costs 48 percent ($2750) less than
66-MHz system bus, not the processor, that ing them to take maximum advantage of
stifles overall system performance. the highest-priced entrant, but only 8 the chip's resources.
percent ($200) more than the lowest.
Fortunately, 66-MHz motherboards are
about to become a thing of the past, atleast Market Splash
for high-end systems. Deschutes PCs built contact (SEC) cartridge. Within the SEC, Deschutes may have a bigger impact on
around 100-MHz motherboards, clocked the processor core and industry-standard the processor market than on overall sys
from 350 to 450 MHz, should make their burst static RAM (BSRAM) Level 2 (L2) tem performance. Intel released the
debut about the time you read this. cache are enclosed in plastic and metal 333 -MHz version at $721, $200 below the
Several manufacturers opted to wait and are surface-mounted. usual price for its top-line PC processor,
out this 333-MHz round-up, choosing to Later Deschutes-series Plls, with full and only two months later dropped that
submit PCs with 100-MHz motherboards speed backside buses, will require Intel to price almost20 percent, to $583. As might
and even faster Pentium II processors replace commodity BSRAMs with custom be expected, the prices of previous-gen
instead. All arrived far too late for com static RAMs (CSRAMs). BSRAMs require eration Pentium Ils tumbled.
prehensive testing for this issue. But after one clock cycle to read and another to Intel also cut prices on Pentiums for
April 15, you can check our Web site, at rewrite data, so their top speed is half that mobile computers from 15 to 51 percent,
http://www.byte.com, for a first look at of the CPU. The CSRAMs are limited although desktop Pentium Pro prices
these machines. quantity proprietary Intel parts that can remain unchanged.
AMD and VIA are already building chip run at a full 450 MHz (i.e., with their 64 The second half of 1998 will see a new
sets to support systems withlOO-MHz bit interface, at 3.6 GBps}. Deschutes series, this time with 256 KB of
motherboards; expect to see Deschutes Deschutes and Klamath have the same on-die L2 cache.
............
ETHERNET
............
,,''; I
EXPANSION SLOTS ; I
For high-end PCs, Slot 2 versions offer processor without L2 cache memory, The PII also includ es 57 MMX in
ing glueless support for up to four-way Celeron is Intel's answer for under-$1000 structions that it executes two at a time.
"' multiprocessing will arrive at 400 (mid- PCs (for a look at new sub-$1000 PCs, Moreover, MMX instruction architecture
"'"' 1998) and 450 MHz (ye ar end), with L2 please see page 125 in this issue). is single instruction/multiple data
cache ranging from 512 KB to 2 MB. • Mobile-cartridge Pentium II modules, (SIMD)-one instruction can perform
Intel's road map for all market segments with low power-consumption levels, will identical operations on multiple pieces of
involves total, eventual migration to Pen increasingly be seen in high-end notebook data, reducing compute-intensive loops
z
tium II : designs. characteristic of video, audio, 2-D graph
t!J
tri0 • Slot 2 Pentium IIs will be used in high ics, videoconferencing, printing, and ani
performance servers and workstations, in Pentium II Architecture mation processing.
z
UJ
z
;;!
single-to four-way multiprocessor designs. Deschutes uses the Dual Independent Bus
"'t • Slot 1 Pentium II machines will be used (DIB) archi tectu re, just like the Pentium
(f)
in desktops requiring midrange to high Pro, to gain a performance advantage on Contributors
ffi
0 Al Gallant, Technical Manager, BYTE Lab
z level performance, using one or at most single-bus systems. The superscalar pro
~ Michelle Campanale, Technical Editor
z two processors. cessor can use the L2 cache bus and pro Tom Halfhill, Senior Editor
0
• Celeron, Intel's latest Pentium II series, cessor-to-main-memory buses simultane
~ Robert Pickering, Technical Assistant
:;:; will become the chip of choice for low-cost ously, for a possible peak capacity of five Dan Tanner, Technical Editor
::>
ny of these 333-MHz PCs and upgradability as possible. Using a basic motherboard, standard
offers high performance at a Implementation scores rate the choic options and memory, with an acceptable
good price. All include sup es made by a manufacturer's design engi 17-inch monitor, the DTK has managed to
port for Accelerated Graph neers. We come up with these scores by keep a low price. At the same time, it
ics Port (AGP) and SCSI hard disk con evaluating the overall system design and scored top marks for performance.
nections, making them sure bets for speed functionality. In our tests, these machines Controls are conveniently located,
gains under the forthcoming Windows were uniformly excellent; on a scale of 1 with a primary power switch on the back
NT 5.0. to 5, no system included in this test scored panel to shut off the juice to the power
We rated these Pll workstations based less than a 4. supply as well as the more conventional
on their quality of performance, imple Our features score measures an over power-on button in front. Inside, there's
mentation, technology, price, usability, all rating of base features in the tested sys easy access and plenty of room for an
and features, on a scale of one to five stars. tem. We look for good-quality integrat extra CD-ROM, tape, or Zip drive.
You'll find a complete listing of features, ed and nonintegrated options, supplied Besides the expected mouse, keyboard,
along with overall ratings, in the chart on at reasonable costs. USB, serial, and parallel ports, the back
pages 122 and 123. We requested identi Our technology scores reflect the qual panel also holds connectors for the AGP
cal configurations from each manufac ity of highly desirable options included video adapter, external SCSI, 10/100 Eth
turer to achieve a level playing field; devi- . with the test systems, in addition to stan ernet, and an x2 5 6K modem. The inside
ations from the standard configuration dard options rated in our features score. of this machine is simple and straight
are noted in this chart. For example, a high-scoring system may forward, offering easy access for repairs
Performance is an important consid have included an additional processor slot or upgrades.
eration, especially for any PC sporting a on the motherboard for a second CPU, or Kingdom's Pinnacle 333 Power system
topline processor. Our Best Overall a 10/100 Ethernet card in place of the stan came in second in our Best Overall scor
scores recognize this by heavily weight dard lOBase-T. Systems providing inte ings, largely due to an excellent tech
ing total performance ratings as 70 per grated SCSI and sound, for example, were nology implementation. Like the third
cent of the total score. Technology and given higher technology ratings. place Xi machine, this PC can support up
implementation ratings share the remain A combination of high technology rat to 1 GB of RAM on the motherboard.
ing 30 percent. ings and low price put a system high on Don't overlook NEC's nifty Power
Performance scores were obtained by our list for Best Value. The Best Value Mate Professional 9000 and SAG's fast
averaging the results from multiple runs scores are a weighted combination of our STF 3300. Priced at less than $3200, both
of our benchmark tests (see "Test performance, usability, features and price offer technology options you'd expect
Methodology" on page 121). The tests ratings. Performance scores make up 50 to see in higher-priced machines. They
rate machine speed in integer, floating percent of the final Best Value score; price have a second processor slot for an addi
point, and application operations. receives a weighting of 30 percent; and tional CPU, for example, and free up an
We judge a system's usability based on features and usability scores contribute extra slot by integrating SCSI on the
the quality of documentation and other 1Opercent each. motherboard. The NEC's 64-bit PC!
information provided to the user. We also slot offers an upgrade path for the future,
look for ease of access to internal com Best Overall and its NEC 32X CD-ROM drive is one of
ponents; quick, well-designed setup and The DTK APRI-76M/P333 has no elabo the best on the market.
installation; and as much expandability rate, expensive engineering features.
Best Value
The $2799 DTK system, with the third
Trick of the Trade? lowest price of all systems tested but low
est price of our top seven performers, also
won honors as Best Value. It offers 10/100
ur time-tested BYTEmark benchmarks showed oddly variable scores on these systems,
0 scores that became even more suspicious when our Van Horn Photoshop benchmarks
Ethernet as standard equipment, a Toshi
ba 32X CD-ROM drive, a good-quality
returned virtually identical results fora II systems. It turns out that the BYTEmarks had uncov ELSA Gloria Synergy video card with 8
ered a little known trick of the PC maker's trade: Some manufacturers-Compaq, Everex, DTK, MB of SGRAM on-board instead of the
and Kingdom, in this case-disable the standard error-correction code (ECC) on the L2 cache more usual 4 MB, and a large 300W (its
and improve performance, apparently with Intel's blessing. maximum output) power supply at a very
Unfortunately, most buyers can't perform the large-scale comparative testing that allowed reasonable price.
us to discover th is ECC performance t~eak. And users will find it virtually impossible to dis The $2599 Micron ClientPro 766Xi
able (or enable) ECC themselves. While there's probably little likelihood that turning off ECC was fourth in Best Value. Its performance
will cause problems, we believe that buyers should be given a chance to decide if they want kept it out of the running for Best Over
to opt for speed and ignore the possibility of unchecked error on the L2 cache. all system, but the machine managed to
incorporate a good feature set-4.5-GB
to realize your
reams.
Desktop Performers.
The 02 and OCTANE wo1-kstation so lut io ns
start ing at $5902".
Your applications can now run on "the fas test Windows NT machine on
the planet." These include Microsoft O ffi ce , Oracle and Netscape ; plus
engineering and graphics soft ware such as Pro/Engineer, Fort ran ,
C /C ++ , Visua l Bas ic , Micros tation, AN SYS , LA PACK,
Ga ussian, Softimage and Lightwave. O ve r the last 15 years
we have des igned systems fo r thousands of satisfied
customers worldwide , including prestigious institutions
like NASA and Fidelity Inves tments. O ur technicians are
expert at configuring all Alpha operating systems and applications,
and you will not find more technically compe tent sales people anywhere.
memory system, boosts perfo rmance by up we've tested . .. on our number-crunching Lightwave 3D test."
M rcrowaY-_®
__________1i____
echn_:_
c'_
;:_
"~..,'·Y
ND___
~:'~-
ran__
~n::__
ic
_r~
v
-
::~__
-
M-~
c
-
r~~
v
-
Corporate Headquarters: Research Park, Box 79, Kingston, MA 02364 USA• TEL 508-746-7341•FAX508-746-4678
...
_U_L_T_
S I
Ul tra Wide SCSI hard drive and 8-MB does buying one of these machines make Intel's Celeron and other low-cost chips
Number Nine video card- and still come sense? If you're in the market for high-per become popular.
"'
O>
in as the lowest-priced machine. formance bargains, our response is an If performance and u pgradability are
O>
While the $3724 SysTech and $3750 unqualified "You bet." your chief concerns, however, you may
Compaq PCs were among the more expen Prices for these 333-MHz units are, in want to wait out this round for even faster
sive machines tested, their combinations many cases, less than half the price of the machines emerging in the next couple of
of great features and high usability made 300-MHz systems we reviewed in our Jan months. Next-generation 350- and 400
them our second and third choices, respec uary issue (see "Eight Heavy-Hitting NT MHz machines, supported by the faster sys
tive ly, for Best Value. Workstations," page 98). tem bus and faster components, likely will
We expect that prices of Pentium PCs add to the overall cost of the PC, but the
The Bottom Line will continue to fall, possibly precipitous improvements in speed and compatibility
With the 66-MHz system bus on the way ly, as the 100-MHz system bus makes its with future upgrade paths might be worth
out, at least for high-end PC workstations, debut and new sub -$1000 PCs utilizing the extra cost.
" DEJA'llS 1
0.25-Micron and Smaller largely the signal-degrading effects of stray capacitance-are natu
More efficient process technology means Deschutes runs faster, cool rally reduced.
er, and us.es less power than its predecessors. The first Deschutes No.wadays we can process information faster than we can move it.
attained a core frequency of 333 MHz-11 percent faster than the Ultimately board, bus, and machine geometry'will have to shrink, too,
fastest Klamath-series Pll (300 MHz). It has a 131 -square-millimeter and that may be even more difficult to accomplish (see "Amending
die, compared to Klamath's 202 square millimeters, and consumes Moore's Law," March BYTE).
almost half the power, 23.7 Was opposed to the·older chip's 43 W. At 333 MHz, a clock period consumes only 3 nanoseconds. But it's
Silicon etch resolution has been sharpened 29 percent with the during the rise/fall times of the clock that signals are gated or trig
Deschutes chip, from 0.35-to 0.25-micron. Shrinking linear dimen gered. Such times are an order of magnitude less, well into the picosec
sions on a chip to 71 percent reduces the chip's area by half. Reduced ond range. In 300 picoseconds, light can travel merely 9 centimeters.
chip area translates to shorter distances for signals to travel, enabling Small wonder that processor cores and cache memory are migrating
ever-higher clock ~peeds. And, as chip geometry.shrinks, "parasitics" to a single die.
BIOS shadowing (ROM or video) Both ROM Both Both ROM Both Both Both
EQUIPMENT INFORMATION
Sound adapter/chip Embedded Yamaha Ensoniq None None ES1868 None Ensoniq PCl/16·bit
ESS1869 OPL-3 AudioPCI w/Wavetable
on board
CD-ROM/speed Hitachi/24X Pioneer/32X Toshiba/32X Toshiba/32X Sony/24X Toshiba/32X Plextor 13/32X Matsushita/24X SCSI
10/100 Ethernet LAN Integrated Optional v v Optional ..... v Optional
Fax/modem 56K Rockwell/56K USR/56K
Motherboard (design/ Compaq ATX/Intel AL440LX/ ATX/DTK AL440LX/ FI C/FIC Burbank/ ECS · Elite Group,
manufacturer) Intel Intel Intel with on-board SCSI
Power supply 260W 200W 235W 300W 235W 235W 300W 235W
HARD DISK
Bays (3'h·/5 Y.·inch) 3/2 2/3 5/4 3/4 5/3 4/3 7/4 3/5
Internal/external 2/3 1/4 5/4 2/6 4/4 2/5 6/5 8/5
Bays with front access (1)3'h ,(2) 5Y. (1)3'h ,(3) 5Y. (1)3'h ,(4) 5Y. (2) 3'h , (4) 5Y. (2)3'h,(3)5Y. (2)3 'h , (3)5Y. (1) 3'h , (4)5Y. (2)3 'h ,(3) 5Y.
Hard drive (vendor and Compaq Seagate Seagate Seagate Seagate Seagate Seagate IBM
model) WDE4360 ST34572W ST34371 UW ST34501W ST34572W ST34572W ST34572W DCAS34330
Hard drive controller (vendor Compaq Adaptec Adaptec Adaptec Adaptec Adaptec Adaptec IBM
and model) Ultra SCSI AHA2940UW AHA2940UW AHA2940UW AHA2940UW AHA2940UW AIC-7895
Hard drive interface type Ultra Wide Ultra Wide Ultra Wide Ultra Wide Ultra Wide Ultra Wide Ultra Wide Ultra Wide
SCSI SCSI SCSI SCSI SCSI SCSI SCSI SCSI
Hard drive capacity 4.3GB 4.5 GB 4.3GB 4.5GB 4.5G B 4.5GB 4.5GB 4.3GB
Primary system architecture 3PCl,4 1SA, 4PCl, 21SA, 4PCl, 2 1SA, 4PCl,. 31SA, 3PCl, 2 1SA, 4 PCl, 2 1SA, 4 PCl,21SA, 4 PCl, 3 1SA,
(PCl/ISA) 1AGP 1 AGP 1AGP 1 AGP 1 AGP 1 AG P 1 AGP 1 AGP
Shared slots 1
Remove cover without tools .....
VIDEO
Video accelerator Matrox STB Velocity Number Nine ELSA Gloria STB Velocity Nvidia Model AccelGraphics ATI Rage Pro
(maker/model) Millennium II 128 AGP Revolution Synergy 128 RIVA 128 Accel Eclipse II
Video memory and type 4·MB SGRAM 4·MB SGRAM 4·MB WRAM 8·MB SGRAM 4·MB SGRAM 4-MB SGRAM 32·MB mixed 4·MB SGRAM
Maximum resolution 1280 x 1024 1280 x 1024 1920 x 1060 1280 x 1024 1280 x 1024 1280 x 1024 1280 x 1024 1080 x 1024
without upgrade
l/OPORTS
Serial/USS 2/2 2/2 2/2 2/2 2/2 2/2 2/2 2/2
Parallel ports 1 1 1 1
SCSl·2ports 150·pin, 1 50-pin, 1 50·pin, 1 50·pin, 1 50-pin, 1 50·pin, 150·pin, 150·pin,
1 68·pin, 1 ext. 1 68-pin, 1 ext. 1 68·pin, 1 ext. 1 68·pin, 1 ext. 1 68·pin, 1 ext. 1 68·pin, 1 ext. 1 68·pin 168·pin
EIDE ports 1 2 2 2 2 2 2 2
MEMORY
Maximum RAM on motherboard 384MB 384MB 384 MB 512 MB 384 MB 384M B 512MB 1 GB
Type and architecture SDRAM/ECC SDRAM SDRAM/ECC SDRAM/ECC SDRAM SDRAM SDRAM/ECC SDRAM/ECC
ECC RAM on motherboard? v Option v
VENDOR INFORMATION*
Phone number 281 ·370·0670 888·226·6772 800·218·4881 626·810·0098 972·416·7600 510·498·4411 800·779·2000 (Sales)
Toll·free phone number 800·345·1518 888·226·6772 800-218·4881 800-289·2385 800-551·9000 800-262·3312 8oo-a46·2303 (Supp.) 800-385-3436
On·line address http://www http://www http://www http://www http://www http://www http://www http://www
.Compaq.com .compusacom .cybmax.com .dtkcomputer .duracom.com .everex.com .gateway.com .kingdomcomputers
.com .com
Inquiry Number 1101 11 02 1103 1104 11 05 1106 1107 1108
*** *** *** **** *** *** **** **** *** *** ****
Award Phoenix4.0 Phoenix 4.0 Phoenix4.0 Award AMI AMI Award AMIHiflex AMI AMI
4.51PG rel 6.0 rel 6.0 rel6.0 4.51PG v 1.1 v2.5 4.51PGM v 1.19 v 1.1 9 rel 1.33A
.....
On On On On On On "'
On On On On "'
On
"'
ROM
.....
ROM
"'
ROM
...... 2.0
Disk or
.....
ROM "'
ROM "'
ROM "'
Di sk
.....
None "'
ROM
V', 2.0
ROM
CD-ROM
ROM Both Both Video Both Both Both Video ROM Both Both
Sound Sound Sound Crystal CS Yamaha/ Sound Sound Sound Ensoniq Ensoniq PCI Ensoniq/DCS
Blaster Blaster Blaster 4236Baudio 719 Blaster Blaster Blaster AudioPCI Sound Image
AWE64 AWE64 AWE64 integrated chip set AWE64 AWE64 AWE64
Toshiba/1OOX Plextor/20X Plextor 14/32X NEC/32X Toshiba/24X Mitsumi/24X Sony/32X TEAC/32X Toshiba/32X Toshiba/32X Teac/32K
..... Optional
Optional
Rockwell/56K
V' Optional
USR/56K "' "' Optional Optional
USR/56K
V'
Powercom/56K
Optional
Micro Augusta/ Atlanta/ DK440LX with P6SLS/ REMIO DLS Dual Pll ATX/Giga-Byte GVC/BCM AL440LX/ P6DLS/
Express Intel Intel AGP/lntel Super 212B Supermicro GA-686SLX KR632 Intel Supermicro
235W 235W 235W 260W 230W 200W 230W 235W 250W 235W 250W
3/3 3/2 3/2 1/5 4/3 3/3 3/3 5/3 3/4 5/2 5/3
1/5 2/5 2/5 2/4 2/3 1/5 1/5 3/5 1/2 2/5 3/5
(2) 3 ~. (3) 5Y. (2) 3 ~. (3) 5X (2) 3 ~, (3) 5X ( 1 )3 ~, (3) 5X (2) 3 ~, (3) 5X (2) 3 ~, (3) 5X (2) 3 ~, (3) 5X (2) 3 ~, (3) 5X (2) 3 ~, (4) 5X (3) 3 ~, (2) 5X (2) 3l>,(3)5X
Seagate Seagate Western Digital Seagate Seagate Seagate Seagate Seagate Seagate Seagate Seagate
ST34501W ST34501W Enterprise ST34572UW ST34501W ST34501W ST34501 ST34501W ST34501W ST34371W ST34501W
Adaptec Adaptec Adaptec Adaptec Adaptec Adaptec Adaptec Adaptec Adaptec Adaptec Adaptec
AHA2940UW AHA2940UW AHA2940UW AIC-7895 AHA2940UW AHA2940UW AHA2940UW AHA2940UW AHA2940UW AHA2940UW AHA2940UW
PCISCSI on-board on-board
Ultra Wide Ultra Wide Ultra Wide Ultra Wide Ultra Wide Ultra Wide Ultra Wide Ultra Wide Ultra Wide Ultra Wide Ultra Wide
SCSI SCSI SCSI SCSI ·SCSI SCSI SCSI SCSI SCSI SCSI SCSI
4.5GB 4.5GB 4.3GB 4.5GB 4.5GB 4. 5GB 4.5GB 4.5GB 4.5GB 4.3GB 4.5GB
4PCl, 31SA, 4PCl,21SA, 4PCl,21SA, 3PCl, 21SA, 4PCl,3 1SA, 3PCl,41SA, 4PCl,31SA, 4PCl,31SA, 4PCl, 21SA, 4PCl,31SA, 4PCl,31SA,
1 AGP 1AGP 1 AGP 1 AGP 1 AGP 1AGP 1AGP 1 AGP 1AGP 1AGP 1AGP
1 1 1 1
..... .....
"' "'
Diamond Fire Number Nine Diamond AccelStar II Diamond ATI 3D Rage ATI Rage Matrox ATI Rage STB Velocity 1 AccelStar II 3D
GL 1000 Pro Revolution Viper V330 3D FireGL Pro 3D Millennium II Pro Turbo 28
4-MBVRAM 8-MB SGRAM 4-MB SGRAM 8-MB SGRAM 8-MB SGRAM 8-MB SGRAM 8-MB SGRAM 8-MB WRAM 8-MB SGRAM 4-MB SGRAM 8-MB SGRAM
1280 x 1024 1280 x 1024 1280 x 1024 1600 x 1200 1280 x 1024 1280 x 1024 1600 x 1200 1600 x 1200 1280 x 1024 1600 x 1280 1280 x 1024
2/2 2/2 2/2 2/2 2/2 2/2 2/2 2/2 2/2 2/2 2/2
1
1 50-pin, 1 50-pin, 1 50-pin, 1 50-pin, 1 50-pin, 1 50-pin, 1 50-pin, 1 50-pin, 1 50-pin, 1 50-pin, 1 50-pin,
1 68-pin, 1 ext. 1 68-pin, 1 ext. 1 68-pin, 1 ext. 2 68-pin 1 68-pin, 1 ext. 1 68-pin, 1 ext. 1 68-pin 1 68-pin, 1 ext. 1 68-pin, 1 ext. 1 68-pin, 1 ext. 1 68-pin
2 2 2 2 2 2 2 2 2 2 2
512MB 384MB 384MB 512MB 1 GB 768MB 512MB 1GB 384MB 384MB 1GB
SDRAM/ECC SDRAM SDRAM SDRAM/ECC SDRAM SDRAM/ECC SDRAM, SDRAM, SDRAM SDRAM SDRAM/ECC
Option .....
"'
714-852-1400 208893-3343 208-893-3343 978-264-8000 650-583-7222 800-677-6477 508-683-0339 714-821-3900 714-9798900 216-344-2649 714-498-0858
800-989-9900 888-209-8039 888-209-8039 888-863-2669 800-789-8027 80Q-677-6477 800-989-3475 800-367-7794 800-824-7267 800-628-4888 80Q-432-0486
httpJ/www http://www httpJ/www http://www http://www httpJ/www httpJ/www httpJ/www httpJ/www httpJ/www http://www
.microexpress mcronpc.com .m1cronpc.com .necnow.com .polywell.com .prem1opc.com .sagelec.com .systechnology .tagram.com .unicent.com .xicomputer.com
.net .com
1109 1110 1111 1112 1113 1114 1115 1116 1117 1118 1119
MVP
"The top search engine
~ is clearly HotBot."
- PC Computing
- Internet World
- PC Magazine
searches."
- Computer Life
Computerlife
"*****"
"HotBot could easily replace
database - Database
all its competitors."
Wired's HotBot.
www.hotbot.com
Low-Cost PCs
Does a low price tag always equal a value? We put five sub-$1000 PCs
all Pentium alternatives- to the test. By Robert L. Hummel
Specifying Systems
To qualify for this review, a PC had to pro
vide adequate processing power for busi
ness and mu ltimedia app lications. We
dema nded a Penti u m-class processor
with support for the MMX instruction set,
32 MB of RAM, and Windows 95 OSR2.
To store all that software, we asked for a TECHNOLOGY TECHNOLOGY
* * * * * *
2-GB hard drive. IMPLEMENTATION IMPLEMENTATION
These systems do not include a moni * * * * * * * *
PERFORMANCE PERFORMANCE
tor, a necessary purchase that will add * * * * * * ** **
VALUE VALUE
$150 to $350. To accurately reflect small * * * * * * * * *
office/home office (SOHO) usage, we
used a video resolution of 800 by 600 pix benchmark suite executes and times pre
els with a 16-bit color depth for all per determined scripts of eight application
formance evaluations. programs. The overall performance score
To accommodate on-line activity, each weights Bapco at 40 percent.
machine had to include a 56-Kbps mo The BYfEmark benchmark most accu
dem. A 16x-or- faster CD-ROM drive, rarely determines pure processor power.
Sound Blaster audio-card compatibi lity, Not surprisingly, we saw the best BYfE
and powered external speakers were mark performance on the fastest chip
req uired to provide basic multimedia with the largest L2 cache.
abil ity. Finally, the price of the system The Intel Media Benchmark release 1.0
(excluding monitor) had to be under measures video, image processing, 3-D
$1000 . In response to our request, we graphics, and audio performance on
received five systems, three based on the systems running Windows 95. This
AMD-K6 processorwithMMX (Compaq, benchmark uses DirectX and supports
IBM, and Polywe ll), one powered by the MMX-enabled processors.
Cyrix 6x86MX, and one built aro und
the Cyrix MediaGX (both from Pionex). Compaq Presario 4540
Although the Presario 4540 turned in
How We Tested TECHNOLOGY
good performance on our benchmark * * *
To measure each system's real-world per tests, its sleek, molded mini-tower chas- IMPLEMENTATION
formance when running typical SOHO sis is an example of emphasizing form * * * *
PERFORMANCE
applications, we chose Bapco's Sysmark over function. Also, given Compaq's ** * **
VALUE
32 for Windows 95, version 1.0. T his obvious goal of making the Presario an * * **
***** Outstanding **** Very Good *** Good ** Fair * Poor MAY 1998 BYTE 12 5
Review Cheap PCs: Bargain or Blunder?
third-party service agency will be grate icated video memory doesn't hurt the
ful to have at hand. TECH FOCUS LPC5201 's performance at all.
You won't notice any big names in the Integrated Ethernet and universal serial
Pion ex 6x86 software bundle. The Akrose Intel Takes the Low Road bus (USB) ports are built onto the system
Works CD provides a five-function col Traditionally, Intel has focused on improving board. It also has the largest hard drive of
lection of basic word processing, spread x8G processor technology, painting the low the bunch-a whopping6.5 GB ofstorage.
sheet, database, draw, and paint programs. costend of the market as trailing-edge tech And the LPC5201 is the only system that
Reference works include Compton's nology. However, the rising level of interest configured its modem as COM3, leaving
Interactive Encyclopedia and Reference in the sub-$1000 PC market has notescaped both serial ports active and available.
Intel's attention. A new chip, Celeron, is Although it has some impressive fea
expected to be shipping by the end of April. tures, the LPC5201's small size translates
Intel's Celeron uses the same 0.25-micron to some compromises. There are no
PG core as the Pentium II, but it has reduced expansion possibilities for addi ti onal
performance and a reduced cost Clocked at devices, such as a DVD or tape drive. A
2GG MHz, it comes without the Pentium ll's riser card provides one ISA slot (used by
L2 cache and runs with a GG-MHz bus. the modem) and one shared PCI/ISA slot,
Despite Intel's attempt to hobble the limiting your expansion choices.
Collection as well as TLC Properties' Body Celeron and market it under a different brand Small also means cramped. The bottom
Works medical-exploration program. namethan Pentium, the chip still has the pos of the floppy drive is less than one-quar
Given the consumer slant of the under sibilityto turn the low-cost market on its ear. ter-inch away from the top of the CPU
$1000 market, it is odd that only Pionex Sharing the Pentium's PG core means that blocking effective cooling of the chip by
bundled any software targeted at children, Intel can move its separate product lines its CPU-mounted fan. The heat problem is
the Akrose Creativity Workshop for Kids. forward simultaneously. aggravated by the tiny power-supply fan
and obstruction of airflow in the unit by
PionexGX internal partitioning. Over the period of
Cosmetically, the Pion ex GX is identical to ably slower. System operation seemed an hour's testing in a cool lab, the area of
the Pionex 6x86 system and comes with sluggish, a problem exacerbated by slower the case above the CPU got quite hot.
the same software bundle. But on closer video. As a result, the system has a trailing Equipping the LPC5201 with required
examination, several differences help keep edge feel to it, despite its recent vintage. software will drive up your total purchase
its price $300 below its costlier sibling. Nonetheless, given its $699 price and price. Only Windows 95 and a few utilities
Powering the system is the Cyrix Media probable end use, it's not fair to expect the
GX processor and chip set. The GX and system to deliver the same performance as
its companion Cx5510 chip provide a com systems costing $3 00 more. Once Win
pact and inexpensive bundle of CPU, core dows is up and running and you're con
logic, PC!, video, and sound support in one nected to the Web or word processing, the
chip set. Video memory is carved out of nor real delays lie outside the PC.
mal system RAM, reducing costs further. When running office applications, the
But all this economy comes at a price. Pionex GX has about half the power of the
Compared to the other review systems, the AMD-K6 233 systems we tested, just
200-MHz Pionex GX system was notice- enough to function as a network client or are included. Despite its limitations, the
as an inexpensive office PC. Its lack of mul LPC5201 is equipped to serve as a client for
PRODUCT INFORMATION timedia horsepower, however, limits its small networks, a second PC for SOHO use,
usefulness as a general home PC, where or a first PC for home or school use.
Aptiva E2G $999 Pionex Technologies,
IBM Corp. Inc. games and other video-intensive app lica
Research Triangle Orem, UT tions are the norm. Summary
Park, NC http://www.pionex.com l
Manufacturers are convinced that the key
800-426-7235
ext. 4340
Enter HotBYTEs
No. 1097.
Polywell Poly LPC5201 to getting more users to purchase their first
919-517-2430 The most striking feature of the Polywell computer is price, but we're not so sure.
http://www.pc.ibm.com Polywell Poly
LPC5201 $998 Poly LPC5201 is its size, just 3 inches high Although the PCs reviewed here cost less
/us/aptiva
Polywell Computer, Inc. and 12.5 inches wide. Despite its stature, than $1000, they're no easier to use than
Presario 4540 $999 San Francisco, CA
800-999-1278
the unit turned in the top overall perfor their more expensive siblings. For those of
Compaq Computer
Corp. 650-583-7222 mance score, fueled by its AMD-K6 233 us who are willing to configure our com
Houston, TX http://www.polywell processor and a 512-KB L2 cache. puters and don't mind downloading a new
800-345-1518 .com
281-370-0670 Enter HotBYTEs The SiS chip set uses a type of un iversal driver occasionally, these PCs are a cost
http://www.compaq No.1099. memory architecture that assigns system effective way to add another computer to
.com memory to the video subsystem. Using the our stables. [ii
Enter HotBYTEs
No.1096. built-in BIOS set up , you can all ocate
Enter HotBYTEs No. between 0.5 and 4 MB of system RAM for Robert L. Hummel is an electrical engineer, pro
Pionex GX $699 at http://www.byte.com
use by the video display, depending on grammer, and consultant. You can reach him at
your required resolution . The lack of <led [email protected]
Remote-Control Registry
• • •• indows 95 an d NT app lica
tions live and die according to
their registry settings, but
managing them is a bear. Like
many network administrators, I've spent
countless hours tracking down registry
configuration problems on networked
PCs. It's a difficult task involving cryp
tic, poorly documented variables.
But a marvelous new tool, Key Vision,
brings order to the registry with search
ing, reporting, and updating features that
allow me to monitor and alter registries
across the network. I wouldn't be with
out it now.
Key Vision's client/server architec
ture has NT-based communications and
management servers you administer with
ActiveX controls via a Web browser.
Agents run on Windows NT or 95. Intra
KeyVision uses ActiveX controls within Internet Explorer to provide
Soft also provides agent installation for
Microsoft Systems Management Services remote batch management of Windows 95 and NT registries.
(SMS).
Heavy-duty requirements allow Key ferent machines for reliability and per RATINGS
Vision to work in large networks. It needs formance, I ran both KeyVision and SQL
Microsoft SQL Server 6.5 on a dual Pen Server on the same dual-processor Back
TECHNOLOGY * * * *
tium Pro machine that has 256 MB of Office server. IMPLEMENTATION * * *
* * * *
between the registry and the KeyVision I had minor SQL Server configuration
server. The Web-based management con hassles during installation. KeyVision's
TECH FOCUS sole provides access to users (query only), configuration support is poor, but maybe
Making Up a Batch operators (change workstation groups you won't need it. The installation pro
Microsoft provides remote registry man and registries), and administrators (access gram didn't put folders on the start menu,
agement using the registry editor, but only policy and configuration options). but a ll actions were available from the
for a single workstation. Batch operations The management console was very main form. Once installed, KeyVision
are lacking, and Windows 95 and NT reg
easy to use . Workstations with agents was very stable.
istries call for different management tools.
installed showed up in the Unassigned KeyVision does only one thing-reg
Most software-distribution packages sup
group. Creat ing groups and moving istry management-but does it so well
port registry manipulation when a pack
workstations to them was a snap. KeyVi that it should be easi ly justifiable by the
age is installed. Limited batch operations
sion sup ports queries to find worksta management cost savings. Its use of SQL
can be performed using command-line
tions whose registries meet specific cri Server and SMS makes it a good fit for
arguments. But none of these tools can
teria, monitors for rea l-time notification BackOffice environments. llJ
begin to match the capabilities of KeyVi of registry changes, and filters to prevent
sion, especially in searching and real-time unwanted updates. William Wong is a computer consultant and
monitoring. KeyVision 's Acrobat documentation author. You can contact him at bwong
was useful, though screens were unclear. @voicenet.com.
128 BYT E MAY 1998 ***** Outstanding ****Very Good ***Good ** Fair * Poor
FIELD TEST: ADSL Service
able to ping the network in 11 milliseconds permanent vlrtual circuits, which are secure and
using a program that tests whether a net guarantee a certain quality of access, but are expensive.
ne of the neatest develop tern was stable, I unplugged the cable you can run at 10 Mbps until you get
ments in the computer revo from the 10-Mbps hub and plugged it into faster boards and then upgrade without
lution is the plethora of cheap the 100-Mbps hub to see if the auto-sens pulling more wire. The odd thing is you
storage systems. We have a ing really worked. It didn't: there was no may be better off paying attention to the
bunch of them at Chaos Manor. green light. The N etgear bo ard has a brand of cable you buy than the brand of
The first solution is simple: add a bunch oflights to signal what's wrong. In Ethernet board.
larger hard drive. Except for portables, this case, it wasn't getting a signal.
it's nearly impossible to buy a hard drive
smaller than 2 GB, and larger ones are
about 50 bucks a gigabyte. Put a new hard
The Netgear manual says you must
have Level 5 cable to run at 100 Mbps. I
wasn't sure what my old cable was, but
T HE NETGEAR BOARD WENT
into Fireball, which is my experi
mental dual 200-MHz Pentium Pro (the
drive in your old system or install it in I'd read that on the box when I bought big ones with a 1-MB cache) system that
another system and network to it. Net the board, so in preparation I also bought I built from a Micronics W6-LI mother
work costs have fallen to nearly trivial lev a 25-foot cable certified as Level 5. I for board and a PC Power & Cooling case
els. Basic new machines are getting cheap get what it cost, butitwas under 20 bucks. and cooling fans; see my December 1997
enough that you can afford to use one as I plugged that into the Netgear board column for details.
a "disk box" with the cheapest possible and the other end into the 100-Mbps hub, Fireball also sports a Distributed Pro-
video card, no sound card or other acces
sories, a network card, and as much disk
space as you want.
Now, three of my systems talk
There are far more elegant solutions to to each other at 100 Mbps.
The third alternative is RAID 5. A RAID cally, to get the drive into the drive tray
5 system requires at least three drives. All once the cables are attached. It took me
files are written across the three in such a nearly half an hour to get it right. Once I
way that if one of the drives fails, you can did, though, there were no problems.
recover all the data through error-correc When the physical installations are
tion files stored on all three drives. This done, invoke Windows 95 and install the
happens invisibly. RAID 5 is slower than DPT software. That's a breeze. Then run
RAID O or RAID 1, but most of the penalty the software.
is in writing files; reads in RAID 5 are fast. The DPT software is nearly self-explana
RAID 5 also uses disk space. In my case, tory, but it takes a long time (about an
I have two 4-GB drives and one 3-GB drive, hour) to build an array, and there is abso
but the final formatted RAID drive (which lutely no indication on your screen that
looks to the OS like one big drive) is only anything is happening. Similarly, there's
6.3 GB, which for Windows 95 formats into an option to format a disk in the array. It's
three 2-GB drives with some left over that not explained well in the DPT documents,
I could partition into a special swap-file but this is a low-level format.
drive. It makes sense to set up the swap If you start that format, it will take an
file drive with the largest disk cluster size hour or more. Once it has started, if you
your system can handle. Never use that halt it before it is finished, the drive will be
drive for anything but the swap file. You'll useless, unavailable, invisible to the OS,
get significant performance improvements. and shown as "impacted" by the DPT soft
Setting up the RAID arrays is both easy ware. Fortunately, the remedy is simple:
and complex. The RAID box comes with invoke the DPT Storage Manager pro
three drive trays, into which you install gram, select that drive, and hit the "for
your drives. Those then slide into the box mat" button. Then go out to dinner. When
and are turned on with a small key. They you come back in an hour or so, the drive
are hot-swappable. You can pull one out will work just fine and can be added to an
while the system is running, and, provided array.
you have a redundant array (RAID 1 or Alas, there is absolutely no indication
RAID 5), you won't lose any data. You could that the format button does anything and
then install a new hard drive into the drive no progress indicators. The drive light will
tray, put the tray back in the box, and use blink furiously, but if you haven't con
the key to turn it on. The DPT software will nected the cable to the right place for the
take care of the rest. "drive busy" connection, you won't see a
The hard part of the installation is drive light. In the case of the Quantum
putting the drives into the drive trays. The Fireball drive, I simply must have faith;
array sets the SCSI ID number for the drive; which works. Eventually the format is
to do that, you must connect cables from done, and the drive is in fine shape.
,Qa; I
write as yo u choose. Moreover, once it
finds a file, it's fast: you can play audio and
small-screen real-time video direct from
FairCorn®
corporation
the tape. It's great for saving Internet mul
timedia downloads.
Note I say once it finds the file. It can
take up to a minute to find and open a new
Commercial Database Technology. Since 1979.
USA. 800.234.8180
Phon e: USA 573.44 5.6833 · EUROPE +39.35.773.464 - JAPAN +81.0592.29.7504 - BRAZIL +55.14.224.1610
\'I/WW.byte.com
Get the
product information
you need,
file, and even to get a directory takes many bounty hunter just waiting for the oppor people who will find these books most use
seconds. After all, it is tape. But once it has tunity; thus the emphasis on credentials ful are those who know a lot abou t the sub
located the file, it reads multimedia files like college degrees. ject, but don' t know it in a systematic way;
so fast you wouldn't know it wasn't a disk Credentialism has also created oppor who have holes in their knowledge base;
drive. tunities. One credential that's worth a lot and who are a bit nervous about exams
Because it looks like a disk drive, you of money is MCSE-Microsoft Certified anyway.
can share the iDT 2500 across the network; Systems Engineer. There are a number of The New Riders MCSE books are the
having it available across the network categories. None of them require college computer books of the month.Just be sure
means you can save to it from anywhere. degrees. They do require you to pass a to notice the publication date; books of
As I write this, I'm using Canyon Soft thorough and difficult exam, but the exam this kind become dated as quickly as
ware's Drag and File Gold to find and copy is based on practical knowledge, not on Microsoft releases new versions of its
the latest versions of everything I ever remembering who said what. products. Generally, the titles that say
wrote and store it on Fireball's RAID 1 If I were young, had never made it to MCSE Training Guide are more recent than
drive. Once that's made up, I'll copy it to college, and wanted to get ahead, I'd go the ones that say MCSE Study Guide.
tape, as well as write it off to yet another for one o f the MCSE credentials; it's guar If yo u already know Windows NT, or
CD-R disc. When I did my " full Monty" anteed employment at fairly decent wages. Exchange Server, or one of the other major
backup last time, I forgot to look into some I'd be particularly interested ifI were doing Microsoft product lines, but like the scare
magneto-optical (MO) discs, which may technical-support work but didn't have crow in the Wizard of Oz you don't have a
have some stuff that didn't get onto one of any credentials. diplom a, go to http:// www.newriders
the networked drives. This time for sure. The usual way to get the MCSE creden .com and see if there's not an MCSE cate
I'll mostly use the iDT 2500 as backup tial is to enroll in a trade school, which gory and book for you . It could change
storage, since the cost per gigabyte for stor doesn't so much teach you about engi your life.
age med ia is very low whi le 6-GB chunks neering Microsoft products as how to pass
are more convenient than the 600 MB you
get on a CD-R disc. However, since it's on
the other end of a 100-Mbps Ethernet, I
the MCSE exam. These are tough exams,
a nd having some coaching in a trade
schoo l certainly does no harm; but you
T HE BOOK OF THE MONTH IS BY
George and Meredith Friedman, The
Future of War (Crown, ISBN 0-517-70403
can also use it to store any multimedia files don't have to enroll in classes to take and X). While I don't agree with all they say,
I download from the Internet. If you're pass the MCSE exams. You can learn on it's a valuable contribution to the discus
looking into data storage, be sure to check your own. sion of technology and warfare. Inciden
out Indigita's iDT 2500. More as I use it If you want to try that, the best way is to tally, I am doing a two-volume set on high
more, but I like it already. get th e appropriate New Riders MCSE tech wars for St. Martin's Press, and I hope
book and CD-ROM. These books aren't to turn in the manuscript of the first vo l
BUYER'S
GUIDE
Essential Products
Technology Experts
Mail Order
Top mail-order vendors offer the
latest hardware and software products at
the best prices. Page 138
Hardware/Software
Showcase
Buyer's Mart
:;;
: The BYTE classified directory of
ffi
CD
!g
:i:
computer products and services,
INDUSTRIAL
CPU CARDS
1111111111111
1
1111111111111
1
1111111111111
1
111111111111
INDUSTRIAL
TOWERS FOR
TELECOM
APPLICATIONS
WALL MOUNT/
BULKHEAD
MOUNT PCs
20 SLOT
RED~NDAN
SERVER
Global solutions
Designed and manufactured in house by
Tri-MAP International.
Full design, customisation and production service
in the UK and USA.
Chassis, industrial CPU cards, passive back planes
BS EN ISO 9002 Registered (UK) and power supplies.
retention so that when you complete your training you 'll be fully prepared to pass your
MCSE exams . You 'll be ready and confident to go into the workplace to effectively plan ,
If your company enters information into a database, you need TELEform, the
data collection solution. TELEform reads hand print from any form. It reads any
data type from faxed, scanned, or even Internet-based forms. The TELEform fam
ily of products can handle your forms processing needs, whether its a hundred
or tens of thousands of forms each day. Create a form, print it, fax it, post it on
your Web site. One form in any format, paper or electronic. Thousands of
companies use TELEform's data collection server and robust recognition capa
bilities to reduce their dependence on manual data entry.
COPY ANY CD
INSTANTLY!
You'll copyentire d1ives instantly! paces. Afull factoI)' final test and perfor NO PC NEEDED.
mru1ce ruialysis is performed. Complete Insert your original disc and press
With our combo IDFJSCSI model, you can
copy entire hard disk images from IDE to test and repair reports are sent to any "start". The multimedia processor
SCSI or vice-versa. standard printer. quickly copies any CD to the internal A/V
hard drive. Insert blank discs ru1d make as
HOT NEW TECHNOLOGY
STAND ALONE IDE DRIVE DUPE-IT
REPAIRS DRIVES
many copies as you like. You'll produce
P/N IOI ........................................................... $395.
identical, bit-for-bit duplicates. The
Don't throw those used drives away!
Breathe new life into old diives with system is totally self contained - no
COMBO IDEAND SCSI DUPE-IT WITH TRANSIATOR
Dupe-It! Pro. Reassign and eliminate bad computer is needed.Just plug it in and
P/N SDl2 ........................................................ $795.
SCSI blocks and IDE defects. Put the press "start". You'll get perfect copies of
built-in drive repair system to work for PRO MODEL LOADED WITH IDE AND SCSI INTER
ru1y CD.
you. Here's how it works: First, a precise FACES, TRANSIATOR,DRIVE MECHANIC, AND DRIVE
BUILD YOUR OWN CUSTOM
analysis system scans the disk surfaces DIAGNOSTIC TEST SOFTWARE WITH PRINTER PORT
AUDIO DISCS!
for errors. Defects are then mapped P/N SDIPRO ................................................... $995.
You can make your own custom audio
around and effectively "erased". The discs without a PC! Insert your original
built-in error correcting system "trains" CDs, select the tracks you wrult, and copy
the drive to permanentlyavoid defective them. Then insert a blank CD-R, and
areas. Your data is stored only on safe you'll have a custom audio disc with just
areas of the disk. Capacity is reduced by the songs you want.
an insignificant amount, and the drive With the included CD mastering soft
works flawlesslyonce again. CORPORATE SYSTEMS CENTER ware, CD Dupe-It will work overtime.
www.corpsys.com
Get the technology used by major repair Just attach a SCSI cable to your PC or
ORDER FAaORY DIREa: Mac, and you're readyto design and
shops and modern data recovery
create your own original CDs.
centers. Dupe-It! Pro repairs all disk
defects caused bynormal wear. Drives 408·743·8732
'
TO HOST WITH HIWAY
Serving 40,000 domains, Hiway is the world's most popular web hosting provider.
And with good reason . We deliver the best performance by using the fastest equipment available. We guarantee 99.5% uptime. We offer the most res ponsive service ,
including around the clock support in multiple languages . Is it time to choose a web hosting provider? Then choose Hiw ay for reliability. And for performance.
And for 40,000 other reasons . Order online at www.hway.net and your site will be hosted today.
(800) 339-HWAY
If you have a problem with your BYTE subscription, lei us know! For best service, provide a brief description
of the problem and a copy of a recent magazine mailing label (if available). If your label is unavailable, just
give us your subscription account number along with your name, address, and zip code where your BYTE
subscription is currently being sent. If you have a change of address, be sure to provide both your old and
new addresses. If the problem involves a payment, be sure to include copies of your cancelled check
(both sides) or your credit card statement. Please include a "business hours" phone number if possible.
Send to:
Fax: 609-426-7087
Phone: (9 a.m. to 8 p.m. Eastern Time,
Mon. - Fri.) 800-232-2983 (U.S.), or 609-426-7676
A Division ofTheMcGraw·HiUCompanies
~
142 BYTE M A Y 199 8
The Definitive Reference Source!
BYTE on CD-ROM
Eight Years of BYTE - 1990 to Present
It's Comprehensive...
I ..... LOCATE Time Saving...and
! I ii 5!'91! @1158
! .....................
..... SCAN
Easy to Use! It's all in
Order Today! BYTE on CD-ROM.
1-800-924-6621
Available for Windows 3.1 , NT, Win 95.
Order Now! ' YES! I want the power and convenience of BYTE on CD-ROM.
Country FreePhone # 0 Send me BYTE on CD-ROM PLUS! The currenlly shipping version, plus 3 quarterly updates. 90+ issues for just $54.95.
Belgium 080071260 0 Send me BYTE on CD-ROM! Full text from Jan. 1990 lhrough the end of the currently shipping quarter - over 90 issues
Denmark 80018934 for only $39.95.
England 0800973195 Charge my: 0 Master Card 0 VISA 0 Amex 0 Check enclosed (Payable to BYTE magazine, US funds only)
France 0800916068
Germany 0130829448 Card# _ _ __ _ _ _ _ _ Exp. Date _ _ _ _ _ Signature _ _ _ _ _ _ _ _ __
Italy 167879415 Name - - - - - - - - - -- -----------------
Netherlands 060224959
Switzerland 0800552418
· Address - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Sweden 020793386 City _ _ _ _ _ _ _ _ _ _ State/Province/Country _ _ _ _ _ _ Zip/Postal Code _ _ _ _ __
·Oih-e;................ ................. ..
E-mail Address _ _ _ _ __ _ _ __ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __
lnt'I +353 91 752792
Mail to: BYTE on CD-ROM, P.O. BOX 526, Hightstown, NJ 08530 PWRLD
U.SJCanada
FAX
1-800-924-6621
+353 91 752793
BYT!E Canadian and U.S. orders, please add $2.95 for shipping and handling, and state tax where applicable. (Canadian orders add
appropriate GST). Outside NorthAmerica, add $5.00 for air mail delivery. Allow 6-8 weeks for delivery. "o;,.;,;o,, ,,111, M,cro ..Hm compa"k'
ZZ
Something Missing?
January
February
March
April
May
June
July
August
September
October
November
December
Special Issues U.S. Delivery $3.00, Foreign Delivery $4.00 ·1990thru1998 U.S. Delivery $6.50, Foreign Delivery $8.50,
Canada & Mexico $7.00 •All issues prior to 1990 U.S. Delivery $3,00, Foreign Delivery $4.00. Call for availability) These
prices include: postage (US), surface mail (foreign). •All checks must be in U.S. funds and drawn on a U.S. bank.
1=
Please indicate which issues you would like by checking (,!)the boxes. Send requests with payment to:
1•~...ill : :I
• : a
Back Issues,
One Phoenix Mill Lane, Peterborough, N.H. 03458
(603) 924-9281 , ext. 194 .
Only credit cards or Eurochecks accepted! Please allow three weeks for delivery by surface mail.
~
A Division ofTheMcGraw·Ht1l Companies
SCSI Vue'" Gold Gold External Ultra SCSI Cases Custom Teflon' Internal C
Diagnostic Cables
Benefits :
Benefits : • Less Errors, Ultimate Periormanc
• No Loss Of Important Data • Silver Wire Improves Signal QuaI
50MO
• Faster Performance Features :
From: • Test Cable Integrity • Perfect 90 Ohm Impedance • Custom in 1 Day
R~mot~~~~~7:: $59 • Triple Pronged Co~nector - Gold contacts Silver Wire
Four models available with optional Remote LED Features :
Pak. These are the finest terminators available, • Diagnostic Indicators • Large Ferrite Filte~
Fro m :
they fix SCSI prob lems and improve re li ab ili ty. • Triple Shielding (Unique Design)
Benefits : $39 • Double Gold 20u~ Plated Connecto~
• Improves SCSI Bus Performance • Extra Heavy 26 Gauge Wire • 100 Styles in Stock
• Less Errors; More Reliable Data Transfer
• Diagnoses Problems • Analyzes Signal Quality
Features : Teflon· 90 Ohm External Cables
• Active Regulation • Fast 50 & Fast Wide 68 The Vertical 3.S" Case Kit offers a 68 Pin Internal Cables, custom or stock, from 1 to
• Status lndicatoo • Gold Contacts small transportable package. Ideally 1 S SCSI devices per cable . We can also make Cus·
Benefits : suited for moving around, this durab le tom 68 pin and SO pin Combination Cables that
allow you to use narrow drives on a wide cable.
&:"!~....... Active 2- 1 SCSI • Ultra SCSI 40 M8/s operation case can take a beating. Unive rsal 3S
• Fixes Ultra SCS I Cable Problems Watt powe r supply. From:
witch I Repeater Feat ures : The Horizontal 3.5" or 5.25" Case Kit Active Digita l
Benefits : • Perfect 90 Ohm Impedance Match Otters a stackable solution
• Up to 14 Devices to 1 Computer • Triple Pronged Connector With Gold contacts for any desktop need. SCSI Repeater
• Share Devices BeM<en 2 Ccmputer> Shown with Optional Bay
From :
Features :
• 2· 1 Active Digital Switch/Repeater Gold .Bmm Ultra SCSI Cables Cooler installed. From:$139
Benefits :
$ 59 9 • Regenerates SCSI Signal for l ong Runs Benefits : • Models f°' all SCSI types
• Faster Performance • Fixes SCSI Cable Problems
Gold Diagnostic Adapters Features : • Doubles Cable l ength (up to 18')
• Active Termination and Signal Purification
Styles : Gender Changen
• Ultra Fast Performance for Added Capabilities
• Both SO pin and 68 pin
• Diagnostic Capabilities • 30u" Gold Contacts
(all combinations)
HOT SWAP flill Qlll l!il)'>
Compatible with all 50 pin & 68 pin
SCSI Buses up to Fast SCSI 2. From: $79 .0 OEM SCSI Repeater
RACK MOUNT 8-Bay ~ ~ QiWi\)< If you integrate SCSI Raids or
Arrays and are having problems
Shown with optional Bay Coolers and Dua l Redun·
mak ing it work, the Granite SCSI
dant Power Suppl
Repeater wi ll make it work. Designed to fit inside
any computer or external case. These repeaters will
double the cable length of any scsi bus allowing
you to achieve the needed distance to make your
system operate. Up to 3 repeater can be used.
SO MB/s!.
si mpl y clicking a switch . Th e Hot Ultra SC5J From:'
Swap Powered Terminator also
has an optional Power Su pply so
Ultra2 SCSlca~ $299
run up to BOMB/s!
that "1t can supply termination This blistering fast speed is accomplished using
~ power toportable setups or Th is is the fastest SCSI available! Twice as fast as Ultra 1 SCSI and without any of
(LVD) technology. 'Th.is new \ec:'nno1ogy a\so
when termination powe r is not its /imitations. If you want true horsepower this is the Ultra SCSI system to buy. allows you to use all the existing peripherals that
~ Vi~ of 1he d rcuil bo;ird being supplied. Completely backwards compatible with Ultra 1 SCSI, Fas t SCSI, and SCSI 1& 2 ! you currently own and share them with this
Ultra Fast Bus.
The key to this new SCSI Standard is the use of Low Voltage Differential Techn ology. Cable length has also been a limitation w ith
Ultra 2 L VD Wide Terminator Also known as (l VD) and Ul t ra 2 SCSI, we can now achie ve speeds th at far exceed Ultra SCSI, but with Ul tra 2 the cab le length is no
This is t he ultimate terminator on the market. It even the fastest computers data thruput capabilities. longer an issue. You can easily connect up to 15
offers both Ultra 2 (LVO) operation and standa rd devices on this bus and have room to spare. Also
Ultra Wide or Fast Wide operation, all in one w ith the use of ou r Ultra 1 to Ul tra 2
unit. Automatically senses wh ich type of bus you U ltra 2 (L VD) - SCSI Repea ter I Converter repeater/converter you can use all of your exist·
are using and configures itse lf to that bus. Add in g peripherals and your new LVD peripherals
Now you can take all your SCSI devices and run them any distance you want, (up to 75 feet) and get up to 4 times the original cable length.
our unique diagnostic capabilities and you have whi le sharing the Ultra 2 SCSl bus. This revolutionary Repea t er I Con
the ultimate terminator. Optional remote LED verter will give you, not only long cable distance, but also complete
$1 pak is i~I:~ :~:i;~~~~·~~~~~ue~~ina- com patibility with the new Ultra 2 standard . There is no need to have two SCSI Adapters taking up precious PC/ slots .
Online Catalog at... w ww.scsipro.com Th e SCSI Solution Company 3101 Whipple Rd . Union City, CA. 94587 Ph : 510-471 -6442 Fax 510-471 -6267
~,Qi.
OW-POWER
~ONTRO L LER-,
THAT'S ASLEEPING GIANT! I
Z·World introduces the LP3100 C-programmable controller
with an innovative sleep mode function that cuts current
consumption to microampslThis multitasking controller is
ideal for r,ortable, remote,mobile or handheld applications.
"Awaken 'the LP3100 upon command or via its real-time Order a development kit
clock for data logging applications. or receive a FREE catalog
• Compact and lightweight - only 1.4 ounces. by calling
1.888.362.3387 Because metal cases provide impressive strength
• Low power- 56 milliwatts, or 0.7 milliwatts (USA and Canada) and d~U'ab ili ty ! You get over 100,000 scans from
• Operates over arange of 3.5- 24 volts DC. http://www.zworld.com Windows'" software to build your applica tion!
-
1/0 configurable as 8inputs or 8outputs.
:r The LP3100 is programmable using Z·World's Dynamic c• Call for your free
~-
2900 Spafford Street
0 software development system.Dynamic c• includes an Davls,CA 9S616
iii
'<
editor, compiler,and debugger,simplifying and speeding
Tel: S30.7S7.3737
Fax: 530.753.5141 information packet today. CE
.
~
:i
your software development effort. Email:[email protected]
1105 N.E. Circle Blvd., Corvallis, OR 97330
c INNOVATION IN CONTROL TEC H NOLOGY
3 541-758-0521 • Fax 541·752-5285 • http://www.videx.com
C' CC~l-1
· -~- -
ACI SYSTEMS
Western Region: 1-800-983- 11 77 Fax: 1·650·428-0866
Eastern Region: 1·800·886-2243 Fax: 1·617-938·8037
(~£:11lt';'.
Free Evaluation CD
386SX
Penlium® Pro
visualization software.
For Intel Penlium®ll 233N333MHz CPU. -' -~\'. ~
~Raritan
Raritan Comp-, Inc. E-mai'I:
400 Cottontail Lane http:/ /www.nJrilan.com
1290 Lawrence Station Ro ad Product catalog Somerset, New Jersey 08873 Fax: 732·764-8887
Sunnyvale , Cali fornia 94089 -2220 Tel: 732-764-8886
1-888-RECORTEC
Ph: 408-734-1290 Fax: 408-734-2140
http://www.recortec.com
email: info @recortec.com Pon11um is a rog!s torod Trodomark ol ln1cl Corp.
RESELLER INQUIRIES INVITED FULL YEAR WARRANTY
HotBytes No. 134 Ho t Byt es No. 13 1
Don't get
boxed in!
lnte~ration
• R ac krn o unt PC En c l o s ures
R ack S y s t e m s
• R ac km o u n t A c cesso r i es
is the answer! • R ac km o unt Dr ive E nc l os ures
• R ed und a nt N + 1 Lo ad S h a rin g
P owe r S y s t e m s
Call us and • I nd u st ri a l PS 2/AT X P ow e r S up p l i es
Phone: 1 800 255 0 2 6 7 FAX : 1 702 356 6 3 6 1
find out E mail : lnfo @s lig e r.com Int e rne t : http://www.s lige r.co m
why! Posta l: 1 5 0 E. G re g Street # 1 OS S p a rk s , N e vada 8943 1
WHO SAYS??
"...LANWatch is just for DOS????
Introducing
LANWatch3ZM
Windows 95
For NT 4.0
and
GET A FREE
TechNet trial CD-ROM
G
HotBytes No. 133
Pi=iEci s i oN
Five Central Street, Tops fi eld, MA 0 1983
(978) 887-6570 (phone)
(978) 88 7-6552 (fox )
http://www. gucsswork.com
Emai l: in [email protected]
Microsoft·
Iii.'
:~ ~=.-; ""'' " .=.~_::: .~-·.•-~ : =:/::::! : :!:! = =~-·
~ ' hk•hrlOMH·~··•
~~,..
3.6x2.3', Am188ES, 1MB Memory
$159 Qty 1 • $54 OEM
e 50+ I/Os, 1112·bit ADC, 2ch. 12·bit DAG.
e 3 UARTs, 3 timers, PWM, Battery, RTC,
··.. .... \:.:~ ." ;" ,'-'I••••
. '•' ~.,~ ••.• , :; ,. • Networking
low Cost CIC++ Development Kits
tor 20+ low Cost 16·bit Controller
.
CD-Recorders
• Powered by SGI origin 2000 server
• Your own FTP site • Your own CGI direttory 9Net PRO plan $39.95/mo.
• 7500 Serious Sysco Router • POP 3 accounts
• Account "Control Panel" access via WWW • 100 MB of disc space • 25 POP3 mailboxes
from CONSAN-the best hlgh·end Integrator • ALL features of 9 Net One Plan Plus:
for all your mass storage needs. • Daily Tape Backup of your data
• Expert technical support • On·site UPS • Dedicated secure server (SSL) • Cybercash
CDR • DISK • TAPE • OPTICAi. • RAID • 24-hour on-site monitoring and VeriSign suppon • Full ODBC support • MS
• Same day set·up SOL, MS Access. mSOL • Shopping Gart
lm$k14f41!·i:fiifrom Yamaha • No minimum contract • Excite Search Engine
• 99% uptime & 90 day money-back
• 5000 MB of monthly data transfer, $.08 over
•Unlimited Domains with unique IP
NI Hostiog
I (800)785-6 I 70
www.nthosting.net
~,.:..,
RATES (January 1998)
classified section organized by artwork. Advertisers should furni sh the maximum recommended). 1xrale 3x rate 6K rate 12krate 24xrate
product category to help readers typewritten copy. 2"x11/16" ad DEADLINE: Ad copy is due
2"x11A',"
..
locate suppliers. Ad s may have inquiry can include headline (23 characters approximately 2 months prior to issue
·~ maximum) , descriptive text (300 date. For example: November issue $960 $945 $930 $910 $815
numbers to aid readers requesting
.· information from adverti sers.
characters is the maximum recom -
mended) plus company name,
closes on Septem ber 15.
To place an ad in THE BUY ER'S
211 x2'!.' 1
$1 ,920 $1,890 $1 ,860 $1 ,825 $1 ,630
r.. AD FORMAT: Each ad will be
designed and typeset by BYTE.
address, telephone and fax number.
2"x2 S/a" ad has more space for
MART, please contact your local
sales representative today. ••••••••COLOR - Add $125 • • • • • • • • •
• Rackmount Chassis •
DO-IT-YOURSELF
Buy Sell Trade
Worthington Data Solutions Data Recovery Software
http://www.recovery.de
t• ~;~~~~~~~;~,~~:~ :n:e~~;~~:~~s~~!~~~!
Ted Dasher & Associates
In France call 0800 90 65 47
Email: data_recove ry @compuserve.com
PO Box 13 1269 Birmingham, Al 35213-6269
In Germany call 0130 8150 84
The Virtual Data Recovery Company Phoneo (205) 263-4747 Fax: (205) 263-1108
Rest of Europe call 353 1 6614 566
(800) 638-4833 E-mail: [email protected]
•'
Website : www.barcodehq .c om
w ,
Bar Code Products AMERICAN INSTITUTE
0 R L D
• Bar Code Reader Packages M G H T E s T
• Laser Scanner Packages
-. FOR COMPUTER SCIENCES
M 0 u s E
• Portable Bar Code Readers p.
•
•
Bar Code Printing Software
Bar Code Labeling Software
• Earn B.S. and M.S. in Computer Science
• DISTANCE EDUCATION ._,
GeoMouse®
www.Aristo.de
• Lasers, CCDs, Wands & Printers • Object oriented B.S. program '.
• Complete Line of Accessories • New courses in Java, Networking, HTML, HotBYTEs No. 388
30-Day Money Back Guarantee
MIS and more
Lifetime Toll -Free Support
.•
• Approved by more than 275 companies
15 Years In Business
INTERNET PRESENCE
Most Items Shipped Same Day
• Follows ACM/IEEE guidelines
American Microsystems, Ltd. • Thousands of students throughout U.S. Virtual Web Hosting• 3-T3 Connections!
2190 Regal Parkway • Euless, Texas 76040
For a free catalog 1-800-767-AICS or www.YourName.com
800-648-4452 http://www.aics.edu
www.AMLTD.com
Phone 817-571-9015 •Fax 817-685-6232
2190 Regal Parkway • Euless, Texas 76040
Accredited Member: World Associolion of Universilies and Colleges $9.95/mo.
(800) 808-9241 I FREE " web" Page
HotBYTEs No. 382 http://PICK.NET RESELLERS Welcome
.· l
.._ ~ . I
HotBYTEs No. 392
..
1 50 BYTE MAY 1998
.. Enter HotBYTEs number at www.byte.com/hotbytes/
... ,-,
..... -'L......
THE BUYER'S MART A DIRECTORY OF PRODUCTS AND SERVICES
SECURITY SECURITY
A Message to Our
THE ULTIMATE SOFTWARE SECURITY
e STOPCOPY family - UNCOPIABLE copy protection
• STOPVIEW software encryption
Subscribers
•1
• NETLIMIT network license metering
• DOS, Windows (3.X, 95, NT), Mac, OS/2, support
• Machine Tie, Internet Protection, CD-ROM Protection ,
Serialization. Date & Execution Limitation, Registration,
VT Protect
... ~.
- .. t
CRYPK(Y SOFTWAR( Ll((NSING SYSHM
"Software Protection with NO hardware lock and NO disk kei"
CrypKey is sollware copy prolecllon that is:
VT Protec t Administrator converts trialware to a full
single user product, cutting sales lime and reducing
licensing headaches.
direct mail purposes only; telemarketing
calls are strictly prohibited.
Many BYTE subscribers appreciate
I ii • completely secure from any disk copy program this carefully managed program, and
Download VT Protect Today!
·; '= • perlect for CD·RDM or INTERNET dislribution!
• cost effective, user friendly, and 100% guarantee d look forward to receiving information of
J!lll". WWW.VTPROTECT.COM
to satisfy! interest to them via the mail. While we
l
-1,~
CrypKey can increase your sol1ware sal es:
• upsell options and levels of your software
• leas e or demo your software by run s or time
• enable or upgradeyour custom ers instantly
(888) 842-8323 / (508) 647-0464
believe this information is of benefit to
our subscribers, we firmly respect the
wishes of any subscriber who does not
I~ I
by phone , lax or E-malll
New! unique Ready-To-Try feature upon install allows 1 lrial
HotBYTEs No. 394
want to receive promotional literature.
period only per cuslomer. NewI unique Add -On feature
add more options, levels, run s or time to existing licenses. SIMULATION SOFTWARE Should you wish to restrict the use of
New I CrypKey Instant-protects in just 5 mlnules with no your name, please send your request
source cod e changes .
CrypKey is completely compatible with MS-DDS, Analog/Digital Simulation!! (including your magazine mailing label,
MS-Windows 3.x, Win32s, Win95, Win95B/FAT·32, Win NT. name, address, and subscription
and manages network lice nses on all Novell and Microsoft • Windows. NT, DOS • Model Libraries , RF, Power
operating system based networks. • Power Moc , Macintosh • More Than 5000 parts account number) to:
CrypKey Instant is Ready-To·Try.
• ISSPICE4 Real Time SPICE • Waveform Analysis
FREE for 30 days on our we b site:
• Mixed Mode Slmulatlon • Full SP ICE programs
http://www.kenonic.com/crypkey.hlm
AIT
~.t;;;ED
Sa rn.tlartl feature,,; :
Vo
i'< TECHNOLOGIES, INC,
W EB HOSTING
CO-LOCATION
ECOMMERCE
• Domain Name Regisiratlon • 24 hour 7 day Tech Supporl • Web statis tics and log files
www.yourcompany.com • Your own cgi-b ln • Free SSL Secure server access
• PGP,.• Secure Ematt available • Free cg! and J ava libraries
• Dedicated IP add ress
• 5 x OC 12 Fiber Optic Cmmectivity • Dalabase capa hlc (U NIX compalib lc ) • Free AIT Mall listing Pre-sales questions
• T3 x 3 redundant Bac kbones • Unllmlted POP email accou nts • Easy to use conirol panel
• Cisco 7000 series ro uters • Unlimited em ail forwarding • Telnet access available 1-910-485-2383
• On-site UPS and clean power • Email a utoresponders (server #2,#3,#4 only) [email protected]
• FUJI generator back-up • Password protected directories • CyberCash.,.., capable
• 30 day money back guarantee • Live a udio capablltties
I
fa,lt'r G1et1ter Be~ I
http ://www.aitcom.net
$1495
$1995
$5995
* Server #1 (Standard) Server #2 (Reseller)
$149 95 Server #3 (Reseller Plus)
• FrontPage . 98 Extensions • 25 MB disk space • FTP partitioning for your customers • 400 MB disk space
• 25 MB disk space • 2000 MB data transfer/mo • I00 MB disk space •256MBRAM
• 2000 MB data transfer/mo •Price: $39.00 setup. $19.95/month • Multiple domain name partitioning • FTP partitioning for your customers
•Price: $39.00 setup. $14.95/month • Set-up a nd first month: $58.95 Give customers www.theirdomain.com • Multiple domain name partitioning
• Set-up and first month : $53.95 25 add' ! domains per server #2 account • Give customers www.their-domain.com
$20.00 setup/$2.00month • 75 domains per server #3 account
• 4 GB Data Transfer • $20.00 setup/$2.00month
A E p
138 9·NET AVENUE INC 148 B88·9NETAVE 437 E-TECH(IS) 19 +BB6·35·77775r · 438 PANDA SOFTWARE 401S 19 +34-1-332·0054 "
125 ACI SYSTEMS 146 800·983· 1177 433 EUTRON (I S) CV +39 35 697001 INTERNATIO NAL (IS)
121 ACME PORTABLE 112L 626·8I4·0516 120 EVEREX (R AS) 112K BOO·EVEREX· l PC EXPO 91 BDO·B29·3976
MACHI NES INC (RAS) exl29BO
ADAPTEC 37 800·804·8886 F 446 Pl MANUFACTURING (IS) 40IS 18 909·59B·3718
exl9486 91 FAIRCOM CORPORATION 134 573-445·6833 123 Pl MANUFACTURING (RAS) 112J 909·59B·371B
444 ADDER TECHNOLOGY (IS) 401S 11 +44·1954·780044 FOREFRONT DIRECT INC 139 800-475·5B3 1 93 PKWARE INC 132 414·354·B699
113 ADVANCED INTERNET 151 800·878-4DB4 133 PREC ISION GUESSWORK INC 148 50B·BB/.6570
TECHNO LOGIES G
449 ALADDINKNOWLEDGE 4DIS 23 +49·B9·894221·0 GATEWAY 2000 8-9 8BB·21/.494 1 Q
SYSTEMS GERMANY (IS) 110 GRAN ITEOIGITAL 145 510·471·6442 94 QNX SOFTWARE SYSTEMS LTD 22-23 BD0-676·0566
85 ALADD INKNOWLEDGE 16 212·564·5678 434 GREY MAnER LTD (IS) 401$ 14 +44·(0)1364·654200.. extl064
SYSTEMS LTD (IS) 101 GRIFFINTECHNOLOG IES (NA) 96 BOD·9B6·657B R
85 ALADDIN KNOWLEDGE 16 800·223-4277 436 RAIMA CORP (IS) 40IS 5 206·557·0200
SYSTEMS LTD (NA) H 140 RAINBOW TECHNOLOGIES 800·705·5552
447 ALADDIN KNOWLEDGE 4DIS 24 +972·3·636·2222 111 HIWAY TECHNOLOGIES 142 B00·339·HWAY
SYSTEMS LTD (IS) 131 RARITAN COMPUTER INC 147 732. 764·BBB6
HOTBOT 124
AMERICAN POWER CONVERS ION 32A-B BB8·2B9· APCC 134 RECORTEC INC 147 BBB·RECORTEC
HOTBYTES 135
extB199 95 ROSE ELECTRONICS 73 BDD·333·9343
92 HUMMIN GBIRD COMMUNICATIONS 31 416·496·2200
86 AMERICAN POWER CONVERSION 33 888·289·APCC
ex t8199
s
448 SEH COMPUTERTECHNIK 40IS 22 +49·521 ·94226·0
ATTACHMATE CORP 54 800·426·6283 18M(NA) 19 GMBH (IS)
B IBM EUROPE (EU IO 401S 9 +41(22)B40 47 47 443 SERCOMM (IS) 39 +8B6·2·26961100
87 BORLAND INTERNATIONAL 59 B00·336·6464 112 ICANECT 149 BOD-422·9213 442 SIEMENS NIXDORF AG 28-29 +49·B21 ·B0436BO
126 ICP ACQUIRE 146 650·967· 7168 PC GM5(1S)
BYTE BACK ISSUES 144 603·924·9281
104 INFORMATION BU ILDERS (N A) 27 B00·969·1NFO SILICON GRAPHICS 117
BYTE BACK ISSUES (IS) 54 603·924-9281
137 INTERLAND 149 .404 ·5B 6·9999 135 SLIGER DESIGNS 147 BDD·255·0267
BYTE MOVING? (RAS) 112H
119 INTRASERVER TECHNOLOGY (RAS) 1128 8BB·429·0425 106 STARBASE (IS) 105 714-442-4440
BYTE ON CO ROM 93 800·924·6621
106 STARBASE (NA) 105 BBB·STAR700
BYTE ON CO ROM (IS) 143 +353·091-752792 K 445 STARTEK ENGINEERlllG me (IS) 401S 10 +BB6·3·57B·53BB
BYTE REPRINTS 101 612·582·3856 116 KINGSTON (RAS) 1120 BD0·25 l·9059 96 STATS OFT 71 91B·749·1119
BYTE RESELLER 112A 441 KYE SYSTEM CORP (IS) 27 +BB6·2·2995·6645 SUPERCDMM 9B 110 BDD·2-SUPERC
TESTMONIAL (R AS)
BYTE SUB MESSAGE 151 L T
BYTE SUB PROBLEMS 142 118 LEOPTICS INC (RAS) 112Q +BB6·2·221 ·B906B 127 TERN INC 148 530·75B·D180
BYTE WEB SITE (IS) 4DIS 9hllp://www.byte.com/ 450 LIGHTNING INSTRUMENTATION (IS) 65 +41 ·21·654·2000 108 IRl·MAP INTERNATIONAL INC 138 510·447·2030
BYTE WINAWEBS ITE (US) 93 LOTUS DEVELOPMENT (N A.) 65 BOD·B72·33B7 97 IRl ·S fAR COMPUTER 21 BOO·B44·2958
ext 0770
c LY COS 87
TV INTERACTIVE/COM
v
85 BD031 I BODI
RESELLER ADVERTISING
Jim Hussey 650-5 13-686 1
ji111_hussey@ mcgraw-hill.com
MAY 1 9 98 BYTE 1 53
EDITORIAL INDEX
Workstations
Brawnier 3-D
Workstations
INTERGRAPH HAS BEEFED UP ITS LINE OF expansion slots. Both systems have
graphics workstations with the 5tu an integrated 512-KB L2 cache, the
dioZ T- RAX 3-0 system, powered Intel 40l.X chip set, up to 256 MB
by dua l 300-MHz Pentium II pro of 50RAM, and ATI 3-0 Rage Pro
cessors.The 5tudioZ maintains the 64-bit PCI graphics with up to 6 MB
same seria l digital (01/501) video of5GRAM.
capabilities as previous-generation Contact: Toshiba America
systems, but it adds the capabilities Information Systems, Irvine,
of lntergraph 's RealiZm 3-0 graph CA, 800-334-3445 or 714
ics subsystem, designed for 3-0 ani 583-3000;
mation creation. The machine costs http://computers.toshiba.com.
$28,895 and comes with 128 MB Enter HotBYTEs No. 1036.
of EDO memory and 40 GB of on
board storage.
Notebooks
Ditto Max Professional Iomega Contact: Intergraph Computer
External Roy, UT Systems, Huntsville, AL,
$z99 (street price) 800-697-8833 800 -763-0242; A Workst ation
(supports DOS and Windows, 801 -778- 1000 http://www.intergraph.com. in a Notebook
optional for NT) [email protected] Enter HotBYTEs No. 103 5.
ROI'S PRECISIONBOOK IS THE EQUIVALENT
Enter HotBYTEs No. 1069. http ://www.iomega.com
of a Hewlett-Packard Visualize B
Systems
class desktop workstation in a 7.5
Big Backup on a Budget pound, 2.3-inch-thick notebook
Pentium II and More with a 14. 1-inch active-m atr ix
t may seem like a chore, but backing up your PC is a smart thing
I to do. So, when Iomega claimed that its latest tape drive, the Ditto
Max Professional, offers cost-effective, easy, high-performance
WORRIED THAT LOW-COST SYSTEMS ARE
color screen. The Precision Book
resolution paper are ava ilable. termina l ada pters can't match . 800-826-3237 or
Contact: Lexmark Adtran has t he Express L128T inte 805-579-1000;
International, Lexington, J( Y, grated ISDN and ID SL modem http://www.tandberg.com.
800-539-6275 or ($795). Express L768 SDSL modem Enter HotBYTEs No. 1045.
606-232-2000; ($995 ). and Express L1.5 HDSL
http://www.lexmark.com. modem ($1495). Th ese stand-alone
Cameras
A Skinnier Notebook Enter HotBYTEs No. 1039. remote-access products feature IP
an d IPX routing and bridging, and
HEWLffi-PACKARD'SOMNI BOOK SOJOURN
Servers support an unlimited number of A Digital Camera
($6599) is likely the thinnest, light users over 1OBase-T Ethernet ports. in a Camcorder
est full-size notebook on the mar Contact: Adtran, Huntsville,
ket.At3.2 pounds and 0.7 inch thick, Flexible Pentium II AL, 800-923-8726 or PANASONIC HAS INCORPORATED ITS VHS
this notebook isskinny but not mal Servers 205-963-8000; Palmcorder camcorder and a digi
nourished. It packs a233-MHz Pen [email protected]; tal sti ll camera in one unit, the PV
tium processor with MMX, a 128 DUALPENTIUM 11 PROCESSORSPOWER THE http://www.adtran.com. L858 ($1000). This combination sys
bitgraphicscontroller with 2 MB of newest ge neration of enterprise Enter HotBYTEs No. 1047. tem can capture either regular
video RAM, 64 MB of RAM, and a serversfrom Tangent Computer. The video or 640- by 480-pixel stil l
12.1-inch TFT 800- by 600-pixe l Enterpri se X- D is highly config images. A flip-out 3.2-inch color
Storage
resolution screen. The system is a monitor serves as a viewer for both
result of aco llaborative effort with still-camera and camcorder func
Mitsubishi. 4.7 GB of Removable tions. The camcorder can input still
Contact: Hewlett-Packard Storage imagesfrom memory onto tape and
Mobile Computing Division, can take still frames from tape and
Palo Alto, CA, SyQuEST's Ou EST DRIVE HASMORE THAN download them to a PC. The cam
800-527-3753 or t riple th e capacity of previous gen
650-857-1501; era tions of removable hard drives,
http://www.hp.com. offering 4.7 GB of storage. SyQuest
Enter HotBYTEs No. 1038. estim ates that th e Quest drive can
hold over 9 hours of digital audio,
1 hour of 16-track audio, or a f ull
Printers
length DVD-q uality movie. It con
urabl e, with up to two Pentium lls nects via Ultra Wid eSCSI and uses era hasoptical 23x zoom lenses and
Laser Technology running at 266 or 300 MHz, up to IBM'snew magnetoresistive heads. 1 MB ofon-board memory for cap
in an Ink-Jet 512 MB of EDO RAM or SD RAM, Pricing sta rts at $599 with one car turing 30 still photos.
redundant power an d coo ling op tridge, whi le individual cartridges Contact: Panasonic Consumer
LEXMARK'S 5700 COLOR INK-JET PRINTER tions, hot-swap disks and power cost $199. Electronics, Secaucus, NJ,
generates high-quality output at supplies, and nine expansion slots Contact: SyQuest Techno logy, 800 -662-3537 or
an affordable price ($249).The Lex (six PCI, two ISA, and one sha red). It Fremont, CA, 510-226-4000; 201-348-7068;
mark 5700's laser-crafted print isset for 120-ready system software http://wt.vw.syquest.com. http: //www. pan asonic.com.
heads deliver laser-like, sharp text and comes with built-in RAID sup Enter HotBYTEs No. 1041. Enter HotBYTEs No. 1040.
and imag e cop ies. The printer's port using on-board Ultra SCSI and
Accu-Feed paper-feed system helps an i960 processor. A machine with Backup Tape Drives Hard Drives
avoid paper jams and can handle a two 300-M Hz Pentium II CPUs, 12
GBofstorage, 128MBofRAM,and TANDBERG'SMLR3 TAPEDRIVE ($2749)
Windows NT loaded wil l cost $6995.
has 50 GB of co mpresse d data A Hard Drive
Contact: Tm1gent Compute1; capacity (25 GB native) and trans with Head Room
Burlingame, CA, 888-826 fe r rates of up to 240 MB per min
4368 or 650-342 -9388; ute. MLR techno logy is simi lar to THELATEST MAXTOR DRIVE USING IBM's
http://www.tangent.com. DLT and 8-mm tec hnologies in the magnetoresistive-head technology,
Enter HotBYTEs No. 1042. midrange segment of the server the 11.5-GB Diamond Max 2880
backup market. MLR3 isthe second shou ld provide eno ugh desktop
generation ofTandberg's multi storage space for all your hard
Remote Access
channel linea r recording technol drive-hogging files and app lica
ogy, wh ich isco mpatible with exist tions. The 3'h-inch EIDE hard drive
wide range of paper stock.The 5700 New Modems ing quarter-inch-tape techno logy, offers a 9-ms average seek time,
can create 1200- by 1200-dpi-res for New Standards but uses mag netic rails to guide the 5400-rpm spindle speed, a256-KB
olution images at speeds that Lex hea ds into pl ace to simplify the cache buffer, and on-the-fly error
mark rates up to 8 ppm for black THE HDSL, IDSL, ANDSDSL STANDARDS mechanisms of data recovery. correction. It's priced at $479.
text and 4 ppm for co lor. An op are making possible remote-access Contact: Tandbe rg Data, Contact: Maxtor, Longmont,
tional photo ink cartridge and high- speeds that today's modems and Simi Valley, CA, CO, 800-262 -9867
or303-651-6000; CD-ROM, CD-R, and DVD-when SOFTWARE commerce efforts. This enterprise
http: //www.maxtor.com. the latter is available. The MC software resides between your
Enter HotBYTEs No. 1043. Printer Model 200 is a CD-ROM m!~!!Y,~i.s ~ · company's intranet firewall and
library with disc duplication and Internet customers and business
Hard Drives label printing built in, capable of Java Reporting partners to control access to data,
for Any System burning 18 CDs an hour. Priced at and Analysis secure data shari ng, ma nage
$16,395, it can hold up to 130 GB accounts, and process data. It pro
IBM ISUSING ITSGIANT MAGNETORESIS of data, has a SCSl-2 connection, UNLIKE HTM l-BASED REPORTING TOOLS vides extensible data-processing
tive hard drive technology to boost and has an average disc load time that you access though a Web
hard disk capacities in all form fac of 4 seconds and disc exchange browser, PowerSqribe is an applet
tors. Following its announcement ti me of 8 seconds. written entirely in Java for deploy
last year of an 8.1-GB hard drive in Contact: JVC Professional ing OLAP tools on an individual
a 17-mm form factor for high-end Computer Products Division, user's desktop. The company claims
notebooks, IBM now introduces the Cypress, CA, 714-816-6500; that this desktop-based technol
Travelstar 6GT ($695), a6.4-GB hard http://www.jvc.net. ogy is faster than browser-based
drive in a 12.5-m m form factor Enter HotBYTEs No. 1046. analysis tools, which claim to be
(about the size of adeck of playing faste r than client/server applica AP/s, has user acco unt man age
cards) for slim notebooks. It has the tions. The company designed th e ment, controls accounts according
Graphics
highest areal density of any IBM tool for nontechnical users with no to business policies, and tracks
disk drive with 4.1 Gb per square knowledge of SOL to process com billing and order information. Th e
inch and has software power man More RAM plex database queries. It costs $99 package starts at $40,000, works
agement to minimize power usage. for Your Buck per user. with SSL-enabled browsers, and
Contact: IBM Storage Systems Contact: Sqribe Technologies, runs on Sun Solaris or HP-UX. The
Division, Sanjose, CA, DIAMOND MULTIMEDIA'SMONSTER 3D II Men lo Park, CA, 650-326 company plans to release a Win
800-426-7777; graphics card ups the ante for 5000; http://www.sqribe.com. dows NT version sometime this year,
http://www.ibm.com/storage. graphics accelerators by including Enter HotBYTEs No. 1048. and future releases will support
12 MB of memory (previous gen LDAP.
RAID erat ions had 8 MB) on a board Java Spreadsheet Contact: Differential,
priced at $299.95. It offers 4 MB of Component Cupertino, CA,
fast EDO DRAM for the Voodoo 2 408-864-0600;
RAID Solutions pixel engine and 4 MB for each of INTEGER, AREAL-TIMESPREADSHEET COM [email protected];
two texture engin es, generating ponent for Java, lets you integrate http://www.differential.com.
AD APTEC 'S flLEARRAY ACCELERATOR 1024- by 768-pixe l resolution. spreadsheet functionality into dis Enter HotBYTEs No. 1057.
($2995) product doesn't rely on the Contact: Diamond Multimedia tributed client/server applications.
host CPU to handle 1/0 requests, but Systems, Sanjose, CA, Integer ($3000 per server, $500 per
processes data itself. This PCl-to 408-325-7000; developer seat) provides real-tim e
SCSI accelerator card has 4 MB of http://www.diamondmm.com. data feeds, JDBC support, and com
ECC-protected, nonvolatile DRAM Enter HotBYTEs No. 1124. patibility with legacy spreadsheets Java for the Enterprise
and support for a 16-MB parity and macros. Multiple users can col
protected data cache. laborate on a single server-based SYNON HAS UPGRADED 0BSYDIAN 3.0, ITS
Upgrades
Contact: Adaptec, Milpitas, spreadsheet in real time.The spread client/server application develop
CA, 408-945 -8600; sheet server is made up of the en ment environment, with TCP/IP
http://www.adaptec.com. New Life for Your Mac gine, which you can implement as
Enter HotBYTEs No. 1044. aJava Bean or Enterprise Java Bean,
NEWER TECHNOLOGIES' G3 UPGRADE CARDS and a Java Bean-based user inter
take advantage of the capabilities face. Integer was designed for dis
CD-ROM
of the G3 processor to add power to tributed component systems.
your old Mac, Umax, or PowerPC Contact: Athena Design, San
CD-ROM Today, system. The high-end MAXpowr 300 Francisco, CA, 415-512-3870;
DVD-ROM Tomo rrow {$1999) 300-MHz upgrade with a http://www.athena.com. support for AS/400 systems and
1-MB cache manages to run the L2 Enter HotBYTEs No. 1049. automatic importofdatabasestruc
JVC's NEW CD-ROM LIBR ARY SYSTEM cache bus at the same speed as the tu res from ODBC databases. The
~---- company also introduced a new
offers up to 200-disc capacity for CPU. The NUpowr 1400 ($999) will
upgrade a PowerBook 1400 to 250 Javacode generator for th is rel ease,
MHz with a 1-MB L2 cache. called Obsydian for Java. Program
Contact: Newer Technologies, Coordinate Your mers using Obsydian for Java can
Wichita, KS, 316-943-0222; E-Commerce Efforts automatically generate Java appli
[email protected]; cations for multi platform server
http://www.newertech.com. THE EXTRAN ET CREATOR ISAKIND OF ALL environments and deploy Java
Enter HotBYTEs No. 1125. purpose middleman for your e- applications from any platform that
is running aJVM. Obsydian 3.0costs Java Troubleshooting GUI displays the calling relationships Put Your Intranet
$23,000 with two code generators. between all your Java methods, let on a Hand-Held PC
Obsydian for Java is priced at $7800 JPROBE PROFILER ($499) IDENTIFIES AND ting you drill down and navigate
as a stand-alone product. aids in the elimination of inefficient through an individual method's WITH AVANTGo's WEB CU ENT AND DESK
Contact: Synan, Larkspur, CA, algorithms, 1/0 blockage, excessive source code to better understand top programs, you can put your
415-461-5000; method calling, excessive object and and untangle the code. intranet in your pocket. The pro
[email protected]; thread creation, inefficient mem Contact: KL Group, Toronto, grams co nsol idate, compress, trans
http://www.synon. com. ory usage, and other performance Ontario, Canada, 800-663- f er, and render Web content onto
Enter Hot~YTEs No. 1059. bottlenecks in your Java code. Its 4723 or416-594-1026; PalmPilot and Windows CE hand
Organize Your lnbox and the bundle costs $99 per seat.
Enter HotBYTEs No. 1061. site. You manage the survey cre
[email protected]
ation-and-analysis process your
http://www.livepix.com
self using aWeb.browser. Prices vary
by sample size, but they start at
Business Gets the Picture $1500 for 100 respondents.
Ramp Onto Contact: Virtua/Architechs,
hoto-image editing has largely been the province of either
P home consumers or professional designers. But as the new
LivePix Deluxe 2.0 shows, entry-level image-editing software can
the Internet Sausalito, CA, 800-809-9764
or 415-332-0992;
RAMP NETWORKS' IP TUNNELING KIT info @vtechs.com;
also satisfy the needs of business users.
Perhaps the essence of LivePix 2.0 is its collection of approxi
($249) makes VPN technology http://www.surveybuilder.com.
mately 150 photo-based project templates. Many templates are available at a price that sma 11 busi Enter HotBYTEs No. 1054.
for home and family use, but templates for stationery, Web pages, nesses can afford. For use with
and business uses are included. LivePix templates are photo-based, Ramp's WebRampM3 integrated Get on the Web
so substituting your own photos into a template is easy, probably router/hub devices, the IP kit sup for Less
the easiest of any similar applications I've used. Infinite redo and ports Microsoft's Point-to-Point
undo make experimenting fairly painless. Tunneling Protocol, currently avail Qu1 cKSITE 3.0 DROPS THE PRICE BARRIER
A full range of photo-retouching tools are standard, along with able for Windows-based PCs. The to getting on the Web.For $49, you
a useful clone tool that lets you duplicate any object in a photo.
software and hardware combina get a WYSIWYG layout editor, tem
There are nifty plug-in effects from XaosTools and connections to
tion lets you establish asecure VPN plates, an HTML editor, and style
on-line photo services (e.g., Kodak Picture Network and Pietra
Net) . LivePix is also notable for its overall power and performance. using analog phone lines and with wizards, as well as CSS, Java, and
Based on FlashPix technology, the program does an especially out having to invest in ISDN or ActiveX support. It automatically
good job at making rapid edits to high-resolution images. frame relay. builds product catalogs and order
Perhaps the best news for the business user is the expected Contact: Ramp Networks, forms for running an on-line busi
release of additional photo-based business templates for LivePix Santa Clara, CA, ness, and has a built-in database
this year. At $49, LivePix is worth investigating. It provides an easy 408-988-5353; engine to simplify updating your
way to add photos to documents and other projects. -Jon Pepper http: //www.rampnet.com. site.
Enter HotBYTEs No. 1052. Contact: Site Technologies,
he remote-control TV time you see it, press the De a very satisfying product. from advertisers to modify
p t p t
A device called the Chance Gardener (tm)-from Chance Devices, in Oakland, Californ ia-can
identify any species of plant life. The
T~i~~~~~~~~emw~~~~~:~:; e r0Jec I
Chance Gardener uses a small PCR hanks to yet another new
(polymerase chain reaction) probe to
sample, amplify, and pre-analyze the
DNA from even a small piece of veg be any confusion about pets.
The Chance Housepet Analyzer
etable matter. A Pentium II (tm)
(tm) is a close cousin to the Chance Gardener (tm). The
chip-driven hand-held computer fin·
Housepet Analyzer can identify any dog, cat, hamster, Viet·
ishes the analysis and identifies the
namese potbellied pig, garter snake, guppy, emu, or other
species by name in English, Latin,
/, animal that you have as a pet. It can even identify
and 174 other languages. At d.~, ;00~ mutts, thanks to a clever use of fuzzy logic.
$299, the device is ~ f~ The only drawback, aside from its extravagant
pricey, but look for >IS'P" price tag of $299, is that the Housepet Analyz·
the cost to drop dra ' er's sampling probe destroys approximately 5
matically over ~ J percent of the samples pre·
the next year '1 sented to it. If the product's price Marc Abrahams is the editor
along with that drops low enough, howev· of the Annals of Improbable
Research. You can contact
of other consumer- · ..... i:\ \. er, t~is might prove to be
oriented botanical · tfjlliiiiiiil1i~· ··.- , him by sending e-mail
aglltchthat'sworthover· [email protected].
equipment. ~ ' looking.
160 BYTE MAY 1998 www.byte.com
* 13.3" XGA Active Matrix TFT Display
* 32MB SDRAM Memory
• 512KB L2 Pipeline Burst Cache
* 4GB Ultra ATA Hard Drive
• Modular Bay accepts 24X Max" Variable
CD-ROM. 35" Floppy Drive(both included)
or Optional 2nd Li-Ion Battery
• 128-bit Graphics Accelerator with
65K Colors at 1024x768
• Zoom Video and USB Ports
* Stereo Speakers with 3D Surround
Sound and Yamaha SW Wavetable
• Smart Lithium Ion Battery
• Cardbus Ready/Fast IR1.1
* MS'' Office 97 Small Business Edition
• MS Windows• 95/MS Internet Explorer
* FREE MS Windows 98 Upgrade Packet
* 6.9 Pounds'/Touchpad
• Extendable 1-Year Limited Warranty'
* Upgrade to 64MB SDRAM. add $799.
* 56K Capable" xZ Modem, add $749.
* 2nd Smart Lithium Ion Battery. add $169.
Shift into fifth gear wi th th e latest mobile Pentium' II processor. It moves at top speed to better
handle all yo ur company's productivi ty needs. And beca use it's from De ll it's maxed-out on TO ORDER TOLL-FREE
great new technol ogy, not on price. Not on ly wi ll you get the faste st mobi le Pentium' II
800-553-6023
processor available, 266MHz. you will also get SDRAM. th e fastest mainstream memory
I TO ORDER ONLINE 24 HRS./DAY j
technology. To top that off. the Ultra ATA hard drive transfers data at twice th e speed in
burst mode of a normal ATA hard drive. And. if that doesn't blow you away,
www.dell.com/buydel I
Mon-Fri 7am-9pm CT •Sat 10am-6pm CT
then maybe the 13.3" XGA active matrix display and 3Dsurround sound wi ll. Sun 12pm-5pm CT •In Canada~ call 800-233-1589
$3149
Business Lease ' : $11 6/Mo.. 36 Mos.
$2799
Business Lease•: $106/ Mo.. 36 Mos.
$2199
Business Lease•: $83/ Mo.. 36 Mos.
$1699
Bus iness Lease•: $64/Mo.. 36 Mos.
Order Code #590401 Order Code #590402 Ord er Code #590403 Order Code #590404
Common features: • Min i-Tower Model + 51 2KB Integrated L2 Cache • 56K Capable** U.S.R. x2 WinModem • 35" Floppy Di sk Drive • Two USB Ports • MS Home
Essentials98 with Money 98 • McAfeeVirusScan • MS Windows 95 • FREE MS Windows 98 Upgrade Packet' • MS Internet Explorer • MS lntelliMouse
• 3-Year Limited Warranty' • 1-Year On-site-' Service Upgrades: • 3-Year On -site·' Service. add $99 • HP ScanJet 5100Cse Scanner. add $299
DELL DIMENSION XPS D333 DELL DIMENSION XPS D333 DELL DIMENSION XPS D300 DELL DIMENSION XPS D233
333MHz PENTIUM II PROCESSOR 333MHz PENTIUM II PROCESSOR 300MHz PENTIUM II PROCESSOR 233MHz PENTIUM 11 PROCESSOR
FEATURING MMXTECHNOLOGY FEATURIN GMMX TECHNOLOGY FEATURIN GMMX TECHNOLOGY FEATURING MMXTECHNOLOGY
Common features listed above plus: Common features listed above plu s: Common featu res listed above plus: Common features listed above plu s:
• 128MB SDRAM Memory • 128MB SDRAM Memory • 64MB SDRAM Memory • 32MB SDRAM Memory
• NEW16.8GB Ultra ATA Hard Drive • 8.4GB Ul tra ATA Hard Dri ve (9 5ms) • 6.4GB Ultra ATA Hard Drive (9.5ms) • 4.3GB Ul tra ATA Hard Drive (9 5ms)
(9.5ms) • 1200HS 19" (17 9" vis. 26dp) Monitor • lOOOTX 17" (159" v.i.s .. 26dp) • 1OOOLS 17" (15.9" v i s) Moni tor
• 1200HS 19" (17 9" v.i.s ..26dp) Monitor • NEW Diamond Permedia 2 8MB 3D Trinitron Monitor • STB nVidia 4MB 3DAGP Video Card
• STBnVidia 4MB 3D AGP Video Ca rd AGP Video Card • NEW Diamond Permedia 2 8MB 3D • 32X Max' Variable CD-ROM Drive
• 2X DVD-ROM Dri ve and Decoder Card • 32X Max' Variable CD-ROM Drive AGP Video Card • Integrated Yamaha Wavetabl e Sound
• NEW Turtle Beach Montego A3D • NEW Turtle Beach Montego A3D • 32X Max' Va ri able CD -ROM Drive
• Altec Lansing ACS -90 Speakers
$3479
Personal Lease ' · $168/Mo.. 24 Mos.0
$2899
Personal Lease' · $140/ Mo.. 24 Mos .
$2399
Personal Lease ' $117/Mo. 24 Mos.
$1799
Personal Lease ' : $88/Mo.. 24 Mos.
Order Code #500404 Order Code #500403 Order Code #500402 Order Code #500401
Reference the appropriate order code tc
Pricing 1snot discoumable 'Foracomplete cop'( of Guara.nteesor L1rrn ted Warramies ..please wrne Dell USA LP . A!ln Warrant res. OneDell Way, Round Rock. rx
78682 Business leasingarranged by Dell Financial ~e rv1ces L.P:. anindependent en111y. to qualified customers Above leas epaymentsbased on 36·momh lease 'Personal leasing arranged by Dell Financial Se
anddo not include taxes. fees. shipping char~es. subiect to credit approval andava ilab1l1ty. Above le as~ term ssub1ect tochanJlewill1out notice. ·Systemweigt11 an independent entity, to qualified customers;
~~ho~~0~f:a~'. iy,e2~~ca~~~1~~M0,~11 r£ixbMaxf12·~i~i~~~31~
1
~~~11~dlMi~1u?~!21 ~r~ J~~~c;rg~~1r:h~e\~ft~6aK ~~~(~b~JrWa~d~~io~~ ~~tC~~~es~h~~'. ;~~~rl~1 ~e;~~~ monthly lease payments above are based upor
ou1pu1. however. current download speeds are limi ted to 53Kbps. Upload speeds are limi1ed to ~3 6Kbps. Actual speedsmay vary depend ing 011 lrne o::ond1tion s
' Each Dell Di mension XPS 0 Simes system or Oell lnspiron n o ~e book. \'11.th Windows 95 fac1ory installed. shipped a_
her 4/1 /98 and prior to 9/1 /9B. will he lease . All above monthly lease payments exc l
1
;~~~~~ t0~n~t~eo~ ~~(~~~~b]~c~~~r~~~~g~i 8
~~~~·~~i9sp~~hde;1v~~
1
~~~:nJ1~~~c~ 1\~~e;~n~i~~odn; 0 0~~ ~~ 5FE8n1~~~t~~1 ~~s~~~~~d~si~~hu~~ 'Sd eafeaf~;~ i~~~.P~~K~~~
1 1 1 which may vary !for example, Hartford City, IN
0 S8.40/month) ; shipping cost due with first pa
5 1 1
~~d ~~sa;~~1 Fn~~\~;rt~~~~,r;~,dMns~~i~~~s ~fi.Y1~~e~Ir~~~;~. ~~~~~~:s\~~l~~lnndod~~; Jf~r~;~g1~~~~~J t~~d~~a~:~6~Mi~~~~~r1t~;i~r ~t1~~~~~~aanndd~~:r~fnt
1 1 11 0
are regi stered trademar ksand Fast Etherlink .is ayademark o! 3Com Co rpora1 ion Trini uon is a registered 1radernark oi Sony Corpora11on. HP. La serJ et ~ rid
security deposit required; subject to credit ap 1
DeskJet are registered trademarks.and .DpenV1ew 1s a tradema rk of He\·1lett Packard Co rporation Oell. the Oel l log_o. Powe rEdge. Ouie1Ke ' -~ nd Del l Dimension availability. lease terms subject to change withu
are registeredtrademarksandlnsp1ron 1s atradema rk of Dell Computer Corooratmn ©1998 Oell ComputerCorporation All rights reserved
. ,. ' - ",.~ ·," , __ f~-~liif;'~~~i\:~2._~1?.'.,: 1 <:.1:¥.-.lh'IW:Ii~
1~i~11-'~"':".\ ',"<''·:·~~
SOFTWARE OPTIONS DELL WORKSTATION .DELL POWEREDGE"
~.-
' SERVERS,3G~f'ifil,~~.,
~ ~ ;.fi,,.~,.•.#ili>'illif'
,"' ~. '~ ~~~-1f~ • .. W, .... ffi"r.... ','L
for Dell Dimension Systems DELL WORKSTATION 400 Common features: • 512KB Integrated L2 EC CCache • Integrated PC\ Ultra-
NEW333MHz PENTIUM II PROCESSOR Wide SCS l-3 Controll er • Intel Pro/ l DOB PC I Ethernet Adapter • HP OpenView'"
Microsoft®Office 97 Small FEATURING MMX TECHNOLOGY NNM Spec ial Edition • 24X Maxi Variable SCS I CD-ROM Drive
Business Edition includes: (DUAL PROCESSOR CAPABLE)
DELL POWEREDGE 2200 SERVER DELL POWEREDGE 2200 SERVER
I • Word 97
• 128MB ECC EDO Memory (512MB Max) NEW 333MHz PENTIUM II PROCESSOR 266MHz PENTIUM II PROCESSOR
• Excel 97 DUALPROCESSOR/RAID CAPABLE DUAL PROCESSOR/RAID CAPABLE
• 9.1GB Ultra-Wide SCSl-3 Hard Drive
• Publisher 97
• 1600HS 21" 119 8" v i.s I Trinitron
Common features: • Modular-Options Bay accepts 24X Max" Variabl e CD-ROM, 3.5" Floppy Drive (both included) or Optional 2nd Smart Lithium-Ion Battery • 512KB
L2 Pipeline Burst Cache • Stereo Speakers with 3D Surround Sound and Yamaha Software Wavetable • Zoom Video and USB Ports • Smart Lithium Ion Battery •
Cardbus Ready/Fast IR1 .1 • MSWindows 95 • FREE MS Windows 98 Upgrade Packet' • MS Internet Explorer • Touchpad • Extendable 1-Year Limited Warranty 1
NEW DELL INSPIRON 3200 D266XT NEW DELL INSPIRON 3200 D266XT DELL INSPIRON 3000 M233XT DELL INSPIRON 3000 M200ST
266MHz PENTIUM II PROCESSOR 266MHz PENTIUM 11 PROCESSOR 233MHz PENTIUM PROCESSOR 200MHz PENTIUM PROCESSOR
FEATURING MMXTECHNOLOGY FEATURING MMXTECHNOLOGY WITH MMXTECHNOLOGY WITH MMXTECHNOLOGY
Common features listed above plus: Common features listed above plus: Common features listed above plus: Common features listed above plus:
• 13.3" XGA Active Matrix TFT Display • 13.3" XGA Active Matrix TFT Di splay • 13.3" XGA Active Matrix TFT Display • 12. 1" SVGA Active Matrix TFT Di splay
• 144MB SDRAM Memory • 64MB SDRAM Memory • 32MB SDRAM Memory • 32MB SDRAM Memory
• 4GB Ultra ATA Hard Drive • 4GB Ultra ATA Hard Drive • 3.2GB Ultra ATA Hard Drive • 3.2GB Ultra ATA Hard Drive
• 128-bit Graphics Accelerator with • 128-bit Graphics Accelerator with • 128-bit GraphicsAccelerator with • 128-bit Graphics Accelera tor with
65K Colors at 1024x768 65K Colors at 1024x768 65K Colors at 1024x768 16 Mil lion Colors at 800x600
• 56K Capable" K-Flex Modem • 56K Capabl e" K-Flex Modem • 56K Capable" K-Flex Modem • MS Office 97 Small Business Edition
• Leather Carrying Case • MS Office 97 Smal l Business Edition • Leather Carrying Case • 6.4 Pounds *
• MS Office 97 Small Bu siness Edition • 6.9 Pounds* • MS Office 97 Smal l Business Edition * Upgrade to a 233MHz Pentium
• 6.9 Pounds* * Upgrade to 96MB SDRAM. add $199 • 6.9 Pounds* Processor. add $200.
* lnspiron Port Replicator. add $759. * 2nd Smart Lithium Ion Battery, add $169. * Upgrade to 64MB SDRAM. add $199. * Upgrade to 64MB SDRAM. add $199.
* 3Com 70/700 Fast Ethernet Adapter. * Leather Carrying Case. add $99. * Upgrade to a 4GB Ultra ATA Hard * Upgrade to a 4GB Ultra ATA Hard
add $169. Drive, add $99. Drive. add $99.
$3999
Business Lease 0 : $147/Mo . 36 Mos.
$3399
Business Lease 0 : $125/Mo.. 36 Mos.
$2899
Business Lease 0 : $110/Mo.. 36 Mos.
$2199
Business Lease 0 : $83/Mo.. 36 Mos.
Order Code #890401 Order Code #890413 Order Code#890415 Order Code #89041 1
:ceive featured configuration and pricing.
----------------------~
oes LP., TO ORDER TOLL-FREE
ount of ACCESS SPECIAL PROMOTIONS
ORDER
-month
' taxes ONLINE DESIGN YOUR IDEAL COMPUTER 800-553-6023 Mon-Fri 7am-9pm CT•Sat 10am-6pmCT
es tax:
ent; no
24HOURS CHECK THE STATU SOF YOUR ORDER ! TO ORDER ONLINE I Sun 12pm-5pm CT •In Canada~ call 800-233-15B9
•al and
ADAY ACCESS 24HR ONLINE TECH SUPPORT GSA Contract #GS-35F-4076D
otice.
www.dell.com/buydel I I Keycode #01318 I
• 51 2KB Integrated L2 Cache
* 6.4GB Ultra ATA Hard Drive (9.5ms)
* 1200HS 19" (17.9" v.i.s., .26dp) Monitor
• NEW Diamond Permedia 2
8MB 3D AGP Video Ca rd
• 32X Max' Variabl e CD-ROM Drive
• Integrated Yamaha Wavetable Sound
• Altec Lansing ACS-90 Speakers
• Iomega Zip 100MB Internal Drive
* Microsoft' Office 97 Small Business
Edition Plus Bookshelf 98;
McAfee VirusScan
• Microsoft Windows' 95 and
Internet Explorer
• FREE MS ' Windows 98 Upgrade Packet'
• Del l" Oui etKey" Keyboard
• MS lntelliMouse'
• 3-Year Limited Wa rranty'
• 1-Year On- site' Service
* Upgrade to a 16.BGBUltra ATA Hard
Drive (9 5ms). add $349.
You need a hard-hitting system with solid performance to blow your competition away. But you TO ORDER TOLL-FREE
shouldn't have to blow your budget to get it. That's where the Dell Dimension' XPS D333 comes in.
It offers all the power and reliability you require at a price that's hard to beat. It's loaded with
800-553-6023
I TO ORDER ONLINE 24 HRS./DAY
an ultra-fast 333MHz Pentium~ II processor, a ma ssive 19-inch (17 .9" v.i.s ., .26dp) monitor and an
www.dell.com/buydel
impressive BMB AGP video card for amazing 20 and 30 performance. Plus 64MB Mon-Fri 7am-9pm CT• Sat 1Oam-6pm CT
optional 16.BGB Ultra ATA hard drive to store al l your critica l data. So, if you've been I Keycode #01 316 j
holding out for the champion of values, you just won the fight. Call us or visit our
Reference the appropriate order code to
P.~,11,iHin•ll website at wwwdell.com. receive featured configuration and pricing