Windows Enterprise Desktop

December 29, 2010  7:46 PM

Is the Windows 7 Tablet Frenzy Justified?

Ed Tittel Ed Tittel Profile: Ed Tittel

Wow! I just scanned through the Windows 7 news reports on Google, and found myself inundated with information, plans, and announcements related to Windows 7 on tablet PCs. Topics covered under this general heading include everything from rumors and reports of planned changes to the Win7 OS itself to support ARM and other non-traditional processors, to mostly CES-related announcements from numerous notebook PC vendors with so-called Windows 7 tablets in their futures (including MSI, Asus, HP, ECS, Toshiba, Samsung, IN Media, and many others).

Aside from seeking to address a bad (and richly deserved) case of “iPad envy,” what’s really going on here? After just traveling with a 15″ notebook PC (an HP dv6) in coach on Delta, I think I can understand the desire for a light and compact machine that makes working on the plane less of a travail, but I’m not sure that a tablet is the answer for those interested in more than reading e-mail, catching up on Facebook, and surfing the Web.

Looking beyond home and consumer situations, where tablets are sure to be a big hit (for many of the same reasons that the iPad continues to rule the touch-based “thin and light” machine realm), the only place I really see touch-based units succeeding is in special-use applications: the signature pad and tracking devices that both UPS and FedEx use; the tracking and reporting handhelds that nearly every service and utility tech seems to carry nowadays; ditto for rental car check-in devices; and so forth. I could see an entirely usable replacement for medical staff who routinely carry a clip-board with tracking, status, and other forms, but I’m not sure there’s enough other stuff like that going on in the corporate world to justify a big influx of tablets for more general applications.

If you think I’m wrong, or have other examples of situations and applications tailor-made for tablet use, please share them here. Otherwise, I’m thinking that conventional desktop and notebook PCs will continue to function as the corporate information consumption and creation tools of choice for the foreseeable future.

December 20, 2010  6:35 PM

A Windows 8 Prescription in Two Parts

Ed Tittel Ed Tittel Profile: Ed Tittel

Those who read my blog regularly know that Paul Thurrot and his SuperSite for Windows often provide grist for this particular mill. Today I’d like to point at two of his recent and stellar efforts in exploring how Microsoft can improve on what it did right with Windows 7, and do even better with Windows 8 — namely:

In the first item in this two-part series, Thurrot makes the point that Microsoft defines “…user state virtualization as a way to ‘separate the user’s data and settings from the physical device and replicate it centrally…'” and then goes on to observe that “…Windows should be configured in such a way that these things are separated in separate hard drive partitions or, preferably, on separate physical disks. Furthermore, the user data and settings should be replicated to some central location for redundancy and data recovery reasons.” In the second part, he clearly and cogently lays out why so many third-party vendors (Zinstall, Prowess, and others) and Microsoft itself (Windows XP mode) have been chasing the rainbow involved in grabbing and virtualizing the Windows XP environment with older, incompatible-with-Win7 applications installed as a way of delivering continued access to important apps and services even when current Windows environments can no longer do that directly.

Put these things together, and you have the foundation for a user computing experience that remains accessible on any of the possible platforms where a user might wish to compute, including smartphones; tablets, netbooks, and other touch devices; and more conventional desktop and notebook PCs. You also have a user computing experience that provides an easy way to continue running outmoded legacy apps inside clean, portable envelopes that will also be accessible across that same continuum of computing devices. Put them all together, and suddenly, you’ve got a prescription for a Windows 8 that’s as much an improvement over Windows 7, as Windows 7 proved to be over XP and Vista.

Let’s hope somebody heavy and insightful at Microsoft is reading Thurrott’s musings and taking them very seriously indeed. This sounds like just what the doctor ordered, and very much what MS needs to do not only to keep itself on top of the OS pecking order, but also to deliver the kinds of cloud-based and device-independent computing that users everywhere are coming to expect.

December 17, 2010  8:42 PM

Patch Tuesday Follow-up

Ed Tittel Ed Tittel Profile: Ed Tittel

OK, now I’ve been through the update cycle on all of my Windows 7 PC (all 8 of them), and have seen anywhere from 11 to 15 updates ger processed on each one (another item for Silverlight popped up later in the day, after the first batch came out). Here’s the deal on the 17 security bulletins and the other 5 miscellaneous updates that appeared on January 14: Security
2146400* MS10-090 Cumulative IE Update
2296199* MS10-091 OpenType Font (OTF) Driver
2305420* MS10-092 Task Scheduler
2424434 MS10-093 Movie Maker
2447961 MS10-094 Windows Media Encoder
2385678* MS10-095 Windows versions (XP, Vista, 7, …)
2423089* MS10-096 Windows Address Book
2443105 MS10-097 Internet Connection Signup Wizard
2436673* MS10-098 Windows Kernel-mode drivers
2440591 MS10-099 Routing & Remote Access (RRAS)
2442962* MS10-100 Consent User Interface
2207559* MS10-101 Windows Netlogon Service
2345316 MS10-102 Hyper-V
2292970 MS10-103 MS Office Publisher
2455005 MS10-104 MS SharePoint Server
0968095 MS10-105 MS Office Graphics Filters
2407132 MS10-106 MS Exchange Server
2443685* No bulletin December 2010 cumulative time zone update
890830* No bulletin December 2010 Malicious Software Removal tool
2412171* No bulletin Office Outlook 2007 Update
2466076* No bulletin Office Outlook 2007 Junk Mail Filter update
2477244* No bulletin Update for Microsoft Silverlight
None No bulletin List of current Windows Security Bulletins

The final 6 entries in the table include 5 other updates pushed out along with the December Security Bulletins, which explains why they are marked “No bulletin” (because they’re not covered by security bulletins). The very last entry provides a link to the list of current security bulletins, which readers may also find interesting. Items marked with an asterisk represent those that I actually saw installed on one or more of my machines. So far, their impact seems negligible except that navigating between folders in Outlook 2007 now takes quite a bit longer than it did before the related updates were applied.

December 16, 2010  4:55 PM

App-DNA offers fascinating Windows App analysis tools

Ed Tittel Ed Tittel Profile: Ed Tittel

In a fascinating phone call with Samit Patel of last Monday (12/13/2010) I learned more about that company’s Windows applications analysis technology called AppTitude, specifically in light of ongoing, planned, and upcoming enterprise-class migrations from older Windows desktop versions to Windows 7. Along the way, I also learned that the same technology that App-DNA brings to operations wishing to streamline and manage that migration process will also work for other likely migrations, including virtualization efforts aimed at Hyper-V, VMWare, Citrix XenApp, Xen Desktop, and so forth (in fact, AppTitude won “Best of Show” at Citrix Synergy 2010).

Let me be very clear as to why I describe AppTitude as an analysis tool rather than a migration tool, even though it can be an important or even invaluable part of the migration process. AppTitude does not actually do migration; rather, it analyzes elements from what Patel calls an “enterprise’s definitive software library” (the collection of installable images, programs, and executable files it uses to generate desktop environments for end users) to determine where potential software conflicts or problems might exist, and then to implement automated remediation strategies or techniques to address them.

Most migration tools work by observing runtime behavior of specific instances of desktop environments, but AppTitude constructs a static virtual model for each of the elements it finds in an organization’s software library. This permits the tool to leverage information from packages or items that would normally be handed off to IT professionals for packaging and/or deployment, and to decompose underlying software API calls and object references to find dependencies within the code that may or may not be compatible with a Windows 7 runtime environment. Says Patel: “The real value comes from going beyond MSI tables for portable executables to analyze headers and other data, and to access pre-installation (PE) data to see if it will run or not.” This technique does not require actual installation, so no observation of runtime behavior is needed. In fact, the 60,000 or so data points that AppTitude collects for application library entries suffice to answer these all-important questions:

  • Will it install?
  • Will it run properly (or at all)?

The biggest problem with other tools and approaches that require migration by trial and error, or by runtime observation, is that this approach cannot possibly follow all potential cases or use scenarios. Patel offered a telling example of how an application that might be subject to batch script invocation every other Sunday wouldn’t manifest problems in a runtime environment unless testing happened to occur on that particular day, or run long enough to come up against this schedule (neither of which is terribly likely, he also opines). Only a tool like AppTitude that systematically examines every possible cross-reference, all internal code structures and external references, and scripts or other automated processes that might invoke the application can possibly catch potential gotchas that could emerge.

The approximately 60,000 data points that AppTitude gathers about applications are what represent the so-called “application DNA” that gives this company its name, and its tool so much punch. Though AppTitude doesn’t actually DO migration per se, it can (and has) helped large organizations anticipate and remediate potential issues when conducting the migration process. Patel indicated that use of App-DNA resulted in price reductions of up to two-thirds for competitive bids for extremely large migrations, as opposed to more labor-intensive and time-consuming approaches to performing migration using the runtime approach. Even better, those winning bids also included timelines that were less than one-third as long as the losing bids based on runtime methodology.

App-DNA prices its offerings on a per-application basis, but enterprise licenses based on the total number of endpoints (as is the case with Citrix Xen and other desktop management environments) are also available. With Windows 7 spearheading the need for future migrations, Windows 8 in the offing for 2014, and virtualization or mobile interface migrations also in the mix in many enterprises, AppTitude appears to offer the opportunity to pay for itself many times over for organizations with thousands of desktops and hundreds to thousands of applications to manage (and migrate).

December 14, 2010  3:03 PM

Big Batch of Security Updates for Final Patch Tuesday of 2010

Ed Tittel Ed Tittel Profile: Ed Tittel

Holy Moly! I just took a quick look at the Microsoft Security Bulletin Advance Notification for December 2010 (this is a temporary placeholder for the actual security bulletin, which will be released at the same time Microsoft posts its updates to the Windows Update Service, so the final bulletin may be in place by the time you read this). There are 17 security updates in the queue for this month, which is certainly the highest number I’ve seen. In fact, according to Mark Reavey of the Microsoft Security Response Center (MSRC) this is the highest number of updates ever released on a Patch Tuesday. See his MSRC blog “December 2010 Advance Notification Service is released” (12/9/2010) for some interesting information about total bulletin counts, vulnerabiliites covered, and information security trends.

Among the most interesting tidbits from this blog is the declaration that Microsoft “…will be closing the last Stuxnet-related issues this month. This is a local Elevation of Privilege vulnerability and we’ve seen no evidence of its use in active exploits aside from the Stuxnet malware.” Likewise, an older (reported in November 2010 in MS Security Advisory 2458511) Remote Code Execution vulnerability in Internet Explorer that affects versions 6, 7, and 8 will also be addressed in the December security updates. Finally, Reavey also points to an interesting article from Microsoft Security Research & Defense entitled “On the effectiveness of DEP and ASLR” (DEP is Data Execution Prevention, and ASLR is Address Space Layout Randomization, two techniques Microsoft uses to good effect to limit the impact of exploit attempts, especially those that seek to leverage buffer overflow weaknesses).

It will be interesting to read more details about this month’s security updates when Microsoft posts them to its update servers at about 11 AM Pacific time today (-08:00 UCT). I’ll post further on what’s in the mix in a follow-up blog tomorrow.

December 10, 2010  6:11 PM

Search for the latest Wi-Fi driver leads straight down the rabbit hole

Ed Tittel Ed Tittel Profile: Ed Tittel

When Alice heads off to Wonderland, she does so by falling down a rabbit hole, and experiencing a sequence of dizzying and terrifying transitions from top to bottom. I had a similar experience this morning, as I tried to find a newer Wi-Fi driver for the Intel Centrino Advanced-N 6200 AGN interface device in my HP dv6t-2300 notebook PC. My first stop, of course, was at the HP support pages where, to my ultimate consternation and confusion, the Intel device was not listed among the options available for this notebook make and model. My immediate reaction: “WTF?!” was followed by extended poking around to see if I could find through other means what I couldn’t get by politely knocking on the front door. No dice.

My next move was to engage HP support in an online chat session to see if they knew something I didn’t. After going round and round with a very nice support tech, I did learn that my system was part of a special build put together for a promotion at the beginning of 2010 (I bought my system in February 2010 for just over $1100, in a configuration that HP no longer makes today, where neither the i7 Q720M processor nor the Intel 6200 AGN interface is available on current models). In fact, this particular tech couldn’t find any drivers for the wireless interface that was installed on my machine at all.

So I transitioned to a phone call, to a location coded PH (which Bing cheerfully informs me is in the Phillippines), and got down and dirty with another support tech instead. Interestingly, the HP support tech on the phone who picked up from his online counterpart couldn’t use the service ticket number the chat tech gave me to identify our session, but he was able to find the ticket using my phone number. Go figure…

After double-checking my product id and serial number six ways from Sunday, he told me my machine definitely included the aforementioned Intel Wi-Fi interface but that the general information for my make and model didn’t. He did some more poking around, and eventually found a source for the drivers that I hadn’t considered while conducting my own search — namely, the “reload drivers” function inside the HP Advisor software that HP installs on all of its PCs. Alas, however, this turned out to be driver version when I was already running version I am also aware that Sony has published version thanks to my handy-dandy subscription, even though HP is apparently still lagging behind (and I can neither install the Sony driver on my HP as you might expect, nor can I extract sufficient “driver goodies” from the Sony Installer file using Universal Extractor to get the driver files that way, either).

The ultimate outcome of the adventure was to realize that HP doesn’t necessarily have access to information that’s any more current or correct than what’s available on the Web (even though they are the gatekeeper to this particular driver, as the Sony version won’t install on my HP machine, and the Intel Driver Update Utility says that I must contact the system vendor to get drivers for the 6200 AGN device that provides me with wireless network access).

As I’m watching my wireless bandwidth on the HP notebook on the one hand, and on my el-cheapo Asus EeePC 1000HE on the other, both connected to the same 802.11n WAP in my bedroom closet, I’m also struck that bandwidth on the HP box is bouncing from a low of 13 Mbps to a high of 130 Mbps, while the Asus stays solidly pegged at 150 Mbps when both units are literally sitting right next to each other. I was really hoping a new driver might help take care of this and put the more expensive machine on a par with the cheaper one, but apparently the Atheros Wi-Fi interface works a lot better than the Intel one. Maybe I’m going to have to look into antennas, machine placement, and yada yada yada. Sheesh!

December 8, 2010  2:47 PM

Holiday 2010 Diversion #1: ARS Technica HTPC Guide

Ed Tittel Ed Tittel Profile: Ed Tittel

For those of you who don’t already know, I’ve got a bit of an HTPC Jones (that’s “Home Theater PC” BTW). I’ve written a book with audio-video-PC guru and site operator Mike Chin (Build the Ultimate Home Theater PC) and another book about the stellar, Linux-based media PC environment named MythTV with FAQ guru Jared Wilson (Hacking MythTV). So when I found this year’s ARS HTPC Guide: December 2010 I read it over with both anticipation and delight. Not only is ARS Technica a great source for breaking Windows news and rumors, they also offer solid, informative technical content as well (along with partner arm Orbiting HQ).

For those of you readers who might be interested in putting together a state-of-the-art HTPC system for the end of 2010, you’d be hard-pressed to find as useful, cogent, and up-to-date a set of specific hardware and software picks and recommendations as you’ll find in this guide. It offers a slate of various hardware options for CPU, motherboard, memory, the all-important digital TV tuner card, storage, Blu-ray, remote, and so forth, that should let even relative DIY novices acquire and assemble a kick-butt HTPC system for a relatively modest budget (around $1150) and without killing themselves in the process.

While there’s a recommended selection in each category, there are also enough options discussed so that those who may not like (or be able to afford) the first choice in each area will have plenty of other items to ponder. The discussion of the TV Tuner card (an element that can easily make or break your HTPC experience) is right on the money (but expensive: it’s a CableCARD unit that retails for $400). Case, PSU, and remote control discussions are equally helpful.

If your thoughts, plans, or wishes for a home theater system include a PC in the mix, check out this guide. It’s definitely worth a read, or even a spot in your favorites or bookmarks.

December 6, 2010  6:01 PM

Say “So Long HP MediaSmart Servers!”

Ed Tittel Ed Tittel Profile: Ed Tittel

I regularly read Paul Thurrott’s Supersite for Windows, so when I saw a story there entitled “HP Drops Windows Home Server Product Line”  I thought to myself “Bummer!” Here’s a capsule summary of what Thurrott says in this story (it’s a paraphrase, not a direct quote, so I set it in italics here): In the wake of Microsoft’s recent announcement that it would drop its Drive Extender technologies (these provide automatic data redudancy across a pair of hard drives, and create an extensible storage pool with a single drive letter that can be expanded by adding drives to the system), HP has indicated it plans to discontinue its MediaSmart Server (MSS) products). And indeed, I am quite sad to see this product leave the marketplace. It offers SOHO users a rare combination of great features, reliable storage, and a pretty bullet-proof runtime environment at an affordable price. Even aside from its media management capabilities — which are pretty good, and kept getting better — the MSS boxes do a peachy job with automated backup, and low-maintenance network file storage, with a usable publicly-accessible Web interface from the Internet included at no extra charge. Good stuff!

But when I went looking for confirmation of this planned change, I didn’t have far to look. CNET also has a  December 1 story entitled “HP discontinues MediaSmart Server line.” This is further confirmed on the Microsoft Home Server blog for November 30, which simply states that “…HP has told us they do not plan to provide a platform for Windows Home Server code named ‘Vail.’ HP has told us they will sell the existing version of MediaSmart Server through the end of calendar year 2010…” Thus, the end is no longer too far off, either.

I’m sorry to see this product go, as I spent many enjoyable hours digging into these systems and tweaking their hardware and software. It was a cute little box, too. Maybe I should try installing Windows Server 2008 on my box and see how it does in that capacity. Too bad: another one bites the dust!

December 3, 2010  5:32 PM

Check out NirSoft’s USBDeview

Ed Tittel Ed Tittel Profile: Ed Tittel

Nir Sofer of Nirsoft has written lots of great utilities, several of which I use pretty regularly. Recently while looking for information to compare UFD speeds (UFD stands for USB Flash Drive, for those not already hip to this abbreviation) I was guided to a page that Sofer set up to report on the results of a somewhat recent addition to the excellent USBDeview program that you can download for free from his site. If you go looking for it yourself on the linked page, be patient: you need to scroll all the way down to the “Publishing Your Speed Test Result” heading to get to the link at Here’s a UI view of the program from my desktop:

Basic info about all USB devices known to device manager whether present or absent

Basic info about all USB devices known to device manager whether present or absent

The cool thing about this utility is that it has all kinds of snazzy, user-callable command line capabilities as well as the basic GUI you see here. This is cool because it lets people use the tool to perform various kinds of tests and measurements including a basic UFD speed test that reads and writes a large (1 MB) file to and from the device to provide a rough’n’ready metric for its read and write speed. Sofer has also posted results for hundreds of such drives on his site and you can use this info to compare devices to each other (actual speeds will vary depending on the speed of the USB interfaces into which devices get plugged and the chipsets and controllers that manage them — but this is useful, because as long as those elements remain the same, users should get the same relative speeds from devices they look at in Sofer’s list, though their actual performance will vary).

Check it out: it’s pretty neat!

November 30, 2010  3:44 PM

Stuxnet spawns bizarre conspiracy theories

Ed Tittel Ed Tittel Profile: Ed Tittel

Everybody’s heard about the Stuxnet virus by now, built specifically to attack Siemens’ SCADA systems through one of its most popular programmable logic controllers (PLCs). At the most recent Virus Bulletin conference in Vancouver, BC, in late September 2010, researchers from Symantec reported their findings about this fascinating and complex threat. These findings included their determination that Stuxnet includes “…the world’s first-ever tookit designed for…” PLCs (SC Magazine, October 8, 2010) and that the complexity of the malware involved “…would have been written using 5-10 core developers over six months and tested on systems mirroring the process control hardware” according to statements attributed to Symantec researcher Liam O Murchu at that conference (ibid). In fact, for the attack to work, the Stuxnet developers “…would have needed to teal digital certificates used to sign driver files used in target systems” (ibid).

Clearly, this is not the work of a single alienated cracker with too much time on his or her hands (O Murchu puts his assessment in pithier language: “This is not a teenage hacker coding in his bedroom-type operation”). Because the attack apparently affected much of Iran’s nuclear development infrastructure, in fact, many people inside and outside that country see government funding (if not an outright government-led “black op”) behind the Stuxnet virus. Israel and the US lead the list of likely culprits, though proving such involvement is also nearly impossible.

But where things get interesting is in the byplay that follows disclosure of such technical analysis and information. The n3td3v IT Security Consultancy in the UK, which is the brainchild of a well-known and eccentric self-professed security “expert” named Andrew Wallace, posted this response to the aforecited SC Magazine article:

“Motivation behind Stuxnet.” BP lobbied for the release of the Lockerbie bomber, and the people responsible for Stuxnet wanted to make sure they paid. To make sure the oil deal from releasing the bomber, BP couldn’t make a profit from. Stuxnet targeted the oil well. There were a lot of unhappy people after the release of Abdelbaset Ali al-Megrahi. Abdelbaset Ali al-Megrahi was convicted for blowing up Pan Am Flight 103 over Lockerbie, Scotland, on December, 21, 1988. He was freed on compassionate grounds by the Scottish government on August, 20, 2009. The claim was he had terminal prostate cancer and was expected to have less than three months to live. It was a lie and he is still alive living the life of riley in Libya.

Originally posted by me at
[Note: other postings on the Schneier blog are more coherent and intelligible, and have lots of interesting things to say about the affected Siemens PLCs.]

In fact, nt3td3v is pretty well-known in the security community because his identity serves as the focus of BlackHat study from 2006 entitled Who is “n3td3v”? Andrew Wallace has even had his psychological profile “done” on the full disclosure list upon which he made something of a pest of himself in that time frame. But as interesting technical events unfold on the information security stage, there’s apparently always a temptation to exploit the notoriety and the publicity that surrounds spectacularly successful (or mysterious) exploits like this one. Who’s to say if this kind of epiphenomenon doesn’t make the whole situation still more compelling than it already is?

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: