Page 14 - enterpriseinnovation.net
Page 14 - enterpriseinnovation.net
Page 14 - enterpriseinnovation.net
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
viewpoint Charles Mok: The cashed-up Hong Kong govt must fund smarter IT initiatives <strong>Page</strong> 10<br />
<br />
The Fourth<br />
Utility<br />
Your data-connectivity’s<br />
crucial, but who’s building<br />
it as a utility in Hong Kong?<br />
<strong>Page</strong> <strong>14</strong><br />
SINCE 1984<br />
bizpeople<br />
New IBM CIO<br />
Mark Hennessy<br />
<strong>Page</strong> 12<br />
legalwatch<br />
Contractual requirements<br />
for security<br />
<strong>Page</strong> 22<br />
industry<br />
HK’s online marketing<br />
<br />
<strong>Page</strong> 24<br />
backpage<br />
Driving China’s ICT<br />
By Robert Clark<br />
<strong>Page</strong> 42
c o n t e n t s April 2009<br />
coverstory<br />
The 4th utility<br />
18<br />
It was standing-room-only at the<br />
5th annual Banking and Finance<br />
Technology Forum Asia 2009<br />
bankingtech<br />
Your data-connectivity’s crucial, but who’s building it as<br />
a utility in Hong Kong? <strong>Page</strong> <strong>14</strong><br />
business<br />
4 upfront<br />
“No comment”= no story<br />
6 biznews<br />
8 viewpoint<br />
The cashed-up Hong Kong govt must<br />
fund smarter IT initiatives<br />
Charles Mok writes that although the<br />
government has increased ICT spending, the<br />
effect on the industry’s hardships is inadequate<br />
10 bizpeople<br />
Inside the new Big Blue<br />
CIO Mark Hennessy on<br />
transforming the IT organization<br />
at IBM, fostering a culture of<br />
innovation and managing IT<br />
during the financial crisis<br />
technology<br />
28 technews<br />
30 careerwatch<br />
Microsoft teams with Cyberport to support<br />
local start-ups<br />
32 CWHKAwardsspecial<br />
47 categories of excellence<br />
36 <strong>net</strong>working<br />
Social apps for business:<br />
plan less for less pain<br />
38 chinawatch<br />
24<br />
Local online marketing<br />
intelligence firm to go global<br />
As the downturn deepens, online<br />
marketing becomes increasingly<br />
important for Hong Kong, says<br />
Admomo’s founder and director<br />
Winston Law<br />
Industryprofile<br />
Check: www.cw.com.hk for daily news<br />
and online features.<br />
20 analystwatch<br />
Asia’s top 10 locations for offshore IT<br />
services<br />
22 legalwatch<br />
Security breaches: leaning on the<br />
suppliers<br />
26 industryevent<br />
Helping the tough get going<br />
27 industryevent<br />
Driving IT to deliver full value<br />
Five technology leaders shared their insights<br />
into how businesses can leverage existing<br />
capacity to help them navigate through the<br />
current economic slump<br />
Google share of China search market inches<br />
up, Dell sees faster economic recovery in the<br />
Middle Kingdom, VMware claims high demand<br />
for virtualization in China and 3Com eyes<br />
expansion from their ‘home market’<br />
42 backpage<br />
Driving China’s ICT<br />
Huawei and ZTE go from merely being major<br />
players to driving the whole sector, writes<br />
Robert Clark<br />
www.cw.com.hk<br />
April 2009 Computerworld Hong Kong 3
upfront<br />
<br />
Adecade ago, I edited an architectural magazine<br />
here in Hong Kong. While conducting<br />
an interview with a local architect who<br />
held strong views on architectural aesthetics, he<br />
vented his opinions about me and the magazine.<br />
“You have a responsibility to the people of<br />
Hong Kong!” he howled. “Why don’t you write<br />
a review and tell everyone what a terrible building<br />
[famous building on the Central waterfront]<br />
is? And as for that eyesore [another famous landmark<br />
on the Hong Kong skyline], you should<br />
write a review of its lousy, amateurish architectural<br />
design!”<br />
I told him I thought that was a great idea: “And<br />
I assume I can start by publishing<br />
what you just told me about those<br />
buildings.”<br />
He turned pale and almost choked<br />
on his latte. “No, no, you can’t do<br />
that! You can’t publish what I just<br />
said!!”<br />
“Well,” I said, “you see the problem.<br />
If no one’s willing to comment,<br />
there’s not much of a story.”<br />
Ten years later, the same philosophy<br />
grips Hong Kongers dealing<br />
with the press. The attitude seems to be: “If<br />
you already know, I don’t need to tell you, and if<br />
you don’t know, it’s not going to be ME that tells<br />
you.”<br />
This game of “no-comment” creates a circus of<br />
absurdity. Every so often a journalist would run<br />
into that brick wall once too often, and the resulting<br />
copy was both cathartic and hilarious. At one<br />
press conference for a retail-outlet years back, a<br />
journalist asked how many branches the retailer<br />
operated in Hong Kong. The spokesperson flatly<br />
refused to disclose the number of stores—hardly<br />
a state secret. The floodgates opened and the<br />
journo went into rant-mode: their next column<br />
detailed press-con “no-comment” absurdities.<br />
Sometimes there’s good reason to keep information<br />
confidential. Computerworld Hong Kong<br />
has a policy of complying with requests made by<br />
sources—people tell us things off the record, and<br />
we keep them off the record. This is reasonable,<br />
and we believe in reasonability.<br />
But when things become a matter of public<br />
record, and we have an opinion, we will state it.<br />
Do we agree with every government policy? Not<br />
necessarily, and as the government has a responsibility<br />
to serve the people (ALL of them), disagreement<br />
with policies that could be improved,<br />
I feel, is reasonable.<br />
We’d like to hear more from our readers,<br />
which is why you can comment on our blogs or<br />
on our Facebook page. You can remain anonymous<br />
if you like. Please be reasonable (no links<br />
to spamtastic.com, and leave the profanity to<br />
LegCo members and Commercial Radio!).<br />
More seriously, the “no-comment” press conference<br />
is being replaced by the “no-client” case<br />
study. Increasingly, vendors tell us about deployments<br />
they’ve done that have saved the users<br />
time and money and are “success stories” for<br />
their companies, but won’t identify the user. We<br />
understand that vendors must often sign non-disclosure<br />
agreements (NDAs) to get the contract.<br />
We’re sympathetic.<br />
And we also ask for consideration. In many cases,<br />
writing a quote or using a case-study without<br />
naming the user is useless. We usually edit out<br />
the reference, because it’s not useful<br />
to our readers.<br />
This is a subject I bring up in offthe-record<br />
conversations with vendors,<br />
and I find that they too feel<br />
the frustration. Vendors spend a<br />
lot of time and effort selling a complex<br />
system and making sure it’s<br />
deployed properly, supporting the<br />
user throughout the implementation<br />
and afterward, and they have a<br />
story to tell. But if the user wants<br />
silence, we remain mute.<br />
The flipside of the coin: perhaps the user wants<br />
to publicize their new tech system. And why not?<br />
If you craft your message for content-value, it<br />
may become news.<br />
There’s a great difference between a press release<br />
lauding anonymous users and a case study<br />
which details TCO and ROI, tells the reader<br />
how much time (and other resources) were consumed<br />
and how the system is working. A superb<br />
case study will tell us how many employees were<br />
redeployed to more useful tasks within the organization<br />
as a result of the tech upgrade.<br />
It happens—a good tech deployment will make<br />
your employees’ lives easier. We’ve seen it happen.<br />
But unless the user is willing to reveal themselves,<br />
we can’t report on it.<br />
And lately, we’re getting more silence than<br />
information. Considering IT stands for “information<br />
technology,” that’s ironic. For journalists, it’s<br />
also frustrating.<br />
Stefan Hammond<br />
Editor<br />
shammond@questexasia.com<br />
http://www.cw.com.hk<br />
Computerworld Hong Kong is published by Questex Asia Ltd, 501<br />
Cambridge House, Taikoo Place, 979 King’s Road, Quarry Bay, Hong<br />
Kong.<br />
EDITORIAL<br />
EDITOR-IN-CHIEF Chee Sing Chan cchan@questexasia.com<br />
EDITOR Stefan Hammond shammond@questexasia.com<br />
SENIOR REPORTER Teresa Leung tleung@questexasia.com<br />
CONTRIBUTING WRITERS Ross Milburn, Jason Krupp<br />
SALES<br />
PUBLISHER Simon Yeung syeung@questexasia.com<br />
ACCOUNT DIRECTOR Connie Yip cyip@questexasia.com<br />
MARKETING & SALES Donna Hon dhon@questexasia.com<br />
SUPPORTING EXECUTIVE<br />
<br />
ART DIRECTOR Eric Lam elam@questexasia.com<br />
PRODUCTION & Donna Hon dhon@questexasia.com<br />
TRAFFIC COORDINATOR<br />
CIRCULATION & John Lam jlam@questexasia.com<br />
DISTRIBUTION DIRECTOR<br />
ASSISTANT CIRCULATION Allie Mok amok@questexasia.com<br />
MANAGER<br />
<br />
MANAGING DIRECTOR Jonathan Bigelow jbigelow@questexasia.com<br />
HR & ADMIN MANAGER Rebecca Ip rip@questexasia.com<br />
BUSINESS MANAGER Eunice Chan echan@questexasia.com<br />
Computerworld Hong Kong is published monthly. All<br />
material is Copyright 2009 by Questex Media Group,<br />
Inc. Reproduction is strictly forbidden without written<br />
permission.<br />
Sales and Custom Publishing Enquiries: E-mail can<br />
be sent to syeung@questexasia.com<br />
Computerworld Hong Kong is circulated to IT, computing<br />
and inter<strong>net</strong> companies and other private and<br />
public companies who use IT and computing. It is edited<br />
for IT professionals, engineers, and senior managers<br />
responsible for design, installation, marketing<br />
and maintenance of IT systems and <strong>net</strong>works. Free<br />
subscription offer valid in Hong Kong only. To subscribe,<br />
go to www.cw.com.hk.<br />
Computerworld Hong Kong (ISSN 1023-4934) is<br />
published eleven times yearly by Questex Asia Ltd. Subscription<br />
rates: 1 year HK$330 (Hong Kong only), HK$440 (Macau only),<br />
US$109 (within Asia) and US$119 (outside Asia), 2 years HK$580<br />
(Hong Kong only), HK$770 (Macau only), US$190 (within Asia) and<br />
US$210 (outside Asia). Single/Back issue (if available) HK$40 per<br />
copy (Hong Kong only) US$11 (within Asia) and US$12 (outside<br />
Asia) plus US$5 handling charge per order. Printed in Hong Kong.<br />
Postage paid in Hong Kong. For subscription enquiries, change of<br />
address or delivery services, please contact our circulation department<br />
by: fax (852) 2559-2015, e-mail customer_service@cw.com.<br />
hk or by mail.<br />
Computerworld Hong Kong is on sale in bookshops in Hong Kong<br />
at HK$40 per issue.<br />
<br />
275 Grove Street, Newton, MA 02466, Tel: +1 617 219 8300<br />
PRESIDENT & CHIEF EXECUTIVE OFFICER Kerry C. Gumas<br />
EXECUTIVE V.P. & CHIEF FINANCIAL OFFICER Tom Caridi<br />
EXECUTIVE VICE PRESIDENT<br />
Robert S. Ingraham<br />
EXECUTIVE VICE PRESIDENT<br />
Tony D’Avino<br />
EXECUTIVE VICE PRESIDENT<br />
Jon Leibowitz<br />
EXECUTIVE V.P. CORPORATE DEVELOPMENT Claudia Flowers<br />
VICE PRESIDENT, DIGITAL MEDIA<br />
Seth Nichols<br />
V.P., HUMAN RESOURCES<br />
Diane Evans-Negron<br />
Printed by:<br />
<br />
9th Floor, Haking (Tung Shing) Industrial Building<br />
34 Lee Chung Street , Chai Wan, Hong Kong<br />
Tel: 852 2965 6777<br />
www.dg3.com/<br />
<br />
Source Dec 2005 HKABC<br />
www.cw.com.hk<br />
(852) 2589-1313<br />
(852) 2559-2015<br />
4 Computerworld Hong Kong April 2009 www.cw.com.hk
Takeaminutetosavemilionsinvendorlock-incosts.<br />
WatchourChoice&Flexibilityvideoatjuniper.<strong>net</strong>/choice<br />
© 2009JUNIPERNETWORKS,INC.
iznews<br />
China becomes a leader in managed print services<br />
China has become one of the leaders in<br />
Asia Pacific’s managed print services<br />
estimated to reach US$1 billion by 2012,<br />
said Springboard Research recently.<br />
The managed print services (MPS) market is<br />
forecast to grow from US$392 million in 2007 to<br />
US$825 million in 2011, according to the research<br />
house.<br />
“These robust growth figures indicate not just<br />
a vibrant MPS marketplace,<br />
but they also reflect<br />
the emergence of<br />
MPS as the best growth<br />
bet for the print hardware<br />
vendors in the<br />
region, who have seen<br />
a decline of hardware<br />
sales amidst the economic<br />
slowdown,” said<br />
by 2012<br />
Sanchit Vir Gogia, senior<br />
research analyst for Services at Springboard<br />
Research. “Enterprises in the region are eager to<br />
test and adopt the ‘next level’ of printing environment,<br />
presenting the MPS vendors with a growth<br />
opportunity in a difficult economic situation.”<br />
Australia and China lead the region<br />
Australia and New Zealand together will remain<br />
the largest MPS market in the region throughout<br />
the forecast period of 2007-2012; cornering<br />
over 25 percent of the market and expanding at<br />
a CAGR of 19.3 percent, Springboard said. While<br />
China’s managed print services to top US$1 billion<br />
India is behind China and ASEAN in overall market<br />
size, the south Asian country is forecasted to<br />
be the fastest growing market in the region with<br />
a CAGR of 22.6 percent, the analyst firm added.<br />
“The MPS model is still in its infancy in Asia Pacific<br />
and enterprises in the region need to be educated<br />
that this is much more than an alternative<br />
print hardware purchase model,” said Phil Hassey,<br />
vice president for services at Springboard<br />
Research. “The challenge<br />
for providers is<br />
to ensure they manage<br />
MPS offerings prices<br />
and offer solutions as<br />
a long-term strategy,<br />
providing immediate<br />
and successful results<br />
for enterprises.”<br />
In the MPS competitive<br />
landscape,<br />
HP is the clear leader with a dominant market<br />
presence in the region’s marketplace, said<br />
Springboard. In second place, Fuji-Xerox has<br />
leveraged its robust set of MPS offerings and a<br />
strong partner ecosystem to strengthen its regional<br />
presence, Springboard added. Lexmark<br />
is the only other global printer vendor who has<br />
a discernible market presence in the region,<br />
Springboard noted. The remaining market is<br />
highly fragmented and is made up of local service<br />
providers and other printer vendors, the<br />
research company observed. <br />
<br />
By Matt Hintsa<br />
Express e-channels aimed to reduce border<br />
crossing time from 12 seconds to eight<br />
seconds have attracted 126,512 Hong<br />
Kong residents to sign up for their trial run.<br />
The Immigration Department has installed 10<br />
express e-channels at the Lo Wu control point<br />
since early March as part of a HK$7 million pilot<br />
project.<br />
According to the department, around 20,000<br />
travelers use the news express e-channels at Lo<br />
Wu daily, about 18 percent of the total e-channel<br />
user base. The department’s figures indicate that<br />
about 1.2 million Hong Kong residents visit China<br />
via Lo Wu at least once a month.<br />
“As there’s a daily average of 10,000 Hong Kong<br />
residents completing the enrollment process, we<br />
expect to sign up all 1.2 million frequent users in<br />
four months,” said Jacqueline Kwan Chan Suetmui,<br />
assistant immigration director (information<br />
systems).<br />
Instead of inserting their ID cards into a reading<br />
machine when using the traditional e-channels,<br />
users of express e-channels put the cards on<br />
an optical reader.<br />
An optical reader scans only the personal information<br />
on an ID card rather than information<br />
from the ID card chip scanned by traditional e-<br />
channels, the department said, adding that the<br />
entire optical scanning process takes just three<br />
seconds.<br />
Users must give consent to the director of immigration<br />
for personal data retrieval from the<br />
chips in their ID cards and to such data being<br />
stored for subsequent self-service immigration<br />
clearance, the department added.<br />
As the user data are stored on the Lo Wu server<br />
not connected to other <strong>net</strong>works, the department<br />
assures the public that personal data cannot be<br />
leaked to outsiders, said Kwan.<br />
Kwan noted that the department will conduct<br />
a review when the pilot ends six months later:<br />
“We will then decide whether the express service<br />
should be extended to other checkpoints.” <br />
—Compiled by Teresa Leung<br />
newsbites<br />
Korean asset management firm deploys<br />
TelePresence<br />
Datacraft said it has completed the installation of a<br />
Cisco TelePresence system for Korean asset management<br />
firm Company, Mirae Asset Global Investments’<br />
offices in South Korea and Hong Kong. The tailor-made<br />
system for Mirae Asset includes the installation of two<br />
Cisco TelePresence Systems (CTS) 3,000 in Korea and<br />
Hong Kong and four CTS 1,000 systems to be deployed<br />
in India, Brazil, the US and the UK. The <strong>net</strong>work hub in<br />
Seoul, Korea also comprises a TelePresence manager,<br />
Call manager, multi-point switch and LDAP facility,<br />
Datacraft added.<br />
Adobe-enabled stream video at<br />
Oriental Press<br />
Adobe has announced that Hong Kong-based Oriental<br />
Press Group has selected Adobe Flash Media Server<br />
software for streaming video on ontv, the company’s<br />
online TV service on its news and information Inter<strong>net</strong><br />
portal on.cc.<br />
The on.cc portal combines content from two of the<br />
territory’s daily newspapers, Oriental Daily News and<br />
The Sun, as well as streaming video content from their<br />
TV service. Oriental Press said the site has 2.1 million<br />
unique viewers each month.<br />
AOL closes China R&D base as<br />
economy slides<br />
America Online will close a research and development<br />
base in Beijing but keep trying to break into China’s<br />
market amid the sliding global economy.<br />
The Beijing office, which opened in 2007 and has 56<br />
staff, will be shut down by midyear given poor economic<br />
circumstances and reorganization plans, an AOL spokeswoman<br />
in the US said via e-mail. But AOL’s Web portal<br />
for mainland China, launched last year, will continue to<br />
operate from the company’s Hong Kong regional base,<br />
the spokeswoman said.<br />
Amerson to set up China delivery<br />
center<br />
US consulting and outsourcing services company<br />
Amerson will set up a global delivery Center in Chengdu,<br />
China. “The setup of the delivery center in Chengdu is<br />
very important to the company’s regional and global<br />
development strategy, “ said Dr Rob Ouyang, managing<br />
director of Amerson, adding that the city has exceptionally<br />
well investment environment, locally abundant talented<br />
resources and high efficiency of government services.<br />
Dell cuts staff worldwide<br />
Dell in mid-March said it had laid off staff at different<br />
sites worldwide in an effort to cut costs and streamline<br />
operations. The company didn’t provide an exact number<br />
of employees it had laid off. However a company spokesman<br />
said that jobs were cut globally, including sites in<br />
Texas and North Carolina.<br />
6 Computerworld Hong Kong April 2009 www.cw.com.hk
Sponsored Feature<br />
Coping with <strong>net</strong>work strain<br />
With <strong>net</strong>work complexity rising Juniper’s EX Series Switches offer<br />
performance, security and significantly simplified management.<br />
Juniper’s EX Series Switches put an<br />
emphasis on uptime, reliability and<br />
simple management.<br />
associated with true chassis-based systems.<br />
Bunt noted that companies can now use the virtual<br />
chassis concept to manage <strong>net</strong>work expansion from<br />
a single chassis and still utilize the shared redundancy<br />
across a new branch <strong>net</strong>work and across multiple<br />
locations.<br />
“The EX Series offers carrier-class reliability, operational<br />
simplicity and integrated security in the form of<br />
end-point protection,” said Bunt.<br />
Switches at work<br />
Bunt also pointed out existing customers who are<br />
taking full advantage of these features.<br />
One organization reaping the benefits of the Juniper<br />
EX Series of switches is the Pittwater Council in<br />
Sydney, Australia.<br />
As a local council body, its responsibilities to citizens<br />
have changed from managing tasks like rubbish<br />
collection to creating and managing interactions and<br />
electronic platforms for public service delivery.<br />
This recent strategy has resulted in a critical need<br />
for a reliable and secure platform for information delivery<br />
and robust disaster recovery solution to ensure<br />
service levels are never disrupted.<br />
The choice was to outsource the operation or build<br />
its own system. The latter choice was taken and Pittwater<br />
Council utilized the Juniper EX4200 Ether<strong>net</strong><br />
CIOs today face unprecedented challenges<br />
with massive pressure to cut cost, drive efficiency<br />
while also deliver even more services<br />
with ever limited resources. Data centers are being<br />
consolidated and virtualized while <strong>net</strong>works face<br />
growing performance needs, security requirements<br />
and more complex management issues.<br />
The wave of added functionality at the <strong>net</strong>work<br />
level is creating tremendous management issues for<br />
CIOs and <strong>net</strong>work managers.<br />
Networks were designed originally just for connectivity.<br />
“But in recent years companies have bolted<br />
on additional functions to the <strong>net</strong>work as an afterthought,”<br />
said Greg Bunt, Asia Pacific Director for<br />
Advanced Technologies, Juniper Networks. First it<br />
was integrating security, then new applications like<br />
voice and video with the need for QoS, then issues<br />
like enabling number portability and now its end-user<br />
authentication.<br />
“The list grows longer by the day and <strong>net</strong>works today<br />
have to enable all of these in an easy, reliable and<br />
secure manner,” Bunt added.<br />
Under pressure<br />
But the need to invest in new <strong>net</strong>works and tools to<br />
manage these issues is tempered by the severe cost<br />
pressures. CIOs on average have 70-80% of their<br />
budget already tied up by essential management and<br />
maintenance costs, leaving little to invest in anything<br />
strategic.<br />
With budgets being cut that gives CIOs even less<br />
room to move. On top of this the restrictions on resources<br />
mean there is a huge demand for highly<br />
skilled professionals to manage the vast <strong>net</strong>work<br />
challenges with fewer people and tools.<br />
“In the current environment such highly-skilled<br />
people are even harder to find as they tend not to<br />
move from their existing jobs,” said Bunt.<br />
In response to these challenges enterprises have<br />
sought to deploy <strong>net</strong>working platforms that enable the<br />
<strong>net</strong>work perform at higher service levels with the same<br />
resources and remain easy to manage?<br />
Single view<br />
Juniper’s solution is its EX Series of Ether<strong>net</strong> switches.<br />
The EX series portfolio is designed for <strong>net</strong>work<br />
performance-minded enterprises and service providers<br />
with an emphasis on uptime, reliability and simple<br />
management.<br />
One unique feature is its single OS which is consistent<br />
across the whole series of EX switches as well as<br />
Juniper’s complete portfolio of <strong>net</strong>working and security<br />
products.<br />
Many competing platforms have adopted the<br />
approach of an OS for each and every product<br />
range. Having different versions of OS on switches,<br />
routers, application management and security<br />
products just makes the management challenge<br />
increasingly difficult. Juniper’s JUNOS operating<br />
system allows users to patch and update OSes<br />
and have that applied consistently across their<br />
<strong>net</strong>works. This lowers management costs and<br />
eases the burden on <strong>net</strong>work managers.<br />
Virtual <strong>net</strong>works<br />
Another unique feature of the EX Series of<br />
switches is its virtual chassis technology. This enables<br />
firms to connect multiple switches together<br />
to act as one logical device that can support up<br />
to 480 10/100/1000BASE-T ports. Because of the<br />
modularity of the Virtual Chassis, switches can be<br />
added on as needed. This scalability reduces the<br />
initial investment as well as operational expenses<br />
Greg Bunt, Juniper: Networks were designed<br />
originally just for connectivity. But in recent<br />
years companies have bolted on additional<br />
functions to the <strong>net</strong>work as an afterthought.<br />
switch with virtual chassis technology to help support<br />
the DR capability. The Virtual Chassis allowed optical<br />
links to be concurrently utilized, increased throughput,<br />
reliability and enabled easier administration The<br />
capital expense of this option was calculated to be<br />
far less than the outsource option and delivered the<br />
required service levels for backup and recovery operations<br />
Ajisen (China) Holdings Limited which operates<br />
an extensive chain of restaurants across China and<br />
Hong Kong has also everaged the EX switching<br />
platform and additional Juniper technology including<br />
firewalls and remote access VPN and Juniper<br />
routers.<br />
This has enabled Ajisen to deliver business critical<br />
services to a massively distributed environment covering<br />
243 locations. IT administration has been drastically<br />
simplified and reliability and security markedly<br />
improved.<br />
For more information or enquiry<br />
please email hk_enquiry@juniper.<strong>net</strong>
Check Point helps firms cut<br />
through the security tangle<br />
Check Point’s new software blade<br />
architecture set to deliver flexible and<br />
manageable security to businesses of all<br />
sizes<br />
Let’s face it, securing a corporate IT infrastructure<br />
is a challenge for any business<br />
regardless of size, particularly as IT departments<br />
roll out layer upon layer of security<br />
technology to cope with the continually growing<br />
number of threats.<br />
What this has created is an environment<br />
often characterized by a host of overlapping<br />
products, hardware platforms, management<br />
consoles and daily monitoring systems.<br />
And this is often a Gordian Knot that is inefficient,<br />
costly and difficult to get a clear understanding<br />
of where the vulnerabilities are.<br />
“Every application comes with a package of<br />
threats. Every time we evolve in this industry<br />
there are new threats created and we constantly<br />
need to have an answer to these,” said Itzhak<br />
Weinreb, Vice President of APAC Sales for<br />
Check Point Software Technologies Ltd.<br />
“Now consider that there are thousands of applications<br />
out there, dozens of technologies and<br />
hundreds of vendors – it is an ongoing nightmare<br />
for any CIO.”<br />
Weinreb said this clearly highlights a need<br />
for a single security suite that is simple to rollout<br />
and maintain, flexible enough to grow with<br />
the needs of the business and with a high degree<br />
of manageability to make operating and<br />
reporting easy.<br />
And he believes that Check Point has answered<br />
all of these key criteria with its latest<br />
security gateway version, the R70.<br />
Live by the blade<br />
What sets the R70 apart is that it is built on<br />
software blade architecture, a first for the security<br />
market.<br />
What this essentially means for customers<br />
is the ability to select exactly which security<br />
products they want from a<br />
library of over 20 software<br />
blades to create a unique<br />
level of protection tailored<br />
to their operating environment.<br />
The libraries include VPN,<br />
Firewall, URL filtering, antivirus<br />
& anti-malware, antispam<br />
and intrusion prevention<br />
system (IPS) modules among<br />
others.<br />
And as the business<br />
grows, additional blades can<br />
be quickly and easily added<br />
to the existing platform,<br />
ensuring the investment is<br />
right-sized to current needs<br />
but flexible enough to grow as the business<br />
does.<br />
Additionally, the software blades can be added<br />
without deploying new hardware, reducing deployment<br />
times and operational costs, as it runs<br />
on Check Point UTM-1 and Power-1 appliances,<br />
open servers and within virtualized environments.<br />
“The idea is to give the customer the option to<br />
choose what they want to put on their system,”<br />
said Weinreb.<br />
“They can either do this a la carte, and choose<br />
the blades that suit their business, or they can<br />
choose from one of our packages because<br />
Check Point’s Itzhak Weinreb:<br />
Our main interest is to simplify everything—the<br />
management tools help<br />
you monitor and control everything<br />
from a single location<br />
we know more or less what<br />
customers at different levels<br />
need.”<br />
Blades for all sizes<br />
The flexibility of Check Point’s<br />
solution extends even further,<br />
giving IT departments the ability<br />
to select specific versions of<br />
the R70 to meet their current<br />
hardware, and is available in<br />
single, two, four or eight core<br />
versions.<br />
And by going the software<br />
rather than the hardware approach,<br />
the R70 is easily integrated<br />
into existing security<br />
infrastructures.<br />
There are thousands of applications out there, dozens of<br />
technologies and hundreds of vendors – it is an ongoing<br />
nightmare for any CIO.<br />
Itzhak Weinreb<br />
All this reduces the total cost of ownership, a<br />
key pain point for many CIOs, under pressure<br />
from senior management to reduce costs in the<br />
current economic climate.<br />
In addition it means the R70 security software<br />
can be rolled out to any organization, whether<br />
they are a small, medium or enterprise-level<br />
business.<br />
“The small market is getting the same security<br />
functionality as the big enterprises but at the<br />
right price,” said Weinreb. “They just choose the<br />
version to match the size of box.”<br />
Another impressive feature of the R70 is in its
Sponsored Feature<br />
functions, allowing them to graphically view high<br />
volumes of event data in real-time and quickly<br />
drill down from a business view of events to a<br />
forensic level of details.<br />
The new provisioning of software blade provides<br />
centralized administration and activation<br />
of Check Point security devices via a single<br />
management console. The unique unified management<br />
architecture of Check Point R70 allows<br />
administrators to manage, set policy and apply<br />
protections across the entire security infrastructure<br />
from a single interface.<br />
Check Point’s IPS software Blade secures everything from the client to server and<br />
OS vulnerabilities, malware and worm infections<br />
At the end of the day it is about giving the customer choice.<br />
CIOs get to invest in the infrastructure that they need, not<br />
what the industry and vendors are bundling together.<br />
Itzhak Weinreb<br />
“Our main interest is to simplify everything the<br />
management tools help you monitor and control<br />
everything from a single location. You get<br />
reports from each machine identifying what are<br />
its weaknesses and how to solve it – even remotely,”<br />
noted Weinreb.<br />
“This saves a lot of internal resources because<br />
you only need a bare minimum of staff that is<br />
familiar with the easy to use management tools<br />
to run the entire security operation.”<br />
This resonates well with CIOs today, because<br />
it lowers operating costs, and decreases the reliance<br />
on specialized security skills, which are<br />
often expensive and in short supply.<br />
ability to allow administrators to set the performance<br />
levels of each blade.<br />
“This is a real revolution when compared to<br />
UTM products for instance. Most UTM products<br />
offer a fixed combination of security functions on<br />
a fixed platform for a fixed price. There is no option<br />
to disable functions to improve overall performance<br />
nor is there an option to add function<br />
as security needs change.”<br />
In the new Software Blade architecture, security<br />
functions run as a separate piece of software<br />
within the same software environment. Security<br />
managers can choose different combinations of<br />
Software Blades in ‘containers’, predefine the<br />
level of performance and manage all applications<br />
in a consistent way from a central management<br />
system.<br />
This means guaranteed performance, according<br />
to Weinreb.<br />
Walking the talk<br />
The new IPS software blade uses a multi-tier intrusion<br />
prevention engine that allows businesses<br />
to pre-emptively protect themselves, by securing<br />
everything from the client to server and OS vulnerabilities,<br />
malware and worm infections.<br />
And the increased performance of the Check<br />
Point R70 means businesses have a unique<br />
alternative to pre-emptively protect themselves<br />
against all threats by deploying the IPS software<br />
blade on every gateway.<br />
Weinreb believes this is an attractive offering<br />
to many customers out there.<br />
“Today, about 80% of customers do not turn<br />
on IPS due to performance concerns.” said<br />
Weinreb. “This is why we came up with the idea<br />
to integrate the IPS into the blade platform. “This<br />
enables full IPS utilization. All customer has to<br />
do is activate the IPS blade, activate the acceleration<br />
blade and set up the performance level.”<br />
Keeping it simple<br />
While Weinreb is happy to talk about the nuts and<br />
bolts of the technology under the hood of the R70,<br />
he also notes that this solution would not be complete<br />
without manageability and good reporting.<br />
It is for this reason that Check Point introduced<br />
two security management blades for IPS event<br />
analysis and provisioning of gateways.<br />
The IPS event analysis blade provides customers<br />
with the ability to focus on critical events and<br />
Seamless deployment<br />
Weinreb also points out that while the R70 and<br />
Check Point’s software blade architecture form<br />
the basis of a new security platform, it still compliments<br />
the current security offerings.<br />
“Even if you are running the R65 on the current<br />
box, you don’t need to change the box, just<br />
upgrade to the latest version, the R70. And it is<br />
an upgrade, not a completely new deployment<br />
which is another advantage.” said Weinreb.<br />
Ultimately Weinreb believes that the R70 and<br />
Check Point’s software blade architecture will<br />
resonate with CIOs in the current economic climate<br />
and beyond, because regardless of market<br />
booms or busts, flexibility, manageability and<br />
lower total cost of ownership are always going to<br />
be important to any business.<br />
“At the end of the day it is about giving the customer<br />
choice. CIOs get to invest in the infrastructure<br />
that they need, not what the industry and vendors<br />
are bundling together,” concluded Weinreb.<br />
The key focus is to address CIO pain points, giving<br />
them a complete security solution that is simple,<br />
flexible and manageable, and one that they can<br />
easily justify investing in because of the lower cost<br />
of ownership, a key criterion in these tough times.<br />
Check Point company website: http://www.checkpoint.com<br />
Email: info_ap@checkpoint.com
viewpoint<br />
Charles Mok<br />
The cashed-up Hong Kong govt<br />
must fund smarter IT initiatives<br />
John Tsang, our Financial Secretary, unrevealed<br />
his second budget in February and<br />
said that “preserving jobs” was his objective.<br />
The theme surely resonates with the public,<br />
but the content of this budget does not justify its<br />
stated goal.<br />
Those who criticize the Hong Kong government<br />
for neglecting its citizens’ hardship<br />
during the current downturn have a point.<br />
Governments around the world are enacting<br />
aggressive economic stimulus measures. But<br />
our government seems to be sitting idle in<br />
spite of record fiscal reserves.<br />
Hong Kong: cash-rich, initiative poor<br />
At the end of January 2009, our fiscal reserves<br />
reached a record-breaking HK$543<br />
billion, while accumulated surplus of the Exchange<br />
Fund was around HK$500 billion. According<br />
to a government press release, as at<br />
31 January 2009, the financial position of the<br />
government stands at the enviable level of<br />
HK$49.8 billion surplus. Instead of the fiscal<br />
deficit of HK$4.9 billion that the government<br />
estimated in the budget, we may end up with a<br />
huge surplus at the end of this financial year.<br />
Taking into account this possibility of a huge<br />
surplus, the meager initiatives proposed in the<br />
budget are even worse than when they first<br />
meet the eyes. On the ICT front, although the<br />
government has increased its ICT spending,<br />
the effect on alleviating the industry’s hardships<br />
is inadequate.<br />
Perhaps more so than in other industries,<br />
our ICT sector faces dwindling demand, and<br />
professionals are under threat of layoff day<br />
and night. Yet prices—for products, services<br />
and manpower—are falling. This is the perfect<br />
opportunity for the government to improve<br />
our information infrastructure, in order<br />
to provide better public services, help sustain<br />
demand, and preserve jobs.<br />
The government must recognize the irreparable<br />
damage that will be caused to the ICT<br />
industry in financial downturns, as ICT skills<br />
are harder to maintain than most other professional<br />
skills if a professional is out of action<br />
for a year or several months. Our industry<br />
and indeed the entire Hong Kong professional<br />
workforce will face a shortage of ICT talent<br />
when the economy recovers—similar to the<br />
post-SARS situation.<br />
E-health scheme not enough<br />
The only bright spot is the appropriation<br />
for the territory-wide e-health records (EHR),<br />
which will go a long way to establish Hong<br />
Although the government has increased its ICT spending, the<br />
effect on alleviating the industry’s hardships is inadequate<br />
Kong as a center of health information system<br />
development. But the ICT industry must<br />
be further and better engaged in the setting<br />
up of the strategy and direction of EHR, so<br />
that the ICT industry will be able to participate,<br />
contribute and benefit from this sizable<br />
investment.<br />
The “MyGovHK” project, which allows users<br />
to customize the government portal, is another<br />
idea I previously proposed in my “Ten<br />
Information Infrastructure Projects.” The government<br />
finally accepted the need for Hong<br />
Kong to have a clearer policy to support the<br />
development of data centers—also welcome<br />
news, after years of lobbying from the industry<br />
and myself along with former LegCo member<br />
Sin Chung-Kai urging the government to<br />
remove restrictive barriers in their land and<br />
innovation support policies.<br />
Hiring for specific needs<br />
But the government’s responses to our other<br />
recommendations in other policy areas, such as<br />
education, transport, food labeling and so on,<br />
have fallen short of the industry’s expectations.<br />
For instance, the budget earmarked HK$63<br />
million for a one-year education program on<br />
online safety, which will create 500 jobs.<br />
But the fund could be much better utilized<br />
if each school hires a single IT assistant: a<br />
trained tech to alleviate the heavy workload of<br />
teachers who must handle IT support chores<br />
in addition to teaching. Instead of the unclear<br />
motives and clearly one-off nature of the proposed<br />
program, what teachers and students<br />
really need is the government’s commitment<br />
to support them in a sustainable way.<br />
The Financial Secretary has indicated that<br />
he may announce further mid-year initiatives,<br />
opening a door for further supportive measures.<br />
It’s high time for our sector to unite<br />
behind a common cause: urging government<br />
to recognize the ICT sector’s importance to<br />
our economy and financing more concrete<br />
measures to re-ignite our momentum, so that<br />
Hong Kong can realize our potential when we<br />
emerge from this crisis. This “worst of times”<br />
is indeed the best of times to make this investment<br />
on ourselves, and we must realize that<br />
this is a once-in-a-century opportunity we are<br />
facing, not a crisis<br />
<br />
Charles Mok is the president<br />
of Inter<strong>net</strong> Society Hong Kong,<br />
and ex-officio Member of the<br />
Hong Kong Information Technology<br />
Federation. He has been<br />
in the IT industry for almost 20<br />
years, and is active in a number<br />
of advisory committees and<br />
statutory bodies of the HKSAR government<br />
10 Computerworld Hong Kong April 2009 www.cw.com.hk
izpeople<br />
Inside the new<br />
Big Blue<br />
???<br />
CIO CANADA: How are you, as a CIO, responding<br />
to the current difficult financial<br />
situation on an immediate and longer term<br />
basis?<br />
HENNESSY: We are being very deliberate<br />
about what the returns are going to be from the<br />
investments we’re making and what the business<br />
cases are behind those investments. We’re also<br />
trying to shorten the time to value for those investments;<br />
we’re working on projects that have<br />
quicker returns, more hard-dollar benefits, as opposed<br />
to multi-year projects.<br />
We’re also trying to make our application development<br />
and our transformation programs more<br />
agile and more tightly integrated with the business<br />
units, so we really understand what value<br />
needs to be created quickly and what the return<br />
on that is going to be.<br />
CIO Mark Hennessy on transforming the IT organization at IBM, fostering a<br />
culture of innovation, managing IT during the financial crisis and the value of<br />
social <strong>net</strong>working tools By David Carey, CIO Canada<br />
a governance model, and by building a skilled<br />
team. All of those things that go into an IT transformation.<br />
CIO: How far have you progressed with the IT<br />
transformation?<br />
HENNESSY: From a centralization standpoint,<br />
we’ve made a lot of progress, consolidating<br />
155 data centers down to five strategic centers<br />
around the world. From an application sunsetting<br />
standpoint we’ve gone from 16,000 down to about<br />
of employees has been increasing, our IT cost<br />
has come down by 26 percent.<br />
We’ve done an awful lot but there’s still a lot<br />
more to do. We’re going to carry on with our IT<br />
transformation [and] continue to drive down our<br />
costs so we can invest in other areas.<br />
CIO: Can you talk about some of the projects<br />
you have under way?<br />
HENNESSY: We’re now in the middle of a very<br />
large virtualization project. About a year ago I<br />
We’ve gone through an IT transformation over the past five to<br />
ten years, going from 128 CIOs down to one<br />
CIO: How is the IT landscape at IBM changing?<br />
HENNESSY: We’ve gone through an IT transformation<br />
over the past five to ten years, going<br />
from 128 CIOs down to one. We’re focusing on<br />
ways to drive more efficiency, such as centralization<br />
in terms of reducing the number of data<br />
centers, sunsetting legacy applications, working<br />
with partners much more closely, and optimizing<br />
our global resourcing.<br />
We’re ensuring that we have a tight relationship<br />
with the business units and making sure we<br />
have a balance between operational excellence<br />
and business value—we’re creating that balance<br />
with a set of standards, with an architecture, with<br />
4,700. I still think 4,700 is too many and we’ve got<br />
work underway to bring that number down.<br />
We’ve done a very good job in terms of working<br />
closely with partners. As an example, we<br />
have one global <strong>net</strong>work now as opposed to<br />
sourcing our <strong>net</strong>work from lots of different<br />
places or driving it internally. We’ve also made<br />
some fundamental steps forward in things like<br />
VoIP.<br />
And we’ve optimized our global delivery—we<br />
now have multiple locations around the world<br />
that have certain skills that we need—and we’ve<br />
figured out how to optimize both service delivery<br />
and application services. Over the past five<br />
years, even though our revenue and our number<br />
challenged a team to take about 25 percent of our<br />
infrastructure, about 3,900 servers, and consolidate<br />
them down into 30, and that project is going<br />
very well. For us the best approach has been to<br />
consolidate those Intel and UNIX servers onto a<br />
Z platform running Linux.<br />
We also have a lot of work going on around<br />
application development and driving for a much<br />
faster return on investment, reducing the time<br />
to value through agile methodology and rational<br />
tools and looking at an outcome-based model as<br />
opposed to utilization models.<br />
CIO: What’s IBM doing to foster a culture of<br />
innovation across the enterprise?<br />
12 Computerworld Hong Kong April 2009 www.cw.com.hk
izpeople<br />
HENNESSY: CIOs today are well positioned to<br />
address this issue. First of all, they’re one of the<br />
few executives that see the enterprise from endto-end,<br />
across all business units, across all geographies.<br />
They see the data flows, they see the<br />
interactions, and so they have a good perspective<br />
on the enterprise itself.<br />
Secondly, they have access to a lot of these<br />
exciting new tools and technologies around social<br />
<strong>net</strong>working [and] Web 2.0. We are working<br />
hard to try and use those tools and that<br />
knowledge to drive innovation. We have four<br />
generations of IBMers—traditionalists, baby<br />
boomers, Gen X, and Gen Y—and they’re<br />
spread out all over the world. We need to try<br />
and figure out how to use these tools to drive<br />
relationship-building, and then collaboration,<br />
and then innovation across all of our employees,<br />
regardless of what business, geography or<br />
generation they’re in.<br />
We’ve started to implement lots of different<br />
tools to do this, such as blogs and wikis. We have<br />
about 18,000 blogs up and running now, and over<br />
half of our population—about 200,000 people—<br />
are using Wikis as an ongoing part of their business.<br />
We also have online collaboration forums<br />
where people can go into an online team room<br />
and introduce topics that others in the organization<br />
can talk about, or managers can come in<br />
and sponsor a work effort that anyone can collaborate<br />
on. Communities have now started to<br />
build around topics that groups of people are interested<br />
in.<br />
CIO: How are you fostering technology innovation?<br />
HENNESSY: From out of the CIO’s organization,<br />
we have what we call a Technology Adoption<br />
program, which is kind of a sandbox that<br />
we’ve built where people can try new tools and<br />
new processes. They can then provide feedback<br />
to the developers and help shape the new products<br />
and processes, ensuring that they’re as valuable<br />
as possible, whether the intention is to take<br />
those new tools to the market or to use them internally.<br />
CIO: What are you doing to help optimize the<br />
value of the social <strong>net</strong>working tools you’re using?<br />
HENNESSY: I find it important to try and understand<br />
the value of each of these different tools,<br />
and I do that in a number of ways. How many<br />
ideas are created by a particular tool? How many<br />
get sponsored by somebody that has a budget?<br />
How many are collaborated on? How many actually<br />
make it to market? What revenue is generated<br />
by those ideas?<br />
I have a set of tools now that I use to track<br />
the ideas and the innovations that come out of<br />
the different tools—so that I can better align my<br />
investments to the tools that are driving the better<br />
and more innovative ideas. That’s something<br />
that I spend a lot of time talking about with<br />
other CIOs around the world: the ROI of social<br />
<strong>net</strong>working.<br />
CIO: What’s the company’s attitude towards<br />
younger employees using their own social <strong>net</strong>working<br />
tools, such as Facebook?<br />
We have about 18,000 blogs up and running now, and over half<br />
of our population—about 200,000 people—are using Wikis as<br />
an ongoing part of their business<br />
HENNESSY: I think it would be hard to try<br />
to control it or turn it off. We understand it’s<br />
a reality and we have to try and leverage that<br />
technology internally. So we give all of our employees,<br />
regardless of what generation they’re<br />
from, the opportunity to use these tools to collaborate,<br />
post their ideas, and work with colleagues<br />
wherever they are to try and come up<br />
with the best solutions for their clients or for<br />
their own internal customers. Because we have<br />
a culture of innovation, utilizing these tools to<br />
get ideas from colleagues is very natural and<br />
it’s taken off quickly.<br />
The other interesting thing is how are we going<br />
to start using those social <strong>net</strong>working tools<br />
outside the firewall? We started to do it on a<br />
couple of different projects. One is our corporate<br />
service corps, which is a group of IBMers<br />
that have taken a leave to work in emerging<br />
markets and places that need their assistance.<br />
We now have a Web site that is a part of the<br />
social <strong>net</strong>working tool that allows interaction<br />
between those folks and the government agencies<br />
that they’re working with and others that<br />
have ideas that can help them. And we’re going<br />
to do more of those types of things to help give<br />
our clients better access into our resources,<br />
our people, our intellectual property and our<br />
key industry thoughts, because we think that<br />
will be helpful in terms of developing new ideas<br />
and new solutions and helping create more value<br />
for our clients.<br />
CIO: What advice do you have for other CIOs<br />
around innovation?<br />
HENNESSY: I would say experiment and pilot.<br />
There are different innovation tools and approaches<br />
out there—it’s not one size fits all.<br />
Everybody’s company is a little different. Their<br />
organizations, their geographies, their cultures<br />
are a little different. If you start with different<br />
tools and incubate them and test them and pilot<br />
them, you’ll start to see what may work well for<br />
your company<br />
I was with a CIO in Japan and his approach<br />
was to create a blog for himself and ask employees:<br />
what issues keep them from being<br />
successful? He was amazed at how quickly he<br />
got ideas back—he didn’t expect that kind of<br />
direct dialogue. Another CIO started his own<br />
Facebook type of social <strong>net</strong>working tool and<br />
he posted ideas about himself personally. Others<br />
in his organization started doing the same<br />
thing, and they found that the relationships<br />
started building quickly across business units<br />
and geographies—they got to know people who<br />
were interested in similar kinds of projects, who<br />
were working on the same kinds of issues for<br />
their clients, and so that took off pretty quickly<br />
for them.<br />
CIO: What technology would you point to that<br />
is going to have a significant impact in the<br />
next three years?<br />
HENNESSY: The pervasive devices that are<br />
emerging around the world in all different industries—sensors,<br />
monitors, cell phones or whatever—are<br />
really going to change the environment<br />
that we’re in, whether they be wirelessly connected<br />
or not. These pervasive devices, as they<br />
become intelligent and interconnected, are going<br />
to create an opportunity for understanding<br />
the environment and making some significant<br />
changes.<br />
All of these embedded devices, as they become<br />
more interconnected and intelligent, are going to<br />
give us opportunities for other types of ‘smart’<br />
environments. And figuring out how to take advantage<br />
of that, not only to improve efficiency<br />
and effectiveness but also to give value back to<br />
businesses, governments and society as a whole,<br />
is going to be important.<br />
<br />
www.cw.com.hk<br />
April 2009 Computerworld Hong Kong 13
Your data-connectivity’s<br />
crucial, but who’s building it<br />
as a utility in Hong Kong?<br />
By Stefan Hammond<br />
The first electrical standards fight raged a<br />
century ago. On one side: famed inventor<br />
Thomas Edison, who is credited with inventing<br />
motion pictures, the incandescent light<br />
bulb and audio recording on wax cylinders. On<br />
the other: a Serbian inventor—part genius, part<br />
Bottom Line:<br />
<br />
<br />
<br />
build<br />
<br />
<br />
<br />
<br />
<br />
<br />
madman—named Nikola Tesla.<br />
Although many believe it was<br />
Marconi who invented radio, it<br />
was in fact Tesla, and the volatile<br />
Serb had a powerful backer:<br />
tycoon George Westinghouse,<br />
who believed that the Tesla<br />
Polyphase System should be deployed<br />
to wire the households of<br />
the USA’s east coast with electrical<br />
current.<br />
Edison made no attempt to<br />
conceal his displeasure. Alternating<br />
current (AC) was dangerous, he thundered,<br />
pointing out that AC was used in the<br />
electric chair to execute criminals. Westinghouse<br />
and Tesla countered that the only way to<br />
transmit current efficiently over long distances<br />
was via an alternating polyphase system which<br />
would carry juice “the last<br />
mile”: into the home. Giant<br />
transformers would encode<br />
the current at a frequency of<br />
60 Hertz (Hz, then known as<br />
“cycles per second”).<br />
Edison had a financial stake<br />
in the direct-current standard.<br />
But needless to say, he<br />
lost, because Westinghouse<br />
and Tesla were right about<br />
long-distance transmission.<br />
Electricity delivered via AC<br />
<strong>14</strong> Computerworld Hong Kong April 2009 www.cw.com.hk
ecame a utility, although it was many more<br />
years before a dependable, accurately calibrated<br />
supply was available at wall-sockets around<br />
the world.<br />
One thing is true of both inventors: neither<br />
could have imagined the usages we now have<br />
for electric current. It’s a utility we never think<br />
about until a circuit-breaker trips, cutting off<br />
the juice.<br />
Electricity—along with water and telephone<br />
lines—are three utilities most Hong Kongers<br />
take for granted. While the uses for wired telco<br />
lines are fairly limited, use of water is more<br />
creative, and electricity heats, cools, amuses,<br />
illuminates and even prolongs or saves lives.<br />
Most of electricity’s uses weren’t dreamt of<br />
in Tesla’s time (although he did build massive<br />
electrical-discharge units known as Tesla<br />
coils—there’s a lovely photo-pool of these<br />
machines in action at http://www.flickr.com/<br />
groups/tesla_coil/pool/). Genius though he<br />
was, Tesla didn’t create the utilization, he built<br />
the utility.<br />
Which brings us to data-transmission.<br />
Utility number four<br />
Data transmission—especially via broadband—squares<br />
electricity’s potential. While<br />
AC brought us television and radio, broadband<br />
brings us interactivity via blogs, forums, wikis<br />
and social <strong>net</strong>working applications. It makes<br />
peer-to-peer file-sharing (which has powerful<br />
legal uses, a fact hyperventilating politicians<br />
and corporate executives sometimes overlook)<br />
possible.<br />
While digital-telecasting, even in high definition,<br />
can be accomplished over the airwaves,<br />
video-over-wire is far more powerful. Ditto for<br />
streaming audio (fire up the “Radio” section<br />
of your iTunes app sometime and try some<br />
browsing). While these uses are basically improvements<br />
on existing media, remember the<br />
pace of change and the inventiveness of human<br />
beings. We’ve only begun to scratch the<br />
surface.<br />
During the heady days of the “dotcom boom,”<br />
<br />
is still greatly underutilized. Collectively, we’re on the steep<br />
part of the learning curve<br />
Broadband over Power Lines (BPL)<br />
T <br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
CLP’s Locandro: <br />
<br />
one oft-repeated example was the Net-savvy<br />
refrigerator which would magically monitor,<br />
say, milk levels, and order new supplies when<br />
necessary (the tech cynics among us waited<br />
for the first time this apocryphal device would<br />
malfunction and order a case of milk, or perhaps<br />
several cases).<br />
Like most of you, I don’t want my fridge connected<br />
to the Inter<strong>net</strong> and ordering groceries<br />
on its own. But what about a unit that monitors<br />
electric usage and micromanages it for greater<br />
efficiency—while your air-conditioners and<br />
dehumidifiers do the same—and allows o<strong>net</strong>ouch<br />
ordering of deliveries via a biometricidentifier?<br />
Too gimmicky? How about regular<br />
monitoring of a homecare patient’s vitals—data<br />
automatically sent to an authorized healthcare<br />
service? Such a scheme would dovetail with<br />
the Hospital Authority’s plan to create patient<br />
records to support all Hong Kongers.<br />
Standards body<br />
The 4th utility is a vast, sprawling subject, so<br />
the best place to start is with a standards body<br />
The US-based professional association BICSI<br />
(pronounced BIK-see) supports the information<br />
transport systems (ITS) industry. Membership<br />
spans nearly 90 countries, and they<br />
provide a definition of the 4th utility I find apt:<br />
“With information transport systems (ITS)<br />
forming the new fourth utility and the everincreasing<br />
demand for bandwidth, the proper<br />
installation of copper and optical fiber systems<br />
has become paramount,” says their Web site.<br />
“ITS covers the spectrum of voice, data and<br />
video technologies,” according to BICSI. “It<br />
continued on page 16 <br />
www.cw.com.hk<br />
April 2009 Computerworld Hong Kong 15
continued from page 15<br />
encompasses the design, integration and installation<br />
of pathways, spaces, fiber- and copper-based<br />
distribution systems, wireless-based<br />
systems and infrastructure that supports the<br />
transportation of information and associated<br />
signaling between and among communications<br />
and information gathering devices.”<br />
Where does Hong Kong rank on this digital<br />
scale, up against connectivity powerhouses<br />
like Korea, Japan and various Scandinavian<br />
countries? According to BICSI, on the Global<br />
Information Technology Report 2008-2009,<br />
produced by the World Economic Forum in<br />
cooperation with INSEAD, the leading international<br />
business school, and sponsored by<br />
Cisco Systems, Hong Kong ranks 12th.<br />
“In general, the transport of data and communications<br />
in a ubiquitous environment is<br />
ever-growing,” said Joe Locandro, director,<br />
Group IT, CLP Holdings. “The two major<br />
mechanisms to achieve this are via wireless<br />
communications with WiFi and into traditional<br />
buildings/home via fiber, copper, ADSL or<br />
even BPL (Broadband over Power Lines). Data<br />
compression algorithms allow effective use of<br />
transmitting data via the above mechanisms.”<br />
(Please see sidebar “Broadband over Power<br />
Lines (BPL)” on page 15 for more information<br />
on this technology).<br />
“The real future will be using the information<br />
highway of both domestic and business users,<br />
using a multiple variety of access methods and<br />
allowing people to connect to the Inter<strong>net</strong> anywhere<br />
anytime,” said Locandro. “Even to the<br />
extent that people can turn on their air conditioners<br />
on before they get home via a Web<br />
page at the office.” The CLP IT expert said<br />
he’d seen working models of this technology<br />
demonstrated in the USA.<br />
Wired flats in Hong Kong<br />
Research firm Gartner has repeatedly said<br />
that consumer tech serves as the blueprint for<br />
tech in the enterprise space. This is often the<br />
Research firm to US President<br />
Obama: invest in fiber-optic<br />
T <br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
case, so it’s worth examining the Soho 38 residential<br />
project from developer Kerry Properties,<br />
a building wired by a variety of vendors<br />
including Cisco, Microsoft, HP, and Hong<br />
Kong-based Home Touch.<br />
“When Home Touch approached us [about<br />
Soho 38], we were surprised,” said Kimmy<br />
Lau, senior marketing manager, Kerry Real<br />
Estate Agency Ltd. “The typical decision-maker<br />
for a flat purchase in Hong Kong may not<br />
be IT-savvy. But we feel that potential Soho<br />
38 flat-buyers aren’t typical, and the technology<br />
we’ve built into the structure will appeal<br />
to them.”<br />
On their Web site, Kerry describes the project<br />
as “the first building in Hong Kong integrating<br />
work, entertainment, communication<br />
and home automation under one platform.”<br />
Data transmission—especially via broadband—squares<br />
electricity’s potential<br />
Much of the tech used in Soho 38 was driven<br />
by CCRE (Cisco Connected Real Estate), a division<br />
of the <strong>net</strong>working giant devoted to creating<br />
“nerve centers” for new buildings. “Considering<br />
the building itself as a ‘live’ entity is at<br />
the heart of CCRE,” says Cisco’s Web site, in<br />
a case study on Deloitte’s new corporate complex<br />
in Milan. “By harnessing the power of Inter<strong>net</strong><br />
Protocol (IP) the traditional perception<br />
of the workplace can be overturned. It has the<br />
ability to bring enormous financial and operational<br />
rewards to institutions.”<br />
However, despite the IP ubiquity, much of<br />
the tech going into the project is aimed at<br />
consumers. In-building wiring is Cat 5 copper<br />
rather than fiber-optic. The home control-unit<br />
is from Home Touch, who helped integrate<br />
the HP and Cisco products with their own devices,<br />
according to Kerry’s Lau. The idea is<br />
to provide an overall consumer experience,<br />
which has crossover with enterprise use. For<br />
example, the building has full Wi-Fi connectivity,<br />
a concept pioneered by Cyberport. another<br />
capability that may appeal to enterprises is video-over-IP<br />
security—Soho 38 uses a “portable<br />
video door phone” that captures voice and<br />
video images.<br />
The future<br />
Despite all the progress currently being<br />
made, the 4th utility is still greatly underuti-<br />
16 Computerworld Hong Kong April 2009 www.cw.com.hk
COVER STORY<br />
Power-saving building <strong>net</strong>works<br />
to get cheaper<br />
Cisco’s Chiu: The Net has become ‘the 4th utility’ as<br />
‘intelligent buildings’ regard communication-related<br />
services as an integral part of the overall infrastructure<br />
lized. Collectively, we’re on the steep part of<br />
the learning curve.<br />
“In view of the acute problems relating to<br />
population growth and unsustainable energy demands,<br />
Cisco has made a commitment to help<br />
address these challenges with CCRE...in essence,<br />
the Inter<strong>net</strong> has become ‘the 4th utility’<br />
as ‘intelligent buildings’ regard communicationrelated<br />
services such as telecommunications,<br />
broadband, security circuits and fire systems<br />
as an integral part of the overall infrastructure<br />
similar to life necessities such as water, electricity<br />
and gas. Indeed, IT plays such a central<br />
role in all of this that it scores very highly in<br />
the ‘Leadership in Energy and Environmental<br />
Design’ (LEED) program, the internationally<br />
accepted benchmark for the design, construction<br />
and operation of high performance green<br />
buildings,” said Barbara Chiu, general manager,<br />
Cisco Hong Kong and Macau.<br />
“Over the years, Cisco has implemented<br />
many CCRE projects locally, such as Cyberport<br />
in Hong Kong, helping them reduce power<br />
requirements and enhance building usage<br />
to provide a flexible foundation for growth,”<br />
added Chiu.<br />
Locandro concluded that “one thing is for<br />
sure: we will live in an interconnected IP<br />
world—from PDAs streaming data to household<br />
appliances having their own IP address.”<br />
Like Tesla and Edison a century ago, we<br />
can’t imagine all the possibilities. But technology<br />
that helps save energy and makes people’s<br />
lives simple and easier is something we<br />
at CWHK support, and will always report on,<br />
whatever stage it’s in.<br />
<br />
The maker of components that link millions of sensors and control devices is<br />
launching a new generation of technology designed to make power-saving control<br />
<strong>net</strong>works affordable for small buildings.<br />
Echelon, a 20-year-old company that developed a now-standardized technology for<br />
these specialized <strong>net</strong>works, has rolled out a new version that it says is only half as<br />
expensive for its customers to put in their devices. It also can carry incoming data from<br />
many more sources on a <strong>net</strong>work, according to Steve Nguyen, Echelon’s director of<br />
corporate marketing.<br />
Echelon’s LonWorks 2.0 platform updates the whole range of components that the<br />
company sells to makers of devices such as lighting controls, security systems and<br />
HVAC (heating, ventilation and cooling) systems. That includes a processor, a transceiver,<br />
an operating system, and development and installation tools. The transceiver<br />
and processor are set to ship in volume in August, and all the components will be<br />
available by 2010.<br />
LonWorks is based on the ISO/IEC <strong>14</strong>908 standard, which allows sensors and<br />
control devices to share a single <strong>net</strong>work and exchange data on a peer-to-peer basis,<br />
according to Nguyen. For example, a thermometer can send a signal that the temperature<br />
in a particular spot has gone over a pre-set limit. An automatic air-vent controller<br />
linked to the same <strong>net</strong>work can interpret the thermometer’s signal and respond by<br />
opening a vent, without having to pass the information through a central computer.<br />
Such mechanisms can now be controlled from beyond the local <strong>net</strong>work using Web<br />
services. One key example of this is “demand response” software operated by energy<br />
providers, Nguyen said. Using a system from a vendor such as EnerNOC, utilities can<br />
send timely information about regionwide demand to individual customers who have<br />
subscribed to the service. Based on that information, devices linked to a control <strong>net</strong>work<br />
can automatically adjust their operations to reduce energy consumption. Together, those<br />
small adjustments may prevent utilities from having to fire up more capacity, Nguyen said.<br />
The ISO/IEC <strong>14</strong>908 standard can be applied to <strong>net</strong>works with a number of different<br />
signaling systems, including fiber-optic cable and wireless. Echelon offers the specifications<br />
for the ISO/IEC <strong>14</strong>908 technology openly without a licensing fee, Nguyen said.<br />
About 700 vendors have adopted the technology, he said.<br />
In addition, the more powerful processor offered with LonWorks 2.0 will be able to<br />
support more functions, Hill said. For example, a keypad on the wall for adjusting the<br />
heat or lighting could have a motion sensor, which would cause it to light up when<br />
someone walked up to the keypad. The new modules should also have more capacity<br />
for self-installation programs, which would save engineers having to visit every room<br />
where a module is being set up, Hills said.<br />
No matter how much energy a building-control system may save, one of the biggest<br />
factors in convincing a developer to use it is how long it will take to pay for itself,<br />
Hill said. In terms of energy savings, smart lighting systems can pay for themselves in<br />
three to four years and heating controls in four to five years. LonWorks 2.0 should help<br />
energy-saving systems pay for themselves sooner, he said.<br />
—By Stephen Lawson, IDG News Service (San Francisco Bureau)<br />
www.cw.com.hk<br />
April 2009 Computerworld Hong Kong 17
Banking and finance technology forum packs out venue<br />
It was standing-room-only at a recent banking/finance tech event in Hong Kong<br />
By Computerworld Hong Kong staff<br />
The 5th annual Banking and Finance<br />
Technology Forum Asia 2009 was held<br />
on March 17, which is also Ireland’s national<br />
holiday: Saint Patrick’s Day. The “luck of<br />
the Irish” was with organizers Euro-Events as<br />
the event was absolutely packed—some events<br />
were standing-room-only as people gathered to<br />
hear speakers from the region dispense their<br />
wisdom on the technology driving financial<br />
services.<br />
Experts discuss optimization<br />
A lively panel discussion on the subject of<br />
“Competing in a Turbulent Marketplace: CIO’s<br />
Agenda for Year 2009” was moderated by Vincent<br />
Chan, partner, Technology and Security<br />
Risk Services, Ernst and Young.<br />
Michael Leung, SVP and CIO, China Construction<br />
Bank (Asia), spoke of the differences<br />
in banking today, with varieties of experiences<br />
in retail banking. “I sometimes wonder if there’s<br />
still any room for banks to make some money,”<br />
said Leung. “We’re expending a lot of money<br />
and effort to follow compliance regulations,”<br />
but, he said, many new rules and processes were<br />
confusing—such as the need to have a younger<br />
person to accompany elderly customers when<br />
purchasing certain investment products.<br />
Leung also mentioned the need for centralization<br />
of back-office processes. “Our cost-cutting<br />
is brutal,” he declared. “For instance, we plan to<br />
add 10 new branches while keeping the bank’s<br />
headcount at roughly the same level. We now<br />
have automatic shut-off of PCs at [approximately]<br />
9PM each day, and if you need to work late,<br />
you have to pre-register.”<br />
The CCB executive said his firm no longer<br />
pays OT as a normal practice. “And paper-use is<br />
to be cut drastically,” he said, “it doesn’t matter if<br />
you print one-side, two-side, whatever.”<br />
“I don’t think there’s a CIO out there, in any industry,<br />
who’s not using outsourcing,” said Alpesh<br />
Patel, Regional Head of IB IT, APAC, UBS (Hong<br />
Kong). “Our firm is going into virtualization, but<br />
it’s not quite there yet, even though the vendors<br />
will tell you it is. Your infrastructure is sitting out<br />
there at 10-15% [utilization], but at market-close<br />
it’s 90%, so you need it.”<br />
“Unless you’re in this industry, you won’t believe<br />
the need for storage: every Powerpoint [presentation]<br />
or other data must be kept for years,”<br />
he said. “[And] because of security breaches, offsite<br />
storage must be encrypted.”<br />
Leung said it was ironic that “in a few cases,<br />
regulatory compliance and cost reduction work<br />
well together. For example the HKMA [Hong<br />
Kong Mo<strong>net</strong>ary Authority ]and the PDPO [Personal<br />
Data Privacy Ordinance] say you should<br />
retain your customers’ data for seven years, but<br />
no longer. Seven years [plus] one day is unnecessary<br />
and strictly speaking illegal! So by purging<br />
older data from databases we’ve been able<br />
to curtail our storage growth rate while staying<br />
fully compliant.”<br />
Vendor discounts<br />
“With the buying power we have, we can get<br />
excellent discounts from vendors these days,”<br />
said Leung. “We can also find great talent now in<br />
the job market, such as branch managers.”<br />
David Lau, head of IT, Kim Eng Securities<br />
We plan to add 10 new branches while keeping the bank’s<br />
headcount at roughly the same level<br />
— Michael Leung, China Construction Bank (Asia)<br />
Hong Kong, agreed with Leung. “This is the best<br />
time to look for new talent,” he said. For vendors,<br />
said Lau: “It’s a great time to approach companies<br />
with new deals.”<br />
“Even in this job market, the best people command<br />
a premium,” said Patel. “For vendors,<br />
you’ve got a contract, but it needs renewal, so<br />
prepare to be flexible. On the vendor-side, don’t<br />
lose heart: we’re both in roles where we’ve both<br />
been successful, if we keep a long-term view, we<br />
can keep it going.”<br />
Financial trends have shifted drastically, noted<br />
Leung. “As a mainland bank, we are now manu-<br />
Patel from UBS: <br />
<br />
facturing our own investment products—bonds,<br />
structured notes—because people no longer believe<br />
in those big names overseas anymore,” he<br />
said.<br />
“As for our bank, products have become simplified,”<br />
said Patel. “The buffet is gone—now you<br />
get the menu, and you look in your pocket to see<br />
who much money you have.”<br />
Ensuring exchanges<br />
Ian Tan, regional sales director for Asia, Tumbleweed<br />
Communications (now merged with<br />
Axway), gave a presentation on “Compliance and<br />
Data Security on File Exchanges in Financial Institutions.”<br />
Tan pointed out that the patchwork of legacy<br />
systems, connected by FTP scripts of various<br />
vintages, can’t meet new security requirements<br />
such as the PDPO.<br />
He said that “we hear horror stories of customer<br />
data being leaked” in Asia, there’s not necessarily<br />
legal necessity to publicize leakage, so we<br />
may only hear about it when the media gets the<br />
information.<br />
Tan added that the means of file transfer between<br />
clients and the enterprise <strong>net</strong>work are<br />
many and varied, and that cash management systems<br />
demanded scalability and security. <br />
Computerworld Hong Kong April 2009 www.cw.com.hk
Sponsored Feature<br />
Have you ever been through sleepless nights<br />
worrying about:<br />
<br />
<br />
ruption?<br />
<br />
<br />
<br />
-<br />
ership?<br />
-<br />
<br />
<br />
-<br />
<br />
-<br />
-<br />
<br />
Data protection, replication and disaster<br />
recovery under one roof<br />
<br />
<br />
<br />
<br />
-<br />
-<br />
<br />
<br />
<br />
<br />
-<br />
No More Sleepless Nights<br />
<br />
<br />
<br />
Making Protection Effective and Affordable<br />
<br />
<br />
-<br />
<br />
<br />
-<br />
<br />
<br />
-<br />
<br />
<br />
Intelligent Protection and Speedy<br />
Recovery<br />
-<br />
<br />
Significant Reduction of Data Recovery Time<br />
<br />
<br />
<br />
<br />
<br />
-<br />
<br />
-<br />
<br />
-<br />
<br />
-<br />
<br />
<br />
-<br />
<br />
<br />
-<br />
-<br />
<br />
<br />
-<br />
-<br />
<br />
<br />
<br />
<br />
-<br />
<br />
-<br />
<br />
<br />
<br />
<br />
Businesses of all sizes<br />
-<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
will equip you with insights into<br />
<br />
-<br />
<br />
<br />
<br />
<br />
<br />
Eternal Salvation: Continuous Data Protection<br />
Date<br />
<br />
<br />
<br />
<br />
<br />
Topic<br />
<br />
<br />
<br />
<br />
<br />
8 May Eternal Salvation: Continuous Data Protection<br />
<br />
<br />
Event Details<br />
Date: 8 May 2009 (Friday)<br />
Time: 2:30 – 5:00 p.m.<br />
Venue: 9/F Cityplaza 4,<br />
Taikoo Shing, Hong Kong<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
cw0309EMC_advertorial.indd 1<br />
4/3/09 10:20:40 AM
Jim Longwood<br />
Asia’s top 10 locations for offshore IT services<br />
The impact of the economic downturn is<br />
driving companies to consider moving<br />
their IT services to lower-cost locations.<br />
However, determining where to host such operations<br />
is a daunting task for many organizations.<br />
Gartner assessed the suitability of A-Pac countries<br />
as offshore locations and identified “10<br />
Leading Locations for Offshore Services in Asia<br />
Pacific for 2009.” These included the undisputed<br />
leader in offshore services (India) and the greatest<br />
challenger in terms of potential scale (China).<br />
The rest are a mix of mature environments that<br />
offer limited cost-benefits (Australia, New Zealand<br />
and Singapore) and emerging countries<br />
with a variety of challenges, but attractive costs<br />
(Malaysia, Pakistan, the Philippines, Thailand,<br />
and Vietnam).<br />
Although India continues to grow in top-line<br />
revenue levels of IT services being exported, its<br />
share of the overall worldwide totals has declined<br />
as other countries are investing to gain more market<br />
share. Enterprises seek strategies to reduce<br />
risk, and India faces challenges. These include<br />
wage inflation, local attrition rates, geopolitical<br />
issues (including the Mumbai terrorist attacks)<br />
and the “Satyam Effect.”<br />
Despite increases in investment, infrastructure<br />
remains India’s biggest weakness—<br />
strained power capacity and inadequate connectivity<br />
remain challenges. Some IT service<br />
categories such as application outsourcing<br />
have matured and the level of incremental<br />
growth is smaller.<br />
The Philippines generates considerably more offshore revenue<br />
than China...the country has a history of providing services to<br />
the US and Asian markets<br />
Testing methodology<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
What about China?<br />
Alternatives in the Asia Pacific region? Gartner<br />
analysis shows a number of countries positioning<br />
themselves as credible alternatives.<br />
China is attracting great interest. But it still has<br />
challenges to buyer confidence: security, quality<br />
and intellectual property issues, relatively low<br />
English-language capabilities, and a scarcity of<br />
middle managers.<br />
A large portion of the current market is geared<br />
to R&D-embedded engineering services, which<br />
differ significantly from commercial enterprise<br />
buyer requirements. Thus, there is a need to<br />
build strong process and quality maturity for delivery<br />
of IT services to commercial enterprises.<br />
Marketing skills across the value chain of the<br />
outsourcing industry are still immature, which<br />
results in a lack of information access and authenticated,<br />
verified sources of data for decisionmaking.<br />
Organizations wishing to engage China<br />
today should plan and budget for more-substantial<br />
levels of project management, change management<br />
and governance requirements, given<br />
the immaturity of the market.<br />
Where else then?<br />
The Philippines generates considerably more<br />
offshore revenue than China. The country has a<br />
history of providing services to the US and Asian<br />
markets. Some IT services have been exported<br />
for more than 15 years. It’s now a key outsourcing<br />
destination for call centers, finance and accounting.<br />
English continues to be the predominant language<br />
in the country and the level of accent<br />
neutralization required is relatively low—significantly<br />
lower than in India and China. It has a<br />
good labor pool that’s scalable at low cost and its<br />
overall cost structure is lower than India’s. Wage<br />
inflation and attrition ratios are also lower.<br />
When considering the Philippines as an offshore<br />
location, companies must be sure to establish<br />
adequate risk mitigation measures around<br />
intellectual property protection, security and<br />
privacy. They should also ensure they are comfortable<br />
with specific technology and industry<br />
knowledge before signing a deal.<br />
Companies seeking to be pioneers in a large<br />
and untapped low-cost destination should investigate<br />
Vietnam. Opportunities exist, but rigorous<br />
due diligence is required. Salaries of IT and business<br />
process professionals are among the lowest<br />
in the world. Consequently, Ho Chi Minh City<br />
and Hanoi are attracting a good deal of interest<br />
from major IT companies. Both IBM and CSC<br />
have made substantive investments in setting up<br />
global delivery centers in the country.<br />
However there are some major challenges,<br />
which include a significant lack of awareness<br />
of key business practices and operating norms,<br />
and few known vendors. Reliable information regarding<br />
Vietnam is scarce, and difficulty in doing<br />
business in Vietnam from a logistical and funding<br />
perspective is a key hurdle.<br />
Companies should think carefully before allowing<br />
the excellent cost base to overly influence<br />
their choice of Vietnam as an offshore destination.<br />
Understand all the risks, including hidden<br />
costs, risks related to data security, ease-of-doingbusiness<br />
issues and relatively low-level Englishlanguage<br />
skills.<br />
Tread carefully<br />
In the current economic climate there are<br />
definite advantages in moving IT services offshore.<br />
But organizations and vendors eyeing<br />
any of the 10 Asia-Pacific countries in the Gartner<br />
report should understand that each country<br />
in the region is quite a different market in<br />
which to operate, particularly if companies are<br />
considering doing local business as well as offshore<br />
business.<br />
<br />
Jim Longwood is a Gartner<br />
research vice president based<br />
in Melbourne. As part of both<br />
the Asia/Pacific and global IT<br />
services teams he is responsible<br />
for undertaking research on<br />
sourcing best practices, trends<br />
and market positioning of<br />
external service providers in the Asia/Pacific IT<br />
services market<br />
20 Computerworld Hong Kong April 2009 www.cw.com.hk
Join the industry’s thought leaders in<br />
IDC’s premier events in 2009!<br />
REGISTER ONLINE @ www.IDCcircle.com!<br />
<br />
Preparing for the Next 20 Years of IT<br />
10 March - 24 April<br />
<br />
Singapore > Malaysia > Korea > New Zealand > Australia > China > Hong Kong > India<br />
<br />
IT Security Strategies: Weathering the Economic Storm<br />
02 April – 17 June<br />
<br />
Singapore > Malaysia > Taiwan > Korea > Thailand > Hong Kong > China > India > Australia<br />
<br />
02 June – 16 June<br />
<br />
Singapore > China > India<br />
IDC Asia/ Pacific<br />
12/F., St. John’s Building, 33 Garden Road, Central, Hong Kong
Peter Bullock, Pinsent Masons<br />
Security breaches: leaning on the suppliers<br />
It seems unlikely for a health authority to blame<br />
a hardware-supplier for data leaks caused by<br />
one of the authority’s own employees misusing<br />
a USB stick. Yet there are many occasions<br />
where suppliers—or their subcontractors—have<br />
been directly responsible for a security breach.<br />
The rise in these incidents (coupled with media<br />
reportage) has led to significant changes in commercial<br />
contracts covering the handling of sensitive<br />
data as well as the balance between data<br />
owners and their suppliers.<br />
Vague responsibilities<br />
The Personal Data (Privacy) Ordinance (PDPO)<br />
implicitly requires that organizations load their required<br />
security standards onto third party suppliers.<br />
In the past, organizations preparing contracts<br />
for IT projects have attempted to abdicate responsibility<br />
by putting a boilerplate (standardized-text)<br />
provision in the contract which states that the supplier<br />
will do what is appropriate regarding security.<br />
In the event of any security breach, contractual<br />
disputes are a certainty.<br />
Despite general awareness that security obligations<br />
must be passed to suppliers, there is a<br />
lack of audit processes and assurance processes<br />
in relation internal and external security. Third<br />
parties with access to an organization’s data, particularly<br />
suppliers, are not subject to any form of<br />
order or review.<br />
The law has remained static but regulatory responses<br />
and media reaction have changed radically.<br />
Audit and assurance procedures have become<br />
a key issue on the boardroom agenda in many<br />
organizations—as opposed to 12 months ago.<br />
Regulatory consequences and adverse PR<br />
consequences mean that organizations must<br />
boost their efforts in this area. They must decide<br />
whether their real world controls for the transfer<br />
of personal and confidential information to third<br />
parties, particularly suppliers, are effective.<br />
A tipping point came recently in Hong Kong<br />
when both HSBC and the Health Authority revealed<br />
serious security breaches within days of<br />
each other, attracting substantial media attention.<br />
Now both public and private sectors recognize<br />
that this issue requires revision, allocation<br />
of resources, and be escalation up risk registers<br />
within organizations. People now understand<br />
that this is not a mere compliance issue but a<br />
time-bomb that can damage the reputation of a<br />
business and ultimately the bottom-line.<br />
Guarding the gates<br />
Organizations are no longer satisfied with boilerplate-text:<br />
they demand a project-specific information<br />
security plan with specific controls and<br />
safeguards which respond to the specific risks<br />
identified. When standard practice evolves, consumer<br />
expectations change and interpretation of<br />
<br />
security guarantee<br />
the PDPO changes because what’s appropriate<br />
today might not be appropriate tomorrow.<br />
We’re seeing large organizations across many<br />
sectors—including energy, financial services,<br />
retail and the public sector—examining their<br />
supplier-selection process and how they identify<br />
information security risk within the supplier<br />
base.<br />
Internal audit departments and group security<br />
departments are examining contracts to vet supplier<br />
performance. Is the objective to mitigate,<br />
manage and control real world security risk?<br />
How does having “perfect contract” accomplish<br />
that? Yes, liability issues might be covered so<br />
you may not end up paying the bill if a security<br />
breach occurs, but in that unfortunate event it<br />
may be your firm’s brand and reputation on the<br />
line and it may be you personally explaining to<br />
the CEO why it happened.<br />
Set your standards<br />
Project Specific Information Security Risks<br />
and Controls should be drawn from ISO standards<br />
or other appropriate international standards.<br />
It is important to note that ISO standards<br />
are not a panacea. They are a set of control objectives,<br />
control statements and controls which<br />
organizations draw upon to manage real world<br />
scenarios.<br />
It’s not enough to assure a supplier you will<br />
comply with ISO requirements. You must identify<br />
risks, what controls will manage and mitigate<br />
those risks, then specifically require the<br />
supplier to implement those controls. But during<br />
this process, both parties must recognize<br />
that this is not a black and white issue.<br />
Implementation of controls may not be enough<br />
to achieve absolute security and no organization<br />
can expect a supplier to give an absolute security<br />
guarantee.<br />
Security costs<br />
This degree of process does not come cheap.<br />
Producing project-specific risk analyses, coping<br />
mechanisms, and security audits, especially on<br />
a substantial IS (information security) project,<br />
consume thousands of man-hours of consulting<br />
resources. And these projects often take years<br />
to complete.<br />
The landscape for contractual requirements<br />
surrounding security provisions has changed<br />
so radically and so rapidly that what now seems<br />
like common sense and best practice to procurers<br />
of IS projects doesn’t match the contractual<br />
requirements those procurers signed their suppliers<br />
to, on the same project, 18-24 months previously.<br />
Much to their annoyance, these procurers<br />
are now finding that their suppliers are making<br />
claims for the work associated with “state of the<br />
art” security arrangements, by way of change<br />
controls. Sometimes the figures involved are<br />
quite staggering.<br />
Security is no longer boilerplate. <br />
Peter Bullock, a technology lawyer,<br />
is a partner with Pinsent<br />
Masons in Hong Kong and can<br />
be contacted at peter.bullock@<br />
pinsentmasons.com<br />
22 Computerworld Hong Kong April 2009 www.cw.com.hk
Converging Risk and Security<br />
to Better Manage Uncertainty<br />
Bringing together security and risk management<br />
to mitigate threats and cope with rapid change<br />
A Perfect Storm is Brewing!<br />
21May<br />
2009<br />
Room 301, Hong Kong Convention and<br />
Exhibition Centre<br />
Organizer Principal Partner Official Media<br />
(Thursday)<br />
The recent high profile cases at Hong Kong Police and UBS bank<br />
show that critical data leaks and information security lapses are still<br />
occurring despite a slew of security technologies being available.<br />
It is times like these that companies face the greatest risks.<br />
Join the 10th InfoSecurity Conference to learn how best to protect<br />
your business and people.<br />
Info-Security Conference<br />
The industry’s leading Info-Security Conference since 2001<br />
More than 700 attendees in 2008 and in 2007<br />
More than 20 sponsors and supporting organizations in 2008<br />
Please mark your diary and REGISTER NOW:<br />
http://www.infosecurityproject.com/registration<br />
For more information on the event:<br />
http://www.infosecurityproject.com<br />
Hong Kong's most significant security event of 2009<br />
features the following key speakers:<br />
Topic of Opening Keynote:<br />
Recession Hackernomics<br />
Dr Herbert "Hugh" Thompson<br />
Chief Security Strategist, People Security<br />
Renowned inter<strong>net</strong> security guru and<br />
author, Dr Thompson was named as<br />
one of the "Top 5 Most Influential<br />
Thinkers in IT Security" by SC Magazine.<br />
Executive Panel Discussion:<br />
Topic: The Importance of IT Risk Management within the<br />
Risk Framework<br />
Steve Tunstall<br />
Group Risk Manager,<br />
Cathay Pacific Airways<br />
Stephane Vidart<br />
Regional CIO,<br />
AXA Asia Life<br />
Carsten Paasch<br />
Head of Group Information Security,<br />
Standard Chartered Bank<br />
And More….<br />
Platinum Sponsor: Diamond Sponsors: Executive Luncheon Sponsor: Executive Panel Discussion Sponsor:<br />
Gold Sponsors:<br />
Exhibition Sponsors: Official Notebook Sponsor: Official Projector Sponsor: Official VMS Sponsor:<br />
Supporting Organizations:<br />
Proudly presented by<br />
For enquiries, please contact Ms. Grace at<br />
Tel : (852) 2186 8725 or email: grace.wu@e21mm.com<br />
(Co-owned by e21 MagicMedia and Questex Media Group)
Local online marketing intelligence firm to go global<br />
As the downturn deepens, online marketing becomes increasingly important<br />
for Hong Kong, says Admomo’s founder and director Winston Law<br />
By Teresa Leung<br />
WL: At the moment our customers come from<br />
Asia Pacific. They include portal sites and gambling<br />
companies.<br />
CWHK: How much does it cost to use your services?<br />
WL: For Hong Kong data only, it costs HK$40,000<br />
a year for one account. Australian data costs<br />
HK$80,000 annually because there are about 600<br />
publishers in the country, which is a higher number<br />
than Hong Kong.<br />
CWHK: How much have you invested in<br />
R&D?<br />
Admomo’s Law (left) and CTO Felix Ng: We aim for 2,000 customers in two years<br />
CWHK: Why online marketing intelligence?<br />
Winston Law: Nowadays we see more companies<br />
with online marketing strategies. This trend<br />
is more obvious when businesses are affected by<br />
an economic downturn because online media is<br />
low cost, interactive, and provides measurable<br />
ROI.<br />
According to survey results announced by Nielsen<br />
Media Research earlier this year, Inter<strong>net</strong> media<br />
budgets are expected to increase from 6 percent to<br />
8 percent. However, the average budget of each advertiser<br />
will fall to HK$17.8 million compared with<br />
HK$20.4 million last year.<br />
At the same time, advertisers want to know the<br />
most effective online advertising platform, what<br />
their rivals are doing online and how much they<br />
spend, as well as online advertising trends in particular<br />
industries. An online marketing intelligence<br />
service provides answers to all these questions.<br />
CWHK: How many Web sites are offering advertising<br />
space in Hong Kong?<br />
WL: There are already more than 200 publishers.<br />
We call Web sites that offer advertising<br />
space “publishers.” In 2008, there were more<br />
than 4,000 advertisers (excluding Google ads)<br />
and more than 10,000 campaigns valued at more<br />
than HK$600 million.<br />
CWHK: When was the company founded?<br />
WL: Admomo was founded in 2007. We have a<br />
team of 30 people. Our Hong Kong office is Admomo’s<br />
R&D base while the content team in<br />
Shenzhen is responsible for inputting content<br />
like advertising slogans, which then become<br />
searchable data for our customers.<br />
Our crawler automatically searches for new campaigns<br />
and updates the server. But data like slogans<br />
must be compiled and presented manually in a format<br />
friendly to users.<br />
CWHK: Who are some of your competitors?<br />
WL: The major one is AC Nielsen. Including us,<br />
there are only three companies that offer global<br />
data [about online advertising campaigns].<br />
CWHK: How do you differentiate?<br />
WL: Admomo’s user interface is user-friendly.<br />
Our data are organized according to industry,<br />
advertiser, products, and publishers. Many of<br />
our rivals only show banner images, which aren’t<br />
useful to users.<br />
We also provide product/campaign comparison<br />
while our competitors don’t and their customers<br />
have to consolidate reports manually for comparison.<br />
Our products are [available] both in English and<br />
the local languages used in markets where we have<br />
presence. We also team with Alexa which provides<br />
traffic data and offer customers more detailed campaign<br />
and/or traffic comparison.<br />
CWHK: What is your partner strategy?<br />
WL: Besides traffic data providers like Alexa, we<br />
want to work with channel partners overseas.<br />
CWHK: Who are your customers? Are most of<br />
them from Hong Kong or overseas?<br />
WL: Around HK$1 million. We are also in the process<br />
of applying for funds from the Small Entrepreneur<br />
Research Assistance Program (SERAP)<br />
offered by the Hong Kong government’s Innovation<br />
and Technology Fund.<br />
CWHK: How’s the Hong Kong online advertising<br />
market different from others?<br />
WL: Hong Kong firms are conservative when it<br />
comes to online campaigns. Despite increasing<br />
spending in online ads, Hong Kong is still behind<br />
markets like Australia and Japan where online<br />
campaign budgets are more than 20 percent of<br />
their marketing spending.<br />
CWHK: What’s the range of online campaign<br />
costs in Hong Kong ?<br />
WL: They range from HK$4 to HK$230 for every<br />
1,000 impression.<br />
CWHK: What’s your targeted customer base?<br />
WL: 2,000 customers worldwide in two years.<br />
CWHK: What’s your expansion plan?<br />
WL: We will launch our service in China in<br />
about two months, and in Australia, Singapore,<br />
and Taiwan at a later stage. We plan to<br />
cover 10 countries within this year and 15 by<br />
mid-2010.<br />
CWHK: How much will this expansion plan<br />
cost you?<br />
WL: We will only need to add a few people to our<br />
content team. I don’t think it will jack up our cost<br />
significantly.<br />
<br />
24 Computerworld Hong Kong April 2009 www.cw.com.hk
Helping the tough get going<br />
Microsoft showcases a host of technologies aimed at helping businesses<br />
survive the economic downturn by ‘doing more with less’ at the Achieve<br />
More Summit By Jason Krupp<br />
Microsoft recently held a one-day conference<br />
in Hong Kong as part of their<br />
Achieve More campaign, which aimed<br />
to help Asian businesses weather the current<br />
economic downturn.<br />
The conference consisted of two sessions<br />
which focused on enterprise-level companies and<br />
SMBs respectively.<br />
The enterprise session was opened by Adam<br />
Anger, senior director of the Microsoft business<br />
& marketing organization Hong Kong, who noted<br />
that during tough times such as these companies<br />
often demand that IT help drive profitability<br />
on one hand, while cutting the budget with the<br />
other.<br />
This paradox was summed up neatly by the<br />
phrase ‘doing more with less’ by Anger.<br />
“There is a lot of pressure both internally and<br />
externally in terms of how we manage businesses<br />
in tough times, and I think that presents a role<br />
—a great opportunity—for leaders in IT to figure<br />
out how their businesses can mange through the<br />
tough times,” said Anger.<br />
Transforming to survive<br />
Following on from Anger was Enrico Benni,<br />
partner and head of greater China business practice<br />
at McKinsey & Company, who shared some<br />
of his view on how CIOs must adopt a number of<br />
new roles in addition to their traditional ones if<br />
Benni: <br />
<br />
<br />
<br />
their organizations are to weather the crisis.<br />
These five roles include: adopting a corporate<br />
finance role by finding new sources of cash for<br />
the business; becoming a broker between the<br />
business units to assess which projects to drive<br />
and which to drop; communicating to the organization<br />
the value of a project; preparing the organization<br />
for upstream regulatory changes in the<br />
business space; and lastly a driver of outsourcing<br />
and offshoring.<br />
What these roles highlighted, according to<br />
Benni, was the fundamental need for businesses<br />
to change their operating model if they are to<br />
survive.<br />
“If you look at companies that were leaders<br />
before the previous downturn, and the ones that<br />
were still leaders after the downturn, what you<br />
see is that half have changed position,” noted<br />
Benni.<br />
“What you see in the companies that remained<br />
leaders is that they have fundamentally taken the<br />
opportunity from the downturn to rethink how<br />
they operate.”<br />
And this, he said, is where IT can play a significant<br />
part, specifically in three main areas:<br />
improving business efficiency by streamlining<br />
processes and the cash conversion cycle; driving<br />
smart growth by leveraging internal synergies<br />
through CRM that were not possible in boom<br />
times; and finally—and most importantly—strategy<br />
transformation.<br />
“Companies can view the crisis as a time to<br />
stay put, survive and come out and be the same<br />
company as you were before. For some that is<br />
the right strategy,” said Benni.<br />
“However, some companies are fundamentally<br />
taking advantage of the crisis to become the new<br />
leaders. This requires thinking about transformation<br />
and new ways of operating. The people<br />
who are working in the CIO community have to<br />
think about these roles and be prepared to assume<br />
these roles in your company and be much<br />
more positive.”<br />
End-to-end view<br />
John C Phillips, enterprise technology strategist<br />
for Microsoft, followed on from Benni, and<br />
explained exactly how CIOs can do more with<br />
less using the Microsoft platform.<br />
He started by asking attending IT leaders to<br />
classify where their operations fall on the value<br />
Phillips: <br />
<br />
chain in their organization, stating at the bottom<br />
with ‘fighting fires’, moving to ‘gaining control’,<br />
then ‘business enabler’ and highest of all, ‘viewed<br />
as a strategic asset’.<br />
“The reality is that 80 to 90% of customers in<br />
Asia are still in the ‘fighting fires’ mode,” said<br />
Phillips.<br />
“It has been identified across a number of<br />
analyses and surveys that the management cost<br />
per PC per user is about HK$<strong>14</strong>,000 per year—<br />
that is in the fighting fires mode. If we can move<br />
you more to ‘business enabler’ or even ‘gaining<br />
control’, you can drop this number by 10 to 20%<br />
per PC per year. That is money back in your<br />
pocket.”<br />
Phillips identified a number of key technology<br />
areas where he says Microsoft can help customers<br />
move up the value chain, namely business<br />
intelligence (BI) and Customer Relationship<br />
Management (CRM), collaboration and unified<br />
communications and virtualisation and IT management,<br />
which link into a interconnected platform.<br />
This was showcased using live demonstrations<br />
from Microsoft solution specialists, who looked<br />
at Microsoft BI, SharePoint, Office Communications<br />
Server and Windows Server.<br />
To close, he urged customers to look into how<br />
they can use their existing infrastructure, and<br />
link it into a single platform to drive transformation<br />
through their business.<br />
“I urge (customers) to do more with what<br />
you’ve got. In many cases you’ve got the technology<br />
already. Now upgrade and get the benefits<br />
and the value,” concluded Phillips.<br />
Speaker presentations and more information<br />
can be found at: www.microsoft.com/hk/<br />
achievemore<br />
<br />
26 Computerworld Hong Kong April 2009 www.cw.com.hk
industryevent<br />
Driving IT to deliver full value<br />
Five technology leaders shared their insights into how businesses can leverage existing<br />
capacity to help them navigate through the current economic slump<br />
By Jason Krupp<br />
Last month, at Microsoft’s Achieve More<br />
Summit, CIOs and IT industry executives<br />
sat down for a panel discussion to highlight<br />
some of the challenges they are facing with<br />
the slowdown in the global economy, and how<br />
they are using Microsoft technology platforms to<br />
navigate around this.<br />
Despite the gloom, the panel cautioned technology<br />
executives that the key was not to focus on<br />
the negative effects of the economic downturn,<br />
and instead focus on ‘clean-up’ and consolidation<br />
projects that might have been considered ‘handsoff’<br />
during the good times.<br />
“The mantra for many boards for many years<br />
has been work ‘smarter rather than harder’. The<br />
only problem with that is that people were making<br />
a lot of money to satisfy shareholders (in the<br />
boom), and were basically resistant to change,”<br />
said Patrick Slesinger, director and CIO at Wallem<br />
Innovative Solutions.<br />
We are now able to do a number of programs<br />
which were perhaps considered too disruptive<br />
to the business while in the boom<br />
– Patrick Slesinger, Wallem Innovative Solutions<br />
“Now, with the economic crisis, what we have<br />
is people fearing for their company’s survival,<br />
and they are willing to take quantifiable risks. We<br />
are now able to do a number of programs which<br />
were perhaps considered too disruptive to the<br />
business while in the boom. This is the time IT<br />
can really help the business.”<br />
Blood from a stone<br />
The panel noted that one of the main areas in<br />
which IT can help is in driving efficiencies and<br />
productivity within the organization, and position<br />
it for rapid growth once the economy recovers.<br />
The challenge for IT leaders lies in getting<br />
capex-shy boards to see the value of investing in<br />
projects that will help them achieve this.<br />
One of the ways most effective ways identified<br />
to do this was by making use of what companies<br />
already have.<br />
“Many people don’t want to spend any more<br />
money, but the reality is that a lot of them have<br />
Patrick Slesinger (left) and Avi Raju (right) discuss the possibilities of IT taking on a driving role in navigating business<br />
through the recession.<br />
invested in systems and architecture for many<br />
years,” said John C Phillips, enterprise technology<br />
strategist for Microsoft.<br />
“We still find that in many cases customers<br />
haven’t 100% deployed what they own, and so it’s<br />
about investigating what<br />
they’ve got and find ways<br />
to use it better.”<br />
Enrico Benni, partner<br />
and head of greater China<br />
Business Practice at<br />
McKinsey & Company,<br />
noted that CIOs need to<br />
aggressively defend their<br />
budgets with sound business<br />
reasoning in order for it to resonate with<br />
senior management.<br />
“We see people cutting costs on IT purely to<br />
generate a bit more cash but this does not bring<br />
them what they need. There is a calculation that<br />
if you cut IT cost by 15% your impact on EBITA is<br />
only 0.5 percent,” noted Benni.<br />
“However, if you invest in IT your turnaround<br />
could get back double or 10 times what you<br />
invested in the first place. So I think there is<br />
a fundamental role for the CIO here, to help<br />
people step up and understand that transformation<br />
is a lot more than just cutting the project<br />
budget.”<br />
Pitch the right project<br />
It was also pointed out that corporate purse strings<br />
are not completely sealed if the right project.<br />
“I think boards are actually quite open to initiatives<br />
on transformation right now,” said Avi<br />
Raju, Director of Asia Information Technology at<br />
Savills, where the recent focus has been on virtualizing<br />
its server environment, creating better<br />
processes and strengthening its CRM platform.<br />
“You should not only look at internal processes,<br />
but also at your competitors and see how they<br />
are placed, what their market share and profile<br />
is and how you can benefit. I think if the right<br />
proposition is put to the board and leverages existing<br />
infrastructure, they will be quite open to<br />
spending on it.”<br />
Benni also pointed out the appeal of implementing<br />
CRM solution right now. “Look at sharing<br />
of customer data across the business units,<br />
something that was very hard to do in the growth<br />
market,” said Benni.<br />
“Right now there are pricing benefits if you can<br />
share this information and put more transparency<br />
in place between the business units, allowing<br />
you to cross sell and up sell.”<br />
Slesinger pointed out that the focus of ERP<br />
systems had now moved beyond process engineering,<br />
and into outsourcing and offshoring to<br />
reduce costs and drive efficiencies.<br />
It was also noted by the panellists that unified<br />
communications platforms are increasingly being<br />
seen as a means to reducing costs and improving<br />
productivity, a strategy that some companies are<br />
employing to drive better collaboration and also<br />
save on travelling to meetings.<br />
Microsoft’s Phillips summarized the discussion.<br />
“You can take a lot of advantage of the<br />
technology you already have in place, and start<br />
to bring together business information and make<br />
smarter, more collaborative decisions,” he said.<br />
“And it’s not always about huge reinvestments in<br />
technology.”<br />
<br />
www.cw.com.hk<br />
April 2009 Computerworld Hong Kong 27
technews<br />
Fatal flaw for IPv6: It’s not backwards compatible<br />
The Inter<strong>net</strong> engineering community<br />
said its biggest mistake in developing<br />
IPv6—a long-anticipated upgrade to the<br />
Inter<strong>net</strong>’s main communications protocol—is<br />
that it lacks backwards compatibility with the<br />
existing Inter<strong>net</strong> Protocol, known as IPv4.<br />
At a panel discussion held in San Franciso<br />
last month, leaders of the Inter<strong>net</strong> Engineering<br />
Task Force (IETF) admitted that they<br />
didn’t do a good enough job making sure native<br />
IPv6 devices and <strong>net</strong>works would be able<br />
to communicate with their IPv4-only counterparts<br />
when they designed the industry standard<br />
13 years ago.<br />
“The lack of real backwards compatibility for<br />
IPv4 was the single critical failure,” said Leslie<br />
Daigle, chief inter<strong>net</strong> technology officer for the<br />
Inter<strong>net</strong> Society. “There were reasons at the<br />
time for doing that...but the reality is that nobody<br />
wants to go to IPv6 unless they think they’re<br />
friends are doing it, too.”<br />
Originally, IPv6 developers envisioned a scenario<br />
where end-user devices and <strong>net</strong>work backbones<br />
would operate IPv4 and IPv6 side-by-side<br />
in what’s called dual-stack mode.<br />
However, they didn’t take into account that<br />
some IPv4 devices would never be upgraded<br />
to IPv6, and that some all-IPv6 <strong>net</strong>works would<br />
need to communicate with IPv4-only devices or<br />
content.<br />
IPv6 proponents said the lack of mechanisms<br />
for bridging between IPv4 and IPv6 is the single<br />
Salesforce.com is working to integrate its<br />
Service Cloud customer-service platform<br />
with the popular messaging service Twitter,<br />
the company said recently.<br />
Salesforce CRM for Twitter, now in beta, will be<br />
available this summer at no additional charge for<br />
Service Cloud users.<br />
Launched in January, the Service Cloud combines<br />
concepts like online customer communities,<br />
social <strong>net</strong>working, knowledge base information,<br />
and making data from cloud services<br />
like Facebook and Twitter available to e-mail,<br />
phone and chat-based customer service representatives.<br />
While there’s nothing stopping a salesperson<br />
from simply using Twitter directly, the integration<br />
pulls relevant Twitter conversations into<br />
the Service Cloud and allows users to reply directly.<br />
In a demonstration of the new capability, Salesforce.com<br />
showed how someone working for a<br />
telecom provider could spot and track a discussion<br />
biggest reason that most ISPs and enterprises<br />
haven’t deployed IPv6.<br />
“Our transition strategy was dual-stack, where<br />
we would start by adding IPv6 to the hosts and<br />
then gradually over time we would disable IPv4<br />
and everything would go smoothly,” said IETF<br />
chair Russ Housley, who added that IPv6 transition<br />
didn’t happen according to plan.<br />
In response, the IETF is developing new IPv6<br />
transition tools that will be done by the end of<br />
2009, Housley said.<br />
“The reason more IPv6 deployment isn’t being<br />
done is because the people who are doing the<br />
job found that they needed these new transition<br />
tools,” Housley said. “These tools are necessary<br />
to ease deployment.”<br />
IPv6 is needed because the Inter<strong>net</strong> is running<br />
out of IPv4 addresses. IPv4 uses 32-bit addresses<br />
and can support approximately 4.3 billion individually<br />
addressed devices on the Inter<strong>net</strong>. IPv6, on<br />
the other hand, uses 128-bit addresses and can<br />
support so many devices that only a mathematical<br />
expression—2 to the 128th power—can quantify<br />
its size.<br />
Experts predict IPv4 addresses will be gone by<br />
2012. At that point, all ISPs, government agencies<br />
and corporations will need to support IPv6<br />
on their backbone <strong>net</strong>works. Today, only a handful<br />
of US organizations—including the federal<br />
government and a few leading-edge companies<br />
like Bechtel and Google—have deployed IPv6<br />
across their <strong>net</strong>works.<br />
<br />
Salesforce integrates service cloud with Twitter<br />
about a headset that a user was having trouble<br />
with. The telecom worker could dig through their<br />
company’s internal knowledge base and then send<br />
the Twitter user a link to a help document.<br />
Salesforce is using the beta period to fine-tune<br />
the integration’s performance and feel, according<br />
to a Salesforce.com spokesman.<br />
One industry observer called Salesforce.com’s<br />
move “incremental” but “interesting.”<br />
“Salesforce is showing that perhaps the best use<br />
of social <strong>net</strong>working is perhaps on the service side of<br />
CRM [customer relationship management] and not<br />
sales force automation,” said Rebecca Wettemann,<br />
vice president, research, at Nucleus Research.<br />
“The immediate advantage of this is for companies<br />
whose audience is teenage girls,” she added.<br />
“They’re constantly Twittering.”<br />
But before companies get enamored with the<br />
“next shiny thing,” which could be Twitter, they<br />
need to mull over the potential return on investment,<br />
she said.<br />
<br />
—Compiled by CWHK staff<br />
newsbytes<br />
<br />
Hong Kong<br />
NTT Com Asia opened its new seven-story data<br />
center building in Tai Po, Hong Kong in late March.<br />
The facility has a gross area of up to 212,100<br />
square feet and can provide more than 3,000 racks,<br />
said NTT Com Asia. The data center has been built<br />
to achieve the Tier III+ infrastructure level, NTT<br />
Com Asia said, adding that every aspect of its<br />
facilities, including power, cooling, and telecommunications<br />
systems are fully redundant to avoid<br />
single point of failure and to ensure business<br />
continuity.<br />
Hong Kong security info watchdog<br />
heads APCERT<br />
The Hong Kong Computer Emergency Response<br />
Team Coordination Centre (HKCERT) has been<br />
elected as the chair of the APCERT (Asia-Pacific<br />
Computer Emergency Response Team) recently<br />
during the annual general meeting held in Kaohsiung,<br />
Taiwan. This is the first time that Hong Kong<br />
heads the APCERT comprising 22 leading and<br />
national Computer Security and Incident Response<br />
Teams (CSIRT) from 15 economies of the Asia<br />
Pacific region, said the Hong Kong Productivity<br />
Council that manages the HKCERT established in<br />
2001.<br />
<br />
Novell unveiled SUSE Linux Enterprise 11 in late<br />
March, with features and capabilities that reflect<br />
the company’s controversial multiyear agreement<br />
with Microsoft. In 2006, Microsoft and<br />
Novell agreed to work on improving compatibility<br />
between their products, and pledged not to pursue<br />
patent claims against each other’s customers.<br />
Novell said SUSE 11 will work “seamlessly” with<br />
Windows regarding areas like systems management,<br />
virtualization, document formats and even<br />
multimedia.<br />
<br />
with Cisco tools<br />
Cisco announced recently that Hong Kong-based<br />
pay TV operator i-CABLE is deploying Cisco’s<br />
set-top boxes and video system to fight pirated TV<br />
viewing. The Cisco products that iCable is deploying<br />
consists of the Model D-PCG1000 PowerKEY<br />
Conditional Access System (CAS) Gateway, a digital<br />
headend system incorporating the Continuum DVP<br />
SI-Server MKV, ROSA Copernicus Network Management<br />
Server (NMS), Model D9630 Advanced QAM<br />
Modulators and DCM Digital Content Manager, and<br />
the Cisco’s Z368DVB Standard-definition (SD) settop<br />
series, which includes options for both digital<br />
cable and MMDS/satellite.<br />
Computerworld Hong Kong April 2009 www.cw.com.hk
Microsoft teams with Cyberport<br />
to support local start-ups<br />
As tech-related vacancies are dropping, it’s time for IT pros to think<br />
about starting their own businesses By Teresa Leung<br />
Tired of the job search? Want to test your<br />
entrepreneurship? The BizSpark creativity<br />
center of Microsoft might help you get<br />
a head start.<br />
The software vendor announced an initiative<br />
to support Hong Kong digital content and entertainment<br />
start-ups, as part of its global BizSpark<br />
program. By teaming up with Cyberport’s Incubation<br />
program dubbed IncuTrain, the BizSpark<br />
program in Hong Kong provides start-ups with a<br />
range of resources including software, technical<br />
support, marketing, and office space.<br />
According to Microsoft, the program is open<br />
to privately held start-ups that build digital entertainment<br />
and creative lifestyle content-based<br />
products or services. These firms must be in<br />
It’s time to develop your<br />
products now—don’t wait<br />
till the arrival of the upturn<br />
— Leung from Microsoft<br />
business for less than three years and have less<br />
than HK$7.8 million in annual revenue.<br />
“The economic downturn is a good time for<br />
[entrepreneurs] to start their own businesses,”<br />
said Simon Leung, chairman and CEO of Microsoft<br />
Greater China Region. “We estimate the<br />
economy will see improvement two years later.<br />
It’s now the right time to develop your products<br />
now and capture market and growth opportunities<br />
when the upturn arrives.”<br />
The vendor added that the software support<br />
amount from the BizSpark program will vary according<br />
to how start-ups architect their products.<br />
But it can be as much as HK$2 million based on<br />
a standard five-person software company, Microsoft<br />
noted.<br />
Leung said that program participants are expected<br />
to graduate in three years’ time.<br />
Asked why Cyberport rather than Hong Kong<br />
Science Park’s incubation program is a better<br />
place for digital content players, Nicholas Yang,<br />
CEO of Hong Kong Cyberport Management said,<br />
“Cyberport ‘s (incubation) program is dedicated<br />
to digital media, content, and entertainment<br />
while Science Park’s program is open to firms in<br />
Microsoft’s Leung: <br />
<br />
multiple areas including IT and biotech.”<br />
According to Leung, Microsoft already<br />
launched the BizSpark program in China last November<br />
and worked with various science parks<br />
in the country to facilitate development of startups.<br />
He added that the company will bring the<br />
same program to Taiwan at a later stage. <br />
Appointment news<br />
Number of new tech jobs drops<br />
37.6 percent in Hong Kong<br />
Freddy Tan<br />
Freddy Tan appointed to<br />
(ISC) 2 board of directors<br />
T <br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
2 .<br />
<br />
<br />
<br />
director of greater China<br />
<br />
<br />
<br />
<br />
responsible for business development in<br />
<br />
30 Computerworld Hong Kong April 2009 www.cw.com.hk
ANNIVERSARY covering Hong Kong technology since 1984<br />
CHANGE<br />
Yes we can help<br />
2008 is a year of changes - Staff Termination,<br />
New Join, Transfer & Promotion.<br />
So it is time to update your database<br />
and prepare for the challenges ahead.<br />
Computerworld HK can Help.<br />
CWHK Database Management Services<br />
Manage profitable relationships with existing<br />
and potential clients<br />
Outbound call for data cleansing<br />
Customer Acquisition / Retention /<br />
Customer Care Program<br />
www.cw.com.hk<br />
For enuiries, please contact Connie Yip, Account Director<br />
Tel: 2589 1373 or Email: cyip@questexasia.com<br />
technews<br />
techguide<br />
techfeature<br />
industryevent<br />
biznews<br />
viewpoint<br />
bizpeople<br />
analystwatch<br />
industryprofile
ANNIVERSARY covering Hong Kong technology since 1984<br />
<br />
Declining markets across the board still provides opportunities for leaders to shine among the gloom<br />
While CWHK prepares for<br />
another annual awards<br />
in June 2009, the industry’s<br />
vendors are still reeling from<br />
a 2008 that looked initially positive<br />
but ended rock-bottom. And the<br />
news is that 2009 will be worse than<br />
expected with Gartner predicting a<br />
decline in global IT spending by 4%.<br />
That means a greater contraction in spending<br />
than the dot com bust in 2001. “The IT market<br />
slowdown will be worse than 2001, that downturn<br />
was tech-related. Today there is a general<br />
slowdown in demand for products and services<br />
across the board and IT spending is not<br />
immune,” said Richard Gordon, research vice<br />
president of global forecasting at Gartner, on a<br />
conference call announcing the spending forecast.<br />
Gartner reported that global IT spending will<br />
reach about US$3.2 trillion in 2009, a 3.8% decline<br />
in growth from the $3.3 trillion spent in 2008. IT<br />
spending in 2001 saw a 2.1% decline, according<br />
to Gartner.<br />
Spending on hardware is expected to fall by<br />
a staggering <strong>14</strong>.9% to $324.3 billion. Software<br />
spending, which was supposed to be a relatively<br />
bright spot, is now seen as growing only threetenths<br />
of one percent, to $222.6 billion in 2009,<br />
and IT services is expected to decline by 1.7% to<br />
$796.1 billion. Telecom and <strong>net</strong>work spending,<br />
which is the largest part of the IT budget, is going<br />
to decline by 2.9% to $1.89 trillion.<br />
Networks<br />
Complexity is the dominant factor in <strong>net</strong>works<br />
today and how companies can best manage it<br />
will be the secret to a high performance <strong>net</strong>work.<br />
Functions are being added constantly while traffic<br />
loads are not slowing in growth leaving <strong>net</strong>work<br />
managers struggling to cope. There are more security<br />
functions being integrated at the <strong>net</strong>work<br />
and applications such as telepresence and unified<br />
communications add even further QoS demands.<br />
On the application side as data centers are<br />
consolidated, the dependence on the <strong>net</strong>work to<br />
deliver consistent user experience and reliable<br />
application performance is becoming critical. All<br />
locations and branch offices demand consistent<br />
service levels for their applications and they want<br />
it all secured. Vendors that can ease the management<br />
burden during such difficult times and enable<br />
the customer to deliver consistent services<br />
levels will be stand a good chance of succeeding<br />
this current market.<br />
Security<br />
Security is perennially in the top three priorities<br />
for IT departments but during a recession<br />
the risks posed to organizations become even<br />
greater. Cybercrime as in the physical world becomes<br />
rife during downturns. Malicious and targeted<br />
threats will without doubt be on the rise as<br />
will the creation of malware and exploitation of<br />
weakpoints. Data protection is now a major priority<br />
as companies realize that protecting users and<br />
their devices is not always realistic but protecting<br />
the data will in turn protect the company.<br />
Internal threats become an even bigger issue<br />
as disgruntled existing and ex-staff have much<br />
higher motivation to take action against their<br />
companies. Again for providers in security there<br />
will be a heavy emphasis on easing management<br />
and also finding ways to deliver security metrics<br />
as budgets are squeezed and all investments<br />
scrutinized more stringently.<br />
Applications<br />
In the applications market, there is a high level<br />
of attention on the business intelligence and<br />
<br />
<br />
CRM space. Improving the use of existing data<br />
as well as capturing new data is a huge concern<br />
as business leaders try to drive greater productivity<br />
and squeeze more value from staff and<br />
from customers. Finding the best resources to<br />
maximize the value delivered to customers can<br />
be optimized by business intelligence and analytics<br />
tools.<br />
CRM will be leveraged to maximize existing customer<br />
relationships as firms turn to focus on customer<br />
retention strategies rather than acquisition.<br />
The other major trend is cloud computing. As<br />
this moves out of the hype phase, firms are now<br />
evaluating the possibilities of moving more resources<br />
into the cloud and applications seems<br />
a good first step. Application vendors that are<br />
able to articulate this development clearly and<br />
also deliver as promised will find growth in this<br />
area.<br />
Services<br />
There are clear arguments for how managed<br />
services will benefit in a downturn. The<br />
problem many firms face is finding enough<br />
examples of services which provide the short<br />
term return that is demanded by businesses<br />
today. Security services, application management,<br />
<strong>net</strong>work management are all areas with<br />
huge potential as firms want to shift the management<br />
burden to third parties and away from<br />
internal resources.<br />
However while companies are taking an interest,<br />
beyond some basic services, adoption is not<br />
as fast as predicted.<br />
<br />
32 Computerworld Hong Kong April 2009 www.cw.com.hk
Computerworld Hong Kong Awards 2009<br />
<br />
This year we have a total of 47 categories<br />
with a record number of entry<br />
nominations. The following list shows<br />
all final nominations as included in the voting<br />
form which is NOW LIVE. Fully-subscribed<br />
readers can still vote by going to our web site<br />
and clicking on the “awards section.”<br />
<br />
exclusive CWHK Photo Album key chain.<br />
<br />
allowed to vote. (VENDORS, SYSTEMS IN-<br />
TEGRATORS, DISTRIBUTORS/RESELL-<br />
ERS not accepted).<br />
<br />
and furnish us with their contact details<br />
will qualify for winning a prize. All winners<br />
will be notified by phone/email individually.<br />
bers<br />
are not eligible for the vote.<br />
<br />
the final decision should there be any<br />
disputes.<br />
HARDWARE:<br />
Mid-Range Server (50-200 users)<br />
Dell PowerEdge Servers<br />
Fujitsu Primergy Servers<br />
HP ProLiant Server<br />
IBM Power Systems<br />
Lenovo ThinkServer R & T Series<br />
Sun SPARC Enterprise T5440<br />
Teradata Data Warehouse Appliance 2550<br />
Enterprise Server (201+ users)<br />
Fujitsu Primergy<br />
Dell PowerEdge M-Series<br />
HP Integrity Server<br />
IBM System z<br />
Sun SPARC Enterprise M9000 Server<br />
Teradata Data Warehouse Appliance 5550<br />
Datacenter Power Systems<br />
APC Symmetra PX<br />
Chloride UPS<br />
Emerson Liebert UPS<br />
HP Power Manager<br />
Datacenter Cooling Systems<br />
APC InRow RP Cooling<br />
Emerson Liebert Precision Cooling<br />
HP Dynamic Smart Cooling<br />
IBM Systems Director Active Energy Manager<br />
RC Precision Cooling<br />
Corporate Multifunctional Copier / Printer /<br />
Scanner<br />
Canon Color ImageRUNNER 3580i<br />
Fuji Xerox ApeosPort-III C3300<br />
HP Color LaserJet CM2320 MFP Series<br />
Konica Minolta bizhub C650<br />
Lexmark X658DE<br />
Ricoh Aficio MP C5000 Colour MFP<br />
Samsung Color Multi-function<br />
laser printer CLX-6240FX<br />
STORAGE<br />
Backup Storage (Tape)<br />
Dell ML6000<br />
HP StorageWorks Tape Drive<br />
IBM System Storage TS3500 Tape Library<br />
Sun StorageTek SL3000 Modular<br />
Library System<br />
Backup Storage (Disk)<br />
Dell PowerVault DL2000<br />
EMC Disk Library<br />
HP StorageWorks Virtual Library System<br />
IBM Virtualization Engine TS7530<br />
Tape Library<br />
NetApp VTL<br />
Mid-Range Storage Systems<br />
Dell EqualLogic PS5000 Series<br />
EMC CLARiiON CX Series<br />
Hitachi Adaptable Modular Storage<br />
(AMS) Series<br />
HP StorageWorks Enterprise Virtual Arrays<br />
IBM System Storage DS4000 Disk Storage<br />
System<br />
NetApp FAS3100<br />
Sun Storage 7410 Unified Storage System<br />
Enterprise Storage Systems<br />
EMC Symmetrix DMX Series<br />
Hitachi Universal Storage Platform V<br />
HP StorageWorks XP Disk Arrays<br />
IBM System Storage DS8000<br />
NetApp FAS6000<br />
Sun StorageTek 9990V System<br />
Storage Management Software<br />
EMC ControlCenter Family<br />
HDS Storage Command Suite<br />
HP Storage Essentials Software<br />
IBM Tivoli Storage Manager<br />
Microsoft System Center Data<br />
Protection Manager 2007<br />
Solaris ZFS<br />
Veritas Storage Foundation<br />
NETWORKING &<br />
COMMUNICATIONS<br />
Enterprise Switch (50+ users)<br />
Alcatel-Lucent OmniSwitch<br />
Cisco Catalyst 3750E Stackable Switch &<br />
ISR 3800<br />
H3C S5500-SI Series Ether<strong>net</strong> Switch<br />
Juniper Networks EX-series (EX 4200)<br />
Nortel Ether<strong>net</strong> Routing Switch<br />
Enterprise Router (50+ users)<br />
Alcatel-Lucent 7670 Routing<br />
Switch Platform<br />
Cisco 3800 Series Integrated<br />
Services Routers<br />
H3C Multiple Service Router<br />
– MSR 20-30-50<br />
Juniper Networks J-series J2320<br />
Nortel Ether<strong>net</strong> Routing Switch<br />
Video Conferencing<br />
Cisco TelePresence<br />
Microsoft Office Communications<br />
Server 2007<br />
Nortel Telepresence Services<br />
Polycom telepresence solutions<br />
Tandberg HD Video Conferencing<br />
Smartphone/Mobile Enterprise Device<br />
HTC Touch Cruise<br />
Motorola MOTOSURF A3100<br />
Nokia N71<br />
Apple iPhone<br />
Palm Treo Pro<br />
RIM Blackberry Bold<br />
Sony Ericsson XPERIA X1<br />
Samsung Anycall OMNIA i908<br />
www.cw.com.hk<br />
April 2009 Computerworld Hong Kong 33
ANNIVERSARY covering Hong Kong technology since 1984<br />
WLAN Switch<br />
Alcatel-Lucent OmniAccess WLAN<br />
Cisco Catalyst 6500 Series Wireless<br />
Series Module (WiSM)<br />
Cisco Wireless LAN Controller<br />
H3C WX5002 Series Access Controller<br />
Nortel WLAN 2300 Series<br />
IP PBX<br />
Alcatel-Lucent OmniPCX Enterprise<br />
Avaya G700 Media Gateways<br />
Cisco Unified Communications Manager<br />
Version 7.0<br />
Nortel Communication Server 1000<br />
Call Center Management<br />
Alcatel-Lucent OmniTouch Call Center Office<br />
Avaya Contact Center Express<br />
Cisco Unified Contact Center Express<br />
+ Cisco Unified Workforce Optimization<br />
Oracle Contact Center Anywhere<br />
Messaging & Collaboration<br />
Cisco WebEx Web Meetings and<br />
On-demand Collaboration<br />
HKNet (TeamWorks)<br />
IBM Lotus Notes + Domino 8.5<br />
Microsoft Exchange 2007<br />
Mirapoint Message Server<br />
Unified Communications<br />
Avaya Unified Communications Advanced<br />
Cisco Unified Personal Communicator<br />
IBM Lotus Sametime<br />
Microsoft Office Communications Server 2007<br />
Joint Nortel and Microsoft Unified<br />
Communications Solution<br />
Structured Cabling<br />
ADC Krone<br />
Belkin<br />
Hellerman Tyton<br />
Panduit<br />
Siemon<br />
Systimax/Commscope<br />
Tyco Electronics<br />
WAN Optimization<br />
BlueCoat Proxy SG MACH 5 Edition<br />
Cisco Wide Area Application (WAAS)<br />
Citrix Wanscaler<br />
Expand Networks Accelerator<br />
F5 Networks WANjet WAN Optimization<br />
Appliance<br />
Juniper Networks WX/WXC Application<br />
Acceleration Platforms<br />
Nortel Networks Application Accelerator<br />
Riverbed Steelhead<br />
SECURITY:<br />
Firewall / VPN<br />
BlueCoat Proxy RA<br />
CheckPoint VPN-1 Power<br />
Cisco ASA 5500 Series Adaptive Security<br />
Appliance – Firewall/VPN Edition<br />
HKNet SSL VPN<br />
Forti<strong>net</strong> FG-3810A<br />
Juniper Networks SSG550M Secure<br />
Services Gateway<br />
Microsoft ISA 2006/IAG 2007<br />
SonicWall NSA Series/TZ Series/<br />
SSL-VPN Series<br />
Content Filtering / Anti-Spyware<br />
BlueCoat Proxy AV<br />
F-Secure Anti-Virus Enterprise Suite<br />
McAfee Total Protection Solutions<br />
Symantec Brightmail Gateway<br />
Trend Micro Anti-spyware for SMB<br />
Websense Web Security version 7<br />
Antivirus/Anti-Spam<br />
CA Anti-Virus<br />
Cisco Security Agent<br />
Forti<strong>net</strong> Security<br />
F-Secure Anti-Virus Enterprise Suite<br />
McAfee Total Protection Solutions<br />
Microsoft Forefront Client Security<br />
Mira RazorGate Appliance<br />
Sophos Security Suite<br />
TrendMicro PC-cillin Inter<strong>net</strong> VirusWall/<br />
ScanMail<br />
Symantec Endpoint Protection<br />
Identity Management<br />
BMC User Administration and Provisioning<br />
CA Identity Manager/SiteMinder Web<br />
Access Manager<br />
EMC RSA SecurID<br />
IBM Tivoli Identity Manager<br />
Microsoft Identity Life Cycle Manager 2007<br />
Oracle Identity Manager<br />
VeriSign Identity Protection<br />
Intrusion Detection/Intrusion Prevention<br />
(IDS/IPS)<br />
Check Point IPS-1 Appliance<br />
Cisco IPS4200 Series Sensors<br />
Forti<strong>net</strong> FG-3810A<br />
IBM Inter<strong>net</strong> Security Systems (Proventia)<br />
Juniper Networks IDP8200<br />
Oracle Adaptive Access Manager<br />
SonicWall NSA Series<br />
Symantec Critical System Protection<br />
TippingPoint Core Controller ThreatLinQ<br />
Surveillance<br />
Burle Phillips<br />
H3C iVS8000 Surveillance Solution<br />
IBM Physical Security Services (IBM smart<br />
Surveillance Solutions)<br />
Panasonic<br />
SonicWall NSA Series<br />
Unified Threat Management (UTM)<br />
Check Point UTM-1 Total Security Appliance<br />
Check Point VPN-1 UTM<br />
Cisco ASA5500 Series Adaptive Security<br />
Appliance – Anti-X Edition<br />
Forti<strong>net</strong> FG-3810A<br />
IBM Inter<strong>net</strong> Security Systems (Proventia)<br />
Juniper Networks Unified Threat<br />
Management (UTM)<br />
Network Box E-Series<br />
WatchGuard FireBox X<br />
SonicWall NSA Series/TZ Series<br />
Managed Security Services<br />
AT&T<br />
BT<br />
CPCNet<br />
HGC<br />
HKNet<br />
IBM Inter<strong>net</strong> Security Systems<br />
Network Box<br />
PCCW<br />
Symantec MessageLabs Managed<br />
Security Services<br />
Verizon<br />
SOFTWARE:<br />
Database Management<br />
MySQL 5.1<br />
IBM DB2 Universal Database<br />
Microsoft SQL Server 2008<br />
Oracle Database<br />
Sybase Adaptive Server Enterprise (ASE)<br />
Teradata 12<br />
34 Computerworld Hong Kong April 2009 www.cw.com.hk
Application Server & Middleware<br />
GlassFish<br />
IBM Websphere<br />
Microsoft BizTalk Server 2006 R2<br />
Oracle Fusion Middleware<br />
Oracle WebLogic Server<br />
Systems Management<br />
Altiris Total Management Suite<br />
APC InfraStruXure Central<br />
Avocent DSView 3 Management Software<br />
BMC Performance Manager (Patrol)<br />
EMC Smarts<br />
HP Operations Center<br />
IBM Tivoli System Management Suite<br />
Microsoft System Center 2007<br />
Oracle Enterprise Manager<br />
Enterprise Resource Planning (ERP)<br />
ECL IFS<br />
Epicor ERP<br />
Kingdee K/3 ERP<br />
Lawson ERP solutions<br />
Microsoft Dynamics AX 2009<br />
Oracle E-Business Suite<br />
SAP ERP<br />
Supply Chain Management (SCM)<br />
Epicor SCM<br />
I2 Supply Chain Management Solutions<br />
Oracle Supply Chain Management<br />
SAP SCM<br />
Customer Relationship Management (CRM)<br />
Microsoft CRM 4.0<br />
Oracle Siebel CRM<br />
SAP CRM<br />
SAS Customer Intelligence<br />
Teradata Relationship Manager<br />
WeB e-Mail Marketing (Web-eM)<br />
Document and Content management<br />
Canon File Navigator<br />
EMC Documentum Content Management<br />
Fuji Xerox DocuShare<br />
IBM FileNet<br />
Microsoft Sharepoint Server 2007<br />
Oracle Universal Content Management<br />
Ricoh SME Solution Suite<br />
BI and Analytics<br />
IBM Cognos 8 Business Intelligence<br />
Microsoft SQL Server 2008<br />
Oracle BI Applications + Oracle BI EE Plus<br />
Oracle Essbase<br />
SAP BusinessObjects<br />
SAS 9.2<br />
Sybase IQ Analytics Server<br />
Teradata Active Enterprise Intelligence<br />
Data Mining & OLAP<br />
IBM InfoSphere Warehouse<br />
Microsoft SQL Server 2008<br />
Oracle Database<br />
SAP Business Objects OLAP Intelligence<br />
SAS 9.2<br />
Developer Tools/Web Services<br />
IBM Rational Professional Bundle<br />
Microsoft Visual Studio 2008 Team System<br />
NetBeans IDE 6.5<br />
Oracle SQL Developer<br />
Sybase Power Builder<br />
Server OS<br />
HP-UX<br />
IBM AIX 5L<br />
Microsoft Windows Server 2008<br />
Novell / SuSe Linux<br />
Oracle Enterprise Linux<br />
Red Hat Enterprise Linux<br />
Solaris OS 10 10/08<br />
Virtualization<br />
Citrix XenApp 5<br />
Citrix XenDesktop<br />
HP Insight Dynamics – VSE<br />
Microsoft Windows Server 2008 Hyper-V<br />
Nortel Ether<strong>net</strong> Routing Switch<br />
Oracle VM<br />
Sun xVM<br />
VMware Infrastructure<br />
SERVICES:<br />
Corporate Mobile Services Provider<br />
CSL<br />
Hutchison Telecom<br />
New World Telecom<br />
PCCW Mobile<br />
SmartTone-Vodafone<br />
Data & Telecoms Services Provider<br />
AT&T<br />
BT<br />
HKNet (SecureNet IP-VPN Service)<br />
New World Telecom<br />
NTT Com Asia Ltd (Arcstar)<br />
Orange Business Services<br />
PCCW<br />
SingTel ConnectPlus IP VPN and E-VPN<br />
Verizon<br />
Wharf T&T<br />
Managed Services<br />
AT&T<br />
BT<br />
CPCNet ManagedCONNECT<br />
EMC Consulting & IT Services<br />
HP<br />
IBM Global Technology Services<br />
(IBM Managed Services)<br />
Jardine OneSolution<br />
New World Telecom<br />
Nortel Network Managed Services<br />
NTT Com Asia<br />
Oracle Advanced Customer Services<br />
Orange Business Services<br />
PCCW<br />
Verizon<br />
IT Hosting & Outsourcing<br />
COL<br />
HKNet<br />
HP<br />
IBM Global Technology Services<br />
(IT Outsourcing)<br />
Jardine OneSolution (Email On-Demand<br />
Service – Hosted Exchange)<br />
New World Telecom<br />
Oracle Advanced Customer Services<br />
Orange Business Services<br />
PCCW Solutions<br />
Consulting & Systems Integration<br />
COL<br />
Datacraft Asia<br />
EMC Consulting & IT Services<br />
HKNet<br />
HP<br />
IBM Global Business Services<br />
Newtech Technology<br />
NTT Com Asia<br />
Oracle Advanced Customer Services<br />
PCCW Solutions<br />
www.cw.com.hk<br />
April 2009 Computerworld Hong Kong 35
Social apps for business:<br />
plan less for less pain<br />
Standardizing on tools people already use, like Facebook and Twitter,<br />
can be the path of least resistance, say experts<br />
<br />
Productivity loss, information leakage, and<br />
defamation of fellow employees are all<br />
enough to get us fired from our jobs, unless<br />
of course it’s done under the guise of a social<br />
<strong>net</strong>work for the enterprise 2.0.<br />
Businesses are beginning to grapple with the<br />
emergence of a culture of IT self-service among<br />
employees and the savvy leaders will harness,<br />
rather than hinder, the use of external hosted applications,<br />
including social <strong>net</strong>working, according<br />
to a group of IT professionals.<br />
Experts: culture shift<br />
Speaking on a panel about social <strong>net</strong>working<br />
for business at the Enterprise 2.0 Executive Forum<br />
in Sydney, representatives from insurance<br />
company AMP, consulting firm Deloitte and IT<br />
analyst firm Forrester Research, agreed that rapid<br />
adoption of external applications by employees<br />
is here to stay so the challenge is how to leverage<br />
this culture shift.<br />
Annalie Killian, AMP’s catalyst for magic [actual<br />
title], said social <strong>net</strong>works have helped dissolve<br />
boundaries between the inside and outside of the<br />
organization. “I communicate with colleagues via<br />
Facebook as much as e-mail,” Killian said.<br />
AMP tried to “experiment” with yammer for inhouse<br />
social <strong>net</strong>working, but it didn’t get enough<br />
uptake and people started to use Twitter “without<br />
being told.” “It happened organically so I think<br />
why try and implement another enterprise tool<br />
when all the fish are at Twitter,” she said. “I don’t<br />
want to manage Twitter.”<br />
Killian said that giving enterprise users freedom<br />
to use the tools they are comfortable with is<br />
often the most useful way to start an IT project.<br />
“I quickly start playing with stuff and think laterally<br />
about how it would be good for the business,”<br />
she said. “Then I find like-minded souls<br />
playing with the tools and it circles out from<br />
there.”<br />
User power<br />
Over at Deloitte Digital, CEO Peter Williams<br />
found 30 percent of his staff were using Facebook<br />
before it was even considered as a business<br />
application.<br />
“The business case proved itself—if 30 percent<br />
of people using tech we didn’t ask them to are<br />
combining work and social <strong>net</strong>working, that’s<br />
the best rollout of technology we’ve ever had,”<br />
Williams said. “We could do it internally, but that<br />
would be a pain so we just standardized on Facebook<br />
and build applications around that.”<br />
Williams has noticed “deeper connections” between<br />
staff can be formed with social <strong>net</strong>works,<br />
not just in a work environment. “There is a thing<br />
called ‘weak tie <strong>net</strong>works’ where you get more<br />
done through a friend of a friend and not immediate<br />
contacts,” he said, adding the <strong>net</strong>work effect<br />
model is creating opportunities for business<br />
growth.<br />
Deloitte’s Williams. “If your organization has a<br />
culture of back-stabbing then it will happen on<br />
social <strong>net</strong>works. Saying we should ban social <strong>net</strong>works<br />
is like saying we should ban phone calls<br />
and e-mail.”<br />
“We say don’t diss each other and we have a<br />
culture of openness so it goes with the turf,” Williams<br />
said. “It’s the same with editing wikis and<br />
people leaving rotting food in the fridge, there is<br />
a certain level of self-regulation.”<br />
Employee behavioral control in the Web 2.0<br />
age comes with the standard terms and conditions<br />
for all IT system use at Deloitte: “Don’t<br />
make them 30 pages long and have a ‘be smart,<br />
use judgment’ mantra,” said Williams.<br />
<br />
hosted applications, including social <strong>net</strong>working<br />
Forrester Research senior analyst Steven Noble<br />
said social <strong>net</strong>works are “the easiest and the<br />
hardest” technology to build a business case for<br />
because the benefits are largely “soft.”<br />
“It should be easy to build a business case for<br />
social <strong>net</strong>working as the core functionality is<br />
pretty simple,” said Noble. “For example, integrated<br />
collaboration tools, blogging and Share-<br />
Point will all build profile capabilities and that is<br />
a social <strong>net</strong>work.” Noble said social <strong>net</strong>works will<br />
increasingly become the “glue” that binds applications<br />
together.<br />
Not so fast, that’s my company data<br />
An increasing headache for businesses living<br />
in the closed-shop IT world is the amount of potential<br />
for social <strong>net</strong>working employees to leak<br />
sensitive data to a third-party of publicize potentially<br />
damaging information about people.<br />
“It goes down to organizational culture,” said<br />
At AMP similar rules apply. We’re trying hard<br />
to have [a] simple social media policy,” said Killian.<br />
“We have a live-and-let-live policy unless a<br />
complaint is raised. We also have a lot of introverts<br />
in the organization. It’s different strokes<br />
for different folks and it’s not a massive problem.”<br />
Killian said a lot of companies want to see social<br />
<strong>net</strong>working fail in order to “sell you some security<br />
software or something.” “When you sign up<br />
for your own blog there is a three-line guideline<br />
statement saying ‘don’t put up anything offensive’<br />
and we then let the community self-regulate,” she<br />
said. “Most people are sensible.”<br />
We live in an age where employers will “Google<br />
you before they hire you,” so don’t release anything<br />
to the Inter<strong>net</strong> you don’t want others to see,<br />
according to Killian. “Companies tend to focus on<br />
boundaries and not what flourishes inside them,”<br />
she said.<br />
<br />
36 Computerworld Hong Kong April 2009 www.cw.com.hk
We have the permission.<br />
We are your trustworthy<br />
EDM partner!<br />
E – Easy & Convenient<br />
D – Direct Response<br />
M – Measurable Result<br />
For more information please contact:<br />
Computerworld HK List Rental Services<br />
Reach IT purchasing decision makers<br />
through a direct response medium with<br />
our highly selective databases.<br />
Our email list consists of members who<br />
have given permission to receive vendor<br />
information.<br />
Simon Yeung<br />
Publisher<br />
Direct line: (852) 2589 1370<br />
Mobile: (852) 9458 7688<br />
Email: syeung@questexasia.com<br />
Connie Yip<br />
Account Director<br />
Direct line: (852) 2589 1373<br />
Mobile: (852) 9407 5454<br />
Email: cyip@questexasia.com
Google’s share of Inter<strong>net</strong> search in China<br />
moved up a hair last year, statistics from<br />
the government’s number cruncher<br />
show, indicating the company continues to struggle<br />
against market leader Baidu.<br />
Google captured 16.6 percent of Chinese<br />
search engine users last year, up from <strong>14</strong>.3<br />
percent the year before, China’s domain registry<br />
center said in a report last month.<br />
Google has struggled to raise its user share<br />
against Chinese search giant Baidu, which<br />
opened in 2000 and has worked hard to lead<br />
its domestic market.<br />
Baidu’s user share rose more than two percentage<br />
points to 76.9 percent last year, the<br />
Chinese Inter<strong>net</strong> Network Information Center<br />
(CNNIC) said.<br />
China had 298 million Inter<strong>net</strong> users at the<br />
end of 2008, the most in any country, according<br />
to CNNIC.<br />
“Google is doing a lot of the right things in<br />
China—it’s just in the situation that there’s a<br />
limit to how much market share it’s going to<br />
be able to get,” said Mark Natkin, director of<br />
Marbridge Consulting in Beijing.<br />
Baidu has an easily recognizable<br />
Chinese name, while Google<br />
only introduced a Chinese name in<br />
2006 and has not caught on as well<br />
among users outside of major cities, he said.<br />
Google’s Chinese name, “Gu ge,” means<br />
“valley song,” but its catchier English name is<br />
more popular among young urban Chinese.<br />
“There’s a strong perception that Google is<br />
a foreign brand, a foreign search engine, and<br />
that Baidu is a domestic one,” Natkin said. “As<br />
such, there’s a little more user acceptance<br />
for Baidu.”<br />
Some analysts also say Baidu attracts<br />
many search engine users<br />
with an MP3 search that links to free downloads<br />
of copyrighted songs.<br />
Google launched a free music search download<br />
service in China for registered songs last<br />
year to compete with Baidu, but limited selection<br />
has deterred users.<br />
More users stayed loyal to Baidu than to<br />
Google in 2008. Google retained around 80<br />
percent of users from 2007 to 2008, much lower<br />
than Baidu’s 96 percent retention, the CN-<br />
NIC report said.<br />
Yahoo’s user share fell to 1.6 percent last<br />
year, the report said without elaborating. The<br />
report did not offer a corresponding figure<br />
from 2007.<br />
<br />
Michael Dell sees faster economic recovery in China<br />
<br />
The CEO of Dell called business conditions<br />
in China among the best in the<br />
world amid slowing global growth at a<br />
talk in Beijing last month.<br />
China has unrolled massive stimulus spending<br />
and launched a discount initiative for rural<br />
consumers buying PCs and other electronics<br />
to spur growth.<br />
“China seems to have come out of the cri-<br />
sis stronger than other countries, faster, and<br />
the government’s pretty rapid action seems<br />
to have caused a positive demand condition,”<br />
said Michael Dell.<br />
Fifteen Dell products, including some models<br />
modified for Chinese consumers, are eligible<br />
for the country’s subsidy program. The<br />
company is investing in rural areas to support<br />
the program and boost sales, Dell said.<br />
Fifteen Dell products, including some models modified for<br />
Chinese consumers, are eligible for the country’s subsidy<br />
program. The company is investing in rural areas to support<br />
the program and boost sales, Dell said<br />
Dell dodged a question about reports that<br />
layoffs at his company could extend to some<br />
of its 6,000 employees in China. China, Dell’s<br />
second largest market, accounts for about<br />
five percent of its global business.<br />
Dell is one of many firms that has targeted<br />
remote Chinese cities to boost growth. Those<br />
efforts have paid off for many firms, but the economic<br />
downturn has hit the Chinese countryside<br />
as well, said Bryan Ma, an analyst at IDC.<br />
How much the rural subsidy program will<br />
help remains unclear.<br />
“There are, of course, going to be a good<br />
number of units sold through the program,<br />
but we don’t believe it’s going to create any<br />
major inflection points in the market,” Ma<br />
said.<br />
<br />
Computerworld Hong Kong April 2009 www.cw.com.hk
VMware will expand in China as it moves<br />
to meet rising demand for desktop and<br />
data center virtualization in the country,<br />
a company executive said in an interview last<br />
month.<br />
VMware is rapidly building a customer base<br />
among smaller Chinese firms—those with 1,000<br />
or fewer staff—even as it expands services for<br />
bigger clients with mature virtualization systems<br />
in place, said Andrew Dutton, VMware’s<br />
new Asia Pacific head.<br />
VMware’s business in China tripled last year.<br />
The firm expects to have 350 staff in China by<br />
the end of the year, up from about 200 now.<br />
That level of growth could continue for a<br />
number of years, Dutton said.<br />
“As we see opportunity present itself, we’ll<br />
staff up to meet that opportunity,” he said.<br />
VMware releases local Chinese versions of its<br />
products about two months after their English-<br />
nications operators have been among the fastest<br />
to virtualize their servers in China, while high<br />
costs and a lack of awareness have made small<br />
firms slow to follow suit, said Ravi Shekhar Pandey,<br />
an analyst at Springboard Research.<br />
Foreign companies offering virtualization in<br />
China could find it difficult to crack software<br />
and service sectors dominated by Chinese<br />
firms, said Pandey.<br />
“I have a strong feeling that Chinese customers<br />
are more comfortable working with Chinese<br />
companies,” he said.<br />
Still, Microsoft and Virtual Iron rank beside<br />
VMware as foreign firms that have made inroads<br />
to China’s virtualization market.<br />
“VMware has an advantage in the sense that<br />
it is recognized in every market as somebody<br />
who pioneered this, who made it easy for companies<br />
to virtualize their infrastructure,” Pandey<br />
said.<br />
<br />
<br />
<br />
3Com Corp may have lost ground in Western<br />
markets in recent years, but meantime<br />
it has built a low-cost operations<br />
base in China that it hopes will attract more<br />
and bigger customers in the developed world.<br />
The <strong>net</strong>work equipment vendor has cut costs<br />
and gained market share in China since 2003,<br />
when it created a joint venture with Chinese<br />
counterpart Huawei Technologies, 3Com CEO<br />
Bob Mao said in a phone interview.<br />
3Com later fully acquired the joint venture.<br />
The company’s China operations accounted<br />
for almost half of its revenue in fiscal year<br />
2008, Mao said.<br />
3Com holds 35 percent of the market for <strong>net</strong>working<br />
products in China, about as much as<br />
Cisco Systems, he added.<br />
“China actually has become our home market,”<br />
Mao said.<br />
3Com’s acquisition of H3C, its venture with<br />
Huawei, brought it an established sales force<br />
in China and a low-cost research and development<br />
team. Its researchers in China have since<br />
rounded out the company’s product portfolio,<br />
helping 3Com beat out competitors who offer<br />
only low- or high-end products, Mao said.<br />
3Com made a <strong>net</strong> profit of US$92.7 million in<br />
the first half of fiscal year 2009, a turnaround<br />
from a $54.3 million loss in the same period a<br />
language launch. The company counts government<br />
ministries and some of China’s biggest<br />
firms among its customers. High levels of virtualization<br />
at clients such as China’s statistics<br />
bureau and the Agricultural Bank of China have<br />
created a need for stronger support staff in China,<br />
Dutton said.<br />
“Some of the customers here are so mature,<br />
or they’re becoming so mature, in the use of<br />
IT that they need to be right up at the cutting<br />
edge, and to do that they want access to the<br />
minds that built the products,” he said.<br />
Data center virtualization provided about<br />
90 percent of VMware’s revenue in China last<br />
year. Less than 10 percent came from desktop<br />
virtualization, but the firm hopes to raise that<br />
number. It expects revenue from desktop products<br />
in the first quarter of this year to match the<br />
figure for all of last year.<br />
Large firms including banks and telecommuyear<br />
earlier. Its third-quarter results are due<br />
out this week.<br />
Sales of equipment for IP video surveillance<br />
<strong>net</strong>works in China have been a boon for 3Com.<br />
H3C has provided the hardware linking over<br />
100 <strong>net</strong>works of surveillance camera systems<br />
around China, mostly in cities, Mao said. Its<br />
largest contract is for a <strong>net</strong>work connecting up<br />
to 50,000 IP cameras in Hangzhou, a coastal<br />
city of about 6 million people known for its<br />
scenery.<br />
prices and swift action to win government<br />
contracts in China, including for large, stateowned<br />
firms and the camera <strong>net</strong>works, said<br />
Milly Xiang, an analyst at IDC.<br />
But H3C’s growth in China has largely relied<br />
on the staff and brand recognition that Huawei<br />
brought to the venture, said Xiang. The sales<br />
force driving H3C’s success in China might<br />
not be as effective in other cultures, she said.<br />
“3Com has not made obvious progress outside<br />
China in recent years,” she said.<br />
The <strong>net</strong>work equipment vendor has cut costs and gained<br />
<br />
venture with Chinese counterpart Huawei Technologies<br />
“In total the surveillance market is growing, 3Com held 1.1 percent of the worldwide market<br />
whether you and I like it or not,” Mao said.<br />
for routers last year, according to IDC re-<br />
“But the IP-based part [of the market] is the search.<br />
fastest growing part.”<br />
3Com plans to stay an independent company<br />
3Com’s next goal is to expand outside China. after a failed acquisition by Bain Capital Partners<br />
It wants to attract more big firms, which currently<br />
two years ago, Mao said.<br />
account for only half of its customers National security concerns in the U.S. derailed<br />
that deal, which would have given Hua-<br />
outside of the country, Mao said. <br />
H3C has undercut competitors with low wei a stake in 3Com.<br />
<br />
www.cw.com.hk<br />
April 2009 Computerworld Hong Kong 39
40 Computerworld Hong Kong April 2009 www.cw.com.hk
For enquiries, please call Connie Yip at 9407 5454. E-mail: cyip@questexasia.com<br />
VMWARE<br />
CERTIFIED<br />
VIRTUAL<br />
APPLIANCE<br />
Newtech secures your Critical Environments<br />
Infrastructure for Critical Environment<br />
Data Centre, Network Control Centre, Business Continuity<br />
Recovery Centre, Clean Room, Laboratory<br />
IT Infrastructure<br />
E&M Service & Intelligent Building System<br />
Space Planning & Interior Decoration<br />
Facility Management, 24x7 Emergency Service<br />
Computational Fluid Dynamics (CFD) Analysis<br />
Head Office<br />
15/F Enterprise Square Two, 3 Sheung Yuet Road<br />
Kowloon Bay, Kowloon, Hong Kong<br />
Tel: (852) 2993 5816 Fax: (852) 2993 5916<br />
Email: info@newtechapac.com<br />
www.newtechapac.com<br />
Powered by World Class Suppliers<br />
UPS CRAC Structured Cabling<br />
Design Build Maintain<br />
www.cw.com.hk April 2009 Computerworld Hong Kong 41
Driving China’s ICT<br />
It’s the comms players, stupid<br />
By Robert Clark<br />
The most important players in China’s<br />
ICT are the comms vendors.<br />
If you doubt it, look at the numbers.<br />
Huawei last year sold around US$18<br />
billion in <strong>net</strong>working gear. State-owned rival<br />
ZTE sold $6.5 billion worth (for $249 million<br />
profit).<br />
The only IT firm on the same scale, Lenovo,<br />
paddles in the commodity shallows and in any<br />
case is struggling to stay afloat—its last quarterly<br />
result showed a $97 million loss on sales<br />
of $3.6 billion.<br />
The rest are not even close. B2B platform Alibaba.com<br />
posted just $321 million in revenue<br />
for the first nine months of last year. The wellregarded<br />
IT services firm Neusoft made a $3<br />
million profit on gross sales of $42 million.<br />
Why comms?<br />
The reasons for this are more interesting. For<br />
one, the comms equipment sector is driven by<br />
scale and standards, not innovation. Whatever<br />
advantage an innovator achieves is dissipated<br />
by the time it takes to become a standard.<br />
Unlike their IT counterparts, Huawei and<br />
ZTE have leveraged technology transfer from<br />
companies like Alcatel-Shanghai Bell, which<br />
set up 30 years ago (and is now wholly Chinese-owned).<br />
They’ve been able to get scale from China’s<br />
own massive telecom build-out over the past<br />
20 years. In doing so, they’ve competed headto-head<br />
with the world’s biggest comms suppliers—a<br />
classic example of open competition<br />
building world-class competitors.<br />
Neighboring rivals Samsung, NEC and Fujitsu<br />
have played themselves out of the market<br />
through protectionist domestic policies—a<br />
<br />
<br />
perfect example of how not to<br />
execute hi-tech industry development.<br />
Sales abroad<br />
Thank to that grounding, both<br />
Huawei and ZTE now make most<br />
of their sales abroad. The next<br />
couple of years could see them<br />
go from merely being major<br />
players to driving the whole sector.<br />
The recession plays to their<br />
obvious strengths and is making<br />
buyers lose their previous skittishness<br />
about dumping their<br />
old suppliers.<br />
The first sign is that Huawei<br />
looks on the verge of some serious<br />
North American business.<br />
It has reportedly won a contract<br />
to supply Cox Cable with<br />
a 3G <strong>net</strong>work—believed to be<br />
worth around $100 million—and<br />
is in the running for a much bigger<br />
deal to sell WiMax gear to<br />
Clearwire.<br />
The Clearwire project is set to<br />
be the largest WiMax <strong>net</strong>work in the US. Huawei<br />
is reportedly on the shortlist with Motorola,<br />
Samsung and Nokia Siemens.<br />
If it goes ahead it will be a big breakthrough<br />
for Huawei, which has continually hit roadblocks<br />
in the US.<br />
<br />
of years could see<br />
Huawei and ZTE<br />
go from merely<br />
<br />
players to driving<br />
the whole sector<br />
Political controversies<br />
Huawei’s biggest contract to date has been<br />
a cdma2000 contract with niche carrier Leap<br />
Wireless. Its major obstacles have not been<br />
legacy suppliers but IPR (Intellectual Property<br />
Rights) and political controversies.<br />
Its first effort faltered after thousands of lines<br />
of Cisco code were found in Huawei’s Quidway<br />
router (the two companies settled out of court).<br />
Last year Huawei’s attempt to buy 3Com in<br />
a joint offer with Bain Capital collapsed after<br />
US officials made it clear it would<br />
be rejected on national security<br />
grounds.<br />
Over the past two years alone<br />
Huawei has provided kit for carriers<br />
such as France Telecom, BT,<br />
TeliaSonera, Bell Canada, Vodafone<br />
and StarHub—so there’s<br />
clearly no problem with Huawei’s<br />
technology.<br />
The political nature of its problem<br />
was underlined recently with<br />
the leak of a UK intelligence report<br />
that claimed Huawei had built a<br />
backdoor into BT’s next-gen broadband<br />
<strong>net</strong>work.<br />
Whether true or not—and the<br />
published evidence is sketchy to<br />
say the least—it shows the sensitivity<br />
of the US and the UK to Huawei<br />
and its PLA background.<br />
So don’t expect Huawei to start<br />
selling gear for Verizon—the Pentagon’s<br />
main comms contractor—<br />
or AT&T any time soon. But the<br />
news out of Cox and Clearwire suggests<br />
the vendor’s North American<br />
footprint is going to widen pretty steadily over<br />
the recession.<br />
Fat cash<br />
Meanwhile, rival ZTE has lined up a hefty<br />
war chest—a $15 billion line of credit from the<br />
China Development Bank—most likely to be<br />
held out to cash-strapped foreign telcos in the<br />
form of vendor financing.<br />
Once it was fashionable for big foreign vendors<br />
to do the same thing—they accumulated<br />
an estimated $26 billion in loans to carriers on<br />
their books by 2000. Then the bubble burst.<br />
ZTE won’t have that problem. One more reason<br />
for thinking that its time has come. <br />
Robert Clark is a Beijing-based technology journalist.<br />
rclark_a_electricspeech.com<br />
42 Computerworld Hong Kong April 2009 www.cw.com.hk
Hong Kong’s most prestigious IT Awards<br />
Computerworld Hong Kong<br />
Awards 2009<br />
www.cw.com.hk<br />
Vote the winners of Hong Kong’s premier IT competition…<br />
and win a Netbook!