06.06.2015 Views

Page 14 - enterpriseinnovation.net

Page 14 - enterpriseinnovation.net

Page 14 - enterpriseinnovation.net

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

viewpoint Charles Mok: The cashed-up Hong Kong govt must fund smarter IT initiatives <strong>Page</strong> 10<br />

<br />

The Fourth<br />

Utility<br />

Your data-connectivity’s<br />

crucial, but who’s building<br />

it as a utility in Hong Kong?<br />

<strong>Page</strong> <strong>14</strong><br />

SINCE 1984<br />

bizpeople<br />

New IBM CIO<br />

Mark Hennessy<br />

<strong>Page</strong> 12<br />

legalwatch<br />

Contractual requirements<br />

for security<br />

<strong>Page</strong> 22<br />

industry<br />

HK’s online marketing<br />

<br />

<strong>Page</strong> 24<br />

backpage<br />

Driving China’s ICT<br />

By Robert Clark<br />

<strong>Page</strong> 42


c o n t e n t s April 2009<br />

coverstory<br />

The 4th utility<br />

18<br />

It was standing-room-only at the<br />

5th annual Banking and Finance<br />

Technology Forum Asia 2009<br />

bankingtech<br />

Your data-connectivity’s crucial, but who’s building it as<br />

a utility in Hong Kong? <strong>Page</strong> <strong>14</strong><br />

business<br />

4 upfront<br />

“No comment”= no story<br />

6 biznews<br />

8 viewpoint<br />

The cashed-up Hong Kong govt must<br />

fund smarter IT initiatives<br />

Charles Mok writes that although the<br />

government has increased ICT spending, the<br />

effect on the industry’s hardships is inadequate<br />

10 bizpeople<br />

Inside the new Big Blue<br />

CIO Mark Hennessy on<br />

transforming the IT organization<br />

at IBM, fostering a culture of<br />

innovation and managing IT<br />

during the financial crisis<br />

technology<br />

28 technews<br />

30 careerwatch<br />

Microsoft teams with Cyberport to support<br />

local start-ups<br />

32 CWHKAwardsspecial<br />

47 categories of excellence<br />

36 <strong>net</strong>working<br />

Social apps for business:<br />

plan less for less pain<br />

38 chinawatch<br />

24<br />

Local online marketing<br />

intelligence firm to go global<br />

As the downturn deepens, online<br />

marketing becomes increasingly<br />

important for Hong Kong, says<br />

Admomo’s founder and director<br />

Winston Law<br />

Industryprofile<br />

Check: www.cw.com.hk for daily news<br />

and online features.<br />

20 analystwatch<br />

Asia’s top 10 locations for offshore IT<br />

services<br />

22 legalwatch<br />

Security breaches: leaning on the<br />

suppliers<br />

26 industryevent<br />

Helping the tough get going<br />

27 industryevent<br />

Driving IT to deliver full value<br />

Five technology leaders shared their insights<br />

into how businesses can leverage existing<br />

capacity to help them navigate through the<br />

current economic slump<br />

Google share of China search market inches<br />

up, Dell sees faster economic recovery in the<br />

Middle Kingdom, VMware claims high demand<br />

for virtualization in China and 3Com eyes<br />

expansion from their ‘home market’<br />

42 backpage<br />

Driving China’s ICT<br />

Huawei and ZTE go from merely being major<br />

players to driving the whole sector, writes<br />

Robert Clark<br />

www.cw.com.hk<br />

April 2009 Computerworld Hong Kong 3


upfront<br />

<br />

Adecade ago, I edited an architectural magazine<br />

here in Hong Kong. While conducting<br />

an interview with a local architect who<br />

held strong views on architectural aesthetics, he<br />

vented his opinions about me and the magazine.<br />

“You have a responsibility to the people of<br />

Hong Kong!” he howled. “Why don’t you write<br />

a review and tell everyone what a terrible building<br />

[famous building on the Central waterfront]<br />

is? And as for that eyesore [another famous landmark<br />

on the Hong Kong skyline], you should<br />

write a review of its lousy, amateurish architectural<br />

design!”<br />

I told him I thought that was a great idea: “And<br />

I assume I can start by publishing<br />

what you just told me about those<br />

buildings.”<br />

He turned pale and almost choked<br />

on his latte. “No, no, you can’t do<br />

that! You can’t publish what I just<br />

said!!”<br />

“Well,” I said, “you see the problem.<br />

If no one’s willing to comment,<br />

there’s not much of a story.”<br />

Ten years later, the same philosophy<br />

grips Hong Kongers dealing<br />

with the press. The attitude seems to be: “If<br />

you already know, I don’t need to tell you, and if<br />

you don’t know, it’s not going to be ME that tells<br />

you.”<br />

This game of “no-comment” creates a circus of<br />

absurdity. Every so often a journalist would run<br />

into that brick wall once too often, and the resulting<br />

copy was both cathartic and hilarious. At one<br />

press conference for a retail-outlet years back, a<br />

journalist asked how many branches the retailer<br />

operated in Hong Kong. The spokesperson flatly<br />

refused to disclose the number of stores—hardly<br />

a state secret. The floodgates opened and the<br />

journo went into rant-mode: their next column<br />

detailed press-con “no-comment” absurdities.<br />

Sometimes there’s good reason to keep information<br />

confidential. Computerworld Hong Kong<br />

has a policy of complying with requests made by<br />

sources—people tell us things off the record, and<br />

we keep them off the record. This is reasonable,<br />

and we believe in reasonability.<br />

But when things become a matter of public<br />

record, and we have an opinion, we will state it.<br />

Do we agree with every government policy? Not<br />

necessarily, and as the government has a responsibility<br />

to serve the people (ALL of them), disagreement<br />

with policies that could be improved,<br />

I feel, is reasonable.<br />

We’d like to hear more from our readers,<br />

which is why you can comment on our blogs or<br />

on our Facebook page. You can remain anonymous<br />

if you like. Please be reasonable (no links<br />

to spamtastic.com, and leave the profanity to<br />

LegCo members and Commercial Radio!).<br />

More seriously, the “no-comment” press conference<br />

is being replaced by the “no-client” case<br />

study. Increasingly, vendors tell us about deployments<br />

they’ve done that have saved the users<br />

time and money and are “success stories” for<br />

their companies, but won’t identify the user. We<br />

understand that vendors must often sign non-disclosure<br />

agreements (NDAs) to get the contract.<br />

We’re sympathetic.<br />

And we also ask for consideration. In many cases,<br />

writing a quote or using a case-study without<br />

naming the user is useless. We usually edit out<br />

the reference, because it’s not useful<br />

to our readers.<br />

This is a subject I bring up in offthe-record<br />

conversations with vendors,<br />

and I find that they too feel<br />

the frustration. Vendors spend a<br />

lot of time and effort selling a complex<br />

system and making sure it’s<br />

deployed properly, supporting the<br />

user throughout the implementation<br />

and afterward, and they have a<br />

story to tell. But if the user wants<br />

silence, we remain mute.<br />

The flipside of the coin: perhaps the user wants<br />

to publicize their new tech system. And why not?<br />

If you craft your message for content-value, it<br />

may become news.<br />

There’s a great difference between a press release<br />

lauding anonymous users and a case study<br />

which details TCO and ROI, tells the reader<br />

how much time (and other resources) were consumed<br />

and how the system is working. A superb<br />

case study will tell us how many employees were<br />

redeployed to more useful tasks within the organization<br />

as a result of the tech upgrade.<br />

It happens—a good tech deployment will make<br />

your employees’ lives easier. We’ve seen it happen.<br />

But unless the user is willing to reveal themselves,<br />

we can’t report on it.<br />

And lately, we’re getting more silence than<br />

information. Considering IT stands for “information<br />

technology,” that’s ironic. For journalists, it’s<br />

also frustrating.<br />

Stefan Hammond<br />

Editor<br />

shammond@questexasia.com<br />

http://www.cw.com.hk<br />

Computerworld Hong Kong is published by Questex Asia Ltd, 501<br />

Cambridge House, Taikoo Place, 979 King’s Road, Quarry Bay, Hong<br />

Kong.<br />

EDITORIAL<br />

EDITOR-IN-CHIEF Chee Sing Chan cchan@questexasia.com<br />

EDITOR Stefan Hammond shammond@questexasia.com<br />

SENIOR REPORTER Teresa Leung tleung@questexasia.com<br />

CONTRIBUTING WRITERS Ross Milburn, Jason Krupp<br />

SALES<br />

PUBLISHER Simon Yeung syeung@questexasia.com<br />

ACCOUNT DIRECTOR Connie Yip cyip@questexasia.com<br />

MARKETING & SALES Donna Hon dhon@questexasia.com<br />

SUPPORTING EXECUTIVE<br />

<br />

ART DIRECTOR Eric Lam elam@questexasia.com<br />

PRODUCTION & Donna Hon dhon@questexasia.com<br />

TRAFFIC COORDINATOR<br />

CIRCULATION & John Lam jlam@questexasia.com<br />

DISTRIBUTION DIRECTOR<br />

ASSISTANT CIRCULATION Allie Mok amok@questexasia.com<br />

MANAGER<br />

<br />

MANAGING DIRECTOR Jonathan Bigelow jbigelow@questexasia.com<br />

HR & ADMIN MANAGER Rebecca Ip rip@questexasia.com<br />

BUSINESS MANAGER Eunice Chan echan@questexasia.com<br />

Computerworld Hong Kong is published monthly. All<br />

material is Copyright 2009 by Questex Media Group,<br />

Inc. Reproduction is strictly forbidden without written<br />

permission.<br />

Sales and Custom Publishing Enquiries: E-mail can<br />

be sent to syeung@questexasia.com<br />

Computerworld Hong Kong is circulated to IT, computing<br />

and inter<strong>net</strong> companies and other private and<br />

public companies who use IT and computing. It is edited<br />

for IT professionals, engineers, and senior managers<br />

responsible for design, installation, marketing<br />

and maintenance of IT systems and <strong>net</strong>works. Free<br />

subscription offer valid in Hong Kong only. To subscribe,<br />

go to www.cw.com.hk.<br />

Computerworld Hong Kong (ISSN 1023-4934) is<br />

published eleven times yearly by Questex Asia Ltd. Subscription<br />

rates: 1 year HK$330 (Hong Kong only), HK$440 (Macau only),<br />

US$109 (within Asia) and US$119 (outside Asia), 2 years HK$580<br />

(Hong Kong only), HK$770 (Macau only), US$190 (within Asia) and<br />

US$210 (outside Asia). Single/Back issue (if available) HK$40 per<br />

copy (Hong Kong only) US$11 (within Asia) and US$12 (outside<br />

Asia) plus US$5 handling charge per order. Printed in Hong Kong.<br />

Postage paid in Hong Kong. For subscription enquiries, change of<br />

address or delivery services, please contact our circulation department<br />

by: fax (852) 2559-2015, e-mail customer_service@cw.com.<br />

hk or by mail.<br />

Computerworld Hong Kong is on sale in bookshops in Hong Kong<br />

at HK$40 per issue.<br />

<br />

275 Grove Street, Newton, MA 02466, Tel: +1 617 219 8300<br />

PRESIDENT & CHIEF EXECUTIVE OFFICER Kerry C. Gumas<br />

EXECUTIVE V.P. & CHIEF FINANCIAL OFFICER Tom Caridi<br />

EXECUTIVE VICE PRESIDENT<br />

Robert S. Ingraham<br />

EXECUTIVE VICE PRESIDENT<br />

Tony D’Avino<br />

EXECUTIVE VICE PRESIDENT<br />

Jon Leibowitz<br />

EXECUTIVE V.P. CORPORATE DEVELOPMENT Claudia Flowers<br />

VICE PRESIDENT, DIGITAL MEDIA<br />

Seth Nichols<br />

V.P., HUMAN RESOURCES<br />

Diane Evans-Negron<br />

Printed by:<br />

<br />

9th Floor, Haking (Tung Shing) Industrial Building<br />

34 Lee Chung Street , Chai Wan, Hong Kong<br />

Tel: 852 2965 6777<br />

www.dg3.com/<br />

<br />

Source Dec 2005 HKABC<br />

www.cw.com.hk<br />

(852) 2589-1313<br />

(852) 2559-2015<br />

4 Computerworld Hong Kong April 2009 www.cw.com.hk


Takeaminutetosavemilionsinvendorlock-incosts.<br />

WatchourChoice&Flexibilityvideoatjuniper.<strong>net</strong>/choice<br />

© 2009JUNIPERNETWORKS,INC.


iznews<br />

China becomes a leader in managed print services<br />

China has become one of the leaders in<br />

Asia Pacific’s managed print services<br />

estimated to reach US$1 billion by 2012,<br />

said Springboard Research recently.<br />

The managed print services (MPS) market is<br />

forecast to grow from US$392 million in 2007 to<br />

US$825 million in 2011, according to the research<br />

house.<br />

“These robust growth figures indicate not just<br />

a vibrant MPS marketplace,<br />

but they also reflect<br />

the emergence of<br />

MPS as the best growth<br />

bet for the print hardware<br />

vendors in the<br />

region, who have seen<br />

a decline of hardware<br />

sales amidst the economic<br />

slowdown,” said<br />

by 2012<br />

Sanchit Vir Gogia, senior<br />

research analyst for Services at Springboard<br />

Research. “Enterprises in the region are eager to<br />

test and adopt the ‘next level’ of printing environment,<br />

presenting the MPS vendors with a growth<br />

opportunity in a difficult economic situation.”<br />

Australia and China lead the region<br />

Australia and New Zealand together will remain<br />

the largest MPS market in the region throughout<br />

the forecast period of 2007-2012; cornering<br />

over 25 percent of the market and expanding at<br />

a CAGR of 19.3 percent, Springboard said. While<br />

China’s managed print services to top US$1 billion<br />

India is behind China and ASEAN in overall market<br />

size, the south Asian country is forecasted to<br />

be the fastest growing market in the region with<br />

a CAGR of 22.6 percent, the analyst firm added.<br />

“The MPS model is still in its infancy in Asia Pacific<br />

and enterprises in the region need to be educated<br />

that this is much more than an alternative<br />

print hardware purchase model,” said Phil Hassey,<br />

vice president for services at Springboard<br />

Research. “The challenge<br />

for providers is<br />

to ensure they manage<br />

MPS offerings prices<br />

and offer solutions as<br />

a long-term strategy,<br />

providing immediate<br />

and successful results<br />

for enterprises.”<br />

In the MPS competitive<br />

landscape,<br />

HP is the clear leader with a dominant market<br />

presence in the region’s marketplace, said<br />

Springboard. In second place, Fuji-Xerox has<br />

leveraged its robust set of MPS offerings and a<br />

strong partner ecosystem to strengthen its regional<br />

presence, Springboard added. Lexmark<br />

is the only other global printer vendor who has<br />

a discernible market presence in the region,<br />

Springboard noted. The remaining market is<br />

highly fragmented and is made up of local service<br />

providers and other printer vendors, the<br />

research company observed. <br />

<br />

By Matt Hintsa<br />

Express e-channels aimed to reduce border<br />

crossing time from 12 seconds to eight<br />

seconds have attracted 126,512 Hong<br />

Kong residents to sign up for their trial run.<br />

The Immigration Department has installed 10<br />

express e-channels at the Lo Wu control point<br />

since early March as part of a HK$7 million pilot<br />

project.<br />

According to the department, around 20,000<br />

travelers use the news express e-channels at Lo<br />

Wu daily, about 18 percent of the total e-channel<br />

user base. The department’s figures indicate that<br />

about 1.2 million Hong Kong residents visit China<br />

via Lo Wu at least once a month.<br />

“As there’s a daily average of 10,000 Hong Kong<br />

residents completing the enrollment process, we<br />

expect to sign up all 1.2 million frequent users in<br />

four months,” said Jacqueline Kwan Chan Suetmui,<br />

assistant immigration director (information<br />

systems).<br />

Instead of inserting their ID cards into a reading<br />

machine when using the traditional e-channels,<br />

users of express e-channels put the cards on<br />

an optical reader.<br />

An optical reader scans only the personal information<br />

on an ID card rather than information<br />

from the ID card chip scanned by traditional e-<br />

channels, the department said, adding that the<br />

entire optical scanning process takes just three<br />

seconds.<br />

Users must give consent to the director of immigration<br />

for personal data retrieval from the<br />

chips in their ID cards and to such data being<br />

stored for subsequent self-service immigration<br />

clearance, the department added.<br />

As the user data are stored on the Lo Wu server<br />

not connected to other <strong>net</strong>works, the department<br />

assures the public that personal data cannot be<br />

leaked to outsiders, said Kwan.<br />

Kwan noted that the department will conduct<br />

a review when the pilot ends six months later:<br />

“We will then decide whether the express service<br />

should be extended to other checkpoints.” <br />

—Compiled by Teresa Leung<br />

newsbites<br />

Korean asset management firm deploys<br />

TelePresence<br />

Datacraft said it has completed the installation of a<br />

Cisco TelePresence system for Korean asset management<br />

firm Company, Mirae Asset Global Investments’<br />

offices in South Korea and Hong Kong. The tailor-made<br />

system for Mirae Asset includes the installation of two<br />

Cisco TelePresence Systems (CTS) 3,000 in Korea and<br />

Hong Kong and four CTS 1,000 systems to be deployed<br />

in India, Brazil, the US and the UK. The <strong>net</strong>work hub in<br />

Seoul, Korea also comprises a TelePresence manager,<br />

Call manager, multi-point switch and LDAP facility,<br />

Datacraft added.<br />

Adobe-enabled stream video at<br />

Oriental Press<br />

Adobe has announced that Hong Kong-based Oriental<br />

Press Group has selected Adobe Flash Media Server<br />

software for streaming video on ontv, the company’s<br />

online TV service on its news and information Inter<strong>net</strong><br />

portal on.cc.<br />

The on.cc portal combines content from two of the<br />

territory’s daily newspapers, Oriental Daily News and<br />

The Sun, as well as streaming video content from their<br />

TV service. Oriental Press said the site has 2.1 million<br />

unique viewers each month.<br />

AOL closes China R&D base as<br />

economy slides<br />

America Online will close a research and development<br />

base in Beijing but keep trying to break into China’s<br />

market amid the sliding global economy.<br />

The Beijing office, which opened in 2007 and has 56<br />

staff, will be shut down by midyear given poor economic<br />

circumstances and reorganization plans, an AOL spokeswoman<br />

in the US said via e-mail. But AOL’s Web portal<br />

for mainland China, launched last year, will continue to<br />

operate from the company’s Hong Kong regional base,<br />

the spokeswoman said.<br />

Amerson to set up China delivery<br />

center<br />

US consulting and outsourcing services company<br />

Amerson will set up a global delivery Center in Chengdu,<br />

China. “The setup of the delivery center in Chengdu is<br />

very important to the company’s regional and global<br />

development strategy, “ said Dr Rob Ouyang, managing<br />

director of Amerson, adding that the city has exceptionally<br />

well investment environment, locally abundant talented<br />

resources and high efficiency of government services.<br />

Dell cuts staff worldwide<br />

Dell in mid-March said it had laid off staff at different<br />

sites worldwide in an effort to cut costs and streamline<br />

operations. The company didn’t provide an exact number<br />

of employees it had laid off. However a company spokesman<br />

said that jobs were cut globally, including sites in<br />

Texas and North Carolina.<br />

6 Computerworld Hong Kong April 2009 www.cw.com.hk


Sponsored Feature<br />

Coping with <strong>net</strong>work strain<br />

With <strong>net</strong>work complexity rising Juniper’s EX Series Switches offer<br />

performance, security and significantly simplified management.<br />

Juniper’s EX Series Switches put an<br />

emphasis on uptime, reliability and<br />

simple management.<br />

associated with true chassis-based systems.<br />

Bunt noted that companies can now use the virtual<br />

chassis concept to manage <strong>net</strong>work expansion from<br />

a single chassis and still utilize the shared redundancy<br />

across a new branch <strong>net</strong>work and across multiple<br />

locations.<br />

“The EX Series offers carrier-class reliability, operational<br />

simplicity and integrated security in the form of<br />

end-point protection,” said Bunt.<br />

Switches at work<br />

Bunt also pointed out existing customers who are<br />

taking full advantage of these features.<br />

One organization reaping the benefits of the Juniper<br />

EX Series of switches is the Pittwater Council in<br />

Sydney, Australia.<br />

As a local council body, its responsibilities to citizens<br />

have changed from managing tasks like rubbish<br />

collection to creating and managing interactions and<br />

electronic platforms for public service delivery.<br />

This recent strategy has resulted in a critical need<br />

for a reliable and secure platform for information delivery<br />

and robust disaster recovery solution to ensure<br />

service levels are never disrupted.<br />

The choice was to outsource the operation or build<br />

its own system. The latter choice was taken and Pittwater<br />

Council utilized the Juniper EX4200 Ether<strong>net</strong><br />

CIOs today face unprecedented challenges<br />

with massive pressure to cut cost, drive efficiency<br />

while also deliver even more services<br />

with ever limited resources. Data centers are being<br />

consolidated and virtualized while <strong>net</strong>works face<br />

growing performance needs, security requirements<br />

and more complex management issues.<br />

The wave of added functionality at the <strong>net</strong>work<br />

level is creating tremendous management issues for<br />

CIOs and <strong>net</strong>work managers.<br />

Networks were designed originally just for connectivity.<br />

“But in recent years companies have bolted<br />

on additional functions to the <strong>net</strong>work as an afterthought,”<br />

said Greg Bunt, Asia Pacific Director for<br />

Advanced Technologies, Juniper Networks. First it<br />

was integrating security, then new applications like<br />

voice and video with the need for QoS, then issues<br />

like enabling number portability and now its end-user<br />

authentication.<br />

“The list grows longer by the day and <strong>net</strong>works today<br />

have to enable all of these in an easy, reliable and<br />

secure manner,” Bunt added.<br />

Under pressure<br />

But the need to invest in new <strong>net</strong>works and tools to<br />

manage these issues is tempered by the severe cost<br />

pressures. CIOs on average have 70-80% of their<br />

budget already tied up by essential management and<br />

maintenance costs, leaving little to invest in anything<br />

strategic.<br />

With budgets being cut that gives CIOs even less<br />

room to move. On top of this the restrictions on resources<br />

mean there is a huge demand for highly<br />

skilled professionals to manage the vast <strong>net</strong>work<br />

challenges with fewer people and tools.<br />

“In the current environment such highly-skilled<br />

people are even harder to find as they tend not to<br />

move from their existing jobs,” said Bunt.<br />

In response to these challenges enterprises have<br />

sought to deploy <strong>net</strong>working platforms that enable the<br />

<strong>net</strong>work perform at higher service levels with the same<br />

resources and remain easy to manage?<br />

Single view<br />

Juniper’s solution is its EX Series of Ether<strong>net</strong> switches.<br />

The EX series portfolio is designed for <strong>net</strong>work<br />

performance-minded enterprises and service providers<br />

with an emphasis on uptime, reliability and simple<br />

management.<br />

One unique feature is its single OS which is consistent<br />

across the whole series of EX switches as well as<br />

Juniper’s complete portfolio of <strong>net</strong>working and security<br />

products.<br />

Many competing platforms have adopted the<br />

approach of an OS for each and every product<br />

range. Having different versions of OS on switches,<br />

routers, application management and security<br />

products just makes the management challenge<br />

increasingly difficult. Juniper’s JUNOS operating<br />

system allows users to patch and update OSes<br />

and have that applied consistently across their<br />

<strong>net</strong>works. This lowers management costs and<br />

eases the burden on <strong>net</strong>work managers.<br />

Virtual <strong>net</strong>works<br />

Another unique feature of the EX Series of<br />

switches is its virtual chassis technology. This enables<br />

firms to connect multiple switches together<br />

to act as one logical device that can support up<br />

to 480 10/100/1000BASE-T ports. Because of the<br />

modularity of the Virtual Chassis, switches can be<br />

added on as needed. This scalability reduces the<br />

initial investment as well as operational expenses<br />

Greg Bunt, Juniper: Networks were designed<br />

originally just for connectivity. But in recent<br />

years companies have bolted on additional<br />

functions to the <strong>net</strong>work as an afterthought.<br />

switch with virtual chassis technology to help support<br />

the DR capability. The Virtual Chassis allowed optical<br />

links to be concurrently utilized, increased throughput,<br />

reliability and enabled easier administration The<br />

capital expense of this option was calculated to be<br />

far less than the outsource option and delivered the<br />

required service levels for backup and recovery operations<br />

Ajisen (China) Holdings Limited which operates<br />

an extensive chain of restaurants across China and<br />

Hong Kong has also everaged the EX switching<br />

platform and additional Juniper technology including<br />

firewalls and remote access VPN and Juniper<br />

routers.<br />

This has enabled Ajisen to deliver business critical<br />

services to a massively distributed environment covering<br />

243 locations. IT administration has been drastically<br />

simplified and reliability and security markedly<br />

improved.<br />

For more information or enquiry<br />

please email hk_enquiry@juniper.<strong>net</strong>


Check Point helps firms cut<br />

through the security tangle<br />

Check Point’s new software blade<br />

architecture set to deliver flexible and<br />

manageable security to businesses of all<br />

sizes<br />

Let’s face it, securing a corporate IT infrastructure<br />

is a challenge for any business<br />

regardless of size, particularly as IT departments<br />

roll out layer upon layer of security<br />

technology to cope with the continually growing<br />

number of threats.<br />

What this has created is an environment<br />

often characterized by a host of overlapping<br />

products, hardware platforms, management<br />

consoles and daily monitoring systems.<br />

And this is often a Gordian Knot that is inefficient,<br />

costly and difficult to get a clear understanding<br />

of where the vulnerabilities are.<br />

“Every application comes with a package of<br />

threats. Every time we evolve in this industry<br />

there are new threats created and we constantly<br />

need to have an answer to these,” said Itzhak<br />

Weinreb, Vice President of APAC Sales for<br />

Check Point Software Technologies Ltd.<br />

“Now consider that there are thousands of applications<br />

out there, dozens of technologies and<br />

hundreds of vendors – it is an ongoing nightmare<br />

for any CIO.”<br />

Weinreb said this clearly highlights a need<br />

for a single security suite that is simple to rollout<br />

and maintain, flexible enough to grow with<br />

the needs of the business and with a high degree<br />

of manageability to make operating and<br />

reporting easy.<br />

And he believes that Check Point has answered<br />

all of these key criteria with its latest<br />

security gateway version, the R70.<br />

Live by the blade<br />

What sets the R70 apart is that it is built on<br />

software blade architecture, a first for the security<br />

market.<br />

What this essentially means for customers<br />

is the ability to select exactly which security<br />

products they want from a<br />

library of over 20 software<br />

blades to create a unique<br />

level of protection tailored<br />

to their operating environment.<br />

The libraries include VPN,<br />

Firewall, URL filtering, antivirus<br />

& anti-malware, antispam<br />

and intrusion prevention<br />

system (IPS) modules among<br />

others.<br />

And as the business<br />

grows, additional blades can<br />

be quickly and easily added<br />

to the existing platform,<br />

ensuring the investment is<br />

right-sized to current needs<br />

but flexible enough to grow as the business<br />

does.<br />

Additionally, the software blades can be added<br />

without deploying new hardware, reducing deployment<br />

times and operational costs, as it runs<br />

on Check Point UTM-1 and Power-1 appliances,<br />

open servers and within virtualized environments.<br />

“The idea is to give the customer the option to<br />

choose what they want to put on their system,”<br />

said Weinreb.<br />

“They can either do this a la carte, and choose<br />

the blades that suit their business, or they can<br />

choose from one of our packages because<br />

Check Point’s Itzhak Weinreb:<br />

Our main interest is to simplify everything—the<br />

management tools help<br />

you monitor and control everything<br />

from a single location<br />

we know more or less what<br />

customers at different levels<br />

need.”<br />

Blades for all sizes<br />

The flexibility of Check Point’s<br />

solution extends even further,<br />

giving IT departments the ability<br />

to select specific versions of<br />

the R70 to meet their current<br />

hardware, and is available in<br />

single, two, four or eight core<br />

versions.<br />

And by going the software<br />

rather than the hardware approach,<br />

the R70 is easily integrated<br />

into existing security<br />

infrastructures.<br />

There are thousands of applications out there, dozens of<br />

technologies and hundreds of vendors – it is an ongoing<br />

nightmare for any CIO.<br />

Itzhak Weinreb<br />

All this reduces the total cost of ownership, a<br />

key pain point for many CIOs, under pressure<br />

from senior management to reduce costs in the<br />

current economic climate.<br />

In addition it means the R70 security software<br />

can be rolled out to any organization, whether<br />

they are a small, medium or enterprise-level<br />

business.<br />

“The small market is getting the same security<br />

functionality as the big enterprises but at the<br />

right price,” said Weinreb. “They just choose the<br />

version to match the size of box.”<br />

Another impressive feature of the R70 is in its


Sponsored Feature<br />

functions, allowing them to graphically view high<br />

volumes of event data in real-time and quickly<br />

drill down from a business view of events to a<br />

forensic level of details.<br />

The new provisioning of software blade provides<br />

centralized administration and activation<br />

of Check Point security devices via a single<br />

management console. The unique unified management<br />

architecture of Check Point R70 allows<br />

administrators to manage, set policy and apply<br />

protections across the entire security infrastructure<br />

from a single interface.<br />

Check Point’s IPS software Blade secures everything from the client to server and<br />

OS vulnerabilities, malware and worm infections<br />

At the end of the day it is about giving the customer choice.<br />

CIOs get to invest in the infrastructure that they need, not<br />

what the industry and vendors are bundling together.<br />

Itzhak Weinreb<br />

“Our main interest is to simplify everything the<br />

management tools help you monitor and control<br />

everything from a single location. You get<br />

reports from each machine identifying what are<br />

its weaknesses and how to solve it – even remotely,”<br />

noted Weinreb.<br />

“This saves a lot of internal resources because<br />

you only need a bare minimum of staff that is<br />

familiar with the easy to use management tools<br />

to run the entire security operation.”<br />

This resonates well with CIOs today, because<br />

it lowers operating costs, and decreases the reliance<br />

on specialized security skills, which are<br />

often expensive and in short supply.<br />

ability to allow administrators to set the performance<br />

levels of each blade.<br />

“This is a real revolution when compared to<br />

UTM products for instance. Most UTM products<br />

offer a fixed combination of security functions on<br />

a fixed platform for a fixed price. There is no option<br />

to disable functions to improve overall performance<br />

nor is there an option to add function<br />

as security needs change.”<br />

In the new Software Blade architecture, security<br />

functions run as a separate piece of software<br />

within the same software environment. Security<br />

managers can choose different combinations of<br />

Software Blades in ‘containers’, predefine the<br />

level of performance and manage all applications<br />

in a consistent way from a central management<br />

system.<br />

This means guaranteed performance, according<br />

to Weinreb.<br />

Walking the talk<br />

The new IPS software blade uses a multi-tier intrusion<br />

prevention engine that allows businesses<br />

to pre-emptively protect themselves, by securing<br />

everything from the client to server and OS vulnerabilities,<br />

malware and worm infections.<br />

And the increased performance of the Check<br />

Point R70 means businesses have a unique<br />

alternative to pre-emptively protect themselves<br />

against all threats by deploying the IPS software<br />

blade on every gateway.<br />

Weinreb believes this is an attractive offering<br />

to many customers out there.<br />

“Today, about 80% of customers do not turn<br />

on IPS due to performance concerns.” said<br />

Weinreb. “This is why we came up with the idea<br />

to integrate the IPS into the blade platform. “This<br />

enables full IPS utilization. All customer has to<br />

do is activate the IPS blade, activate the acceleration<br />

blade and set up the performance level.”<br />

Keeping it simple<br />

While Weinreb is happy to talk about the nuts and<br />

bolts of the technology under the hood of the R70,<br />

he also notes that this solution would not be complete<br />

without manageability and good reporting.<br />

It is for this reason that Check Point introduced<br />

two security management blades for IPS event<br />

analysis and provisioning of gateways.<br />

The IPS event analysis blade provides customers<br />

with the ability to focus on critical events and<br />

Seamless deployment<br />

Weinreb also points out that while the R70 and<br />

Check Point’s software blade architecture form<br />

the basis of a new security platform, it still compliments<br />

the current security offerings.<br />

“Even if you are running the R65 on the current<br />

box, you don’t need to change the box, just<br />

upgrade to the latest version, the R70. And it is<br />

an upgrade, not a completely new deployment<br />

which is another advantage.” said Weinreb.<br />

Ultimately Weinreb believes that the R70 and<br />

Check Point’s software blade architecture will<br />

resonate with CIOs in the current economic climate<br />

and beyond, because regardless of market<br />

booms or busts, flexibility, manageability and<br />

lower total cost of ownership are always going to<br />

be important to any business.<br />

“At the end of the day it is about giving the customer<br />

choice. CIOs get to invest in the infrastructure<br />

that they need, not what the industry and vendors<br />

are bundling together,” concluded Weinreb.<br />

The key focus is to address CIO pain points, giving<br />

them a complete security solution that is simple,<br />

flexible and manageable, and one that they can<br />

easily justify investing in because of the lower cost<br />

of ownership, a key criterion in these tough times.<br />

Check Point company website: http://www.checkpoint.com<br />

Email: info_ap@checkpoint.com


viewpoint<br />

Charles Mok<br />

The cashed-up Hong Kong govt<br />

must fund smarter IT initiatives<br />

John Tsang, our Financial Secretary, unrevealed<br />

his second budget in February and<br />

said that “preserving jobs” was his objective.<br />

The theme surely resonates with the public,<br />

but the content of this budget does not justify its<br />

stated goal.<br />

Those who criticize the Hong Kong government<br />

for neglecting its citizens’ hardship<br />

during the current downturn have a point.<br />

Governments around the world are enacting<br />

aggressive economic stimulus measures. But<br />

our government seems to be sitting idle in<br />

spite of record fiscal reserves.<br />

Hong Kong: cash-rich, initiative poor<br />

At the end of January 2009, our fiscal reserves<br />

reached a record-breaking HK$543<br />

billion, while accumulated surplus of the Exchange<br />

Fund was around HK$500 billion. According<br />

to a government press release, as at<br />

31 January 2009, the financial position of the<br />

government stands at the enviable level of<br />

HK$49.8 billion surplus. Instead of the fiscal<br />

deficit of HK$4.9 billion that the government<br />

estimated in the budget, we may end up with a<br />

huge surplus at the end of this financial year.<br />

Taking into account this possibility of a huge<br />

surplus, the meager initiatives proposed in the<br />

budget are even worse than when they first<br />

meet the eyes. On the ICT front, although the<br />

government has increased its ICT spending,<br />

the effect on alleviating the industry’s hardships<br />

is inadequate.<br />

Perhaps more so than in other industries,<br />

our ICT sector faces dwindling demand, and<br />

professionals are under threat of layoff day<br />

and night. Yet prices—for products, services<br />

and manpower—are falling. This is the perfect<br />

opportunity for the government to improve<br />

our information infrastructure, in order<br />

to provide better public services, help sustain<br />

demand, and preserve jobs.<br />

The government must recognize the irreparable<br />

damage that will be caused to the ICT<br />

industry in financial downturns, as ICT skills<br />

are harder to maintain than most other professional<br />

skills if a professional is out of action<br />

for a year or several months. Our industry<br />

and indeed the entire Hong Kong professional<br />

workforce will face a shortage of ICT talent<br />

when the economy recovers—similar to the<br />

post-SARS situation.<br />

E-health scheme not enough<br />

The only bright spot is the appropriation<br />

for the territory-wide e-health records (EHR),<br />

which will go a long way to establish Hong<br />

Although the government has increased its ICT spending, the<br />

effect on alleviating the industry’s hardships is inadequate<br />

Kong as a center of health information system<br />

development. But the ICT industry must<br />

be further and better engaged in the setting<br />

up of the strategy and direction of EHR, so<br />

that the ICT industry will be able to participate,<br />

contribute and benefit from this sizable<br />

investment.<br />

The “MyGovHK” project, which allows users<br />

to customize the government portal, is another<br />

idea I previously proposed in my “Ten<br />

Information Infrastructure Projects.” The government<br />

finally accepted the need for Hong<br />

Kong to have a clearer policy to support the<br />

development of data centers—also welcome<br />

news, after years of lobbying from the industry<br />

and myself along with former LegCo member<br />

Sin Chung-Kai urging the government to<br />

remove restrictive barriers in their land and<br />

innovation support policies.<br />

Hiring for specific needs<br />

But the government’s responses to our other<br />

recommendations in other policy areas, such as<br />

education, transport, food labeling and so on,<br />

have fallen short of the industry’s expectations.<br />

For instance, the budget earmarked HK$63<br />

million for a one-year education program on<br />

online safety, which will create 500 jobs.<br />

But the fund could be much better utilized<br />

if each school hires a single IT assistant: a<br />

trained tech to alleviate the heavy workload of<br />

teachers who must handle IT support chores<br />

in addition to teaching. Instead of the unclear<br />

motives and clearly one-off nature of the proposed<br />

program, what teachers and students<br />

really need is the government’s commitment<br />

to support them in a sustainable way.<br />

The Financial Secretary has indicated that<br />

he may announce further mid-year initiatives,<br />

opening a door for further supportive measures.<br />

It’s high time for our sector to unite<br />

behind a common cause: urging government<br />

to recognize the ICT sector’s importance to<br />

our economy and financing more concrete<br />

measures to re-ignite our momentum, so that<br />

Hong Kong can realize our potential when we<br />

emerge from this crisis. This “worst of times”<br />

is indeed the best of times to make this investment<br />

on ourselves, and we must realize that<br />

this is a once-in-a-century opportunity we are<br />

facing, not a crisis<br />

<br />

Charles Mok is the president<br />

of Inter<strong>net</strong> Society Hong Kong,<br />

and ex-officio Member of the<br />

Hong Kong Information Technology<br />

Federation. He has been<br />

in the IT industry for almost 20<br />

years, and is active in a number<br />

of advisory committees and<br />

statutory bodies of the HKSAR government<br />

10 Computerworld Hong Kong April 2009 www.cw.com.hk


izpeople<br />

Inside the new<br />

Big Blue<br />

???<br />

CIO CANADA: How are you, as a CIO, responding<br />

to the current difficult financial<br />

situation on an immediate and longer term<br />

basis?<br />

HENNESSY: We are being very deliberate<br />

about what the returns are going to be from the<br />

investments we’re making and what the business<br />

cases are behind those investments. We’re also<br />

trying to shorten the time to value for those investments;<br />

we’re working on projects that have<br />

quicker returns, more hard-dollar benefits, as opposed<br />

to multi-year projects.<br />

We’re also trying to make our application development<br />

and our transformation programs more<br />

agile and more tightly integrated with the business<br />

units, so we really understand what value<br />

needs to be created quickly and what the return<br />

on that is going to be.<br />

CIO Mark Hennessy on transforming the IT organization at IBM, fostering a<br />

culture of innovation, managing IT during the financial crisis and the value of<br />

social <strong>net</strong>working tools By David Carey, CIO Canada<br />

a governance model, and by building a skilled<br />

team. All of those things that go into an IT transformation.<br />

CIO: How far have you progressed with the IT<br />

transformation?<br />

HENNESSY: From a centralization standpoint,<br />

we’ve made a lot of progress, consolidating<br />

155 data centers down to five strategic centers<br />

around the world. From an application sunsetting<br />

standpoint we’ve gone from 16,000 down to about<br />

of employees has been increasing, our IT cost<br />

has come down by 26 percent.<br />

We’ve done an awful lot but there’s still a lot<br />

more to do. We’re going to carry on with our IT<br />

transformation [and] continue to drive down our<br />

costs so we can invest in other areas.<br />

CIO: Can you talk about some of the projects<br />

you have under way?<br />

HENNESSY: We’re now in the middle of a very<br />

large virtualization project. About a year ago I<br />

We’ve gone through an IT transformation over the past five to<br />

ten years, going from 128 CIOs down to one<br />

CIO: How is the IT landscape at IBM changing?<br />

HENNESSY: We’ve gone through an IT transformation<br />

over the past five to ten years, going<br />

from 128 CIOs down to one. We’re focusing on<br />

ways to drive more efficiency, such as centralization<br />

in terms of reducing the number of data<br />

centers, sunsetting legacy applications, working<br />

with partners much more closely, and optimizing<br />

our global resourcing.<br />

We’re ensuring that we have a tight relationship<br />

with the business units and making sure we<br />

have a balance between operational excellence<br />

and business value—we’re creating that balance<br />

with a set of standards, with an architecture, with<br />

4,700. I still think 4,700 is too many and we’ve got<br />

work underway to bring that number down.<br />

We’ve done a very good job in terms of working<br />

closely with partners. As an example, we<br />

have one global <strong>net</strong>work now as opposed to<br />

sourcing our <strong>net</strong>work from lots of different<br />

places or driving it internally. We’ve also made<br />

some fundamental steps forward in things like<br />

VoIP.<br />

And we’ve optimized our global delivery—we<br />

now have multiple locations around the world<br />

that have certain skills that we need—and we’ve<br />

figured out how to optimize both service delivery<br />

and application services. Over the past five<br />

years, even though our revenue and our number<br />

challenged a team to take about 25 percent of our<br />

infrastructure, about 3,900 servers, and consolidate<br />

them down into 30, and that project is going<br />

very well. For us the best approach has been to<br />

consolidate those Intel and UNIX servers onto a<br />

Z platform running Linux.<br />

We also have a lot of work going on around<br />

application development and driving for a much<br />

faster return on investment, reducing the time<br />

to value through agile methodology and rational<br />

tools and looking at an outcome-based model as<br />

opposed to utilization models.<br />

CIO: What’s IBM doing to foster a culture of<br />

innovation across the enterprise?<br />

12 Computerworld Hong Kong April 2009 www.cw.com.hk


izpeople<br />

HENNESSY: CIOs today are well positioned to<br />

address this issue. First of all, they’re one of the<br />

few executives that see the enterprise from endto-end,<br />

across all business units, across all geographies.<br />

They see the data flows, they see the<br />

interactions, and so they have a good perspective<br />

on the enterprise itself.<br />

Secondly, they have access to a lot of these<br />

exciting new tools and technologies around social<br />

<strong>net</strong>working [and] Web 2.0. We are working<br />

hard to try and use those tools and that<br />

knowledge to drive innovation. We have four<br />

generations of IBMers—traditionalists, baby<br />

boomers, Gen X, and Gen Y—and they’re<br />

spread out all over the world. We need to try<br />

and figure out how to use these tools to drive<br />

relationship-building, and then collaboration,<br />

and then innovation across all of our employees,<br />

regardless of what business, geography or<br />

generation they’re in.<br />

We’ve started to implement lots of different<br />

tools to do this, such as blogs and wikis. We have<br />

about 18,000 blogs up and running now, and over<br />

half of our population—about 200,000 people—<br />

are using Wikis as an ongoing part of their business.<br />

We also have online collaboration forums<br />

where people can go into an online team room<br />

and introduce topics that others in the organization<br />

can talk about, or managers can come in<br />

and sponsor a work effort that anyone can collaborate<br />

on. Communities have now started to<br />

build around topics that groups of people are interested<br />

in.<br />

CIO: How are you fostering technology innovation?<br />

HENNESSY: From out of the CIO’s organization,<br />

we have what we call a Technology Adoption<br />

program, which is kind of a sandbox that<br />

we’ve built where people can try new tools and<br />

new processes. They can then provide feedback<br />

to the developers and help shape the new products<br />

and processes, ensuring that they’re as valuable<br />

as possible, whether the intention is to take<br />

those new tools to the market or to use them internally.<br />

CIO: What are you doing to help optimize the<br />

value of the social <strong>net</strong>working tools you’re using?<br />

HENNESSY: I find it important to try and understand<br />

the value of each of these different tools,<br />

and I do that in a number of ways. How many<br />

ideas are created by a particular tool? How many<br />

get sponsored by somebody that has a budget?<br />

How many are collaborated on? How many actually<br />

make it to market? What revenue is generated<br />

by those ideas?<br />

I have a set of tools now that I use to track<br />

the ideas and the innovations that come out of<br />

the different tools—so that I can better align my<br />

investments to the tools that are driving the better<br />

and more innovative ideas. That’s something<br />

that I spend a lot of time talking about with<br />

other CIOs around the world: the ROI of social<br />

<strong>net</strong>working.<br />

CIO: What’s the company’s attitude towards<br />

younger employees using their own social <strong>net</strong>working<br />

tools, such as Facebook?<br />

We have about 18,000 blogs up and running now, and over half<br />

of our population—about 200,000 people—are using Wikis as<br />

an ongoing part of their business<br />

HENNESSY: I think it would be hard to try<br />

to control it or turn it off. We understand it’s<br />

a reality and we have to try and leverage that<br />

technology internally. So we give all of our employees,<br />

regardless of what generation they’re<br />

from, the opportunity to use these tools to collaborate,<br />

post their ideas, and work with colleagues<br />

wherever they are to try and come up<br />

with the best solutions for their clients or for<br />

their own internal customers. Because we have<br />

a culture of innovation, utilizing these tools to<br />

get ideas from colleagues is very natural and<br />

it’s taken off quickly.<br />

The other interesting thing is how are we going<br />

to start using those social <strong>net</strong>working tools<br />

outside the firewall? We started to do it on a<br />

couple of different projects. One is our corporate<br />

service corps, which is a group of IBMers<br />

that have taken a leave to work in emerging<br />

markets and places that need their assistance.<br />

We now have a Web site that is a part of the<br />

social <strong>net</strong>working tool that allows interaction<br />

between those folks and the government agencies<br />

that they’re working with and others that<br />

have ideas that can help them. And we’re going<br />

to do more of those types of things to help give<br />

our clients better access into our resources,<br />

our people, our intellectual property and our<br />

key industry thoughts, because we think that<br />

will be helpful in terms of developing new ideas<br />

and new solutions and helping create more value<br />

for our clients.<br />

CIO: What advice do you have for other CIOs<br />

around innovation?<br />

HENNESSY: I would say experiment and pilot.<br />

There are different innovation tools and approaches<br />

out there—it’s not one size fits all.<br />

Everybody’s company is a little different. Their<br />

organizations, their geographies, their cultures<br />

are a little different. If you start with different<br />

tools and incubate them and test them and pilot<br />

them, you’ll start to see what may work well for<br />

your company<br />

I was with a CIO in Japan and his approach<br />

was to create a blog for himself and ask employees:<br />

what issues keep them from being<br />

successful? He was amazed at how quickly he<br />

got ideas back—he didn’t expect that kind of<br />

direct dialogue. Another CIO started his own<br />

Facebook type of social <strong>net</strong>working tool and<br />

he posted ideas about himself personally. Others<br />

in his organization started doing the same<br />

thing, and they found that the relationships<br />

started building quickly across business units<br />

and geographies—they got to know people who<br />

were interested in similar kinds of projects, who<br />

were working on the same kinds of issues for<br />

their clients, and so that took off pretty quickly<br />

for them.<br />

CIO: What technology would you point to that<br />

is going to have a significant impact in the<br />

next three years?<br />

HENNESSY: The pervasive devices that are<br />

emerging around the world in all different industries—sensors,<br />

monitors, cell phones or whatever—are<br />

really going to change the environment<br />

that we’re in, whether they be wirelessly connected<br />

or not. These pervasive devices, as they<br />

become intelligent and interconnected, are going<br />

to create an opportunity for understanding<br />

the environment and making some significant<br />

changes.<br />

All of these embedded devices, as they become<br />

more interconnected and intelligent, are going to<br />

give us opportunities for other types of ‘smart’<br />

environments. And figuring out how to take advantage<br />

of that, not only to improve efficiency<br />

and effectiveness but also to give value back to<br />

businesses, governments and society as a whole,<br />

is going to be important.<br />

<br />

www.cw.com.hk<br />

April 2009 Computerworld Hong Kong 13


Your data-connectivity’s<br />

crucial, but who’s building it<br />

as a utility in Hong Kong?<br />

By Stefan Hammond<br />

The first electrical standards fight raged a<br />

century ago. On one side: famed inventor<br />

Thomas Edison, who is credited with inventing<br />

motion pictures, the incandescent light<br />

bulb and audio recording on wax cylinders. On<br />

the other: a Serbian inventor—part genius, part<br />

Bottom Line:<br />

<br />

<br />

<br />

build<br />

<br />

<br />

<br />

<br />

<br />

<br />

madman—named Nikola Tesla.<br />

Although many believe it was<br />

Marconi who invented radio, it<br />

was in fact Tesla, and the volatile<br />

Serb had a powerful backer:<br />

tycoon George Westinghouse,<br />

who believed that the Tesla<br />

Polyphase System should be deployed<br />

to wire the households of<br />

the USA’s east coast with electrical<br />

current.<br />

Edison made no attempt to<br />

conceal his displeasure. Alternating<br />

current (AC) was dangerous, he thundered,<br />

pointing out that AC was used in the<br />

electric chair to execute criminals. Westinghouse<br />

and Tesla countered that the only way to<br />

transmit current efficiently over long distances<br />

was via an alternating polyphase system which<br />

would carry juice “the last<br />

mile”: into the home. Giant<br />

transformers would encode<br />

the current at a frequency of<br />

60 Hertz (Hz, then known as<br />

“cycles per second”).<br />

Edison had a financial stake<br />

in the direct-current standard.<br />

But needless to say, he<br />

lost, because Westinghouse<br />

and Tesla were right about<br />

long-distance transmission.<br />

Electricity delivered via AC<br />

<strong>14</strong> Computerworld Hong Kong April 2009 www.cw.com.hk


ecame a utility, although it was many more<br />

years before a dependable, accurately calibrated<br />

supply was available at wall-sockets around<br />

the world.<br />

One thing is true of both inventors: neither<br />

could have imagined the usages we now have<br />

for electric current. It’s a utility we never think<br />

about until a circuit-breaker trips, cutting off<br />

the juice.<br />

Electricity—along with water and telephone<br />

lines—are three utilities most Hong Kongers<br />

take for granted. While the uses for wired telco<br />

lines are fairly limited, use of water is more<br />

creative, and electricity heats, cools, amuses,<br />

illuminates and even prolongs or saves lives.<br />

Most of electricity’s uses weren’t dreamt of<br />

in Tesla’s time (although he did build massive<br />

electrical-discharge units known as Tesla<br />

coils—there’s a lovely photo-pool of these<br />

machines in action at http://www.flickr.com/<br />

groups/tesla_coil/pool/). Genius though he<br />

was, Tesla didn’t create the utilization, he built<br />

the utility.<br />

Which brings us to data-transmission.<br />

Utility number four<br />

Data transmission—especially via broadband—squares<br />

electricity’s potential. While<br />

AC brought us television and radio, broadband<br />

brings us interactivity via blogs, forums, wikis<br />

and social <strong>net</strong>working applications. It makes<br />

peer-to-peer file-sharing (which has powerful<br />

legal uses, a fact hyperventilating politicians<br />

and corporate executives sometimes overlook)<br />

possible.<br />

While digital-telecasting, even in high definition,<br />

can be accomplished over the airwaves,<br />

video-over-wire is far more powerful. Ditto for<br />

streaming audio (fire up the “Radio” section<br />

of your iTunes app sometime and try some<br />

browsing). While these uses are basically improvements<br />

on existing media, remember the<br />

pace of change and the inventiveness of human<br />

beings. We’ve only begun to scratch the<br />

surface.<br />

During the heady days of the “dotcom boom,”<br />

<br />

is still greatly underutilized. Collectively, we’re on the steep<br />

part of the learning curve<br />

Broadband over Power Lines (BPL)<br />

T <br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

CLP’s Locandro: <br />

<br />

one oft-repeated example was the Net-savvy<br />

refrigerator which would magically monitor,<br />

say, milk levels, and order new supplies when<br />

necessary (the tech cynics among us waited<br />

for the first time this apocryphal device would<br />

malfunction and order a case of milk, or perhaps<br />

several cases).<br />

Like most of you, I don’t want my fridge connected<br />

to the Inter<strong>net</strong> and ordering groceries<br />

on its own. But what about a unit that monitors<br />

electric usage and micromanages it for greater<br />

efficiency—while your air-conditioners and<br />

dehumidifiers do the same—and allows o<strong>net</strong>ouch<br />

ordering of deliveries via a biometricidentifier?<br />

Too gimmicky? How about regular<br />

monitoring of a homecare patient’s vitals—data<br />

automatically sent to an authorized healthcare<br />

service? Such a scheme would dovetail with<br />

the Hospital Authority’s plan to create patient<br />

records to support all Hong Kongers.<br />

Standards body<br />

The 4th utility is a vast, sprawling subject, so<br />

the best place to start is with a standards body<br />

The US-based professional association BICSI<br />

(pronounced BIK-see) supports the information<br />

transport systems (ITS) industry. Membership<br />

spans nearly 90 countries, and they<br />

provide a definition of the 4th utility I find apt:<br />

“With information transport systems (ITS)<br />

forming the new fourth utility and the everincreasing<br />

demand for bandwidth, the proper<br />

installation of copper and optical fiber systems<br />

has become paramount,” says their Web site.<br />

“ITS covers the spectrum of voice, data and<br />

video technologies,” according to BICSI. “It<br />

continued on page 16 <br />

www.cw.com.hk<br />

April 2009 Computerworld Hong Kong 15


continued from page 15<br />

encompasses the design, integration and installation<br />

of pathways, spaces, fiber- and copper-based<br />

distribution systems, wireless-based<br />

systems and infrastructure that supports the<br />

transportation of information and associated<br />

signaling between and among communications<br />

and information gathering devices.”<br />

Where does Hong Kong rank on this digital<br />

scale, up against connectivity powerhouses<br />

like Korea, Japan and various Scandinavian<br />

countries? According to BICSI, on the Global<br />

Information Technology Report 2008-2009,<br />

produced by the World Economic Forum in<br />

cooperation with INSEAD, the leading international<br />

business school, and sponsored by<br />

Cisco Systems, Hong Kong ranks 12th.<br />

“In general, the transport of data and communications<br />

in a ubiquitous environment is<br />

ever-growing,” said Joe Locandro, director,<br />

Group IT, CLP Holdings. “The two major<br />

mechanisms to achieve this are via wireless<br />

communications with WiFi and into traditional<br />

buildings/home via fiber, copper, ADSL or<br />

even BPL (Broadband over Power Lines). Data<br />

compression algorithms allow effective use of<br />

transmitting data via the above mechanisms.”<br />

(Please see sidebar “Broadband over Power<br />

Lines (BPL)” on page 15 for more information<br />

on this technology).<br />

“The real future will be using the information<br />

highway of both domestic and business users,<br />

using a multiple variety of access methods and<br />

allowing people to connect to the Inter<strong>net</strong> anywhere<br />

anytime,” said Locandro. “Even to the<br />

extent that people can turn on their air conditioners<br />

on before they get home via a Web<br />

page at the office.” The CLP IT expert said<br />

he’d seen working models of this technology<br />

demonstrated in the USA.<br />

Wired flats in Hong Kong<br />

Research firm Gartner has repeatedly said<br />

that consumer tech serves as the blueprint for<br />

tech in the enterprise space. This is often the<br />

Research firm to US President<br />

Obama: invest in fiber-optic<br />

T <br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

case, so it’s worth examining the Soho 38 residential<br />

project from developer Kerry Properties,<br />

a building wired by a variety of vendors<br />

including Cisco, Microsoft, HP, and Hong<br />

Kong-based Home Touch.<br />

“When Home Touch approached us [about<br />

Soho 38], we were surprised,” said Kimmy<br />

Lau, senior marketing manager, Kerry Real<br />

Estate Agency Ltd. “The typical decision-maker<br />

for a flat purchase in Hong Kong may not<br />

be IT-savvy. But we feel that potential Soho<br />

38 flat-buyers aren’t typical, and the technology<br />

we’ve built into the structure will appeal<br />

to them.”<br />

On their Web site, Kerry describes the project<br />

as “the first building in Hong Kong integrating<br />

work, entertainment, communication<br />

and home automation under one platform.”<br />

Data transmission—especially via broadband—squares<br />

electricity’s potential<br />

Much of the tech used in Soho 38 was driven<br />

by CCRE (Cisco Connected Real Estate), a division<br />

of the <strong>net</strong>working giant devoted to creating<br />

“nerve centers” for new buildings. “Considering<br />

the building itself as a ‘live’ entity is at<br />

the heart of CCRE,” says Cisco’s Web site, in<br />

a case study on Deloitte’s new corporate complex<br />

in Milan. “By harnessing the power of Inter<strong>net</strong><br />

Protocol (IP) the traditional perception<br />

of the workplace can be overturned. It has the<br />

ability to bring enormous financial and operational<br />

rewards to institutions.”<br />

However, despite the IP ubiquity, much of<br />

the tech going into the project is aimed at<br />

consumers. In-building wiring is Cat 5 copper<br />

rather than fiber-optic. The home control-unit<br />

is from Home Touch, who helped integrate<br />

the HP and Cisco products with their own devices,<br />

according to Kerry’s Lau. The idea is<br />

to provide an overall consumer experience,<br />

which has crossover with enterprise use. For<br />

example, the building has full Wi-Fi connectivity,<br />

a concept pioneered by Cyberport. another<br />

capability that may appeal to enterprises is video-over-IP<br />

security—Soho 38 uses a “portable<br />

video door phone” that captures voice and<br />

video images.<br />

The future<br />

Despite all the progress currently being<br />

made, the 4th utility is still greatly underuti-<br />

16 Computerworld Hong Kong April 2009 www.cw.com.hk


COVER STORY<br />

Power-saving building <strong>net</strong>works<br />

to get cheaper<br />

Cisco’s Chiu: The Net has become ‘the 4th utility’ as<br />

‘intelligent buildings’ regard communication-related<br />

services as an integral part of the overall infrastructure<br />

lized. Collectively, we’re on the steep part of<br />

the learning curve.<br />

“In view of the acute problems relating to<br />

population growth and unsustainable energy demands,<br />

Cisco has made a commitment to help<br />

address these challenges with CCRE...in essence,<br />

the Inter<strong>net</strong> has become ‘the 4th utility’<br />

as ‘intelligent buildings’ regard communicationrelated<br />

services such as telecommunications,<br />

broadband, security circuits and fire systems<br />

as an integral part of the overall infrastructure<br />

similar to life necessities such as water, electricity<br />

and gas. Indeed, IT plays such a central<br />

role in all of this that it scores very highly in<br />

the ‘Leadership in Energy and Environmental<br />

Design’ (LEED) program, the internationally<br />

accepted benchmark for the design, construction<br />

and operation of high performance green<br />

buildings,” said Barbara Chiu, general manager,<br />

Cisco Hong Kong and Macau.<br />

“Over the years, Cisco has implemented<br />

many CCRE projects locally, such as Cyberport<br />

in Hong Kong, helping them reduce power<br />

requirements and enhance building usage<br />

to provide a flexible foundation for growth,”<br />

added Chiu.<br />

Locandro concluded that “one thing is for<br />

sure: we will live in an interconnected IP<br />

world—from PDAs streaming data to household<br />

appliances having their own IP address.”<br />

Like Tesla and Edison a century ago, we<br />

can’t imagine all the possibilities. But technology<br />

that helps save energy and makes people’s<br />

lives simple and easier is something we<br />

at CWHK support, and will always report on,<br />

whatever stage it’s in.<br />

<br />

The maker of components that link millions of sensors and control devices is<br />

launching a new generation of technology designed to make power-saving control<br />

<strong>net</strong>works affordable for small buildings.<br />

Echelon, a 20-year-old company that developed a now-standardized technology for<br />

these specialized <strong>net</strong>works, has rolled out a new version that it says is only half as<br />

expensive for its customers to put in their devices. It also can carry incoming data from<br />

many more sources on a <strong>net</strong>work, according to Steve Nguyen, Echelon’s director of<br />

corporate marketing.<br />

Echelon’s LonWorks 2.0 platform updates the whole range of components that the<br />

company sells to makers of devices such as lighting controls, security systems and<br />

HVAC (heating, ventilation and cooling) systems. That includes a processor, a transceiver,<br />

an operating system, and development and installation tools. The transceiver<br />

and processor are set to ship in volume in August, and all the components will be<br />

available by 2010.<br />

LonWorks is based on the ISO/IEC <strong>14</strong>908 standard, which allows sensors and<br />

control devices to share a single <strong>net</strong>work and exchange data on a peer-to-peer basis,<br />

according to Nguyen. For example, a thermometer can send a signal that the temperature<br />

in a particular spot has gone over a pre-set limit. An automatic air-vent controller<br />

linked to the same <strong>net</strong>work can interpret the thermometer’s signal and respond by<br />

opening a vent, without having to pass the information through a central computer.<br />

Such mechanisms can now be controlled from beyond the local <strong>net</strong>work using Web<br />

services. One key example of this is “demand response” software operated by energy<br />

providers, Nguyen said. Using a system from a vendor such as EnerNOC, utilities can<br />

send timely information about regionwide demand to individual customers who have<br />

subscribed to the service. Based on that information, devices linked to a control <strong>net</strong>work<br />

can automatically adjust their operations to reduce energy consumption. Together, those<br />

small adjustments may prevent utilities from having to fire up more capacity, Nguyen said.<br />

The ISO/IEC <strong>14</strong>908 standard can be applied to <strong>net</strong>works with a number of different<br />

signaling systems, including fiber-optic cable and wireless. Echelon offers the specifications<br />

for the ISO/IEC <strong>14</strong>908 technology openly without a licensing fee, Nguyen said.<br />

About 700 vendors have adopted the technology, he said.<br />

In addition, the more powerful processor offered with LonWorks 2.0 will be able to<br />

support more functions, Hill said. For example, a keypad on the wall for adjusting the<br />

heat or lighting could have a motion sensor, which would cause it to light up when<br />

someone walked up to the keypad. The new modules should also have more capacity<br />

for self-installation programs, which would save engineers having to visit every room<br />

where a module is being set up, Hills said.<br />

No matter how much energy a building-control system may save, one of the biggest<br />

factors in convincing a developer to use it is how long it will take to pay for itself,<br />

Hill said. In terms of energy savings, smart lighting systems can pay for themselves in<br />

three to four years and heating controls in four to five years. LonWorks 2.0 should help<br />

energy-saving systems pay for themselves sooner, he said.<br />

—By Stephen Lawson, IDG News Service (San Francisco Bureau)<br />

www.cw.com.hk<br />

April 2009 Computerworld Hong Kong 17


Banking and finance technology forum packs out venue<br />

It was standing-room-only at a recent banking/finance tech event in Hong Kong<br />

By Computerworld Hong Kong staff<br />

The 5th annual Banking and Finance<br />

Technology Forum Asia 2009 was held<br />

on March 17, which is also Ireland’s national<br />

holiday: Saint Patrick’s Day. The “luck of<br />

the Irish” was with organizers Euro-Events as<br />

the event was absolutely packed—some events<br />

were standing-room-only as people gathered to<br />

hear speakers from the region dispense their<br />

wisdom on the technology driving financial<br />

services.<br />

Experts discuss optimization<br />

A lively panel discussion on the subject of<br />

“Competing in a Turbulent Marketplace: CIO’s<br />

Agenda for Year 2009” was moderated by Vincent<br />

Chan, partner, Technology and Security<br />

Risk Services, Ernst and Young.<br />

Michael Leung, SVP and CIO, China Construction<br />

Bank (Asia), spoke of the differences<br />

in banking today, with varieties of experiences<br />

in retail banking. “I sometimes wonder if there’s<br />

still any room for banks to make some money,”<br />

said Leung. “We’re expending a lot of money<br />

and effort to follow compliance regulations,”<br />

but, he said, many new rules and processes were<br />

confusing—such as the need to have a younger<br />

person to accompany elderly customers when<br />

purchasing certain investment products.<br />

Leung also mentioned the need for centralization<br />

of back-office processes. “Our cost-cutting<br />

is brutal,” he declared. “For instance, we plan to<br />

add 10 new branches while keeping the bank’s<br />

headcount at roughly the same level. We now<br />

have automatic shut-off of PCs at [approximately]<br />

9PM each day, and if you need to work late,<br />

you have to pre-register.”<br />

The CCB executive said his firm no longer<br />

pays OT as a normal practice. “And paper-use is<br />

to be cut drastically,” he said, “it doesn’t matter if<br />

you print one-side, two-side, whatever.”<br />

“I don’t think there’s a CIO out there, in any industry,<br />

who’s not using outsourcing,” said Alpesh<br />

Patel, Regional Head of IB IT, APAC, UBS (Hong<br />

Kong). “Our firm is going into virtualization, but<br />

it’s not quite there yet, even though the vendors<br />

will tell you it is. Your infrastructure is sitting out<br />

there at 10-15% [utilization], but at market-close<br />

it’s 90%, so you need it.”<br />

“Unless you’re in this industry, you won’t believe<br />

the need for storage: every Powerpoint [presentation]<br />

or other data must be kept for years,”<br />

he said. “[And] because of security breaches, offsite<br />

storage must be encrypted.”<br />

Leung said it was ironic that “in a few cases,<br />

regulatory compliance and cost reduction work<br />

well together. For example the HKMA [Hong<br />

Kong Mo<strong>net</strong>ary Authority ]and the PDPO [Personal<br />

Data Privacy Ordinance] say you should<br />

retain your customers’ data for seven years, but<br />

no longer. Seven years [plus] one day is unnecessary<br />

and strictly speaking illegal! So by purging<br />

older data from databases we’ve been able<br />

to curtail our storage growth rate while staying<br />

fully compliant.”<br />

Vendor discounts<br />

“With the buying power we have, we can get<br />

excellent discounts from vendors these days,”<br />

said Leung. “We can also find great talent now in<br />

the job market, such as branch managers.”<br />

David Lau, head of IT, Kim Eng Securities<br />

We plan to add 10 new branches while keeping the bank’s<br />

headcount at roughly the same level<br />

— Michael Leung, China Construction Bank (Asia)<br />

Hong Kong, agreed with Leung. “This is the best<br />

time to look for new talent,” he said. For vendors,<br />

said Lau: “It’s a great time to approach companies<br />

with new deals.”<br />

“Even in this job market, the best people command<br />

a premium,” said Patel. “For vendors,<br />

you’ve got a contract, but it needs renewal, so<br />

prepare to be flexible. On the vendor-side, don’t<br />

lose heart: we’re both in roles where we’ve both<br />

been successful, if we keep a long-term view, we<br />

can keep it going.”<br />

Financial trends have shifted drastically, noted<br />

Leung. “As a mainland bank, we are now manu-<br />

Patel from UBS: <br />

<br />

facturing our own investment products—bonds,<br />

structured notes—because people no longer believe<br />

in those big names overseas anymore,” he<br />

said.<br />

“As for our bank, products have become simplified,”<br />

said Patel. “The buffet is gone—now you<br />

get the menu, and you look in your pocket to see<br />

who much money you have.”<br />

Ensuring exchanges<br />

Ian Tan, regional sales director for Asia, Tumbleweed<br />

Communications (now merged with<br />

Axway), gave a presentation on “Compliance and<br />

Data Security on File Exchanges in Financial Institutions.”<br />

Tan pointed out that the patchwork of legacy<br />

systems, connected by FTP scripts of various<br />

vintages, can’t meet new security requirements<br />

such as the PDPO.<br />

He said that “we hear horror stories of customer<br />

data being leaked” in Asia, there’s not necessarily<br />

legal necessity to publicize leakage, so we<br />

may only hear about it when the media gets the<br />

information.<br />

Tan added that the means of file transfer between<br />

clients and the enterprise <strong>net</strong>work are<br />

many and varied, and that cash management systems<br />

demanded scalability and security. <br />

Computerworld Hong Kong April 2009 www.cw.com.hk


Sponsored Feature<br />

Have you ever been through sleepless nights<br />

worrying about:<br />

<br />

<br />

ruption?<br />

<br />

<br />

<br />

-<br />

ership?<br />

-<br />

<br />

<br />

-<br />

<br />

-<br />

-<br />

<br />

Data protection, replication and disaster<br />

recovery under one roof<br />

<br />

<br />

<br />

<br />

-<br />

-<br />

<br />

<br />

<br />

<br />

-<br />

No More Sleepless Nights<br />

<br />

<br />

<br />

Making Protection Effective and Affordable<br />

<br />

<br />

-<br />

<br />

<br />

-<br />

<br />

<br />

-<br />

<br />

<br />

Intelligent Protection and Speedy<br />

Recovery<br />

-<br />

<br />

Significant Reduction of Data Recovery Time<br />

<br />

<br />

<br />

<br />

<br />

-<br />

<br />

-<br />

<br />

-<br />

<br />

-<br />

<br />

<br />

-<br />

<br />

<br />

-<br />

-<br />

<br />

<br />

-<br />

-<br />

<br />

<br />

<br />

<br />

-<br />

<br />

-<br />

<br />

<br />

<br />

<br />

Businesses of all sizes<br />

-<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

will equip you with insights into<br />

<br />

-<br />

<br />

<br />

<br />

<br />

<br />

Eternal Salvation: Continuous Data Protection<br />

Date<br />

<br />

<br />

<br />

<br />

<br />

Topic<br />

<br />

<br />

<br />

<br />

<br />

8 May Eternal Salvation: Continuous Data Protection<br />

<br />

<br />

Event Details<br />

Date: 8 May 2009 (Friday)<br />

Time: 2:30 – 5:00 p.m.<br />

Venue: 9/F Cityplaza 4,<br />

Taikoo Shing, Hong Kong<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

cw0309EMC_advertorial.indd 1<br />

4/3/09 10:20:40 AM


Jim Longwood<br />

Asia’s top 10 locations for offshore IT services<br />

The impact of the economic downturn is<br />

driving companies to consider moving<br />

their IT services to lower-cost locations.<br />

However, determining where to host such operations<br />

is a daunting task for many organizations.<br />

Gartner assessed the suitability of A-Pac countries<br />

as offshore locations and identified “10<br />

Leading Locations for Offshore Services in Asia<br />

Pacific for 2009.” These included the undisputed<br />

leader in offshore services (India) and the greatest<br />

challenger in terms of potential scale (China).<br />

The rest are a mix of mature environments that<br />

offer limited cost-benefits (Australia, New Zealand<br />

and Singapore) and emerging countries<br />

with a variety of challenges, but attractive costs<br />

(Malaysia, Pakistan, the Philippines, Thailand,<br />

and Vietnam).<br />

Although India continues to grow in top-line<br />

revenue levels of IT services being exported, its<br />

share of the overall worldwide totals has declined<br />

as other countries are investing to gain more market<br />

share. Enterprises seek strategies to reduce<br />

risk, and India faces challenges. These include<br />

wage inflation, local attrition rates, geopolitical<br />

issues (including the Mumbai terrorist attacks)<br />

and the “Satyam Effect.”<br />

Despite increases in investment, infrastructure<br />

remains India’s biggest weakness—<br />

strained power capacity and inadequate connectivity<br />

remain challenges. Some IT service<br />

categories such as application outsourcing<br />

have matured and the level of incremental<br />

growth is smaller.<br />

The Philippines generates considerably more offshore revenue<br />

than China...the country has a history of providing services to<br />

the US and Asian markets<br />

Testing methodology<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

What about China?<br />

Alternatives in the Asia Pacific region? Gartner<br />

analysis shows a number of countries positioning<br />

themselves as credible alternatives.<br />

China is attracting great interest. But it still has<br />

challenges to buyer confidence: security, quality<br />

and intellectual property issues, relatively low<br />

English-language capabilities, and a scarcity of<br />

middle managers.<br />

A large portion of the current market is geared<br />

to R&D-embedded engineering services, which<br />

differ significantly from commercial enterprise<br />

buyer requirements. Thus, there is a need to<br />

build strong process and quality maturity for delivery<br />

of IT services to commercial enterprises.<br />

Marketing skills across the value chain of the<br />

outsourcing industry are still immature, which<br />

results in a lack of information access and authenticated,<br />

verified sources of data for decisionmaking.<br />

Organizations wishing to engage China<br />

today should plan and budget for more-substantial<br />

levels of project management, change management<br />

and governance requirements, given<br />

the immaturity of the market.<br />

Where else then?<br />

The Philippines generates considerably more<br />

offshore revenue than China. The country has a<br />

history of providing services to the US and Asian<br />

markets. Some IT services have been exported<br />

for more than 15 years. It’s now a key outsourcing<br />

destination for call centers, finance and accounting.<br />

English continues to be the predominant language<br />

in the country and the level of accent<br />

neutralization required is relatively low—significantly<br />

lower than in India and China. It has a<br />

good labor pool that’s scalable at low cost and its<br />

overall cost structure is lower than India’s. Wage<br />

inflation and attrition ratios are also lower.<br />

When considering the Philippines as an offshore<br />

location, companies must be sure to establish<br />

adequate risk mitigation measures around<br />

intellectual property protection, security and<br />

privacy. They should also ensure they are comfortable<br />

with specific technology and industry<br />

knowledge before signing a deal.<br />

Companies seeking to be pioneers in a large<br />

and untapped low-cost destination should investigate<br />

Vietnam. Opportunities exist, but rigorous<br />

due diligence is required. Salaries of IT and business<br />

process professionals are among the lowest<br />

in the world. Consequently, Ho Chi Minh City<br />

and Hanoi are attracting a good deal of interest<br />

from major IT companies. Both IBM and CSC<br />

have made substantive investments in setting up<br />

global delivery centers in the country.<br />

However there are some major challenges,<br />

which include a significant lack of awareness<br />

of key business practices and operating norms,<br />

and few known vendors. Reliable information regarding<br />

Vietnam is scarce, and difficulty in doing<br />

business in Vietnam from a logistical and funding<br />

perspective is a key hurdle.<br />

Companies should think carefully before allowing<br />

the excellent cost base to overly influence<br />

their choice of Vietnam as an offshore destination.<br />

Understand all the risks, including hidden<br />

costs, risks related to data security, ease-of-doingbusiness<br />

issues and relatively low-level Englishlanguage<br />

skills.<br />

Tread carefully<br />

In the current economic climate there are<br />

definite advantages in moving IT services offshore.<br />

But organizations and vendors eyeing<br />

any of the 10 Asia-Pacific countries in the Gartner<br />

report should understand that each country<br />

in the region is quite a different market in<br />

which to operate, particularly if companies are<br />

considering doing local business as well as offshore<br />

business.<br />

<br />

Jim Longwood is a Gartner<br />

research vice president based<br />

in Melbourne. As part of both<br />

the Asia/Pacific and global IT<br />

services teams he is responsible<br />

for undertaking research on<br />

sourcing best practices, trends<br />

and market positioning of<br />

external service providers in the Asia/Pacific IT<br />

services market<br />

20 Computerworld Hong Kong April 2009 www.cw.com.hk


Join the industry’s thought leaders in<br />

IDC’s premier events in 2009!<br />

REGISTER ONLINE @ www.IDCcircle.com!<br />

<br />

Preparing for the Next 20 Years of IT<br />

10 March - 24 April<br />

<br />

Singapore > Malaysia > Korea > New Zealand > Australia > China > Hong Kong > India<br />

<br />

IT Security Strategies: Weathering the Economic Storm<br />

02 April – 17 June<br />

<br />

Singapore > Malaysia > Taiwan > Korea > Thailand > Hong Kong > China > India > Australia<br />

<br />

02 June – 16 June<br />

<br />

Singapore > China > India<br />

IDC Asia/ Pacific<br />

12/F., St. John’s Building, 33 Garden Road, Central, Hong Kong


Peter Bullock, Pinsent Masons<br />

Security breaches: leaning on the suppliers<br />

It seems unlikely for a health authority to blame<br />

a hardware-supplier for data leaks caused by<br />

one of the authority’s own employees misusing<br />

a USB stick. Yet there are many occasions<br />

where suppliers—or their subcontractors—have<br />

been directly responsible for a security breach.<br />

The rise in these incidents (coupled with media<br />

reportage) has led to significant changes in commercial<br />

contracts covering the handling of sensitive<br />

data as well as the balance between data<br />

owners and their suppliers.<br />

Vague responsibilities<br />

The Personal Data (Privacy) Ordinance (PDPO)<br />

implicitly requires that organizations load their required<br />

security standards onto third party suppliers.<br />

In the past, organizations preparing contracts<br />

for IT projects have attempted to abdicate responsibility<br />

by putting a boilerplate (standardized-text)<br />

provision in the contract which states that the supplier<br />

will do what is appropriate regarding security.<br />

In the event of any security breach, contractual<br />

disputes are a certainty.<br />

Despite general awareness that security obligations<br />

must be passed to suppliers, there is a<br />

lack of audit processes and assurance processes<br />

in relation internal and external security. Third<br />

parties with access to an organization’s data, particularly<br />

suppliers, are not subject to any form of<br />

order or review.<br />

The law has remained static but regulatory responses<br />

and media reaction have changed radically.<br />

Audit and assurance procedures have become<br />

a key issue on the boardroom agenda in many<br />

organizations—as opposed to 12 months ago.<br />

Regulatory consequences and adverse PR<br />

consequences mean that organizations must<br />

boost their efforts in this area. They must decide<br />

whether their real world controls for the transfer<br />

of personal and confidential information to third<br />

parties, particularly suppliers, are effective.<br />

A tipping point came recently in Hong Kong<br />

when both HSBC and the Health Authority revealed<br />

serious security breaches within days of<br />

each other, attracting substantial media attention.<br />

Now both public and private sectors recognize<br />

that this issue requires revision, allocation<br />

of resources, and be escalation up risk registers<br />

within organizations. People now understand<br />

that this is not a mere compliance issue but a<br />

time-bomb that can damage the reputation of a<br />

business and ultimately the bottom-line.<br />

Guarding the gates<br />

Organizations are no longer satisfied with boilerplate-text:<br />

they demand a project-specific information<br />

security plan with specific controls and<br />

safeguards which respond to the specific risks<br />

identified. When standard practice evolves, consumer<br />

expectations change and interpretation of<br />

<br />

security guarantee<br />

the PDPO changes because what’s appropriate<br />

today might not be appropriate tomorrow.<br />

We’re seeing large organizations across many<br />

sectors—including energy, financial services,<br />

retail and the public sector—examining their<br />

supplier-selection process and how they identify<br />

information security risk within the supplier<br />

base.<br />

Internal audit departments and group security<br />

departments are examining contracts to vet supplier<br />

performance. Is the objective to mitigate,<br />

manage and control real world security risk?<br />

How does having “perfect contract” accomplish<br />

that? Yes, liability issues might be covered so<br />

you may not end up paying the bill if a security<br />

breach occurs, but in that unfortunate event it<br />

may be your firm’s brand and reputation on the<br />

line and it may be you personally explaining to<br />

the CEO why it happened.<br />

Set your standards<br />

Project Specific Information Security Risks<br />

and Controls should be drawn from ISO standards<br />

or other appropriate international standards.<br />

It is important to note that ISO standards<br />

are not a panacea. They are a set of control objectives,<br />

control statements and controls which<br />

organizations draw upon to manage real world<br />

scenarios.<br />

It’s not enough to assure a supplier you will<br />

comply with ISO requirements. You must identify<br />

risks, what controls will manage and mitigate<br />

those risks, then specifically require the<br />

supplier to implement those controls. But during<br />

this process, both parties must recognize<br />

that this is not a black and white issue.<br />

Implementation of controls may not be enough<br />

to achieve absolute security and no organization<br />

can expect a supplier to give an absolute security<br />

guarantee.<br />

Security costs<br />

This degree of process does not come cheap.<br />

Producing project-specific risk analyses, coping<br />

mechanisms, and security audits, especially on<br />

a substantial IS (information security) project,<br />

consume thousands of man-hours of consulting<br />

resources. And these projects often take years<br />

to complete.<br />

The landscape for contractual requirements<br />

surrounding security provisions has changed<br />

so radically and so rapidly that what now seems<br />

like common sense and best practice to procurers<br />

of IS projects doesn’t match the contractual<br />

requirements those procurers signed their suppliers<br />

to, on the same project, 18-24 months previously.<br />

Much to their annoyance, these procurers<br />

are now finding that their suppliers are making<br />

claims for the work associated with “state of the<br />

art” security arrangements, by way of change<br />

controls. Sometimes the figures involved are<br />

quite staggering.<br />

Security is no longer boilerplate. <br />

Peter Bullock, a technology lawyer,<br />

is a partner with Pinsent<br />

Masons in Hong Kong and can<br />

be contacted at peter.bullock@<br />

pinsentmasons.com<br />

22 Computerworld Hong Kong April 2009 www.cw.com.hk


Converging Risk and Security<br />

to Better Manage Uncertainty<br />

Bringing together security and risk management<br />

to mitigate threats and cope with rapid change<br />

A Perfect Storm is Brewing!<br />

21May<br />

2009<br />

Room 301, Hong Kong Convention and<br />

Exhibition Centre<br />

Organizer Principal Partner Official Media<br />

(Thursday)<br />

The recent high profile cases at Hong Kong Police and UBS bank<br />

show that critical data leaks and information security lapses are still<br />

occurring despite a slew of security technologies being available.<br />

It is times like these that companies face the greatest risks.<br />

Join the 10th InfoSecurity Conference to learn how best to protect<br />

your business and people.<br />

Info-Security Conference<br />

The industry’s leading Info-Security Conference since 2001<br />

More than 700 attendees in 2008 and in 2007<br />

More than 20 sponsors and supporting organizations in 2008<br />

Please mark your diary and REGISTER NOW:<br />

http://www.infosecurityproject.com/registration<br />

For more information on the event:<br />

http://www.infosecurityproject.com<br />

Hong Kong's most significant security event of 2009<br />

features the following key speakers:<br />

Topic of Opening Keynote:<br />

Recession Hackernomics<br />

Dr Herbert "Hugh" Thompson<br />

Chief Security Strategist, People Security<br />

Renowned inter<strong>net</strong> security guru and<br />

author, Dr Thompson was named as<br />

one of the "Top 5 Most Influential<br />

Thinkers in IT Security" by SC Magazine.<br />

Executive Panel Discussion:<br />

Topic: The Importance of IT Risk Management within the<br />

Risk Framework<br />

Steve Tunstall<br />

Group Risk Manager,<br />

Cathay Pacific Airways<br />

Stephane Vidart<br />

Regional CIO,<br />

AXA Asia Life<br />

Carsten Paasch<br />

Head of Group Information Security,<br />

Standard Chartered Bank<br />

And More….<br />

Platinum Sponsor: Diamond Sponsors: Executive Luncheon Sponsor: Executive Panel Discussion Sponsor:<br />

Gold Sponsors:<br />

Exhibition Sponsors: Official Notebook Sponsor: Official Projector Sponsor: Official VMS Sponsor:<br />

Supporting Organizations:<br />

Proudly presented by<br />

For enquiries, please contact Ms. Grace at<br />

Tel : (852) 2186 8725 or email: grace.wu@e21mm.com<br />

(Co-owned by e21 MagicMedia and Questex Media Group)


Local online marketing intelligence firm to go global<br />

As the downturn deepens, online marketing becomes increasingly important<br />

for Hong Kong, says Admomo’s founder and director Winston Law<br />

By Teresa Leung<br />

WL: At the moment our customers come from<br />

Asia Pacific. They include portal sites and gambling<br />

companies.<br />

CWHK: How much does it cost to use your services?<br />

WL: For Hong Kong data only, it costs HK$40,000<br />

a year for one account. Australian data costs<br />

HK$80,000 annually because there are about 600<br />

publishers in the country, which is a higher number<br />

than Hong Kong.<br />

CWHK: How much have you invested in<br />

R&D?<br />

Admomo’s Law (left) and CTO Felix Ng: We aim for 2,000 customers in two years<br />

CWHK: Why online marketing intelligence?<br />

Winston Law: Nowadays we see more companies<br />

with online marketing strategies. This trend<br />

is more obvious when businesses are affected by<br />

an economic downturn because online media is<br />

low cost, interactive, and provides measurable<br />

ROI.<br />

According to survey results announced by Nielsen<br />

Media Research earlier this year, Inter<strong>net</strong> media<br />

budgets are expected to increase from 6 percent to<br />

8 percent. However, the average budget of each advertiser<br />

will fall to HK$17.8 million compared with<br />

HK$20.4 million last year.<br />

At the same time, advertisers want to know the<br />

most effective online advertising platform, what<br />

their rivals are doing online and how much they<br />

spend, as well as online advertising trends in particular<br />

industries. An online marketing intelligence<br />

service provides answers to all these questions.<br />

CWHK: How many Web sites are offering advertising<br />

space in Hong Kong?<br />

WL: There are already more than 200 publishers.<br />

We call Web sites that offer advertising<br />

space “publishers.” In 2008, there were more<br />

than 4,000 advertisers (excluding Google ads)<br />

and more than 10,000 campaigns valued at more<br />

than HK$600 million.<br />

CWHK: When was the company founded?<br />

WL: Admomo was founded in 2007. We have a<br />

team of 30 people. Our Hong Kong office is Admomo’s<br />

R&D base while the content team in<br />

Shenzhen is responsible for inputting content<br />

like advertising slogans, which then become<br />

searchable data for our customers.<br />

Our crawler automatically searches for new campaigns<br />

and updates the server. But data like slogans<br />

must be compiled and presented manually in a format<br />

friendly to users.<br />

CWHK: Who are some of your competitors?<br />

WL: The major one is AC Nielsen. Including us,<br />

there are only three companies that offer global<br />

data [about online advertising campaigns].<br />

CWHK: How do you differentiate?<br />

WL: Admomo’s user interface is user-friendly.<br />

Our data are organized according to industry,<br />

advertiser, products, and publishers. Many of<br />

our rivals only show banner images, which aren’t<br />

useful to users.<br />

We also provide product/campaign comparison<br />

while our competitors don’t and their customers<br />

have to consolidate reports manually for comparison.<br />

Our products are [available] both in English and<br />

the local languages used in markets where we have<br />

presence. We also team with Alexa which provides<br />

traffic data and offer customers more detailed campaign<br />

and/or traffic comparison.<br />

CWHK: What is your partner strategy?<br />

WL: Besides traffic data providers like Alexa, we<br />

want to work with channel partners overseas.<br />

CWHK: Who are your customers? Are most of<br />

them from Hong Kong or overseas?<br />

WL: Around HK$1 million. We are also in the process<br />

of applying for funds from the Small Entrepreneur<br />

Research Assistance Program (SERAP)<br />

offered by the Hong Kong government’s Innovation<br />

and Technology Fund.<br />

CWHK: How’s the Hong Kong online advertising<br />

market different from others?<br />

WL: Hong Kong firms are conservative when it<br />

comes to online campaigns. Despite increasing<br />

spending in online ads, Hong Kong is still behind<br />

markets like Australia and Japan where online<br />

campaign budgets are more than 20 percent of<br />

their marketing spending.<br />

CWHK: What’s the range of online campaign<br />

costs in Hong Kong ?<br />

WL: They range from HK$4 to HK$230 for every<br />

1,000 impression.<br />

CWHK: What’s your targeted customer base?<br />

WL: 2,000 customers worldwide in two years.<br />

CWHK: What’s your expansion plan?<br />

WL: We will launch our service in China in<br />

about two months, and in Australia, Singapore,<br />

and Taiwan at a later stage. We plan to<br />

cover 10 countries within this year and 15 by<br />

mid-2010.<br />

CWHK: How much will this expansion plan<br />

cost you?<br />

WL: We will only need to add a few people to our<br />

content team. I don’t think it will jack up our cost<br />

significantly.<br />

<br />

24 Computerworld Hong Kong April 2009 www.cw.com.hk


Helping the tough get going<br />

Microsoft showcases a host of technologies aimed at helping businesses<br />

survive the economic downturn by ‘doing more with less’ at the Achieve<br />

More Summit By Jason Krupp<br />

Microsoft recently held a one-day conference<br />

in Hong Kong as part of their<br />

Achieve More campaign, which aimed<br />

to help Asian businesses weather the current<br />

economic downturn.<br />

The conference consisted of two sessions<br />

which focused on enterprise-level companies and<br />

SMBs respectively.<br />

The enterprise session was opened by Adam<br />

Anger, senior director of the Microsoft business<br />

& marketing organization Hong Kong, who noted<br />

that during tough times such as these companies<br />

often demand that IT help drive profitability<br />

on one hand, while cutting the budget with the<br />

other.<br />

This paradox was summed up neatly by the<br />

phrase ‘doing more with less’ by Anger.<br />

“There is a lot of pressure both internally and<br />

externally in terms of how we manage businesses<br />

in tough times, and I think that presents a role<br />

—a great opportunity—for leaders in IT to figure<br />

out how their businesses can mange through the<br />

tough times,” said Anger.<br />

Transforming to survive<br />

Following on from Anger was Enrico Benni,<br />

partner and head of greater China business practice<br />

at McKinsey & Company, who shared some<br />

of his view on how CIOs must adopt a number of<br />

new roles in addition to their traditional ones if<br />

Benni: <br />

<br />

<br />

<br />

their organizations are to weather the crisis.<br />

These five roles include: adopting a corporate<br />

finance role by finding new sources of cash for<br />

the business; becoming a broker between the<br />

business units to assess which projects to drive<br />

and which to drop; communicating to the organization<br />

the value of a project; preparing the organization<br />

for upstream regulatory changes in the<br />

business space; and lastly a driver of outsourcing<br />

and offshoring.<br />

What these roles highlighted, according to<br />

Benni, was the fundamental need for businesses<br />

to change their operating model if they are to<br />

survive.<br />

“If you look at companies that were leaders<br />

before the previous downturn, and the ones that<br />

were still leaders after the downturn, what you<br />

see is that half have changed position,” noted<br />

Benni.<br />

“What you see in the companies that remained<br />

leaders is that they have fundamentally taken the<br />

opportunity from the downturn to rethink how<br />

they operate.”<br />

And this, he said, is where IT can play a significant<br />

part, specifically in three main areas:<br />

improving business efficiency by streamlining<br />

processes and the cash conversion cycle; driving<br />

smart growth by leveraging internal synergies<br />

through CRM that were not possible in boom<br />

times; and finally—and most importantly—strategy<br />

transformation.<br />

“Companies can view the crisis as a time to<br />

stay put, survive and come out and be the same<br />

company as you were before. For some that is<br />

the right strategy,” said Benni.<br />

“However, some companies are fundamentally<br />

taking advantage of the crisis to become the new<br />

leaders. This requires thinking about transformation<br />

and new ways of operating. The people<br />

who are working in the CIO community have to<br />

think about these roles and be prepared to assume<br />

these roles in your company and be much<br />

more positive.”<br />

End-to-end view<br />

John C Phillips, enterprise technology strategist<br />

for Microsoft, followed on from Benni, and<br />

explained exactly how CIOs can do more with<br />

less using the Microsoft platform.<br />

He started by asking attending IT leaders to<br />

classify where their operations fall on the value<br />

Phillips: <br />

<br />

chain in their organization, stating at the bottom<br />

with ‘fighting fires’, moving to ‘gaining control’,<br />

then ‘business enabler’ and highest of all, ‘viewed<br />

as a strategic asset’.<br />

“The reality is that 80 to 90% of customers in<br />

Asia are still in the ‘fighting fires’ mode,” said<br />

Phillips.<br />

“It has been identified across a number of<br />

analyses and surveys that the management cost<br />

per PC per user is about HK$<strong>14</strong>,000 per year—<br />

that is in the fighting fires mode. If we can move<br />

you more to ‘business enabler’ or even ‘gaining<br />

control’, you can drop this number by 10 to 20%<br />

per PC per year. That is money back in your<br />

pocket.”<br />

Phillips identified a number of key technology<br />

areas where he says Microsoft can help customers<br />

move up the value chain, namely business<br />

intelligence (BI) and Customer Relationship<br />

Management (CRM), collaboration and unified<br />

communications and virtualisation and IT management,<br />

which link into a interconnected platform.<br />

This was showcased using live demonstrations<br />

from Microsoft solution specialists, who looked<br />

at Microsoft BI, SharePoint, Office Communications<br />

Server and Windows Server.<br />

To close, he urged customers to look into how<br />

they can use their existing infrastructure, and<br />

link it into a single platform to drive transformation<br />

through their business.<br />

“I urge (customers) to do more with what<br />

you’ve got. In many cases you’ve got the technology<br />

already. Now upgrade and get the benefits<br />

and the value,” concluded Phillips.<br />

Speaker presentations and more information<br />

can be found at: www.microsoft.com/hk/<br />

achievemore<br />

<br />

26 Computerworld Hong Kong April 2009 www.cw.com.hk


industryevent<br />

Driving IT to deliver full value<br />

Five technology leaders shared their insights into how businesses can leverage existing<br />

capacity to help them navigate through the current economic slump<br />

By Jason Krupp<br />

Last month, at Microsoft’s Achieve More<br />

Summit, CIOs and IT industry executives<br />

sat down for a panel discussion to highlight<br />

some of the challenges they are facing with<br />

the slowdown in the global economy, and how<br />

they are using Microsoft technology platforms to<br />

navigate around this.<br />

Despite the gloom, the panel cautioned technology<br />

executives that the key was not to focus on<br />

the negative effects of the economic downturn,<br />

and instead focus on ‘clean-up’ and consolidation<br />

projects that might have been considered ‘handsoff’<br />

during the good times.<br />

“The mantra for many boards for many years<br />

has been work ‘smarter rather than harder’. The<br />

only problem with that is that people were making<br />

a lot of money to satisfy shareholders (in the<br />

boom), and were basically resistant to change,”<br />

said Patrick Slesinger, director and CIO at Wallem<br />

Innovative Solutions.<br />

We are now able to do a number of programs<br />

which were perhaps considered too disruptive<br />

to the business while in the boom<br />

– Patrick Slesinger, Wallem Innovative Solutions<br />

“Now, with the economic crisis, what we have<br />

is people fearing for their company’s survival,<br />

and they are willing to take quantifiable risks. We<br />

are now able to do a number of programs which<br />

were perhaps considered too disruptive to the<br />

business while in the boom. This is the time IT<br />

can really help the business.”<br />

Blood from a stone<br />

The panel noted that one of the main areas in<br />

which IT can help is in driving efficiencies and<br />

productivity within the organization, and position<br />

it for rapid growth once the economy recovers.<br />

The challenge for IT leaders lies in getting<br />

capex-shy boards to see the value of investing in<br />

projects that will help them achieve this.<br />

One of the ways most effective ways identified<br />

to do this was by making use of what companies<br />

already have.<br />

“Many people don’t want to spend any more<br />

money, but the reality is that a lot of them have<br />

Patrick Slesinger (left) and Avi Raju (right) discuss the possibilities of IT taking on a driving role in navigating business<br />

through the recession.<br />

invested in systems and architecture for many<br />

years,” said John C Phillips, enterprise technology<br />

strategist for Microsoft.<br />

“We still find that in many cases customers<br />

haven’t 100% deployed what they own, and so it’s<br />

about investigating what<br />

they’ve got and find ways<br />

to use it better.”<br />

Enrico Benni, partner<br />

and head of greater China<br />

Business Practice at<br />

McKinsey & Company,<br />

noted that CIOs need to<br />

aggressively defend their<br />

budgets with sound business<br />

reasoning in order for it to resonate with<br />

senior management.<br />

“We see people cutting costs on IT purely to<br />

generate a bit more cash but this does not bring<br />

them what they need. There is a calculation that<br />

if you cut IT cost by 15% your impact on EBITA is<br />

only 0.5 percent,” noted Benni.<br />

“However, if you invest in IT your turnaround<br />

could get back double or 10 times what you<br />

invested in the first place. So I think there is<br />

a fundamental role for the CIO here, to help<br />

people step up and understand that transformation<br />

is a lot more than just cutting the project<br />

budget.”<br />

Pitch the right project<br />

It was also pointed out that corporate purse strings<br />

are not completely sealed if the right project.<br />

“I think boards are actually quite open to initiatives<br />

on transformation right now,” said Avi<br />

Raju, Director of Asia Information Technology at<br />

Savills, where the recent focus has been on virtualizing<br />

its server environment, creating better<br />

processes and strengthening its CRM platform.<br />

“You should not only look at internal processes,<br />

but also at your competitors and see how they<br />

are placed, what their market share and profile<br />

is and how you can benefit. I think if the right<br />

proposition is put to the board and leverages existing<br />

infrastructure, they will be quite open to<br />

spending on it.”<br />

Benni also pointed out the appeal of implementing<br />

CRM solution right now. “Look at sharing<br />

of customer data across the business units,<br />

something that was very hard to do in the growth<br />

market,” said Benni.<br />

“Right now there are pricing benefits if you can<br />

share this information and put more transparency<br />

in place between the business units, allowing<br />

you to cross sell and up sell.”<br />

Slesinger pointed out that the focus of ERP<br />

systems had now moved beyond process engineering,<br />

and into outsourcing and offshoring to<br />

reduce costs and drive efficiencies.<br />

It was also noted by the panellists that unified<br />

communications platforms are increasingly being<br />

seen as a means to reducing costs and improving<br />

productivity, a strategy that some companies are<br />

employing to drive better collaboration and also<br />

save on travelling to meetings.<br />

Microsoft’s Phillips summarized the discussion.<br />

“You can take a lot of advantage of the<br />

technology you already have in place, and start<br />

to bring together business information and make<br />

smarter, more collaborative decisions,” he said.<br />

“And it’s not always about huge reinvestments in<br />

technology.”<br />

<br />

www.cw.com.hk<br />

April 2009 Computerworld Hong Kong 27


technews<br />

Fatal flaw for IPv6: It’s not backwards compatible<br />

The Inter<strong>net</strong> engineering community<br />

said its biggest mistake in developing<br />

IPv6—a long-anticipated upgrade to the<br />

Inter<strong>net</strong>’s main communications protocol—is<br />

that it lacks backwards compatibility with the<br />

existing Inter<strong>net</strong> Protocol, known as IPv4.<br />

At a panel discussion held in San Franciso<br />

last month, leaders of the Inter<strong>net</strong> Engineering<br />

Task Force (IETF) admitted that they<br />

didn’t do a good enough job making sure native<br />

IPv6 devices and <strong>net</strong>works would be able<br />

to communicate with their IPv4-only counterparts<br />

when they designed the industry standard<br />

13 years ago.<br />

“The lack of real backwards compatibility for<br />

IPv4 was the single critical failure,” said Leslie<br />

Daigle, chief inter<strong>net</strong> technology officer for the<br />

Inter<strong>net</strong> Society. “There were reasons at the<br />

time for doing that...but the reality is that nobody<br />

wants to go to IPv6 unless they think they’re<br />

friends are doing it, too.”<br />

Originally, IPv6 developers envisioned a scenario<br />

where end-user devices and <strong>net</strong>work backbones<br />

would operate IPv4 and IPv6 side-by-side<br />

in what’s called dual-stack mode.<br />

However, they didn’t take into account that<br />

some IPv4 devices would never be upgraded<br />

to IPv6, and that some all-IPv6 <strong>net</strong>works would<br />

need to communicate with IPv4-only devices or<br />

content.<br />

IPv6 proponents said the lack of mechanisms<br />

for bridging between IPv4 and IPv6 is the single<br />

Salesforce.com is working to integrate its<br />

Service Cloud customer-service platform<br />

with the popular messaging service Twitter,<br />

the company said recently.<br />

Salesforce CRM for Twitter, now in beta, will be<br />

available this summer at no additional charge for<br />

Service Cloud users.<br />

Launched in January, the Service Cloud combines<br />

concepts like online customer communities,<br />

social <strong>net</strong>working, knowledge base information,<br />

and making data from cloud services<br />

like Facebook and Twitter available to e-mail,<br />

phone and chat-based customer service representatives.<br />

While there’s nothing stopping a salesperson<br />

from simply using Twitter directly, the integration<br />

pulls relevant Twitter conversations into<br />

the Service Cloud and allows users to reply directly.<br />

In a demonstration of the new capability, Salesforce.com<br />

showed how someone working for a<br />

telecom provider could spot and track a discussion<br />

biggest reason that most ISPs and enterprises<br />

haven’t deployed IPv6.<br />

“Our transition strategy was dual-stack, where<br />

we would start by adding IPv6 to the hosts and<br />

then gradually over time we would disable IPv4<br />

and everything would go smoothly,” said IETF<br />

chair Russ Housley, who added that IPv6 transition<br />

didn’t happen according to plan.<br />

In response, the IETF is developing new IPv6<br />

transition tools that will be done by the end of<br />

2009, Housley said.<br />

“The reason more IPv6 deployment isn’t being<br />

done is because the people who are doing the<br />

job found that they needed these new transition<br />

tools,” Housley said. “These tools are necessary<br />

to ease deployment.”<br />

IPv6 is needed because the Inter<strong>net</strong> is running<br />

out of IPv4 addresses. IPv4 uses 32-bit addresses<br />

and can support approximately 4.3 billion individually<br />

addressed devices on the Inter<strong>net</strong>. IPv6, on<br />

the other hand, uses 128-bit addresses and can<br />

support so many devices that only a mathematical<br />

expression—2 to the 128th power—can quantify<br />

its size.<br />

Experts predict IPv4 addresses will be gone by<br />

2012. At that point, all ISPs, government agencies<br />

and corporations will need to support IPv6<br />

on their backbone <strong>net</strong>works. Today, only a handful<br />

of US organizations—including the federal<br />

government and a few leading-edge companies<br />

like Bechtel and Google—have deployed IPv6<br />

across their <strong>net</strong>works.<br />

<br />

Salesforce integrates service cloud with Twitter<br />

about a headset that a user was having trouble<br />

with. The telecom worker could dig through their<br />

company’s internal knowledge base and then send<br />

the Twitter user a link to a help document.<br />

Salesforce is using the beta period to fine-tune<br />

the integration’s performance and feel, according<br />

to a Salesforce.com spokesman.<br />

One industry observer called Salesforce.com’s<br />

move “incremental” but “interesting.”<br />

“Salesforce is showing that perhaps the best use<br />

of social <strong>net</strong>working is perhaps on the service side of<br />

CRM [customer relationship management] and not<br />

sales force automation,” said Rebecca Wettemann,<br />

vice president, research, at Nucleus Research.<br />

“The immediate advantage of this is for companies<br />

whose audience is teenage girls,” she added.<br />

“They’re constantly Twittering.”<br />

But before companies get enamored with the<br />

“next shiny thing,” which could be Twitter, they<br />

need to mull over the potential return on investment,<br />

she said.<br />

<br />

—Compiled by CWHK staff<br />

newsbytes<br />

<br />

Hong Kong<br />

NTT Com Asia opened its new seven-story data<br />

center building in Tai Po, Hong Kong in late March.<br />

The facility has a gross area of up to 212,100<br />

square feet and can provide more than 3,000 racks,<br />

said NTT Com Asia. The data center has been built<br />

to achieve the Tier III+ infrastructure level, NTT<br />

Com Asia said, adding that every aspect of its<br />

facilities, including power, cooling, and telecommunications<br />

systems are fully redundant to avoid<br />

single point of failure and to ensure business<br />

continuity.<br />

Hong Kong security info watchdog<br />

heads APCERT<br />

The Hong Kong Computer Emergency Response<br />

Team Coordination Centre (HKCERT) has been<br />

elected as the chair of the APCERT (Asia-Pacific<br />

Computer Emergency Response Team) recently<br />

during the annual general meeting held in Kaohsiung,<br />

Taiwan. This is the first time that Hong Kong<br />

heads the APCERT comprising 22 leading and<br />

national Computer Security and Incident Response<br />

Teams (CSIRT) from 15 economies of the Asia<br />

Pacific region, said the Hong Kong Productivity<br />

Council that manages the HKCERT established in<br />

2001.<br />

<br />

Novell unveiled SUSE Linux Enterprise 11 in late<br />

March, with features and capabilities that reflect<br />

the company’s controversial multiyear agreement<br />

with Microsoft. In 2006, Microsoft and<br />

Novell agreed to work on improving compatibility<br />

between their products, and pledged not to pursue<br />

patent claims against each other’s customers.<br />

Novell said SUSE 11 will work “seamlessly” with<br />

Windows regarding areas like systems management,<br />

virtualization, document formats and even<br />

multimedia.<br />

<br />

with Cisco tools<br />

Cisco announced recently that Hong Kong-based<br />

pay TV operator i-CABLE is deploying Cisco’s<br />

set-top boxes and video system to fight pirated TV<br />

viewing. The Cisco products that iCable is deploying<br />

consists of the Model D-PCG1000 PowerKEY<br />

Conditional Access System (CAS) Gateway, a digital<br />

headend system incorporating the Continuum DVP<br />

SI-Server MKV, ROSA Copernicus Network Management<br />

Server (NMS), Model D9630 Advanced QAM<br />

Modulators and DCM Digital Content Manager, and<br />

the Cisco’s Z368DVB Standard-definition (SD) settop<br />

series, which includes options for both digital<br />

cable and MMDS/satellite.<br />

Computerworld Hong Kong April 2009 www.cw.com.hk


Microsoft teams with Cyberport<br />

to support local start-ups<br />

As tech-related vacancies are dropping, it’s time for IT pros to think<br />

about starting their own businesses By Teresa Leung<br />

Tired of the job search? Want to test your<br />

entrepreneurship? The BizSpark creativity<br />

center of Microsoft might help you get<br />

a head start.<br />

The software vendor announced an initiative<br />

to support Hong Kong digital content and entertainment<br />

start-ups, as part of its global BizSpark<br />

program. By teaming up with Cyberport’s Incubation<br />

program dubbed IncuTrain, the BizSpark<br />

program in Hong Kong provides start-ups with a<br />

range of resources including software, technical<br />

support, marketing, and office space.<br />

According to Microsoft, the program is open<br />

to privately held start-ups that build digital entertainment<br />

and creative lifestyle content-based<br />

products or services. These firms must be in<br />

It’s time to develop your<br />

products now—don’t wait<br />

till the arrival of the upturn<br />

— Leung from Microsoft<br />

business for less than three years and have less<br />

than HK$7.8 million in annual revenue.<br />

“The economic downturn is a good time for<br />

[entrepreneurs] to start their own businesses,”<br />

said Simon Leung, chairman and CEO of Microsoft<br />

Greater China Region. “We estimate the<br />

economy will see improvement two years later.<br />

It’s now the right time to develop your products<br />

now and capture market and growth opportunities<br />

when the upturn arrives.”<br />

The vendor added that the software support<br />

amount from the BizSpark program will vary according<br />

to how start-ups architect their products.<br />

But it can be as much as HK$2 million based on<br />

a standard five-person software company, Microsoft<br />

noted.<br />

Leung said that program participants are expected<br />

to graduate in three years’ time.<br />

Asked why Cyberport rather than Hong Kong<br />

Science Park’s incubation program is a better<br />

place for digital content players, Nicholas Yang,<br />

CEO of Hong Kong Cyberport Management said,<br />

“Cyberport ‘s (incubation) program is dedicated<br />

to digital media, content, and entertainment<br />

while Science Park’s program is open to firms in<br />

Microsoft’s Leung: <br />

<br />

multiple areas including IT and biotech.”<br />

According to Leung, Microsoft already<br />

launched the BizSpark program in China last November<br />

and worked with various science parks<br />

in the country to facilitate development of startups.<br />

He added that the company will bring the<br />

same program to Taiwan at a later stage. <br />

Appointment news<br />

Number of new tech jobs drops<br />

37.6 percent in Hong Kong<br />

Freddy Tan<br />

Freddy Tan appointed to<br />

(ISC) 2 board of directors<br />

T <br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

2 .<br />

<br />

<br />

<br />

director of greater China<br />

<br />

<br />

<br />

<br />

responsible for business development in<br />

<br />

30 Computerworld Hong Kong April 2009 www.cw.com.hk


ANNIVERSARY covering Hong Kong technology since 1984<br />

CHANGE<br />

Yes we can help<br />

2008 is a year of changes - Staff Termination,<br />

New Join, Transfer & Promotion.<br />

So it is time to update your database<br />

and prepare for the challenges ahead.<br />

Computerworld HK can Help.<br />

CWHK Database Management Services<br />

Manage profitable relationships with existing<br />

and potential clients<br />

Outbound call for data cleansing<br />

Customer Acquisition / Retention /<br />

Customer Care Program<br />

www.cw.com.hk<br />

For enuiries, please contact Connie Yip, Account Director<br />

Tel: 2589 1373 or Email: cyip@questexasia.com<br />

technews<br />

techguide<br />

techfeature<br />

industryevent<br />

biznews<br />

viewpoint<br />

bizpeople<br />

analystwatch<br />

industryprofile


ANNIVERSARY covering Hong Kong technology since 1984<br />

<br />

Declining markets across the board still provides opportunities for leaders to shine among the gloom<br />

While CWHK prepares for<br />

another annual awards<br />

in June 2009, the industry’s<br />

vendors are still reeling from<br />

a 2008 that looked initially positive<br />

but ended rock-bottom. And the<br />

news is that 2009 will be worse than<br />

expected with Gartner predicting a<br />

decline in global IT spending by 4%.<br />

That means a greater contraction in spending<br />

than the dot com bust in 2001. “The IT market<br />

slowdown will be worse than 2001, that downturn<br />

was tech-related. Today there is a general<br />

slowdown in demand for products and services<br />

across the board and IT spending is not<br />

immune,” said Richard Gordon, research vice<br />

president of global forecasting at Gartner, on a<br />

conference call announcing the spending forecast.<br />

Gartner reported that global IT spending will<br />

reach about US$3.2 trillion in 2009, a 3.8% decline<br />

in growth from the $3.3 trillion spent in 2008. IT<br />

spending in 2001 saw a 2.1% decline, according<br />

to Gartner.<br />

Spending on hardware is expected to fall by<br />

a staggering <strong>14</strong>.9% to $324.3 billion. Software<br />

spending, which was supposed to be a relatively<br />

bright spot, is now seen as growing only threetenths<br />

of one percent, to $222.6 billion in 2009,<br />

and IT services is expected to decline by 1.7% to<br />

$796.1 billion. Telecom and <strong>net</strong>work spending,<br />

which is the largest part of the IT budget, is going<br />

to decline by 2.9% to $1.89 trillion.<br />

Networks<br />

Complexity is the dominant factor in <strong>net</strong>works<br />

today and how companies can best manage it<br />

will be the secret to a high performance <strong>net</strong>work.<br />

Functions are being added constantly while traffic<br />

loads are not slowing in growth leaving <strong>net</strong>work<br />

managers struggling to cope. There are more security<br />

functions being integrated at the <strong>net</strong>work<br />

and applications such as telepresence and unified<br />

communications add even further QoS demands.<br />

On the application side as data centers are<br />

consolidated, the dependence on the <strong>net</strong>work to<br />

deliver consistent user experience and reliable<br />

application performance is becoming critical. All<br />

locations and branch offices demand consistent<br />

service levels for their applications and they want<br />

it all secured. Vendors that can ease the management<br />

burden during such difficult times and enable<br />

the customer to deliver consistent services<br />

levels will be stand a good chance of succeeding<br />

this current market.<br />

Security<br />

Security is perennially in the top three priorities<br />

for IT departments but during a recession<br />

the risks posed to organizations become even<br />

greater. Cybercrime as in the physical world becomes<br />

rife during downturns. Malicious and targeted<br />

threats will without doubt be on the rise as<br />

will the creation of malware and exploitation of<br />

weakpoints. Data protection is now a major priority<br />

as companies realize that protecting users and<br />

their devices is not always realistic but protecting<br />

the data will in turn protect the company.<br />

Internal threats become an even bigger issue<br />

as disgruntled existing and ex-staff have much<br />

higher motivation to take action against their<br />

companies. Again for providers in security there<br />

will be a heavy emphasis on easing management<br />

and also finding ways to deliver security metrics<br />

as budgets are squeezed and all investments<br />

scrutinized more stringently.<br />

Applications<br />

In the applications market, there is a high level<br />

of attention on the business intelligence and<br />

<br />

<br />

CRM space. Improving the use of existing data<br />

as well as capturing new data is a huge concern<br />

as business leaders try to drive greater productivity<br />

and squeeze more value from staff and<br />

from customers. Finding the best resources to<br />

maximize the value delivered to customers can<br />

be optimized by business intelligence and analytics<br />

tools.<br />

CRM will be leveraged to maximize existing customer<br />

relationships as firms turn to focus on customer<br />

retention strategies rather than acquisition.<br />

The other major trend is cloud computing. As<br />

this moves out of the hype phase, firms are now<br />

evaluating the possibilities of moving more resources<br />

into the cloud and applications seems<br />

a good first step. Application vendors that are<br />

able to articulate this development clearly and<br />

also deliver as promised will find growth in this<br />

area.<br />

Services<br />

There are clear arguments for how managed<br />

services will benefit in a downturn. The<br />

problem many firms face is finding enough<br />

examples of services which provide the short<br />

term return that is demanded by businesses<br />

today. Security services, application management,<br />

<strong>net</strong>work management are all areas with<br />

huge potential as firms want to shift the management<br />

burden to third parties and away from<br />

internal resources.<br />

However while companies are taking an interest,<br />

beyond some basic services, adoption is not<br />

as fast as predicted.<br />

<br />

32 Computerworld Hong Kong April 2009 www.cw.com.hk


Computerworld Hong Kong Awards 2009<br />

<br />

This year we have a total of 47 categories<br />

with a record number of entry<br />

nominations. The following list shows<br />

all final nominations as included in the voting<br />

form which is NOW LIVE. Fully-subscribed<br />

readers can still vote by going to our web site<br />

and clicking on the “awards section.”<br />

<br />

exclusive CWHK Photo Album key chain.<br />

<br />

allowed to vote. (VENDORS, SYSTEMS IN-<br />

TEGRATORS, DISTRIBUTORS/RESELL-<br />

ERS not accepted).<br />

<br />

and furnish us with their contact details<br />

will qualify for winning a prize. All winners<br />

will be notified by phone/email individually.<br />

bers<br />

are not eligible for the vote.<br />

<br />

the final decision should there be any<br />

disputes.<br />

HARDWARE:<br />

Mid-Range Server (50-200 users)<br />

Dell PowerEdge Servers<br />

Fujitsu Primergy Servers<br />

HP ProLiant Server<br />

IBM Power Systems<br />

Lenovo ThinkServer R & T Series<br />

Sun SPARC Enterprise T5440<br />

Teradata Data Warehouse Appliance 2550<br />

Enterprise Server (201+ users)<br />

Fujitsu Primergy<br />

Dell PowerEdge M-Series<br />

HP Integrity Server<br />

IBM System z<br />

Sun SPARC Enterprise M9000 Server<br />

Teradata Data Warehouse Appliance 5550<br />

Datacenter Power Systems<br />

APC Symmetra PX<br />

Chloride UPS<br />

Emerson Liebert UPS<br />

HP Power Manager<br />

Datacenter Cooling Systems<br />

APC InRow RP Cooling<br />

Emerson Liebert Precision Cooling<br />

HP Dynamic Smart Cooling<br />

IBM Systems Director Active Energy Manager<br />

RC Precision Cooling<br />

Corporate Multifunctional Copier / Printer /<br />

Scanner<br />

Canon Color ImageRUNNER 3580i<br />

Fuji Xerox ApeosPort-III C3300<br />

HP Color LaserJet CM2320 MFP Series<br />

Konica Minolta bizhub C650<br />

Lexmark X658DE<br />

Ricoh Aficio MP C5000 Colour MFP<br />

Samsung Color Multi-function<br />

laser printer CLX-6240FX<br />

STORAGE<br />

Backup Storage (Tape)<br />

Dell ML6000<br />

HP StorageWorks Tape Drive<br />

IBM System Storage TS3500 Tape Library<br />

Sun StorageTek SL3000 Modular<br />

Library System<br />

Backup Storage (Disk)<br />

Dell PowerVault DL2000<br />

EMC Disk Library<br />

HP StorageWorks Virtual Library System<br />

IBM Virtualization Engine TS7530<br />

Tape Library<br />

NetApp VTL<br />

Mid-Range Storage Systems<br />

Dell EqualLogic PS5000 Series<br />

EMC CLARiiON CX Series<br />

Hitachi Adaptable Modular Storage<br />

(AMS) Series<br />

HP StorageWorks Enterprise Virtual Arrays<br />

IBM System Storage DS4000 Disk Storage<br />

System<br />

NetApp FAS3100<br />

Sun Storage 7410 Unified Storage System<br />

Enterprise Storage Systems<br />

EMC Symmetrix DMX Series<br />

Hitachi Universal Storage Platform V<br />

HP StorageWorks XP Disk Arrays<br />

IBM System Storage DS8000<br />

NetApp FAS6000<br />

Sun StorageTek 9990V System<br />

Storage Management Software<br />

EMC ControlCenter Family<br />

HDS Storage Command Suite<br />

HP Storage Essentials Software<br />

IBM Tivoli Storage Manager<br />

Microsoft System Center Data<br />

Protection Manager 2007<br />

Solaris ZFS<br />

Veritas Storage Foundation<br />

NETWORKING &<br />

COMMUNICATIONS<br />

Enterprise Switch (50+ users)<br />

Alcatel-Lucent OmniSwitch<br />

Cisco Catalyst 3750E Stackable Switch &<br />

ISR 3800<br />

H3C S5500-SI Series Ether<strong>net</strong> Switch<br />

Juniper Networks EX-series (EX 4200)<br />

Nortel Ether<strong>net</strong> Routing Switch<br />

Enterprise Router (50+ users)<br />

Alcatel-Lucent 7670 Routing<br />

Switch Platform<br />

Cisco 3800 Series Integrated<br />

Services Routers<br />

H3C Multiple Service Router<br />

– MSR 20-30-50<br />

Juniper Networks J-series J2320<br />

Nortel Ether<strong>net</strong> Routing Switch<br />

Video Conferencing<br />

Cisco TelePresence<br />

Microsoft Office Communications<br />

Server 2007<br />

Nortel Telepresence Services<br />

Polycom telepresence solutions<br />

Tandberg HD Video Conferencing<br />

Smartphone/Mobile Enterprise Device<br />

HTC Touch Cruise<br />

Motorola MOTOSURF A3100<br />

Nokia N71<br />

Apple iPhone<br />

Palm Treo Pro<br />

RIM Blackberry Bold<br />

Sony Ericsson XPERIA X1<br />

Samsung Anycall OMNIA i908<br />

www.cw.com.hk<br />

April 2009 Computerworld Hong Kong 33


ANNIVERSARY covering Hong Kong technology since 1984<br />

WLAN Switch<br />

Alcatel-Lucent OmniAccess WLAN<br />

Cisco Catalyst 6500 Series Wireless<br />

Series Module (WiSM)<br />

Cisco Wireless LAN Controller<br />

H3C WX5002 Series Access Controller<br />

Nortel WLAN 2300 Series<br />

IP PBX<br />

Alcatel-Lucent OmniPCX Enterprise<br />

Avaya G700 Media Gateways<br />

Cisco Unified Communications Manager<br />

Version 7.0<br />

Nortel Communication Server 1000<br />

Call Center Management<br />

Alcatel-Lucent OmniTouch Call Center Office<br />

Avaya Contact Center Express<br />

Cisco Unified Contact Center Express<br />

+ Cisco Unified Workforce Optimization<br />

Oracle Contact Center Anywhere<br />

Messaging & Collaboration<br />

Cisco WebEx Web Meetings and<br />

On-demand Collaboration<br />

HKNet (TeamWorks)<br />

IBM Lotus Notes + Domino 8.5<br />

Microsoft Exchange 2007<br />

Mirapoint Message Server<br />

Unified Communications<br />

Avaya Unified Communications Advanced<br />

Cisco Unified Personal Communicator<br />

IBM Lotus Sametime<br />

Microsoft Office Communications Server 2007<br />

Joint Nortel and Microsoft Unified<br />

Communications Solution<br />

Structured Cabling<br />

ADC Krone<br />

Belkin<br />

Hellerman Tyton<br />

Panduit<br />

Siemon<br />

Systimax/Commscope<br />

Tyco Electronics<br />

WAN Optimization<br />

BlueCoat Proxy SG MACH 5 Edition<br />

Cisco Wide Area Application (WAAS)<br />

Citrix Wanscaler<br />

Expand Networks Accelerator<br />

F5 Networks WANjet WAN Optimization<br />

Appliance<br />

Juniper Networks WX/WXC Application<br />

Acceleration Platforms<br />

Nortel Networks Application Accelerator<br />

Riverbed Steelhead<br />

SECURITY:<br />

Firewall / VPN<br />

BlueCoat Proxy RA<br />

CheckPoint VPN-1 Power<br />

Cisco ASA 5500 Series Adaptive Security<br />

Appliance – Firewall/VPN Edition<br />

HKNet SSL VPN<br />

Forti<strong>net</strong> FG-3810A<br />

Juniper Networks SSG550M Secure<br />

Services Gateway<br />

Microsoft ISA 2006/IAG 2007<br />

SonicWall NSA Series/TZ Series/<br />

SSL-VPN Series<br />

Content Filtering / Anti-Spyware<br />

BlueCoat Proxy AV<br />

F-Secure Anti-Virus Enterprise Suite<br />

McAfee Total Protection Solutions<br />

Symantec Brightmail Gateway<br />

Trend Micro Anti-spyware for SMB<br />

Websense Web Security version 7<br />

Antivirus/Anti-Spam<br />

CA Anti-Virus<br />

Cisco Security Agent<br />

Forti<strong>net</strong> Security<br />

F-Secure Anti-Virus Enterprise Suite<br />

McAfee Total Protection Solutions<br />

Microsoft Forefront Client Security<br />

Mira RazorGate Appliance<br />

Sophos Security Suite<br />

TrendMicro PC-cillin Inter<strong>net</strong> VirusWall/<br />

ScanMail<br />

Symantec Endpoint Protection<br />

Identity Management<br />

BMC User Administration and Provisioning<br />

CA Identity Manager/SiteMinder Web<br />

Access Manager<br />

EMC RSA SecurID<br />

IBM Tivoli Identity Manager<br />

Microsoft Identity Life Cycle Manager 2007<br />

Oracle Identity Manager<br />

VeriSign Identity Protection<br />

Intrusion Detection/Intrusion Prevention<br />

(IDS/IPS)<br />

Check Point IPS-1 Appliance<br />

Cisco IPS4200 Series Sensors<br />

Forti<strong>net</strong> FG-3810A<br />

IBM Inter<strong>net</strong> Security Systems (Proventia)<br />

Juniper Networks IDP8200<br />

Oracle Adaptive Access Manager<br />

SonicWall NSA Series<br />

Symantec Critical System Protection<br />

TippingPoint Core Controller ThreatLinQ<br />

Surveillance<br />

Burle Phillips<br />

H3C iVS8000 Surveillance Solution<br />

IBM Physical Security Services (IBM smart<br />

Surveillance Solutions)<br />

Panasonic<br />

SonicWall NSA Series<br />

Unified Threat Management (UTM)<br />

Check Point UTM-1 Total Security Appliance<br />

Check Point VPN-1 UTM<br />

Cisco ASA5500 Series Adaptive Security<br />

Appliance – Anti-X Edition<br />

Forti<strong>net</strong> FG-3810A<br />

IBM Inter<strong>net</strong> Security Systems (Proventia)<br />

Juniper Networks Unified Threat<br />

Management (UTM)<br />

Network Box E-Series<br />

WatchGuard FireBox X<br />

SonicWall NSA Series/TZ Series<br />

Managed Security Services<br />

AT&T<br />

BT<br />

CPCNet<br />

HGC<br />

HKNet<br />

IBM Inter<strong>net</strong> Security Systems<br />

Network Box<br />

PCCW<br />

Symantec MessageLabs Managed<br />

Security Services<br />

Verizon<br />

SOFTWARE:<br />

Database Management<br />

MySQL 5.1<br />

IBM DB2 Universal Database<br />

Microsoft SQL Server 2008<br />

Oracle Database<br />

Sybase Adaptive Server Enterprise (ASE)<br />

Teradata 12<br />

34 Computerworld Hong Kong April 2009 www.cw.com.hk


Application Server & Middleware<br />

GlassFish<br />

IBM Websphere<br />

Microsoft BizTalk Server 2006 R2<br />

Oracle Fusion Middleware<br />

Oracle WebLogic Server<br />

Systems Management<br />

Altiris Total Management Suite<br />

APC InfraStruXure Central<br />

Avocent DSView 3 Management Software<br />

BMC Performance Manager (Patrol)<br />

EMC Smarts<br />

HP Operations Center<br />

IBM Tivoli System Management Suite<br />

Microsoft System Center 2007<br />

Oracle Enterprise Manager<br />

Enterprise Resource Planning (ERP)<br />

ECL IFS<br />

Epicor ERP<br />

Kingdee K/3 ERP<br />

Lawson ERP solutions<br />

Microsoft Dynamics AX 2009<br />

Oracle E-Business Suite<br />

SAP ERP<br />

Supply Chain Management (SCM)<br />

Epicor SCM<br />

I2 Supply Chain Management Solutions<br />

Oracle Supply Chain Management<br />

SAP SCM<br />

Customer Relationship Management (CRM)<br />

Microsoft CRM 4.0<br />

Oracle Siebel CRM<br />

SAP CRM<br />

SAS Customer Intelligence<br />

Teradata Relationship Manager<br />

WeB e-Mail Marketing (Web-eM)<br />

Document and Content management<br />

Canon File Navigator<br />

EMC Documentum Content Management<br />

Fuji Xerox DocuShare<br />

IBM FileNet<br />

Microsoft Sharepoint Server 2007<br />

Oracle Universal Content Management<br />

Ricoh SME Solution Suite<br />

BI and Analytics<br />

IBM Cognos 8 Business Intelligence<br />

Microsoft SQL Server 2008<br />

Oracle BI Applications + Oracle BI EE Plus<br />

Oracle Essbase<br />

SAP BusinessObjects<br />

SAS 9.2<br />

Sybase IQ Analytics Server<br />

Teradata Active Enterprise Intelligence<br />

Data Mining & OLAP<br />

IBM InfoSphere Warehouse<br />

Microsoft SQL Server 2008<br />

Oracle Database<br />

SAP Business Objects OLAP Intelligence<br />

SAS 9.2<br />

Developer Tools/Web Services<br />

IBM Rational Professional Bundle<br />

Microsoft Visual Studio 2008 Team System<br />

NetBeans IDE 6.5<br />

Oracle SQL Developer<br />

Sybase Power Builder<br />

Server OS<br />

HP-UX<br />

IBM AIX 5L<br />

Microsoft Windows Server 2008<br />

Novell / SuSe Linux<br />

Oracle Enterprise Linux<br />

Red Hat Enterprise Linux<br />

Solaris OS 10 10/08<br />

Virtualization<br />

Citrix XenApp 5<br />

Citrix XenDesktop<br />

HP Insight Dynamics – VSE<br />

Microsoft Windows Server 2008 Hyper-V<br />

Nortel Ether<strong>net</strong> Routing Switch<br />

Oracle VM<br />

Sun xVM<br />

VMware Infrastructure<br />

SERVICES:<br />

Corporate Mobile Services Provider<br />

CSL<br />

Hutchison Telecom<br />

New World Telecom<br />

PCCW Mobile<br />

SmartTone-Vodafone<br />

Data & Telecoms Services Provider<br />

AT&T<br />

BT<br />

HKNet (SecureNet IP-VPN Service)<br />

New World Telecom<br />

NTT Com Asia Ltd (Arcstar)<br />

Orange Business Services<br />

PCCW<br />

SingTel ConnectPlus IP VPN and E-VPN<br />

Verizon<br />

Wharf T&T<br />

Managed Services<br />

AT&T<br />

BT<br />

CPCNet ManagedCONNECT<br />

EMC Consulting & IT Services<br />

HP<br />

IBM Global Technology Services<br />

(IBM Managed Services)<br />

Jardine OneSolution<br />

New World Telecom<br />

Nortel Network Managed Services<br />

NTT Com Asia<br />

Oracle Advanced Customer Services<br />

Orange Business Services<br />

PCCW<br />

Verizon<br />

IT Hosting & Outsourcing<br />

COL<br />

HKNet<br />

HP<br />

IBM Global Technology Services<br />

(IT Outsourcing)<br />

Jardine OneSolution (Email On-Demand<br />

Service – Hosted Exchange)<br />

New World Telecom<br />

Oracle Advanced Customer Services<br />

Orange Business Services<br />

PCCW Solutions<br />

Consulting & Systems Integration<br />

COL<br />

Datacraft Asia<br />

EMC Consulting & IT Services<br />

HKNet<br />

HP<br />

IBM Global Business Services<br />

Newtech Technology<br />

NTT Com Asia<br />

Oracle Advanced Customer Services<br />

PCCW Solutions<br />

www.cw.com.hk<br />

April 2009 Computerworld Hong Kong 35


Social apps for business:<br />

plan less for less pain<br />

Standardizing on tools people already use, like Facebook and Twitter,<br />

can be the path of least resistance, say experts<br />

<br />

Productivity loss, information leakage, and<br />

defamation of fellow employees are all<br />

enough to get us fired from our jobs, unless<br />

of course it’s done under the guise of a social<br />

<strong>net</strong>work for the enterprise 2.0.<br />

Businesses are beginning to grapple with the<br />

emergence of a culture of IT self-service among<br />

employees and the savvy leaders will harness,<br />

rather than hinder, the use of external hosted applications,<br />

including social <strong>net</strong>working, according<br />

to a group of IT professionals.<br />

Experts: culture shift<br />

Speaking on a panel about social <strong>net</strong>working<br />

for business at the Enterprise 2.0 Executive Forum<br />

in Sydney, representatives from insurance<br />

company AMP, consulting firm Deloitte and IT<br />

analyst firm Forrester Research, agreed that rapid<br />

adoption of external applications by employees<br />

is here to stay so the challenge is how to leverage<br />

this culture shift.<br />

Annalie Killian, AMP’s catalyst for magic [actual<br />

title], said social <strong>net</strong>works have helped dissolve<br />

boundaries between the inside and outside of the<br />

organization. “I communicate with colleagues via<br />

Facebook as much as e-mail,” Killian said.<br />

AMP tried to “experiment” with yammer for inhouse<br />

social <strong>net</strong>working, but it didn’t get enough<br />

uptake and people started to use Twitter “without<br />

being told.” “It happened organically so I think<br />

why try and implement another enterprise tool<br />

when all the fish are at Twitter,” she said. “I don’t<br />

want to manage Twitter.”<br />

Killian said that giving enterprise users freedom<br />

to use the tools they are comfortable with is<br />

often the most useful way to start an IT project.<br />

“I quickly start playing with stuff and think laterally<br />

about how it would be good for the business,”<br />

she said. “Then I find like-minded souls<br />

playing with the tools and it circles out from<br />

there.”<br />

User power<br />

Over at Deloitte Digital, CEO Peter Williams<br />

found 30 percent of his staff were using Facebook<br />

before it was even considered as a business<br />

application.<br />

“The business case proved itself—if 30 percent<br />

of people using tech we didn’t ask them to are<br />

combining work and social <strong>net</strong>working, that’s<br />

the best rollout of technology we’ve ever had,”<br />

Williams said. “We could do it internally, but that<br />

would be a pain so we just standardized on Facebook<br />

and build applications around that.”<br />

Williams has noticed “deeper connections” between<br />

staff can be formed with social <strong>net</strong>works,<br />

not just in a work environment. “There is a thing<br />

called ‘weak tie <strong>net</strong>works’ where you get more<br />

done through a friend of a friend and not immediate<br />

contacts,” he said, adding the <strong>net</strong>work effect<br />

model is creating opportunities for business<br />

growth.<br />

Deloitte’s Williams. “If your organization has a<br />

culture of back-stabbing then it will happen on<br />

social <strong>net</strong>works. Saying we should ban social <strong>net</strong>works<br />

is like saying we should ban phone calls<br />

and e-mail.”<br />

“We say don’t diss each other and we have a<br />

culture of openness so it goes with the turf,” Williams<br />

said. “It’s the same with editing wikis and<br />

people leaving rotting food in the fridge, there is<br />

a certain level of self-regulation.”<br />

Employee behavioral control in the Web 2.0<br />

age comes with the standard terms and conditions<br />

for all IT system use at Deloitte: “Don’t<br />

make them 30 pages long and have a ‘be smart,<br />

use judgment’ mantra,” said Williams.<br />

<br />

hosted applications, including social <strong>net</strong>working<br />

Forrester Research senior analyst Steven Noble<br />

said social <strong>net</strong>works are “the easiest and the<br />

hardest” technology to build a business case for<br />

because the benefits are largely “soft.”<br />

“It should be easy to build a business case for<br />

social <strong>net</strong>working as the core functionality is<br />

pretty simple,” said Noble. “For example, integrated<br />

collaboration tools, blogging and Share-<br />

Point will all build profile capabilities and that is<br />

a social <strong>net</strong>work.” Noble said social <strong>net</strong>works will<br />

increasingly become the “glue” that binds applications<br />

together.<br />

Not so fast, that’s my company data<br />

An increasing headache for businesses living<br />

in the closed-shop IT world is the amount of potential<br />

for social <strong>net</strong>working employees to leak<br />

sensitive data to a third-party of publicize potentially<br />

damaging information about people.<br />

“It goes down to organizational culture,” said<br />

At AMP similar rules apply. We’re trying hard<br />

to have [a] simple social media policy,” said Killian.<br />

“We have a live-and-let-live policy unless a<br />

complaint is raised. We also have a lot of introverts<br />

in the organization. It’s different strokes<br />

for different folks and it’s not a massive problem.”<br />

Killian said a lot of companies want to see social<br />

<strong>net</strong>working fail in order to “sell you some security<br />

software or something.” “When you sign up<br />

for your own blog there is a three-line guideline<br />

statement saying ‘don’t put up anything offensive’<br />

and we then let the community self-regulate,” she<br />

said. “Most people are sensible.”<br />

We live in an age where employers will “Google<br />

you before they hire you,” so don’t release anything<br />

to the Inter<strong>net</strong> you don’t want others to see,<br />

according to Killian. “Companies tend to focus on<br />

boundaries and not what flourishes inside them,”<br />

she said.<br />

<br />

36 Computerworld Hong Kong April 2009 www.cw.com.hk


We have the permission.<br />

We are your trustworthy<br />

EDM partner!<br />

E – Easy & Convenient<br />

D – Direct Response<br />

M – Measurable Result<br />

For more information please contact:<br />

Computerworld HK List Rental Services<br />

Reach IT purchasing decision makers<br />

through a direct response medium with<br />

our highly selective databases.<br />

Our email list consists of members who<br />

have given permission to receive vendor<br />

information.<br />

Simon Yeung<br />

Publisher<br />

Direct line: (852) 2589 1370<br />

Mobile: (852) 9458 7688<br />

Email: syeung@questexasia.com<br />

Connie Yip<br />

Account Director<br />

Direct line: (852) 2589 1373<br />

Mobile: (852) 9407 5454<br />

Email: cyip@questexasia.com


Google’s share of Inter<strong>net</strong> search in China<br />

moved up a hair last year, statistics from<br />

the government’s number cruncher<br />

show, indicating the company continues to struggle<br />

against market leader Baidu.<br />

Google captured 16.6 percent of Chinese<br />

search engine users last year, up from <strong>14</strong>.3<br />

percent the year before, China’s domain registry<br />

center said in a report last month.<br />

Google has struggled to raise its user share<br />

against Chinese search giant Baidu, which<br />

opened in 2000 and has worked hard to lead<br />

its domestic market.<br />

Baidu’s user share rose more than two percentage<br />

points to 76.9 percent last year, the<br />

Chinese Inter<strong>net</strong> Network Information Center<br />

(CNNIC) said.<br />

China had 298 million Inter<strong>net</strong> users at the<br />

end of 2008, the most in any country, according<br />

to CNNIC.<br />

“Google is doing a lot of the right things in<br />

China—it’s just in the situation that there’s a<br />

limit to how much market share it’s going to<br />

be able to get,” said Mark Natkin, director of<br />

Marbridge Consulting in Beijing.<br />

Baidu has an easily recognizable<br />

Chinese name, while Google<br />

only introduced a Chinese name in<br />

2006 and has not caught on as well<br />

among users outside of major cities, he said.<br />

Google’s Chinese name, “Gu ge,” means<br />

“valley song,” but its catchier English name is<br />

more popular among young urban Chinese.<br />

“There’s a strong perception that Google is<br />

a foreign brand, a foreign search engine, and<br />

that Baidu is a domestic one,” Natkin said. “As<br />

such, there’s a little more user acceptance<br />

for Baidu.”<br />

Some analysts also say Baidu attracts<br />

many search engine users<br />

with an MP3 search that links to free downloads<br />

of copyrighted songs.<br />

Google launched a free music search download<br />

service in China for registered songs last<br />

year to compete with Baidu, but limited selection<br />

has deterred users.<br />

More users stayed loyal to Baidu than to<br />

Google in 2008. Google retained around 80<br />

percent of users from 2007 to 2008, much lower<br />

than Baidu’s 96 percent retention, the CN-<br />

NIC report said.<br />

Yahoo’s user share fell to 1.6 percent last<br />

year, the report said without elaborating. The<br />

report did not offer a corresponding figure<br />

from 2007.<br />

<br />

Michael Dell sees faster economic recovery in China<br />

<br />

The CEO of Dell called business conditions<br />

in China among the best in the<br />

world amid slowing global growth at a<br />

talk in Beijing last month.<br />

China has unrolled massive stimulus spending<br />

and launched a discount initiative for rural<br />

consumers buying PCs and other electronics<br />

to spur growth.<br />

“China seems to have come out of the cri-<br />

sis stronger than other countries, faster, and<br />

the government’s pretty rapid action seems<br />

to have caused a positive demand condition,”<br />

said Michael Dell.<br />

Fifteen Dell products, including some models<br />

modified for Chinese consumers, are eligible<br />

for the country’s subsidy program. The<br />

company is investing in rural areas to support<br />

the program and boost sales, Dell said.<br />

Fifteen Dell products, including some models modified for<br />

Chinese consumers, are eligible for the country’s subsidy<br />

program. The company is investing in rural areas to support<br />

the program and boost sales, Dell said<br />

Dell dodged a question about reports that<br />

layoffs at his company could extend to some<br />

of its 6,000 employees in China. China, Dell’s<br />

second largest market, accounts for about<br />

five percent of its global business.<br />

Dell is one of many firms that has targeted<br />

remote Chinese cities to boost growth. Those<br />

efforts have paid off for many firms, but the economic<br />

downturn has hit the Chinese countryside<br />

as well, said Bryan Ma, an analyst at IDC.<br />

How much the rural subsidy program will<br />

help remains unclear.<br />

“There are, of course, going to be a good<br />

number of units sold through the program,<br />

but we don’t believe it’s going to create any<br />

major inflection points in the market,” Ma<br />

said.<br />

<br />

Computerworld Hong Kong April 2009 www.cw.com.hk


VMware will expand in China as it moves<br />

to meet rising demand for desktop and<br />

data center virtualization in the country,<br />

a company executive said in an interview last<br />

month.<br />

VMware is rapidly building a customer base<br />

among smaller Chinese firms—those with 1,000<br />

or fewer staff—even as it expands services for<br />

bigger clients with mature virtualization systems<br />

in place, said Andrew Dutton, VMware’s<br />

new Asia Pacific head.<br />

VMware’s business in China tripled last year.<br />

The firm expects to have 350 staff in China by<br />

the end of the year, up from about 200 now.<br />

That level of growth could continue for a<br />

number of years, Dutton said.<br />

“As we see opportunity present itself, we’ll<br />

staff up to meet that opportunity,” he said.<br />

VMware releases local Chinese versions of its<br />

products about two months after their English-<br />

nications operators have been among the fastest<br />

to virtualize their servers in China, while high<br />

costs and a lack of awareness have made small<br />

firms slow to follow suit, said Ravi Shekhar Pandey,<br />

an analyst at Springboard Research.<br />

Foreign companies offering virtualization in<br />

China could find it difficult to crack software<br />

and service sectors dominated by Chinese<br />

firms, said Pandey.<br />

“I have a strong feeling that Chinese customers<br />

are more comfortable working with Chinese<br />

companies,” he said.<br />

Still, Microsoft and Virtual Iron rank beside<br />

VMware as foreign firms that have made inroads<br />

to China’s virtualization market.<br />

“VMware has an advantage in the sense that<br />

it is recognized in every market as somebody<br />

who pioneered this, who made it easy for companies<br />

to virtualize their infrastructure,” Pandey<br />

said.<br />

<br />

<br />

<br />

3Com Corp may have lost ground in Western<br />

markets in recent years, but meantime<br />

it has built a low-cost operations<br />

base in China that it hopes will attract more<br />

and bigger customers in the developed world.<br />

The <strong>net</strong>work equipment vendor has cut costs<br />

and gained market share in China since 2003,<br />

when it created a joint venture with Chinese<br />

counterpart Huawei Technologies, 3Com CEO<br />

Bob Mao said in a phone interview.<br />

3Com later fully acquired the joint venture.<br />

The company’s China operations accounted<br />

for almost half of its revenue in fiscal year<br />

2008, Mao said.<br />

3Com holds 35 percent of the market for <strong>net</strong>working<br />

products in China, about as much as<br />

Cisco Systems, he added.<br />

“China actually has become our home market,”<br />

Mao said.<br />

3Com’s acquisition of H3C, its venture with<br />

Huawei, brought it an established sales force<br />

in China and a low-cost research and development<br />

team. Its researchers in China have since<br />

rounded out the company’s product portfolio,<br />

helping 3Com beat out competitors who offer<br />

only low- or high-end products, Mao said.<br />

3Com made a <strong>net</strong> profit of US$92.7 million in<br />

the first half of fiscal year 2009, a turnaround<br />

from a $54.3 million loss in the same period a<br />

language launch. The company counts government<br />

ministries and some of China’s biggest<br />

firms among its customers. High levels of virtualization<br />

at clients such as China’s statistics<br />

bureau and the Agricultural Bank of China have<br />

created a need for stronger support staff in China,<br />

Dutton said.<br />

“Some of the customers here are so mature,<br />

or they’re becoming so mature, in the use of<br />

IT that they need to be right up at the cutting<br />

edge, and to do that they want access to the<br />

minds that built the products,” he said.<br />

Data center virtualization provided about<br />

90 percent of VMware’s revenue in China last<br />

year. Less than 10 percent came from desktop<br />

virtualization, but the firm hopes to raise that<br />

number. It expects revenue from desktop products<br />

in the first quarter of this year to match the<br />

figure for all of last year.<br />

Large firms including banks and telecommuyear<br />

earlier. Its third-quarter results are due<br />

out this week.<br />

Sales of equipment for IP video surveillance<br />

<strong>net</strong>works in China have been a boon for 3Com.<br />

H3C has provided the hardware linking over<br />

100 <strong>net</strong>works of surveillance camera systems<br />

around China, mostly in cities, Mao said. Its<br />

largest contract is for a <strong>net</strong>work connecting up<br />

to 50,000 IP cameras in Hangzhou, a coastal<br />

city of about 6 million people known for its<br />

scenery.<br />

prices and swift action to win government<br />

contracts in China, including for large, stateowned<br />

firms and the camera <strong>net</strong>works, said<br />

Milly Xiang, an analyst at IDC.<br />

But H3C’s growth in China has largely relied<br />

on the staff and brand recognition that Huawei<br />

brought to the venture, said Xiang. The sales<br />

force driving H3C’s success in China might<br />

not be as effective in other cultures, she said.<br />

“3Com has not made obvious progress outside<br />

China in recent years,” she said.<br />

The <strong>net</strong>work equipment vendor has cut costs and gained<br />

<br />

venture with Chinese counterpart Huawei Technologies<br />

“In total the surveillance market is growing, 3Com held 1.1 percent of the worldwide market<br />

whether you and I like it or not,” Mao said.<br />

for routers last year, according to IDC re-<br />

“But the IP-based part [of the market] is the search.<br />

fastest growing part.”<br />

3Com plans to stay an independent company<br />

3Com’s next goal is to expand outside China. after a failed acquisition by Bain Capital Partners<br />

It wants to attract more big firms, which currently<br />

two years ago, Mao said.<br />

account for only half of its customers National security concerns in the U.S. derailed<br />

that deal, which would have given Hua-<br />

outside of the country, Mao said. <br />

H3C has undercut competitors with low wei a stake in 3Com.<br />

<br />

www.cw.com.hk<br />

April 2009 Computerworld Hong Kong 39


40 Computerworld Hong Kong April 2009 www.cw.com.hk


For enquiries, please call Connie Yip at 9407 5454. E-mail: cyip@questexasia.com<br />

VMWARE<br />

CERTIFIED<br />

VIRTUAL<br />

APPLIANCE<br />

Newtech secures your Critical Environments<br />

Infrastructure for Critical Environment<br />

Data Centre, Network Control Centre, Business Continuity<br />

Recovery Centre, Clean Room, Laboratory<br />

IT Infrastructure<br />

E&M Service & Intelligent Building System<br />

Space Planning & Interior Decoration<br />

Facility Management, 24x7 Emergency Service<br />

Computational Fluid Dynamics (CFD) Analysis<br />

Head Office<br />

15/F Enterprise Square Two, 3 Sheung Yuet Road<br />

Kowloon Bay, Kowloon, Hong Kong<br />

Tel: (852) 2993 5816 Fax: (852) 2993 5916<br />

Email: info@newtechapac.com<br />

www.newtechapac.com<br />

Powered by World Class Suppliers<br />

UPS CRAC Structured Cabling<br />

Design Build Maintain<br />

www.cw.com.hk April 2009 Computerworld Hong Kong 41


Driving China’s ICT<br />

It’s the comms players, stupid<br />

By Robert Clark<br />

The most important players in China’s<br />

ICT are the comms vendors.<br />

If you doubt it, look at the numbers.<br />

Huawei last year sold around US$18<br />

billion in <strong>net</strong>working gear. State-owned rival<br />

ZTE sold $6.5 billion worth (for $249 million<br />

profit).<br />

The only IT firm on the same scale, Lenovo,<br />

paddles in the commodity shallows and in any<br />

case is struggling to stay afloat—its last quarterly<br />

result showed a $97 million loss on sales<br />

of $3.6 billion.<br />

The rest are not even close. B2B platform Alibaba.com<br />

posted just $321 million in revenue<br />

for the first nine months of last year. The wellregarded<br />

IT services firm Neusoft made a $3<br />

million profit on gross sales of $42 million.<br />

Why comms?<br />

The reasons for this are more interesting. For<br />

one, the comms equipment sector is driven by<br />

scale and standards, not innovation. Whatever<br />

advantage an innovator achieves is dissipated<br />

by the time it takes to become a standard.<br />

Unlike their IT counterparts, Huawei and<br />

ZTE have leveraged technology transfer from<br />

companies like Alcatel-Shanghai Bell, which<br />

set up 30 years ago (and is now wholly Chinese-owned).<br />

They’ve been able to get scale from China’s<br />

own massive telecom build-out over the past<br />

20 years. In doing so, they’ve competed headto-head<br />

with the world’s biggest comms suppliers—a<br />

classic example of open competition<br />

building world-class competitors.<br />

Neighboring rivals Samsung, NEC and Fujitsu<br />

have played themselves out of the market<br />

through protectionist domestic policies—a<br />

<br />

<br />

perfect example of how not to<br />

execute hi-tech industry development.<br />

Sales abroad<br />

Thank to that grounding, both<br />

Huawei and ZTE now make most<br />

of their sales abroad. The next<br />

couple of years could see them<br />

go from merely being major<br />

players to driving the whole sector.<br />

The recession plays to their<br />

obvious strengths and is making<br />

buyers lose their previous skittishness<br />

about dumping their<br />

old suppliers.<br />

The first sign is that Huawei<br />

looks on the verge of some serious<br />

North American business.<br />

It has reportedly won a contract<br />

to supply Cox Cable with<br />

a 3G <strong>net</strong>work—believed to be<br />

worth around $100 million—and<br />

is in the running for a much bigger<br />

deal to sell WiMax gear to<br />

Clearwire.<br />

The Clearwire project is set to<br />

be the largest WiMax <strong>net</strong>work in the US. Huawei<br />

is reportedly on the shortlist with Motorola,<br />

Samsung and Nokia Siemens.<br />

If it goes ahead it will be a big breakthrough<br />

for Huawei, which has continually hit roadblocks<br />

in the US.<br />

<br />

of years could see<br />

Huawei and ZTE<br />

go from merely<br />

<br />

players to driving<br />

the whole sector<br />

Political controversies<br />

Huawei’s biggest contract to date has been<br />

a cdma2000 contract with niche carrier Leap<br />

Wireless. Its major obstacles have not been<br />

legacy suppliers but IPR (Intellectual Property<br />

Rights) and political controversies.<br />

Its first effort faltered after thousands of lines<br />

of Cisco code were found in Huawei’s Quidway<br />

router (the two companies settled out of court).<br />

Last year Huawei’s attempt to buy 3Com in<br />

a joint offer with Bain Capital collapsed after<br />

US officials made it clear it would<br />

be rejected on national security<br />

grounds.<br />

Over the past two years alone<br />

Huawei has provided kit for carriers<br />

such as France Telecom, BT,<br />

TeliaSonera, Bell Canada, Vodafone<br />

and StarHub—so there’s<br />

clearly no problem with Huawei’s<br />

technology.<br />

The political nature of its problem<br />

was underlined recently with<br />

the leak of a UK intelligence report<br />

that claimed Huawei had built a<br />

backdoor into BT’s next-gen broadband<br />

<strong>net</strong>work.<br />

Whether true or not—and the<br />

published evidence is sketchy to<br />

say the least—it shows the sensitivity<br />

of the US and the UK to Huawei<br />

and its PLA background.<br />

So don’t expect Huawei to start<br />

selling gear for Verizon—the Pentagon’s<br />

main comms contractor—<br />

or AT&T any time soon. But the<br />

news out of Cox and Clearwire suggests<br />

the vendor’s North American<br />

footprint is going to widen pretty steadily over<br />

the recession.<br />

Fat cash<br />

Meanwhile, rival ZTE has lined up a hefty<br />

war chest—a $15 billion line of credit from the<br />

China Development Bank—most likely to be<br />

held out to cash-strapped foreign telcos in the<br />

form of vendor financing.<br />

Once it was fashionable for big foreign vendors<br />

to do the same thing—they accumulated<br />

an estimated $26 billion in loans to carriers on<br />

their books by 2000. Then the bubble burst.<br />

ZTE won’t have that problem. One more reason<br />

for thinking that its time has come. <br />

Robert Clark is a Beijing-based technology journalist.<br />

rclark_a_electricspeech.com<br />

42 Computerworld Hong Kong April 2009 www.cw.com.hk


Hong Kong’s most prestigious IT Awards<br />

Computerworld Hong Kong<br />

Awards 2009<br />

www.cw.com.hk<br />

Vote the winners of Hong Kong’s premier IT competition…<br />

and win a Netbook!

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!