On Technology

Thursday, October 26, 2006

Apple's new MacBook Pros now feature Intel's Core 2 Duo processors

Apple Computer released three speedier versions of its MacBook Pro notebooks today, each with an Intel Core 2 Duo processor sitting squarely in the driver's seat. The Core 2 Duo processors give the notebooks a performance boost that Apple says is 39 percent better than previous models, supposedly putting them right on par with the fastest Windows-based PCs.
The new MacBook Pros also come with twice the standard RAM of their predecessors -- ranging from 1 GB to 2 GB, depending on the model. And, buyers who use Apple's build-to-order option can increase the RAM all the way up to 3 GB.
The notebooks also have larger hard drives (up to 200 GB) and a FireWire 800 port for shuttling high-end graphics, music files, and video content. Two of the new models sport 15-inch screens, while the third features a roomy 17-inch display.

Good Timing
Apple's release of the new MacBook Pro line comes at a time when there is a great opportunity for Apple among business users. Apple has a chance to penetrate the business market because of a convergence of events. First, the general move to 64-bit platforms in corporate settings, and second, the impending release of Windows Vista. As a result, companies that would never have considered Macs might do so in the future because they'll have to review -- and possibly deploy -- new platforms and operating systems anyway.

Broader Appeal
By using Intel processors, Macs should now be able to run Windows software that was originally developed for standard x86 PCs. As a result, interest in Apple -- or at least the potential for widely using the Macintosh as a business machine -- is on the rise, and not just in the usual departments of graphics and media production.
I think it would be difficult to find people who are dismissing the Macintosh completely anymore. There is a big difference between "considering" and "buying, I believes that if Apple takes advantage of this perfect storm of events -- for instance, by licensing its operating system to Dell -- then its bottom line might get a boost by something other than iPod sales.
The decision to shift from Power PC to Intel, is probably the most important decision in the history of the Macintosh family.

Microsoft has delayed RTM Release for Vista

The Internet is abuzz with reports that Microsoft Vista will miss an important deadline, possibly making the operating system slip its launch schedule.
The October 25 date for Vista's release to manufacturing -- or RTM -- has been reset by Microsoft to November 8.
Jim Allchin, copresident of Microsoft's Platforms and Services Division had admitted, the company wouldn't make its planned RTM date, but did not say whether the final release date would be affected.
As there is no direct relation Microsoft could afford to postpone the RTM date to the second week of November and still meet its January launch schedule for consumer editions of Windows Vista.

Could Firefox 2.0 Overtake Internet Explorer 7?

On Tuesday, the Mozilla Foundation has released the final version of Firefox 2.0, the latest iteration of the open-source browser that has been nipping steadily at the heels of Microsoft's Internet Explorer. The new Firefox version comes less than a week after Microsoft released the long-awaited version 7 of Internet Explorer.
And don't forget Opera, which, according to some, has more features and renders Web pages much more quickly than other browsers. Version 9 of Opera was released in July, in a prelude to this week's prize fight between Microsoft and Mozilla.
But if the browser battles are back in full swing, which one is winning the war?
According to analytics firm OneStat, Microsoft owns a crushing 86 percent of the global market and Firefox has just over 11 percent. Opera weighs in with less than 1 percent.
But data from companies such as Net Applications, which keeps tabs on the browser market, shows that Firefox has been adding market share for months.

Not To Be Out-Done
Internet Explorer 7 "puts Microsoft back into the features game. Some of the cool new features of IE7 include tabbed browsing, built-in anti-phishing protection, a new print-preview feature that lets you fit a Web page onto a single sheet of paper, and one-click erasure of your browsing history.
Not to be outdone, the new version of Firefox has tabbed browsing, enhanced security , and the ability to auto-suggest search terms. Firefox 2.0 also maintains the features from prior versions that made it a favorite with Internet aficionados. Some of the top features include extensions, or add-on programs, that let you do everything from synchronizing bookmarks to viewing weather reports.
Opera, which has the smallest market share, might actually have the largest feature set. Like its competitors, Version 9 includes a tabbed interface. In addition, Opera also offers a transfer manager for large downloads, a customizable content blocker for keeping ads and pop-ups in check, and a "mouse gestures" feature to give the mouse a little more power.
Opera 9 also provides voice control, skins, built-in support for BitTorrent, and a kiosk mode. And, it offers integrated one-click widget downloads.

It's a Good Thing
Competition in the browser space is always a good thing. Microsoft let five years pass before releasing a new browser, because the company followed what the market told it to do, And in this case, the market was not telling Microsoft it needed a better browser. But the entrance of Firefox a couple years ago changed that, forcing Redmond to up the ante in browser features and give consumers more options. Microsoft still has an edge in the corporate sphere. Even though other browsers cost nothing to d0ownload, the cost of fielding support calls on large-scale deployments could make Firefox, Opera, and other minor browsers too much of a hassle for corporate I.T. departments.
So now that Microsoft, Mozilla, and Opera have unleashed the dogs of war, all that remains to be seen is which browser takes the biggest bite.

Wednesday, October 25, 2006

Mozilla released Firefox 2 - game is getting interesting

Mozilla on Tuesday released Firefox 2, marking a significant update to the open-source Web browser that has gained a large following in the two years since its introduction and, in some ways at least, has set the standard for next-generation Web access.
Mozilla developers have made across-the-board improvements to the Firefox interface and to the browser's built-in security systems.
Mozilla also tweaked the tabbed-browsing features to provide better navigation among sites opened in a single window, and a restore feature to recall previously-open windows when initiating a new surfing session.
By default, Firefox 2 will now open links in new tabs instead of new windows.

Integrated search capabilities in Firefox 2 now include a suggestions feature to update lists of search terms as you enter text into the search bars for Google, Yahoo, or Answers.com.
For handling RSS feeds, the browser now provides a preview of the information being offered with the option to subscribe to a feed as a Live Bookmark.
As for online safeguards, built-in phishing protection is active by default in Firefox 2, with a local blacklist updated hourly.
You can let Firefox check the validity of Web sites or set the browser to use a third-party antiphishing service, such as Google, prior to visiting any site.
The browser will issue warnings and guidance when it detects a suspicious Web site.

The whole package has been upgraded, but the things that differentiated Firefox from the competition, such as tabbed browsing, RSS feeds, and better security features, are now being adopted by others Microsoft, in particular, with the launch of its next-generation browser, Internet Explorer 7, has made great strides in these areas.
In taking a page or two of strategy from Mozilla, Micrsoft has acknowledged that it has to evolve to maintain a browser market share that sits at about 86 percent but has lost some ground to Firefox, which has roughly 12 percent of the market, according to OneStat.
It will be interesting to see if Firefox can hold on to its audience, or if Microsoft can get more people to return to Internet Explorer. One advantage for Microsoft, is that Internet Explorer 7 will be added to the next Microsoft automatic-update cycle, whereas Firefox 2 requires a visit to the Mozilla site to download.
Firefox 2 is available for Windows, Linux, and Mac OS X. Users are reminded that installing the new browser will overwrite earlier versions of Firefox, although bookmarks and browsing history will be retained.

Integrating Visio 2007 and Project 2007

Microsoft Office Project 2007 and Microsoft Office Visio 2007 provide integration capabilities that previous versions did not provide. You can take advantage of these capabilities by using a combination of native features and COM add-in features.

The Visio Enterprise Project Management (EPM) solution uses standard Visio diagramming features, such as groups and connectors, together with new Visio 2007 functionality, such as AutoConnect.
The Visio EPM solution also provides the following tool-specific shapes to use for
creating a process flow diagram or a Work Breakdown Structure (WBS) diagram:
Project Group. Represents the highest-level shape, which encompasses multiple projects
Project. Represents all phases, tasks, and milestones within a project
Phase. Includes all tasks and milestones, such as a summary task in Project
Task. Represents an individual work item; used when you create a process flow diagram
Milestone. Signifies the completion of a major task or project event
WBS Task. Represents an individual work item; used when you create a WBS diagram
Task Connector. Enables you to represent the critical path in process flow diagrams or to create predecessor relationships and successor relationships in WBS diagrams

Here are few examples what we can do with this:

All of these can be generated on the fly as you run the project in microsoft project. I see it as great advantage - it helps presentation of the project to your boss like breeze

For detail please visit this msdn article, you will be glade you did:
http://msdn2.microsoft.com/en-us/library/aa827350.aspx

How about custom Search Personalized to your taste

Google Inc. is ready to let Web publishers and bloggers create custom searches on their sites, in a move that could make searches more relevant to consumers and allow the company to charge more for advertising, Google said late on Monday.
The Internet search leader said the new Google Custom Search Engine relies on the same underlying database of Web sites to allow companies or individual users to set up personalized online searches -- on topics ranging from global climate change to gossip on pop stars.

The Google Custom Search Engine is the company's biggest push yet to rely on "the wisdom of crowds," where rival Yahoo Inc. and start-ups such as Rollyo.com and Eurekster.com have focused for several years.

It is basically applying human judgment by saying I can make search better by allowing people to decide

Google is moving beyond the formula-driven, one-size-fits all way it indexes the Web to a relativistic approach for finding sites. The move also points toward a balkanization of what different groups of people see on the World Wide Web.

Details can be found at http://www.google.com/coop/cse/. It is set to be available on international sites in a few weeks

Monday, October 23, 2006

Microsoft announces Virtual Hard Disk (VHD)

lokohMicrosoft is pushing further into virtualization, announcing that its Virtual Hard Disk (VHD) Image Format specification is now free to developers working on related technologies.
The release was made under Microsoft's Open Specification Promise (OSP), a license that the software giant introduced in September for an array of Web services in an effort to improve software interoperability.
The VHD file format is a primary component of Microsoft Virtual Server, Virtual PC, and Windows Server virtualization. It is designed to store a virtual operating system and its applications in a single file, making the virtualized servers easier to manage.

Embracing Virtualization
Virtualization is widely recognized as a way companies can slash I.T. infrastructure costs. By using the technology, businesses can replace larger, mostly unused servers with smaller, more efficient machines that run multiple operating systems.
The technology has increasingly become mainstream. A survey conducted earlier this year by Forrester found that, of 1,221 businesses with more than 1,000 employees, some 41 percent already had implemented or were planning to implement virtualization software.
Analysts have said it is only a matter of time before virtualization capabilities are commoditized, as chipmakers, including Intel and AMD , provide additional support for the technology at the motherboard level. This trend might mean that the battle for the virtualization market could shift entirely to software tools that help manage virtual environments and organize the systems to use the hardware more efficiently.
With the VHD format now a freely available specification, Microsoft hopes to establish common ground among all commercial and open-source software products.

Collaboration Is Key
Microsoft made a similar move in April, announcing that its Virtual Server 2005 R2 product would provide support for Linux and be available as a free download. With Virtual Server, organizations can run up to four virtual operating systems on one physical system.

I think Microsoft has recognized the growing influence of Linux in virtualization, with offerings from VMware and XenSource, and needs some level of support for platforms other than Windows, There is a higher risk for Microsoft if they don't collaborate with the Linux community. Still, such support is indeed virtual in nature and that it will take years for Microsoft to develop strong ties with software developers working on non-Windows technology.
With virtualization, commodity is the name of the game, as businesses continue to define what the new technology means. It's very popular among enterprises because they can save money through consolidation and disaster recovery.

IE7 & Security flow - the saga continues

Less than a day after releasing its latest browser update, Internet Explorer 7, Microsoft was hit with reports that the new software had a vulnerability that was present in the last version, Internet Explorer 6, and had gone unpatched.
In response, Microsoft has called the reports technically inaccurate, and noted the flaw is not in Internet Explorer 7, but in a different component of Windows.
The vulnerability report came from security firm Secunia, which had run standard tests on the browser as soon as it was made available. The firm's chief technology officer, Thomas Kristensen, noted that he was surprised the flaw had not been fixed for IE 7.
Secunia rated the vulnerability "less critical" because attackers cannot gain remote control over a system by exploiting the flaw. But Secunia also said that the bug does put users at risk because it can be used to launch phishing attacks or spy on a user's actions.

Strong Response
The reply to Secunia's claims appeared on the Microsoft Security Response Center blog, posted by Christopher Budd, a security program manager at Microsoft.
The issue in question is not in Internet Explorer 7, or even a previous version of the browser, Budd wrote, but instead in a component of Outlook Express. "While these reports use Internet Explorer as the vector, the vulnerability itself is in Outlook Express," he noted.
Budd stated that Microsoft is aware that the issue has been publicly disclosed, but has not had any reports of the vulnerability being used in attacks against computers.
Microsoft has the matter under investigation, Budd went on to say, and the company plans to take appropriate action once it has done more research.

On the Other Hand
In response to Microsoft's reply, Secunia noted that, while it might be true that the vulnerability is an Outlook Express issue, it is still fully exploitable through Internet Explorer 7, which would be the primary attack method for malicious hackers.
"Just because a vulnerability stems from an underlying component does not relieve IE or any other piece of software from responsibility when it provides a clear direct vector to the vulnerable component," Kristensen said.
According to Kristensen, Microsoft has had a policy of tagging various vulnerabilities, where Internet Explorer is the primary attack vector, as operating system vulnerabilities. He said he believes this policy leads to confusion and might cause users and system administrators to view the issues as insignificant.
"Hiding behind an explanation that certain vulnerabilities, which only are exploitable through Internet Explorer, are to blame on Outlook Express, Microsoft Windows, or other core Microsoft Windows components seems more like a way to promote security of IE rather than standing up and explaining to users where the true risk is and taking responsibility for the vulnerabilities and risks in IE," said Kristensen.

Tuesday, October 17, 2006

Intel Announces Launch for Quad-Core Chips

The world's largest chip maker Intel said it plans to launch its quad-core chips in a new line of Hewlett-Packard computers beginning in November.
The launch date, just in time for the upcoming holiday season, means the quad-core processors will be available to consumers before rival Advanced Micro Devices can get its own quad-cores out the door. AMD plans to release a quad-core processor in mid-2007.
According to an invitation sent to the media, HP and Intel will host "Quad Fest" on November 13 to coincide with the product lunch. The idea behind the event is to share information about "the business behind quad-core technology."
Quad-core chips have been highly anticipated because of their ability to provide more processing power and handle more tasks simultaneously while not increasing power consumption or heat. The new microprocessors will have four computing engines on a single chip.

Peak performance
According to Intel, PC performance will increase some 70 percent for some applications, with the new chips being aimed at gamers, programmers, and other people with heavy-duty computing needs. For general consumers, Intel will ship a quad-core chip starting in the first quarter of 2007. For businesses, Intel will begin shipping four-core server chips later this year.
Joe Wilcox, a senior analyst with Jupiter Research, said the quad-core will definitely appeal to a certain segment of users, but he questioned how much hunger there would be among casual consumers. "There is always a question of how much performance you really need," Wilcox said. "If you are running XP, it is much more than you need."
But he pointed out that gamers and multimedia enthusiasts will be lining up for machines built with the quad-core chips. "For mutlimedia users and gamers, the more power the better," he said.
Recently, Intel's chief rival AMD claimed that its own design for quad-core processors would be superior to Intel's. However, it remains to be seen if the architecture of the processors will result in a significant difference, said Wilcox.

Friday, October 13, 2006

Data Deduplication: Backup only the byte-level changes

I was looking at the backup policy for our organization and thought let me check what is new and i found this, something called "Data Deduplication". Interesting......

Data deduplication, data reduction, commonality factoring, capacity optimized storage -- whatever you call it -- is a process designed to make network backups to disk faster and more economical.
The idea is to eliminate large amounts of redundant data that can chew up disk space. Proponents also say it enables you to make more data available online longer in the same amount of disk.
In deduplication, as data is backed up to a disk-based virtual tape library (VTL) appliance, a catalog of the data is built. This catalog or repository indexes individual bits of data in a file or block of information, assigns a metadata reference to it that is used to rebuild the file if it needs to be recovered and stores it on disk. The catalog also is used on subsequent backups to identify which data elements are unique. Nonunique data elements are not backed up; unique ones are committed to disk.
For instance, a 20-slide PowerPoint file is initially backed up. The user then changes a single slide in the files, saves the file and e-mails it to 10 counterparts. When a traditional backup occurs, the entire PowerPoint file and its 10 e-mailed copies are backed up. In deduplication, after the PowerPoint file is modified, only the unique elements of data -- the single changed slide -- is backed up, requiring significantly less disk capacity.
"The data-reduction numbers are great," says Randy Kerns, an independent storage analyst. "Most vendors are quoting a 20-to-1 capacity reduction by only storing uniquely changed data."
Data deduplication uses a couple of methods to identify unique information. Some vendors use a cryptographic algorithm called hashing to tell whether data is unique. The algorithm is applied to the data and compared with previously calculated hashes. Other vendors, such as Diligent, use a pattern-matching and differencing algorithm that identifies duplicate data. Diligent says this method is more efficient, because it is less CPU- and memory-intensive.

Dedupe Differentiation
Data deduplication differs from compression in that compression looks only for repeating patterns of information and reduces them. Brad O'Neill, senior analyst with the Taneja Group, offers this example: The pattern of data '123412341234123412341234' would be compressed to '6 1234' or 6x1234 -- a fivefold compression of 24 digits. Data duplication would result in reducing the unique data initially to four digits -- 1234 -- and subsequent backups would recognize that no additional unique data was being transmitted, so it would not be backed up. Deduplication also differs from incremental backups in that only the byte-level changes are backed up. In incremental backups, entire files or blocks of information are backed up when they change. For instance, in a file, a user changes the single word 'Bob' to 'Steve' and saves the file. When the system backs up this data incrementally, rather than just backing up the unique data -- 'Steve' -- it backs up the entire file. Data-deduplication technology would recognize that 'Steve' is the only unique element of the file and thus back it up solely.
The size of the catalog and cache are also important in differentiating deduplication products.
"The efficiency of deduplication technology all comes down to how the index is architected and how large it is," O'Neill says. "For instance, Diligent spends a lot of time talking about the speed and size of its index -- that it's small and resides completely in RAM."
Data deduplication takes place by two methods -- either in-line or postprocessing. With in-line processing, data is deduplicated as it is backed up; in postprocessing, data is deduplicated after it is backed up.
Analysts say there is not much of a difference in the outcome between using either method.
"The in-line vendors make claims about performance and scalability; the postprocessing vendors are generally making the same claims," O'Neill says. "From everything I see, it comes down to the particular workload profile of the user. One of the disadvantages of postprocessing is it can potentially extend the time it takes to backup the data."
ADIC, Asigra, Avamar, Data Domain, Diligent, Falconstor and Microsoft all use in-line processing; Copan and Sepaton use postprocessing.

Tuesday, October 10, 2006

Cisco Warns of Remote Workers

Most remote workers claim to be aware of security issues, but routinely engage in dangerous activities such as sharing work computers with non-employees, opening unknown e-mails and hijacking neighbors' wireless networks.
According to a global third-party study of more than 1,000 teleworkers in 10 countries commissioned by Cisco Systems, remote workers aggravate network security concerns because of a false sense of awareness.
While two in every three teleworkers surveyed said they are "cognizant" of security concerns when working remotely, many admitted to behavior that undermines and contradicts that awareness.
More than one in five remote workers allows friends, family members or other non-employees to use a work computer to access the Internet.

One in four remote workers surveyed opens unknown e-mails when using work devices. In China more than half of the respondents admitted to opening e-mails from unknown sources.
"Hijacking wireless networks or sharing corporate devices with non-employees is a significant risk for the global I.T. community," said Jeff Platon, vice president of security solutions marketing at Cisco.
"To highlight the U.S. example, the unsafe behavior of 11 remote workers in a company of 100 can bring down a network or compromise corporate information and personal identities.
"It only takes one security breach. For large enterprises with tens of thousands of workers, especially those with global workforces and differing business cultures, the potential risk is even more challenging."

Is Microsoft is wrong on Vista security

I have found this on cnet news.com. thought you may be interested in it.

For decades, and in every Windows operating system prior to Vista, Microsoft has relied on the contributions of third-party security vendors to help keep the user safe.
These products protected both consumers and corporate users from the ravages of malware such as viruses, spyware, trojans, worms and, most recently, rootkits.
These security products from independent software vendors even help keep people's computers safe from Microsoft's own critical software bugs, which notably have been on the increase in recent years.
Regrettably, Microsoft's own "buffer overflows" and "Internet Explorer exploits" have now become commonplace in today's lexicon. But again, the security products from the likes of McAfee, Symantec, Check Point Software Technologies, et al, have thankfully been available for people to choose in order to keep their computing experience safe.

This cooperative and relatively safe computing experience is about to change in Vista.

I think it is good to think it through if it is good / bad or otherwise.

For full article you may visit:
http://news.com.com/Why+Microsoft+is+wrong+on+Vista+security/2010-7349_3-6123924.html?tag=nefd.pulse

Wednesday, October 04, 2006

Wibree - the Bluetooth Alternative from Nokia

Nokia today took the wraps off of Wibree, a new short-range wireless system that acts like Bluetooth but promises to go well beyond mobile phones and PC peripherals to find its way into smart watches, remote control toys, and even sensors for sports equipment.
The new radio technology was developed by the Nokia Research Center as an initiative designed to enhance connectivity for small-scale devices.

Because Wibree consumes a fraction of the power of Bluetooth and other wireless systems, said Jani Tierala, business development manager for the research center, it could bring about a new wave of smaller and less expensive smart hardware.

Wibree is the first wireless technology to solve the following needs in a single solution.

* Ultra low peak, average & idle mode power consumption
* Ultra low cost & small size for accessories & human interface devices (HID)
* Minimal cost & size addition to mobile phones & PCs
* Global, intuitive & secure multi-vendor interoperability

One or Both
Wibree can be used as a stand-alone wireless chip for specialized products such as watches, or as a Bluetooth-Wibree dual-purpose chip for multipurpose communications links. Wibree has the same range (about 30 feet) and data transmission rate (1 Mbps) as Bluetooth, and uses the same radio frequency.

The primary difference from Bluetooth is that Wibree is optimized for smaller devices that consume very little power, said Tierala. "It uses power based on the size of the data packet being sent, whereas Bluetooth uses only a fixed packet size," said Tierala.

The new technology is not meant to handle data-intensive applications such as voice communications or digital music and video, which are best left to Bluetooth, he added.

Tierala envisions Wibree sensors that could provide feedback on the heart rate, blood pressure, or distance covered by a runner. In addition, Tierala said, Wibree could be used for interactive toys as well as new wireless keyboards and mice.

Open Approach
The world's leading mobile phone manufacturer is planning to release the technical specs for Wibree to chip manufacturers, device makers, and standards groups in an effort to get a movement up and running quickly. "We are creating a Wibree ecosystem, with a number of organizations working on the specification," said Tierala.

Broadcom, Epson, and Nordic Semiconductor will create Wibree chips. Meanwhile, Suunto and Taiyo Yuden will be working on interoperability specifications for the new technology.

The final specs of Wibree are expected during second quarter of 2007, Tierala said, with the commercial release of Wibree chips to follow shortly thereafter.

Wibree radio specification
Wibree radio specification enables dual-mode implementations to reuse Bluetooth RF part but also to guarantee ultra low power consumption for devices with embedded stand-alone implementation of the Wibree specification. Wibree operates in 2.4 GHz ISM band with physical layer bit rate of 1 Mbps and provides link distance of 5-10 meters.

Wibree link layer specification
Wibree link layer provides ultra low power idle mode operation, simple device discovery and reliable point-to-multipoint data transfer with advanced power-save and encryption functionalities. The link layer provides means to schedule Wibree traffic in between Bluetooth transmissions.

Wibree host & profile specifications
In the first phase Wibree provides sensor, HID and watch user interface profiles.

Windows Vista Security

Major security firms McAfee and Symantec have gone on the attack against Microsoft, accusing the software behemoth of changing security in the forthcoming Windows Vista operating system to lock them out.
The security tweak in question is limiting access to the system's kernel, which security vendors have been able to access in the past, and which is necessary for making third-party security software work effectively.
The security firms contend that Microsoft has made the changes to promote its own line of recently developed security products.
In a full-page ad in the Financial Times, McAfee ran an open letter to Microsoft, noting that the company "seems to envision a world in which one giant company not only controls the systems that drive most computers around the world but also the security that protects those computers from viruses and other online threats."
Security Gripes
Criticism over kernel access in Vista surfaced earlier when Symantec complained to the European Union about the issue. That complaint could lead to a shipping delay in Europe as antitrust charges are investigated.
Although it is likely that the U.S. version of Windows Vista will ship on time, Microsoft could face formal complaints here on its home turf.
"There's some legitimacy around Microsoft's argument that limiting kernel access will keep the bad guys out," said Jupiter Research analyst Joe Wilcox. "But it's clear that their competitors, which were formerly partners, don't necessarily buy that argument."
Microsoft has noted that it will play fair when it comes to competition, Wilcox said, pointing out that, given the company's anticompetitive behavior in the past, Microsoft's moves will be closely watched.
Limited Effect
Although the furor over kernel access could go on for some time as Vista rolls out, the issue will have limited impact on those who actually use the system, Wilcox noted.
"Under the current architecture, you wouldn't be able to use McAfee or Symantec products with the 64-bit version of Vista," he said. "But adoption of that version won't be very big. Most people will use 32-bit."
There has been a 64-bit version of Windows XP out for some time, he pointed out, and adoption is minimal, because users of that system face issues surrounding driver support and applications.
"The kernel issue is a complicated one, and both sides are telling their stories in believable ways," Wilcox said. "But, ultimately, it won't have a huge effect on most users."