AutoPilot 2000 on my new Dual Pentium 933: Results.
Here are some first results of AutoPilot 2000 on a Dual 933 with W2K
Professional SP1 installed. First I ran the APBench a few times to get
a baseline established. Funny thing was that the second run was way
faster than the first, but this was probably a fluke as when I went
on the results were pretty close in runs 2 thru 5. Next I installed
AP for W2K. (This is a Dell Dual Optiplex PIII, 256MB ECC RAM, 40Gig
EIDE drive, and a TNT2 video card that is hooked op with a cross-
over cable to my 2 year old Dell Dimension with 256RAM, a 15Gig SCSI
drive and single PII 450.)
The Transactions per Second were:
Run 1 w/o AP: 58
Run 2 w/o AP: 193
Run 3 w/o AP: 150
Run 4 w/o AP: 203
Run 5 w/o AP: 190
That's an average of 184 TPS for runs 2-5. Next I ran three times
The APBench tool in the 'First Without And Then With AutoPilot' mode.
The results were:
W/O: 196 With: 232
W/O: 191 With: 223
W/O: 183 With: 226
Avg: 190 Avg: 227 -> 16% to 18% improvement. Not bad!
Hardware manufacturers love improvements like these. But testing AP
with benchmarks is a problem as they are usually created to measure
hardware performance, or the performance of a single application.
AutoPilot is so unique in what it does, that there are very few
benchmarks that actually show its results. The best is to run it in
your own environment with a full load of apps on your WS or Server
and run something you know already takes x-time. That?s the best way
to see if AP will benefit that machine. Both APBench and the 30-day
AP trial are here for download:
Are Users With Write-Access Filling Your Servers With Junk?
With access to lots of disk space, (and the new NAS and SAN storage
technologies are not making it easier) employees with write-access
to server folders are filling them with more and more junk. Users
can plug pretty much anything they like on your servers. I recently
found one of our own Sunbelt employees with a full application to
monitor the weather on his server share: 70MB worth of weather
All that stuff they plug in their home directories could be in the
form of an email attachment, files created by the user, but mainly
they are Internet downloads. Usually bandwidth is not a problem, so
employees don't think twice about loading 50 megabytes of MP3 files
that take 2 minutes to put on the server. It can result in a mess:
You can either "throw more disks at the problem," or try to manage
it with software that can automatically manage this data. You can't
manage what you can't measure. Take a look at what's on your severs,
using sophisticated reporting tools and scheduled reports. Do an
initial audit, find outdated files, duplicate, orphan files or MP3.
Most users don't have a business need to put music files or graphic
files on company server. Sometimes there are pornography or racial
jokes there that could get your company sued.
- Duplicate files
- fat MP3 and GIF/JPG files
- outdated files, not accessed in 9 months or more
- orphaned files, user is no longer with the company
- large files, such as desktop backups.
Educating end users comes next, and it begins with showing them a
list of their outdated files. "You tell them, 'Here's what you haven't looked at in one year, and here are your duplicate files. If you don't think you will need to access them, we'll clean it up and
free up space on the server.' Having the audit alleviates you from
being called the 'net-nazi' or the 'disk-police'. It allows the
user to manage the situation.
The audits also identify who uses the most storage, or which server
is most heavily used. Then, software allows you to control the space
hogs. The software offers real-time quota enforcement, giving the
user five warnings, such as "You are at 70% of your space limit."
You will find that it will save you a lot of time and headaches to
install and run software that audits and controls storage on your
servers. Our Fortune 100 customers get back at least 30% of space
wasted by obsolete, non-business related data. 30-day trial:
Anti-Virus Software Does Not Offer Enough Email Protection
E-mail may be the really 'mission critical app' for your company (it
is for us at Sunbelt) -- but it's also the perfect way for someone to
cripple your corporate e-mail system -- whenever they feel like it.
Anti-virus software alone is not enough to safeguard organizations
against the present and future onslaught of email viruses and attacks.
This IS the holiday season: the ideal time for attacks as there are
less people that manage IT than normal. Be alert, especially now.
Anti-virus vendors simply cannot update their signatures in time
against some deadly viruses that are distributed worldwide via email
in a matter of hours, such as the recent LoveLetter virus and its
variants. This means that if you use a virus-scanning engine alone
you are not necessarily safeguarded when a new virus comes out in
These kinds of tools work reactively, letting all emails in and then
trying to disable a virus. At this point, it may already be too late:
once a virus has entered the system, it takes one quick click for an
unwitting user to activate it and infect everybody in the company.
You can also outsource the whole thing, and make it some one else's
headache to make sure your email is clean. These services prevent
errant e-mail messages from damaging your network, reputation, or
business relationships. They protect your network against viruses,
spam, offensive or inappropriate content, and oversized attachments
that clog e-mail networks and distract -- or offend -- employees.
Outsourced services scan both incoming and outgoing messages for words, phrases, images, and attachments that violate your e-mail policy, according to lexical weighting and keyword detection assigned by your e-mail administrator. The entire process takes less than five seconds and remains completely transparent to both sender and recipient.
They can automatically send a notification, based on preferences set
forth by yourself, to the sender, recipient and administrator that a
message has been blocked. Via an easy-to-use Web interface, you can
then clean, release, or delete quarantined messages, detain large
messages for delivery during non-peak periods, track message volume,
and generate real-time and historical reports. Based on industry
standard protocols like SMTP and MIME, these services integrate with
new products and services without super-human efforts by e-mail
administrators or end users.
You should make the choice between two options. Run it in-house or
outsource the whole thing. I have some info for you, so that you can
make that determination. First, there is a new whitepaper about this
that you should read. It explains in a nutshell what kind of email
attacks exist including email Trojans, buffer overflows and HTML
viruses. Then the paper demonstrates how anti-virus software offers
no protection at all against such attacks, which are often highly
harmful one-off attacks secretly targeted at a specific organization.
The white paper sits on the Mail Essentials page, in the section
White Papers, Documents and other files, the third one down.
The other option is outsourcing the process. A good example is
MailWatch. This service protects against viruses, spam, offensive
content and proprietary information. I think they are the biggest
in this industry, and filter millions of messages per day for big
outfits like Ford Motor and Mercedez-Benz. There is a PDF you
can download from this page and read about how it all works.