SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : Ascend Communications (ASND) -- Ignore unavailable to you. Want to Upgrade?


To: djane who wrote (47489)5/25/1998 4:01:00 PM
From: djane  Respond to of 61433
 
2 thestreet.com articles. Internet Catching Fire in Europe

thestreet.com
thestreet.com

By Ned Stafford
Special to TheStreet.com
5/25/98 12:15 AM ET

FRANKFURT -- It hasn't yet become an epidemic, but
Internet fever is spreading across Europe.

"Growth is much faster than we expected," says Carsten Hejndorf, research manager for International Data Corp.'s European Internet Program in Copenhagen. "The Internet in Europe has reached critical mass, and we now have a snowball effect."

IDC, an IT market research and consulting firm based in
Framingham, Mass., in December estimated Western
European (the EU plus Switzerland and Norway)
Internet users at 21.2 million people, and expected a total
of 27.5 million by the end of 1998. But the unexpected
surge means IDC will have to raise Internet growth
forecasts.

Hejndorf expects an ongoing survey, due out in August, to
show growth at least 25% higher than December's
forecast. IDC's forecast of 59 million European Internet
users by the end of 2001 also will likely be revised up, he
says.


The EU is highly developed, wealthy and huge, with a
population of 373 million compared with 270 million
Americans. Furthermore, EU gross domestic product in
1997 was $7.52 trillion, larger than U.S. GDP of $6.66
trillion.

You don't need to be a rocket scientist -- or, for that
matter, a 27-year-old computer nerd in T-shirt ruling a
multimillion-dollar Internet startup -- to figure out the virtual
reality of the EU numbers.

U.S. companies want a piece of European growth.

"Our view is that there is tremendous growth potential in
Europe," says Fabiola Arredondo, managing director for
Yahoo! Europe in London. "We are growing very, very
rapidly."

Yahoo!, which already operates in the U.K. and Ireland,
Germany, France, Sweden, Norway and Denmark,
added local-language content in Italy in April.

Could the EU numbers -- and potential riches -- be why
U.S. titans such as Microsoft's (MSFT:Nasdaq) Bill
Gates have toured Europe urging increased efforts to
promote information technology? Nah. Bill probably just
likes the pie in Brussels.

Joe Sawyer, analyst for Forrester Research's recently
opened European New Media Strategies office in
Amsterdam, sees Internet revenue in Western Europe
growing from $1.2 billion this year to $64.4 billion by 2001.
Calling the 2001 forecast conservative, he said $56.7
billion will be from business trade, $4.6 billion from
consumer retail, and $3.1 billion from content.

Though impressive numbers, they still lag the U.S.
Cambridge, Mass.-based Forrester expects the U.S. to
reach $206.8 billion in Internet revenue in 2001.

Most observers agree Europe also lags the U.S. in
information technology, with one measure being computer
penetration. About one in four Western European
households has a PC, compared with around 42%-45% in
the U.S. And the North-South gap in Europe is huge. PC
leader Denmark had 50.3 PCs per 100 people, while last
place Greece had only 5.7.

The Scandinavian nations are generally the most
advanced in Europe in IT and have the most Internet users
as percentage of population. The Netherlands comes
next, with the U.K. and Germany in the middle of the EU
technological/Internet spectrum. France and then the
southern EU nations are at the bottom.

But European PC sales are surging, and many analysts
link the strong demand to Internet fever. First-quarter
factory PC shipments to Western Europe were up 19%
from a year ago, following a 20% gain in the fourth quarter,
according to Ian Darbyshire, manager of IDC's quarterly
Europe, Middle East and Africa PC Tracker Program.
There are indications that second-quarter growth is
continuing strong with the arrival of the sub-$1,000 PC in
Europe.

That's not the only thing expected to smooth the way.
Most expect the EU single currency -- the euro -- to give
European Internet growth and e-commerce a boost. The
euro will make trading across borders simpler, and force
down prices for goods and services through increased
price transparency and competition.

Keith Woolcock, technology analyst at Merrill Lynch in
London, agrees. And he said the euro also will make it
easier for American Internet-related companies to expand
in Europe.

"They are going to come in and mop up," he says.

Jochen Kubosch, spokesman for the EU's top
telecommunications official, says the EU has laid the
political groundwork to foster Internet growth in Europe,
noting the EU's decision to deregulate
telecommunications at the start of the year.


There are hurdles, still. The high local telephone fees are
the biggest factor keeping European Internet usage from
becoming a full-blown epidemic, most analysts say.

"The cost of local calls is a huge, huge factor inhibiting
Internet growth in Europe. It is something that is keeping
the masses from jumping on board," says Nick Gibson,
an analyst at the investment bank Durlacher in London.

In Europe, the charge for local calls is not a flat monthly
fee for unlimited usage, but is based on the amount of
time spoken, or cruising the Web. (See related story.)

Ingo Reese, Hamburg-based spokesman for AOL
Bertelsmann Online, a joint venture of America Online
(AOL:NYSE) and the German media giant Bertelsmann
AG, says German subscribers averaged only about seven
hours online a month.

But nobody expects telephone companies to slash prices
and give up such a huge source of revenue anytime soon.
Alternatives for cheaper Internet access are being studied
-- such as cable TV modems, existing electrical lines and
radio transmissions -- but are at least a year away.

Ned Stafford, a veteran journalist living in Germany, has
worked for wire services including Bridge.

________________________________________________________________



Across the Street: Care to Surf the
Web in Europe? Check Your Bank
Account First

By Ned Stafford
Special to TheStreet.com
5/25/98 12:15 AM ET

FRANKFURT -- Serious cybersurfers in Europe must dig
deep to support their habit. The Internet here does not
come cheap.

The biggest ISP in Germany is Deutsche Telekom
Online (T-Online), which has 2.1 million subscribers and
is owned by the main telephone company, Deutsche
Telekom (DT:NYSE ADR). T-Online charges a flat $4.50
(8 German marks) a month, plus $1.70 (3 marks) for each
hour of Internet use. So if you surf 10 hours a week, your
monthly bill (40 hours) would be $72.50. That's right,
$72.50.

But wait. You're not finished paying yet. Deutsche
Telekom also wants a cut. In Europe, local telephone
calls -- even from your computer to your ISP -- are
expensive. Weekday local calls from 9 a.m. to 6 p.m.
cost $2.70 per hour, from 6 to 9 p.m. and 5 to 9 a.m.
$1.62 per hour, and from 9 p.m. to 5 a.m. $1.00 per hour.
On weekends you pay $1.62 per hour from 5 a.m. to 9
p.m. and $1.00 per hour after 9 p.m.

If you're a night owl, only prowling the Web after 9 p.m.,
your 40 hours of local calling time will cost $40, for a total
monthly Internet bill of $112.50. But say you go online
only during the day during the week, your 40 hours local
phone time will cost you $108, for a total monthly Internet
bill of $180.50. Ouch.

Deutsche Telekom does allow customers to buy up to 20
hours of local calling time in advance each month, with a
50% savings on daytime rates and 16% on evening rates.
But even if you were smart enough to buy the maximum
20 hours for your daytime calls, your 40-hour Internet bill
would only fall to $153.50 from $180.50.

Maybe it's time to shop around for another ISP. How
about AOL Bertelsmann in Germany? The flat monthly
fee of $5.50 (9.90 marks) gives you two free hours of
online time. Wow. This is looking good. But wait a
second. What's this? After the two free hours are used,
the cost per each additional hour is $3.35 (6 marks).
Hmmm. AOL Bertelsmann gets $132.80 for 40 hours. And
don't forget to pay Deutsche Telekom. And if you and the
kids surf 60 hours a month, 80 hours...

Maybe there are cheaper ways to kill time in Europe. Hey,
anyone up for a weekend trip to Paris?

Ned Stafford, a veteran journalist living in Germany, has
worked for wire services including Bridge.



To: djane who wrote (47489)5/25/1998 4:25:00 PM
From: djane  Respond to of 61433
 
forbes article. Digital security: The next generation [Info on VPN companies.]

By Om Malik

For today's corporations keeping the
company networks safe is a top priority.

Just when companies think that they have total
digital security, there is another hack attack, or a
network brought to its knees by a prankster. Call
it the digital battle between the good and the evil.

As long as this battle continues, expect
corporations to keep spending billions of dollars
on new software and methods to keep
troublemakers at bay. San Jose, Calif.-based
market research firm Dataquest expects that by
year 2000, U.S. corporations will spend $13
billion annually on computer security, up from
$6.3 billion this year.

Much of this money is going to be spent on some
cutting-edge technologies like virtual private
networks, smart cards and encryption, which
have recently become popular with corporations.


Forbes Digital Media takes a look at these new
sheriffs in town:

Virtual private networks (VPN)

Networking giant Bay Networks' (BAY) decision
to buy small startup New Oak Communications
for $156 million in January gave the emerging
virtual private networks (VPN) technology the
validation it so sorely needed.

VPN, according to analysts, is the next evolution
of firewall technology (see "A security software
glossary") currently being deployed by the
corporations. But what is VPN?

VPN is a blend of firewall and encryption
technology. There are two firewalls--one on
either end of the network connection, and
encrypted data flows between these two points.

VPN technology allows remote users to get onto
their corporate network over the Internet instead
of dialing directly into the network. For example,
John Doe in Idaho can dial his local Internet
access provider and by using special software
send and get data from his New York
headquarters. It saves his company money, as
there are no network charges, no long distance
telephone bills and no special hardware.

Much safer than traditional firewall and remote
access software, Infonetics Research, a San Jose,
Calif.-based research firm expects the VPN
market to grow from $15 million in 1997 to $1.2
billion by year 2001.

VPN players: Radguard, RedCreek, Isolation
Systems, Axent Technologies, Bay Networks


Smart cards

Authentication is one of the new ways companies
are likely to tackle some of the digital security
issues in coming years. Authentication, as the
word suggests, is the way people identify
themselves.

In real life, we use a driver's license, social
security number, passport or business card.
Things are not terribly different in cyberspace,
although people are likely to use smart cards.

A smart card is a small plastic card that looks
exactly like a credit card, and has a central
processing unit (CPU) chip embedded in it. It has
its own operating system, which is why it can
perform multiple functions.

One company that is really pushing the envelope
when it comes to smart cards, is Sunnyvale,
Calif.-based Cylink Corp. (CYLK). Last month,
the company introduced two card products:
Private Card, its smart card, and Private Safe, a
smart card reader.

Private Safe card reader connects between a PC
and its keyboard. A user can simply insert the
smart card into the reader and log on to the PC.
Without a smart card, access to the PC is not
possible, as private key and digital signatures are
generated on the chip itself, thus protecting those
functions from attack via a network or the PC.

The next step in the evolution of the authentication
process is called "biometrics," and will involve
voice activation or fingerprint scanning. For
example, if you want to log on to your company's
network, just place your hand on a special screen
and you will be allowed access if your fingerprints
match. Or in case of voice activation, you talk to
the computer and it recognizes your voice.
Sounds like science fiction!

Smart card players: Cylink, Siemens AG,
Motorola

New virus busters

If you think that the current generation of antivirus
software is enough to protect your computer from
virus attacks, you could not be more wrong.
There is a new family of viruses circulating around
the computer networks. These next-generation
viruses are called "vandals" and are essentially
mini-applications, which are written in software
languages like Java and ActiveX. They enter the
network via E-mail or via software downloaded
from the Internet.

Even though the damage caused by these vandals
is of the same magnitude as traditional viruses,
they are more deadly because the end-user in not
aware of their existence.

Antivandal players: E-Safe, Finjan, Security-7

Related stories:
Low tech spooks (Forbes Digital Tool, Apr. 3)
Safety first (Forbes Digital Tool, May 20)
Smart cards (Forbes Digital Tool, Nov. 14,
1997)





| top |

See also:

Network protection
How companies make their networks secure.

A security software glossary
Making sense of the jargon.

Who's doing what?
A Forbes Digital Tool guide to the top names in each
security software category.

Forbes Front Page | Forbes Magazine | The Toolbox

Sitemap | Help | Search | Webmaster

c 1998 Forbes Inc. Terms, Conditions and Notices




To: djane who wrote (47489)5/25/1998 5:16:00 PM
From: djane  Respond to of 61433
 
Are VPNs ready for prime time? Yes, for remote access

By Tom Pincince
Network World, 5/25/98

nwfusion.com

For almost a year, major
networking vendors and a slew of
start-ups have touted the benefits
of virtual private networks.
Essentially, VPN technology allows
you to build extranets, which enable you to use
the Internet for private communication,
commerce and collaboration.

Let's be honest - VPNs will not replace
corporate WANs in the near future. However,
there are certain applications for which VPNs
make sense today.

Initially, remote access is the most appropriate
enterprise application for VPNs. Corporations
can save $1 million per year per 1,000 users by
implementing an extranet. Because users always
dial in to a local ISP, access charges, such as
long-distance and toll-free phone charges, are
eliminated. In addition, having fewer devices on
the network significantly reduces management
and capital costs.


Major corporations such as American
Airlines/Sabre Labs and 3M Corp. have built
extranets. In doing so, they have not only
reduced costs by at least $1,000 per user per
year over their old remote access system, but
have also quickly and easily provided mobile
employees, business partners and customers with
access to their corporate resources.

In addition to saving you money, VPNs and
extranets can eliminate the headache of managing
modem racks. With the right extranet access
products, modem hassles can be outsourced to a
service provider, freeing you to concentrate on
business issues that contribute to your company's
bottom line.

Furthermore, VPNs and extranets are more
scalable than traditional remote access solutions.
Currently, every time you want to add more
remote users, you have to buy more modems
and add T-1 lines. This is expensive, time
consuming and a management nuisance. With an
extranet, new users, including business partners,
can be added easily, without expensive and
complex equipment upgrades.

Yet, corporations will not abandon their existing
networking infrastructures entirely and shift
remote access, collaboration and electronic
commerce applications to the Internet all at once.
In time, these and other key applications will
migrate to the Internet. Each application that
moves to the Internet will increase your savings.

Supply chain management, for example, will
become more efficient as extranet links between
suppliers and buyers improve the process. Direct
links between retailers and suppliers ensure more
precise inventory control. By creating open
procedures between business partners, extranets
extend electronic commerce beyond online
transactions.

It is important to note that the Internet that will
support these mission-critical applications is not
the wild and woolly Internet, but rather the
business-class Internet. Top-tier service
providers such as AT&T, Concentric, MCI,
Sprint and UUNet will offer the quality of service
and service-level agreements corporations will
demand to shift business applications to the
Internet.


Extranets and VPNs are a viable alternative to
traditional remote access. All corporations may
not be ready to move their entire supply chain to
the Internet backbone immediately - but the
technology exists today, and further innovations
will continue to be available for secure, scalable
and manageable extranet access.



Feedback | Network World, Inc. | Sponsor
Index
Marketplace Index | How to Advertise |
Copyright

Home | NetFlash | This Week | Industry/Stocks
Buyer's Guides/Tests | Net Resources | Opinions |
Careers
Seminars & Events | Product Demos/Info
Audio Primers | IntraNet

The opposing view

The VPNs: Ready
for Prime Time?
forum.

Pincince is vice
president, business
development, at
Bay Networks, Inc.
in Billerica, Mass.
He can be reached
at (978) 916-0731 or
at tom_pincince@
baynetworks.com.



To: djane who wrote (47489)5/25/1998 5:20:00 PM
From: djane  Read Replies (5) | Respond to of 61433
 
Are VPNs ready for prime time? Not for your IP backbone

By Tony Rybzynski
Network World, 5/25/98

nwfusion.com

Today most of
the attention in
the virtual
private network
market is
focused on Internet-based
VPNs. Don't be fooled.
Such VPNs are over-hyped
and are definitely not ready
to be your IP backbone in
for mission-critical
applications requiring high
reliability, consistent low
latency and minimum
bandwidth guarantees
between sites. The good
news is that there are other
VPN architectures to choose
from, so let's look at these
and make an educated
decision.

The first class of
Internet-based VPNs
overlay the Internet via IP
tunneling. This approach is
very attractive from
economic and connectivity
standpoints. However,
Internet-based VPNs have
little real value as an
enterprise IP backbone
because of the 'Net's
unpredictability. In addition,
this class of VPN is
vulnerable to intruders who
could take up valuable
access bandwidth by sending
unwanted data to a targeted
site. The same considerations
apply to roll-your-own
VPNs, whereby the user
owns and manages the
tunneling router or security
platform.

A second class of overlay
VPN involves IP tunneling
over an ISP's network,
which is specifically
engineered to meet certain
latency limits and availability.
These VPNs generally don't
support any form of class of
service (CoS), they can't
offer bandwidth guarantees
and are also vulnerable to
access bandwidth intruders.

A third VPN architecture
involves a different form of
tunneling: virtual circuit
tunneling, this time over
Layer 2 frame relay or ATM
permanent VCs. This
approach addresses
enterprise IP backbone
requirements for availability,
latency and guaranteed
bandwidth by leveraging the
CoS attributes of frame relay
and ATM networking. It also
makes access bandwidth
invulnerable to intruders.

There are two major
problems with IP and VC
tunneling: limited network
knowledge and scalability. IP
and VC tunneling severely
limit the service provider's
ability to monitor,
troubleshoot and generate
reports on a per-customer
basis because what flows in
the tunnels is only visible at
the end points. Scalability is
limited by the number of
routing adjacencies as the
number of sites grows, and
also by the need to manage a
potentially large number of
tunnels or connections, one
per each pair of sites.

A fourth architecture, Layer
3 VPNs, addresses the
issues of network knowledge
and scalability by introducing
a routing hierarchy to
aggregate routes and give
each VPN visibility in the
network. This can be done
by deploying multiple routers,
one per VPN, in the central
office (CO), but this results in
operational complexity and
higher costs.

A better solution is to create
new CO routing switch
architectures that allow traffic
from multiple VPNs to be
routed and switched across
the network, while isolating
the VPNs from one another.
In this scenario, switches
must support native IP
addressing, thus eliminating
any need for address
reassignment and translation.
Such an architecture
provides a high degree of
scalability and meets
enterprise user requirements
for security, service-level
agreement (SLA) guarantees
and reliability.

So what's a user to do?
Overlay Internet-based
VPNs are only an option if
low cost is your objective
and best-effort service is
adequate; they are really
extranet vehicles. If you have
fewer than 10 sites, consider
overlay VPNs from service
providers that specialize in
VPN service or Layer 2
VPNs, depending on how
stringent your requirements
are. If you have more than
10 sites, Layer 3 VPNs with
their scalable security and
SLA guarantees are the
solution for you.


Feedback | Network World,
Inc. | Sponsor Index
Marketplace Index | How to
Advertise | Copyright

Home | NetFlash | This Week |
Industry/Stocks
Buyer's Guides/Tests | Net
Resources | Opinions | Careers
Seminars & Events | Product
Demos/Info
Audio Primers | IntraNet

The opposing view

The VPNs: Ready
for Prime Time?
forum.

Rybczynski is
director of strategic
marketing and
technologies in
Nortel's Enterprise
Data Networks
Group in Ottawa,
Canada. He can be
reached at (613)
723-4920 or
Tony.Rybczynski@
nortel.com.