Tuesday 29 December 2015

How to stop Windows 10 asking you to give feedback

If you've signed up to the Windows Insider program, you're enjoying preview builds of Windows 10 before the vast majority of people. Whether you are on the Fast or the Slow Ring, getting hold of Insider preview builds is a great way to stay on the cutting edge -- but it comes with its drawbacks.

One of these -- aside from the need to download gigantic updates from time to time -- is that Windows 10 will constantly pester you for feedback. While it could be argued that this is very much the point of the preview program, some of you will almost certainly just want to get on with using Windows 10 without being asked 'Would you recommend this build to a friend?' or 'What do you think of the latest features of Windows 10?'. If you want to kill the feedback popups, here's how to do it.

What's important about feedback is letting Microsoft know when something goes wrong or doesn’t work as expected. But rather than feeling harangued into answering simple Yes / No / Maybe style questions, it makes far more sense to seek out the Feedback app and go into more details about problems you have encountered, when you encounter them. If you wait to be asked about your experience, you may well have forgotten what irked you. Take back control. Be pro-active. Hit the Feedback app, and ditch the nagging.

· Fire up Settings from the Start menu.

· Open up Privacy and move to the Feedback & diagnostics section.

· From the Feedback frequency drop down menu, select how often you're happy for Windows to hassle you -- cut it down to a daily or weekly occurrence, or select Never to kill it completely.

Close Settings, and you're done.
Certkingdom 20% Discount Promotion Coupon Code: 45K2D47FW4


Thursday 17 December 2015

Hosted bare metal emerges as alternative to IaaS cloud

When a VM in a public cloud isn’t good enough, some turn to physical servers

AppLovin is a 4-year old marketing platform that places advertisements in mobile apps. And it’s a data-intensive business to say the least.

When AppLovin learns of an advertising opportunity in an app, the company has 100 milliseconds to decide if it will bid on the spot in a real-time auction. If it wins the bid, it consults a database storing billions of user preferences to serve an ad personalized to that user. AppLovin processes about 30 billion to 50 billion actions per day, all of which need to happen in millisecond timeframes and on a global basis.

The company started as a customer of Amazon Web Services' IaaS public cloud. But in the past few years CTO John Krystynak – an early VMware employee - has moved AppLovin’s operations to another platform: Hosted bare metal infrastructure.

Bare metal servers are non-virtualized compute infrastructure, meaning that unlike a public cloud there is no hypervisor that creates virtual machines. Through provider Internap, AppLovin’s engineers can spin up as many bare metal servers as it needs, and it’s not sharing any of that infrastructure with other customers in a public cloud.

“Once you get to a point where you’re trying to optimize the infrastructure at a granular level, you really want to understand the whole infrastructure stack you’re running on,” Krystynak says.

AppLovin isn’t alone in embracing hosted bare metal infrastructure. Earlier this year Forrester’s Vice President and principle analyst for infrastructure and operations professionals Richard Fichera published a report titled “Consider bare metal as a viable cloud option.” Many vendors have recently begun offering bare metal options, including IBM through its acquisition of SoftLayer, Rackspace, Internap, and others.

“Bare-metal clouds offer a way for I&O pros to deploy workloads that demand dedicated hardware for performance and isolation reasons with all the operational advantages of VM-based infrastructure-as-a-service cloud services,” Fichera wrote in the report.

Network World
But as hosted bare metal has emerged as an attractive option, analysts don’t believe they’re a panacea that will replace IaaS. Instead, they encourage users to consider it another tool in the toolbox of enterprise IT.

Different use cases
Vendors typically offer hosted bare metal infrastructure similar to how IaaS cloud is consumed: Users access an online portal, request resources and pay for it by the hour or month. There are some important differences between IaaS and bare metal though. They’re meant for different types of workloads.

Bare metal infrastructure is great for high-performing workloads that strain compute and memory capacity. VMs from a public cloud are great for highly variable workloads that spin up and down frequently. Neither is better than the other, they’re just for different use cases.

There are other important differences too – perhaps the most notable one is price. SoftLayer’s Bare Metal cloud offering costs $0.37 per hour for a four-core server with 8GB of RAM. Its IaaS virtual machine starts at $0.038 per hour with 1GB of RAM. Microsoft Azure has VMs that start at $0.018 per hour. A massive price difference, but a big performance difference too.

No more noisy neighbor

Krystynak says one of the things that frustrated him most about operating in an IaaS public cloud four years ago was the concept of “noisy neighbors.” In a public cloud, customers share infrastructure and sometimes other customers can impact the performance of virtual machines running on the same server. In a bare metal environment, customers get access to the full server, so there are no neighbors, noisy or otherwise.

Does hosted bare metal have a place in your IT environment?
Noisy neighbors are a minor and rare inconvenience for most users that is fairly easy to remediate, says a spokesperson for operational analytics company Datadog. But for customers like AppLovin who are pushing the infrastructure to the max, any inconsistency in performance, even if minor, can become problematic.

In recent months an interesting new use case has emerged for hosted bare metal offerings: Application containers. “There’s really no reason to put a VM under a container unless you’re really trying to isolate it for security,” says Rackspace CTO John Engates. “Otherwise, if you can take the VM out of the equation, you can put containers right on the bare metal, and we have customers doing that.”

Fichera in his Forrester report notes that bare metal infrastructure is a compelling option for latency-sensitive workloads, or users who are currently using large sized VMs that are constantly loaded.
What it’s not good for
Bare metal has its disadvantages though. For one, customers don’t get the same agility from bare metal servers as they do with virtual machines. IaaS public cloud resources spin up very quickly compared to bare metal servers. There also are not as advanced management tools for bare metal servers – so for example replicating machine images for backup and testing is more difficult. And they require using physical networking and storage, whereas VMs can take advantage of more-agile virtual networking and storage. And most workloads don’t need access to the whole server – it’s overkill.

Gartner Vice President and Distinguished Analyst Lydia Leong says any debate between IaaS and hosted bare metal harkens back to the debate from the early and mid 2000s about whether workloads should run on virtualized infrastructure or not.

Bare metal infrastructure has its place – especially for workloads with large memory footprints, like an SAP HANA in-memory database. Batch computing can also benefit from bare metal performance.

But the IaaS public cloud providers like AWS have gotten really good at offering bare-metal-like performance in their virtualized environments, and they have options for customers to get bare-metal like performance in its public cloud. IaaS cloud providers gain important management, security and efficiency advantages by using hypervisors. So, while the hosted bare metal market is gaining traction, it doesn’t appear to be threatening the meteoric growth of the IaaS public cloud market.

Thursday 10 December 2015

210-065 Implementing Cisco Video Network Devices v1.0


QUESTION 1
Refer to the exhibit.



Which configuration item shown in the exhibit should be used to assign the internal and external video communication server address for this group of users?

A. User Settings > Video Address pattern
B. Administrative Tools > User Settings
C. Configuration Template > Edit Template
D. User Import > Configuration

Answer: C


QUESTION 2
Which three features are supported by Cisco TMSPE? (Choose three.)

A. Simplified provisioning
B. LDAP user import
C. Scheduling via Microsoft Outlook
D. FindMe
E. Jabber for Windows
F. Automatic endpoint upgrades

Answer: A,B,D


QUESTION 3
Which four features are provided by Cisco TelePresence Management Suite? (Choose four.)

A. Scheduling of video conference calls
B. Built-in-bridge functionality for multiparty video conferences
C. SIP-H.323 protocol interworking
D. Centralized management of conference resources
E. SMTP email event notification
F. Endpoint configuration backup and restore
G. Cisco TelePresence endpoint automated redundancy
H. Automated resource optimization

Answer: A,D,E,F


QUESTION 4
Management wants to modify Cisco TMS to allow users to configure the call behavior with their associated devices and dial from a single ID. Which feature needs to be enabled and configured?

A. Smart Scheduler
B. Low-touch Provisioning
C. FindMe
D. CMR Provisioning

Answer: C


QUESTION 5
A network engineer wants to automate the monitoring of Cisco TelePresence TX systems. Which step should the engineer take first?

A. Configure Cisco TMS on the codec.
B. Configure Medianet on the codec.
C. Configure NTP on the codec.
D. Configure Multiway on the codec.
E. Configure SNMP on the codec.

Answer: E


Wednesday 25 November 2015

200-601 IMINS2 Managing Industrial Networks for Manufacturing with Cisco Technologies

200-601 IMINS2
Managing Industrial Networks for Manufacturing with Cisco Technologies


Exam Number 200-601 IMINS2
Associated Certifications CCNA Industrial
Duration 90 Minutes (65 - 75 questions)

This exam tests concepts and technology commonly found in the automated manufacturing environment. This exam tests candidates on the Common Industrial Protocol (CIP) and ProfiNET industrial protocols and the underlying support network infrastructure design to maximize efficiency within Industrial Ethernet.

Exam Description
The exam Managing Industrial Networks for Manufacturing with Cisco Technologies (CCNA IMINS2) certification exam (200-601) is a 90 minute, 65 – 75 question assessment. This exam tests concepts and technology commonly found in the automated manufacturing environment. This exam tests candidates on the Common Industrial Protocol (CIP) and ProfiNET industrial protocols and the underlying support network infrastructure design to maximize efficiency within Industrial Ethernet.

The following topics are general guidelines for the content likely to be included on the exam. However, other related topics may also appear on any specific delivery of the exam. In order to better reflect the contents of the exam and for clarity purposes, the guidelines below may change at any time without notice.

1.0 IP Networking 20%
1.1 Describe the difference between enterprise environments and industrial environments
1.2 Describe the components for making the data flow highly available and predictable in an industrial environment (QoS, IP addressing, protocol, and hardware resiliency)
1.3 Interpret and diagnose problems that are related to QoS
1.4 Describe the differences between redundancy and resiliency requirements / approaches between the Enterprise and the plant floor
1.5 Differentiate the capabilities of switch types
1.6 Describe the life cycle of a multicast group
1.7 Describe and configure the operation and use cases for NAT
1.8 Describe and configure the operation and use cases for static routing
1.9 Describe and configure VLAN trunking to a virtual switch
1.10 Describe and configure Layer 2 resiliency protocols (Spanning Tree, REP, Flex Links, and Etherchannels)
1.11 Configure switch ports ( macros, threshold alarms)

2.0 Common Industrial Protocol (CIP) Knowledge and Configuration 19%
2.1 Explain the CIP connection establishment process
2.2 Explain producer/consumer models and implicit/explicit message models
2.3 Recognize communication abilities and capacities in different hardware/hardware generations (revisions)
2.4 Identify and describe the technologies that enable CIP Motion and CIP Safety
2.5 Identify the applicability, limitations, and components of a DLR implementation
2.6 Implement multicast features for CIP within a LAN
2.7 Optimize RPI on a CIP connection given a set of parameters
2.8 Enable and configure IEEE 1588 PTP at the system level
2.9 Configure the Stratix using the Add On Profile (AOP) in Studio 5000

3.0 ProfiNET Knowledge and Configuration 19%
3.1 Describe the differences in ProfiNET support between Cisco catalyst and Cisco Industrial Ethernet (IE) switches
3.1.a Support for VLAN 0
3.1.b Support for ProfiNET LLDP
3.1.c Support for GSDs (integration into SIMATIC STEP 7)

3.2 Describe the operation and purpose of ProfiSAFE
3.3 Describe the three basic ProfiNET devices and conformanceclasses
3.4 Describe the ProfiNET application classes and communication channels
3.5 Describe DHCP and how it can be used for IP addressing of devices and configuration pushes
3.6 Describe ring network requirements for ProfiNET
3.7 Enable ProfiNET on the switch
3.8 Enable Layer 2 QoS to ensure ProfiNET is prioritized
3.9 Integrate the Cisco Industrial Ethernet Switch in SIMATIC STEP 7
3.10 Configure and monitor ProfiNET alarm profiles on IE switches

4.0 Security 12%
4.1 Describe the defense in-depth approach to securing the industrial zone
4.2 Identify how a security component (hardware/software) applies to a network device to meet the network security definition of defense in depth
4.3 Describe network device hardening
4.4 Describe the concept and mechanisms of implementing logical segmentation
4.5 Identify possible options to control traffic between zones (ACLs, firewalls, VLANs)

5.0 Wireless 10%
5.1 Describe the differences between 802.11a/b/g/n/ac
5.2 Describe the components that you need to build multiple wireless networks on a single access point
5.3 Describe the difference between autonomous and controller-based access points and wireless workgroup bridges
5.4 Demonstrate a typical switchport configuration for autonomous and controller-based access points
5.5 Describe the limitations of using a workgroup bridge with a control communication

6.0 Troubleshooting 20%
6.1 Troubleshoot advanced Layer 1 problems such as mechanical deterioration, electromagnetic noise issues, and infrastructure mismatches
6.2 Troubleshoot VLAN trunking
6.3 Troubleshoot an error disabled port
6.4 Troubleshoot basic spanning tree port state and root priority problems
6.5 Troubleshoot Layer 3 problems by inspecting route tables and NAT tables
6.6 Troubleshoot Layer 3 problems in a VRF-lite enabled environment
6.7 Demonstrate the ability to find the location of a device within a multi-switch network given an IP address
6.8 Identify methods for troubleshooting a communication problem in a CIP environment
6.9 Troubleshoot CIP using an Ethernet/IP browse tool, command line, and a web browser
6.10 Troubleshoot device communications performance
6.11 Identify the source of cable and device faults in a DLR
6.12 Identify methods for troubleshooting a communication problem in a ProfiNET environment
6.13 Troubleshoot ProfiNET using SIMATIC STEP 7 to view network topology, use the switch command line


Wednesday 11 November 2015

SDN and NFV: The brains behind the “smart” city

In major metropolitan areas and smaller cities alike, governments are adopting software-defined networking (SDN) and network function virtualization (NFV) to deliver the agility and flexibility needed to support adoption of “smart” technologies that enhance the livability, workability and sustainability of their towns.

Today there are billions of devices and sensors being deployed that can automatically collect data on everything from traffic to weather, to energy usage, water consumption, carbon dioxide levels and more. Once collected, the data has to be aggregated and transported to stakeholders where it is stored, organized and analyzed to understand what’s happening and what’s likely to happen in the future.

There’s a seemingly endless list of potential benefits. Transportation departments can make informed decisions to alleviate traffic jams. Sources of water leaks can be pinpointed and proactive repairs scheduled. Smart payments can be made across city agencies, allowing citizens to complete official payments quickly and reducing government employee time to facilitate such transactions. And even public safety can be improved by using automated surveillance to assist the police watch high-crime hotspots.

Of particular interest is how healthcare services can be improved. There is already a push to adopt more efficient and effective digital technology management systems to better store, secure and retrieve huge amounts of patient data. Going a step further, a smart city is better equipped to support telemedicine innovations that require the highest quality, uninterrupted network service. Telesurgery, for example, could allow for specialized surgeons to help local surgeons perform emergency procedures from remote locations — the reduction of wait time before surgery can save numerous lives in emergency situations, and can help cities and their hospital systems attract the brightest minds in medical research and practice.

The smart city of today

While the smart city is expected to become the norm, examples exist today. Barcelona is recognized for environmental initiatives (such as electric vehicles and bus networks), city-wide free Wi-Fi, smart parking, and many more programs, all of which benefit from smart city initiatives. With a population of 1.6 million citizens, Barcelona shows that smart city technologies can be implemented regardless of city size.

But even smaller cities are benefitting from going “smart.” In 2013 Cherry Hill, New Jersey, with a population of only 71,000, began using a web-based data management tool along with smart sensors to track the way electricity, water, fuel and consumables are being utilized, then compared usage between municipal facilities to identify ways to be more efficient. Chattanooga, Tennessee, population 170,000, along with its investment to provide the fastest Internet service in the U.S., has recently begun developing smart city solutions for education, healthcare and public safety.

How do cities become smart? The most immediate need is to converge disparate communications networks run by various agencies to ensure seamless connectivity. To achieve this, packet optical based connectivity is proving critical, thanks largely to the flexibility and cost advantages it provides. Then atop the packet optical foundation sits technology that enables NFV and the applications running on COTS (commercial off-the-shelf) equipment in some form of virtualized environment. SDN and NFV allow for the quick and virtual deployment of services to support multiple data traffic and priority types, as well as increasingly unpredictable data flows of IoT.

Decoupling network functions from the hardware means that architectures can be more easily tweaked as IoT requirements change. Also, SDN and NFV can yield a more agile service provision process by dynamically defining the network that connects the IoT end devices to back-end data centers or cloud services.

The dynamic nature of monitoring end-points, location, and scale will require SDN so that networks can be programmable and reconfigured to accommodate the moving workloads. Take for example, allocating bandwidth to a stadium for better streaming performance of an event as the number of users watching remotely on-demand goes up—this sort of dynamic network-on-demand capability is enabled by SDN. Additionally, NFV can play a key role where many of the monitoring points that make the city "smart" are actually not purpose-built hardware-centric solutions, but rather software-based solutions that can be running on-demand.

With virtual network functions (VNF), the network can react in a more agile manner as the municipality requires. This is particularly important because the network underlying the smart city must be able to extract high levels of contextual insight through real-time analytics conducted on extremely large datasets if systems are to be able to problem-solve in real-time; for example, automatically diverting traffic away from a street where a traffic incident has taken place.

SDN and NFV may enable the load balancing, service chaining and bandwidth calendaring needed to manage networks that are unprecedented in scale. In addition, SDN and NFV can ensure network-level data security and protection against intrusions – which is critical given the near-impossible task of securing the numerous sensor and device end points in smart city environments.
Smart city business models

In their smart city initiatives, cities large and small are addressing issues regarding planning, infrastructure, systems operations, citizen engagement, data sharing, and more. The scale might vary, but all are trying to converge networks in order to provide better services to citizens in an era of shrinking budgets. As such, the decision on how to go about making this a reality is important. There are four major smart city business models to consider, as defined by analysts at Frost & Sullivan (“Global Smart City Market a $1.5T Growth Opportunity In 2020”):

Build Own Operate (BOO): In a BOO model, municipalities own, control, and independently build the city infrastructure needed, and deliver the smart city services themselves. Both operation and maintenance of these services is under the municipality’s control, often headed up by their city planner.

Build Operate Transfer (BOT): Whereas in a BOO model, the municipality is always in charge of the operation and management of smart city services, in a BOT model that is only the case after a little while – the smart city infrastructure building and initial service operation is first handled by a trusted partner appointed by the city planner. Then, once all is built and in motion, operation is handed back over to the city.

Open Business Model (OBM): In an OBM model, the city planner is open to any qualified company building city infrastructure and providing smart city services, so long as they stay within set guidelines and regulations.

Build Operate Manage (BOM): Finally, there is the BOM model, which is where the majority of smart city projects are likely to fall under. In this model, the smart city planner appoints a trusted partner to develop the city infrastructure and services. The city planner then has no further role beyond appointment – the partner is in charge of operating and managing smart city services.

SDN and NFV: The keys to the (smart) city
With the appropriate business model in place and the network foundation laid out, the technology needs to be implemented to enable virtualization. Virtualized applications allow for the flexibility of numerous data types, and the scalability to transport huge amounts of data the city aims to use in its analysis.

SDN and NFV reduce the hardware, power, and space requirements to deploy network functions through the use of industry-standard high-volume servers, switches and storage; it makes the network applications portable and upgradeable with software; and it allows cities of all sizes the agility and scalability to tackle the needs and trends of the future as they arise. Like the brain’s neural pathways throughout a body, SDN and NFV are essential in making the smart city and its networks connect and talk to each other in a meaningful way.



Thursday 5 November 2015

Are your IT certifications Helping your career?

There is no shortage of ways to advance your career, or your earnings potential. Racking up a bunch of certifications is one of them. But be careful it doesn’t have the opposite effect.

Specialization creates tremendous value in our economy. Adam Smith’s economic theory on the merits of specialization has been proven true over and over again. Yet, can you have too much of a good thing? That’s an important question for technology professionals and leaders to consider.

Key facts about IT specialization

How rampant is the scope of the IT specialization? Consider these facts:
IT specialization by industry. Following the 2007-2009 recession, many IT professionals have changed their focus to healthcare because that sector is adopting technology rapidly to improve care and comply with regulations. A 2015 Modus survey found that healthcare and education are forecasted to have the most significant need for technology talent. The increasing rise of start-ups focused on niche markets and products is another factor encouraging specialization.

IT certifications. There are more than 100 certifications available to IT professionals, including such popular one as the Project Management Professional (PMP), Microsoft certifications, ISACA certifications, Cisco certifications and Oracle certifications. Oracle, it should be noted, offers more than 30 certifications related to their products.

IT job titles. There are dozens of popular IT job roles in the market. Some titles reflect seniority (e.g. Developer vs Senior Developer, Software Engineer I vs Software Engineer II) while others speak to a technical focus (e.g. Infrastructure Manager and Java Developer).

Specialization means different things to different people. A college graduate might think of specialization in terms of hardware or software engineering. In contrast, a highly experienced developer may specialize in a certain flavor of Linux or the C# programming language.

Surely all this specialization leads to economic value, right? One way to answer that question is to look at data collected by recruiters.
The recruiter’s perspective: specialization boosts salaries … to a point

Recruiters have a unique perspective on technology talent and in-demand skills. After all, they’re interacting with a large number of candidates each year, and are able to determine which skills are valuable. According to Robert Half’s 2016 Salary Guide for Technology Professionals, some of the most valuable skills in demand in the U.S. right now include the following:

Microsoft SQL Server database skills: Adds 10 percent to salary.
Java development skills: Adds 9 percent to salary.
Microsoft Sharepoint skills: Add 9 percent to salary.
Cisco network administration skills: Adds 9 percent to salary.
Virtualization skills: Adds 8 percent to salary.


Those salary increases will vary by region and vertical industry, of course. But the above trends suggest a clear pattern: Becoming a specialist with a given company’s technology suite (e.g. Cisco and Microsoft) is an excellent way to build your compensation bracket. It’s also worth noting that Cisco and Microsoft are both large, well-established companies that have built loyal customer bases across corporate America. Specializing in software offered by smaller companies offering similar products and services may not add value because employers will not be able to understand or make use of them.

The way forward for your development: technical and leadership skills


Developing your career in the technology industry is a major challenge. In some cases, you may receive guidance from your managers and peers. In other situations, you’ll be left to your own devices. As you navigate to career success, there are two tracks to pursue in your professional development.

First, pursue the technical skills and knowledge you need to be successful in your current role. For example, you may specialize in Microsoft or Oracle products – applications that are in high demand according to recent research. These technical skills, especially for individual contributors, give you the ability to create results and earn credibility.

Second, look for nontechnology training and development to distinguish yourself from other technology professionals. If you frequently work with vendors, pursuing study in communication and negotiation training make sense. If your company is based in another country, you may want to add language skills to your toolbox.

Thursday 29 October 2015

Exam 70-695 Deploying Windows Desktops and Enterprise Applications

Exam 70-695 Deploying Windows Desktops and Enterprise Applications

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

Implement the Operating System Deployment (OSD) infrastructure (21%)
Assess the computing environment
Configure and implement the Microsoft Assessment and Planning (MAP) Toolkit, assess Configuration Manager reports, integrate MAP with Microsoft System Center 2012 Configuration Manager, determine network load capacity
Plan and implement user state migration
Design considerations, including determining which user data and settings to preserve, hard-link versus remote storage, mitigation plan for non-migrated applications, and wipe-and-load migration versus side-by-side migration; estimate migration store size; secure migrated data; create a User State Migration Tool (USMT) package
Configure the deployment infrastructure
Configure Windows Deployment Services (WDS), install and configure Microsoft Deployment Toolkit (MDT), identify network services that support deployments, select Configuration Manager distribution points, support BitLocker
Configure and manage activation
Configure KMS, MAK, and Active Directory–based activation; identify the appropriate activation tool

Implement a Lite Touch deployment (18%)
Install and configure WDS
Configure unicast/multicast, add images to WDS, configure scheduling, restrict who can receive images
Configure MDT
Configure deployment shares, manage the driver pool, configure task sequences, configure customsettings.ini
Create and manage answer files
Identify the appropriate location for answer files, identify the required number of answer files, identify the appropriate setup phase for answer files, configure answer file settings, create autounattend.xml answer files

Implement a Zero Touch deployment (20%)
Configure Configuration Manager for OSD
Configure deployment packages and applications, configure task sequences, manage the driver pool, manage boot and deployment images
Configure distribution points
Configure unicast/multicast, configure PXE, configure deployments to distribution points and distribution point groups
Configure MDT and Configuration Manager integration
Use MDT-specific task sequences; create MDT boot images; create custom task sequences, using MDT components

Create and maintain desktop images (21%)
Plan images
Design considerations, including thin, thick, and hybrid images, WDS image types, image format (VHD or WIM), number of images based on operating system or hardware platform, drivers, and operating features
Capture images
Prepare the operating system for capture, create capture images using WDS, capture an image to an existing or new WIM file, capture an operating system image using Configuration Manager
Maintain images
Update images using DISM; apply updates, drivers, settings, and files to online and offline images; apply service packs to images; manage embedded applications

Prepare and deploy the application environment (20%)
Plan for and implement application compatibility and remediation
Planning considerations, including RDS, VDI, Client Hyper-V, and 32 bit versus 64 bit; plan for application version co-existence; use the Application Compatibility Toolkit (ACT); deploy compatibility fixes
Deploy Office 2013 by using MSI
Customize deployment, manage Office 2013 activation, manage Office 2013 settings, integrate Lite Touch deployment, re-arm Office 2013, provide slipstream updates
Deploy Office 2013 by using click-to-run (C2R)
Configure licensing, customize deployment, configure updates, monitor usage by using the Telemetry Dashboard



Wednesday 21 October 2015

10 key moments in the history of Apple and Microsoft

Apple and Microsoft recently renewed their alliance with the goal of tackling the enterprise market, but the latest partnership is just the most recent turning point in the two companies' intertwined histories. Here are the defining moments that led up to the new pact.

Apple and Microsoft's history of highs and lows
Apple and Microsoft share a common history and bond in the evolution of personal computing. Relations between the two technology pioneers were generally cordial when they were founded in the 1970s, but that sense of mutual respect quickly turned to discord. The founders of both companies were at loggerheads often in the past. Today their new leaders appear determined to bury the hatchet and partner for greater opportunities in the enterprise.

Youthful innocence of the early '80s
Microsoft was a critical Apple ally during the first Macintosh's development. At an Apple event in 1983, Microsoft CEO Bill Gates told attendees Microsoft expected to earn half of its revenues selling Macintosh software the following year. He called the Macintosh, "something that's really new and really captures people's attention."

Jobs ousted from Apple, forms NeXT
In 1985, Apple CEO Steve Jobs was ousted from the company he cofounded nine years earlier. He immediately sold all but one share in Apple to fund the launch of NeXT, where he would spend the next 12 years building computer workstations for higher education and business.

Jobs says Microsoft has 'no taste'
"The only problem with Microsoft is they just have no taste," Jobs said in the 1996 "Triumph of the Nerds" TV documentary. "They have absolutely no taste. And I don't mean that in a small way, I mean that in a big way, in the sense that they don't think of original ideas, and they don't bring much culture into their products."

Jobs returns to Apple, partners with Microsoft
When Apple acquired NeXT in 1997 and brought Steve Jobs back into the fold, the company was in disarray amid growing uncertainty about the future of Microsoft Office for Mac. During his keynote address at the Macworld Expo that year, Jobs extolled the virtues of partnering with industry leaders and spoke of the need to improve Apple's partner relations.

Gates addresses the Apple faithful in 1997
"Microsoft is going to be part of the game with us as we restore this company back to health," Jobs said at Macworld, before asking Gates to address the crowd via satellite.

"We think Apple makes a huge contribution to the computer industry," Gates said. "We think it's going to be a lot of fun helping out."

Gates and Jobs take the stage together in 2007
A seminal moment occurred between the leaders of both companies when Gates and Jobs jointly took the stage for an interview at the D5 conference. Both men praised each other in their own ways. Jobs commended Gates for building the first software company in the world, but Gates was more flattering. "What Steve's done is quite phenomenal," he said.

'Memories longer than the road ahead'
When Jobs was asked to describe the greatest misunderstanding of his relationship with Gates, he said: "I think of most things in life as either a Bob Dylan or a Beatles song, but there's that one line in that one Beatles song — 'You and I have memories longer than the road that stretches out ahead' — and that's clearly very true here."

Apple invites Microsoft exec on stage for iPad demo
A new era of partnership buoyed by opportunities in the enterprise began to blossom in the early-2010s. At Apple's September 2015 new product event in San Francisco, the company invited Kirk Koenigsbauer, vice president of Microsoft Office, on stage to demonstrate Office 365 apps working in split-screen mode on an iPad Pro.

Microsoft CEO uses iPhone at Dreamforce
At Salesforce's 2015 Dreamforce conference, Microsoft CEO Satya Nadella demoed the company's iOS apps on an iPhone. When Nadella did the once unthinkable, using an iPhone on stage, he acknowledged it as such but also made clear that it wasn't his phone. "It is a pretty unique iPhone," he said. "I like to call it the iPhone Pro because it has all the Microsoft software and applications on it … It's pretty amazing."

Apple CEO Tim Cook doesn't hold a grudge
During a keynote at cloud-storage company Box's BoxWorks conference in September 2015, when asked about the company's renewed relationship with Microsoft, Apple CEO Tim Cook said he doesn't believe in holding grudges. "If you think back in time, Apple and IBM were foes. Apple and Microsoft were foes," Cook said. "Apple and Microsoft still compete today, but frankly Apple and Microsoft can partner on more things than we could compete on, and that's what the customer wants."


Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Tuesday 13 October 2015


QUESTION 1
You need to prepare the environment for the implementation of phase 1.
What changes must be made to the environment before you can install Exchange Server 2013?

A. The operating system or service pack level of TexDC1 needs to be upgraded.
B. The Windows 2008 R2 domain controllers in Washington and Boston need to be upgraded.
C. A server running Exchange Server 2007 or Exchange Server 2010 needs to be installed in Texas.
D. The PDC emulator role needs to be transferred to a domain controller in Washington or Boston.

Answer: A

Explanation:


QUESTION 2
You are evaluating whether the proposed Exchange solution will meet the current and future
capacity requirements.
You want to gather statistics about the current Exchange environment.
Which of the following tools would you use to determine the number of emails sent to and received
by the current users?

A. Remote Server Administration Tools.
B. Microsoft Exchange Server Profile Analyzer.
C. Microsoft Exchange Server Deployment Assistant.
D. ESEUtil.exe.
E. Microsoft Exchange Server Jetstress.

Answer: B

Explanation:


QUESTION 3
You need to apply the required size restriction to the mailboxes in the new environment.
Which of the following commands should you run?

A. Get-MailboxDatabase | Set-MailboxDatabase –ProhibitSendReceiveQuota
B. Get-MailboxDatabase | Set-Mailbox –ProhibitSendReceiveQuota
C. Get-Mailbox | Set-Mailbox –ProhibitSendReceiveQuota
D. Get-MailboxDatabase | Get-Mailbox | Set-Mailbox –ProhibitSendReceiveQuota

Answer: A

Explanation:


QUESTION 4
You are evaluating whether the proposed Exchange solution will meet the current and future
capacity requirements.
You want to gather statistics about the current Exchange environment.
Which of the following tools would you use to determine the number of IOPS (Input/Output
Operations Per Second) required for the mailbox database storage?

A. ESEUtil.exe.
B. Microsoft Exchange Server Jetstress.
C. Microsoft Exchange Server Deployment Assistant.
D. Exchange Mailbox Server Role Requirements Calculator.
E. SQL Server Analysis Services.

Answer: D

Explanation:


QUESTION 5
You need to install and configure anti-spam and antimalware filtering.
Which servers should you install the anti-spam agents and enable the anti-spam and antimalware
filtering? (Choose two).

A. You should install the anti-spam agents on the Client Access Servers only.
B. You should install the anti-spam agents on the Mailbox serversonly.
C. You should install the anti-spam agents on the Client Access Servers and the Mailbox Servers.
D. You should enable antimalware filtering on the Client Access Serversonly.
E. You should enable antimalware filtering on the Mailbox serversonly.
F. You enable antimalware filtering on the Client Access Servers and the Mailbox Servers.

Answer: B,E

Explanation:


Friday 9 October 2015

70-246 Monitoring and Operating a Private Cloud with System Center 2012

QUESTION 1
Your company has a datacenter in Los Angeles that contains a System Center 2012 Operations
Manager infrastructure. You create three unsealed management packs named Pack1, Pack2, and
Pack3. You create an override for Pack1. You create a group in Pack2. You need to apply the override
for Pack1 to the group in Pack2. What should you do before you apply the override?

A. Create a new class in Pack2.
B. Seal Pack2.
C. Seal Pack1.
D. Create a new class in Pack1.
E. Create a new class in Pack3.

Correct Answer: B


QUESTION 2
Your company has a private cloud that is managed by using a System Center 2012 Operations
Manager infrastructure. The Operations Manager management server role is installed on a server
named Server1. You deploy a server named Server2, and then join Server2 to the domain. You log
on to Server2 and install the Operations Manager agent. You specify Server1 as the management
server. You notice that Server1 did not discover Server2. You need to add Server2 as an agentmanaged
device. What should you do from the Operations Manager console?

A. Run the Discovery Wizard - Computer and Device Management Wizard.
B. Import the Windows Servers Base Operating System Management Pack.
C. Modify the Global Management Server Settings - Security settings.
D. Create a new discovery rule.

Correct Answer: C


QUESTION 3
Your company has a private cloud that is managed by using a System Center 2012 Operations
Manager infrastructure. You have a line-of-business web application named App1. App1 stores its
information in a dedicated Microsoft SQL Server 2008 database. You need to create a central
diagram that contains the complete health information of App1. You import the SQL, IIS, and
Windows Server management packs. What should you create next?

A. a Service Level Dashboard
B. a diagram view
C. a dashboard view
D. a distributed application model

Correct Answer: D


QUESTION 4
Your company has a private cloud that is managed by using a System Center 2012 Operations
Manager infrastructure. You plan to create a distributed application named DistributedApp1. You
need to ensure that a folder for DistributedApp1 is available from the Monitoring workspace in the
Operations Manager console. What should you do?

A. Save DistributedApp1 as a new management pack.
B. Save DistributedApp1 in the Default Management Pack.
C. Add the OperationsManagerAppMonitoring object to DistributedApp1.
D. Add the OperationsManagerMonitoringView object to DistributedApp1.

Correct Answer: A


QUESTION 5
Your company has a datacenter in Los Angeles that contains a private cloud. The private cloud is
managed by using a System Center 2012 Operations Manager infrastructure. You plan to create a
distributed application named App1. You need to ensure that a folder for App1 is available from
the Monitoring workspace in the Operation Manager console. What should you do?

A. Run the Protect-SCOMManagementPack cmdlet.
B. Save App1 in the Default Management Pack.
C. Run the Import-SCOMManagementPack cmdlet.
D. Save App1 as a new management pack.

Correct Answer: D


QUESTION 6
Your company has a private cloud that is managed by using a System Center 2012 infrastructure.
The network contains a Virtual Machine Manager (VMM) infrastructure and an Operation Manager
infrastructure. You create and deploy a three-tier service to VMM. You plan to view service
diagrams in Operations Manager. You need to identify which management packs must be imported
to Operations Manager for the planned diagrams. The solution must minimize the number of
imported management packs. Which management packs should you identify? (Each correct
answer presents part of the solution. Choose all that apply.)

A. the Windows Server Operating System management pack
B. the Internet Information Services 7 Monitoring management pack
C. the File Services management pack
D. the Microsoft SQL Server Monitoring Management Pack
E. the Monitoring Pack for Active Directory (AD)
F. the Windows Server DNS 2003/2008/2008 R2 Monitoring Management Pack

Correct Answer: ABD

Thursday 17 September 2015

What to expect at Microsoft's big hardware event on October 6th

Expect Surface tablets, Lumia smartphones, and maybe more at a rare Microsoft hardware event.

You don't usually see "Microsoft" with "hardware event," unless they are a guest, but Microsoft will be holding just that, a hardware event, on October 6 in New York City. The company sent out invitations on Monday morning.

Of course, Microsoft did not say what hardware would be on display, but it's fairly easy to guess. The most obvious choice is Surface 4, unless they change the name. The Surface 3 models are now more than a year old, ancient in hardware terms.

It really is time for a Surface update. Intel has released the Skylake processor, and Microsoft now has Windows 10. Plus, Apple has its new iPad Pro, Lenovo has a 12-inch tablet, and Dell has one coming in the next few months.

Then there's the Lumia business. Microsoft is sticking with it for now despite the fact that the Nokia acquisition has cost the company billions. The rumor is that two new flagship devices will be introduced: a 5.2-inch Lumia 950 with a Qualcomm Snapdragon 808 processor and 1080p display, and the 5.7-inch QHD Lumia 950 XL with the newer Qualcomm Snapdragon 810 processor.

The final piece of hardware rumored for the event is an update to Microsoft's wearable, the Microsoft Band. It has been almost a year since its release, and at the time, it was viewed as a 1.0 product. In other words, it needed work. There isn't much floating around on the new Band, but it has nowhere to go but up.

On an unrelated note, you may have heard rumors last week that Microsoft was looking to buy a piece, or maybe all, of AMD. On the surface that seems ridiculous, but AMD is the chip supplier for the Xbox One and AMD is teetering on the brink of oblivion with plunging sales and continued losses.

Well, Citi's semiconductor analyst Chris Danely threw some cold water on that idea, saying "we seriously doubt it" and noting that Microsoft has a close partnership with AMD's rival Intel, among other reasons. He also noted that AMD has a cross-licensing patent agreement with Intel and any company buying AMD would have to renegotiate that deal, which would be awkward.

Danely said it might be possible that Microsoft acquires AMD's semi-custom processor businesses, although that too seems unlikely. The custom semi business not only makes the Xbox One's processor, it also makes the processor for the Sony PlayStation 4, and Sony would not sit quietly by and let that happen.

AMD is in rough shape, no question about it, and these rumors are constant. I'd say take them with a grain of salt, but really, you shouldn't take them at all when it comes to Microsoft. At best, Microsoft can throw them a financial lifeline like it did with Apple in 1997, but that's as far as it will go.



Wednesday 2 September 2015

Microsoft slips user-tracking tools into Windows 7, 8 amidst Windows 10 privacy storm

Worried about Windows 10's deep-reaching user tracking? Some of it's coming to Windows 7 and 8, too.

Windows 10 is a deliciously good operating system, all things considered, but its abundant user-tracking has prompted many privacy-minded individuals to stay pat with older versions of Windows. Now, Microsoft’s providing those concerned individuals a reason to upgrade.

No, the company’s not walking back its privacy-encroaching features. Instead, Microsoft’s quietly rolling out updates that bake new tracking tools into Windows 7 and Windows 8.

Yes, really.
The story behind the story: Privacy concerns have marred an otherwise sterling launch for Windows 10, which is already installed on 75 million PCs. Rolling out this Windows 7 and 8 updates amidst the controversy smacks of insensitivity—and it’s just plain poor timing, to boot.
All eyes on you

Ghacks discovered four recent KB updates for Windows 7 and 8, all designed to send Microsoft regular reports on your machine’s activities.

KB3068708 – “This update introduces the Diagnostics and Telemetry tracking service to existing devices. By applying this service, you can add benefits from the latest version of Windows to systems that have not yet upgraded. The update also supports applications that are subscribed to Visual Studio Application Insights.” This update replaced KB3022345.

KB3075249 – “This update adds telemetry points to the User Account Control (UAC) feature to collect information on elevations that come from low integrity levels.”

KB3080149 – “This package updates the Diagnostics and Telemetry tracking service to existing devices. This service provides benefits from the latest version of Windows to systems that have not yet upgraded. The update also supports applications that are subscribed to Visual Studio Application Insights.”

The latter two updates are flagged as Optional, but KB3068708 holds Recommended status, which means it would be downloaded and installed if you have Windows Updates set to automatic. It’s only functional in PCs that participate in Microsoft’s Customer Experience Improvement Program, which already sends Microsoft information on how you use your computer.

Opting out of the CEIP isn’t a single straightforward flip to switch. You have to disable it in all the software you’ve agreed to use it with. From Microsoft’s CEIP website:

“Most programs make CEIP options available from the Help menu, although for some products, you might need to check settings, options, or preferences menus. Some pre-release products that are under development might require participation in CEIP to help ensure the final release of the product improves frequently used features and solves common problems that exist in the pre-release software.”

If you use Office’s default settings, it signs you up for Microsoft's CEIP. How-to Geek has a tutorial explaining how to disable it, though if sending information to Microsoft before didn’t bother you, this new update probably won’t either.

Begone!

Disabling the tracking tools in the Recommended KB3068708 update isn’t simple, either. It connects to vortex-win.data.microsoft.com and settings-win.data.microsoft.com, which are hard-coded to bypass the Windows HOSTS file. In other words, it’s tricky to block unless you have a firewall that can block HTTPS connections as well as be configured manually, ExtremeTech explains. There are options in GPEdit.msc that allow you to disable application telemetry and CEIP participation, but it’s unknown if they behave correctly after the new patches are installed.

Where to uninstall updates. (Image ironically taken on Windows 10.)
If you don’t want these new tracking tools on your PC, the best thing to do seems to be simply uninstalling the offending updates, then blocking them from being reinstalled.

To do so, head to Control Panel > Programs > Uninstall or change a program. Here, click View installed updates in the left-hand navigation pane. In the search box in the upper-right corner, search for the KB3068708, KB3022345, KB3075249, and KB3080149 updates by name. If they’re installed, they’ll pop right up. If you find one, right-click on it and select Uninstall to wipe it from your system.
updates

To block the updates from being downloaded again, dive back into the Control Panel and head to System and Security > Windows Update > Check for updates. The system will look for updates, then say you have a certain number of updates available, separated by status (Optional, Recommended, Critical). Simply click the recommended updates link, find the KB3068708 and KB3022345 updates, then right-click them and select Hide update. Boom! Done.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Thursday 20 August 2015

Silicon Valley's 'pressure cooker:' Thrive or get out


Spotlight may be on Amazon, but tech jobs are high profit and high stress

It's true. People working in Silicon Valley may cry at their desks, may be expected to respond to emails in the middle of the night and be in the office when they'd rather be sick in bed.

But that's the price employees pay to work for some of the most successful and innovative tech companies in the world, according to industry analysts.

"It's a pressure cooker for tech workers," said Bill Reynolds, research director for Foote Partners LLC, an IT workforce research firm. "But for every disgruntled employee, someone will tell you it's fine. This is the ticket to working in this area and they're willing to pay it."

The tech industry has been like this for years, he added.
Employees are either Type A personalities who thrive on the pressure, would rather focus on a project than get a full night's sleep and don't mind pushing or being pushed.

If that's not who they are, they should get another job and probably in another industry.

"A lot of tech companies failed, and the ones that made it, made it based on a driven culture. No one made it working 9 to 5," said John Challenger, CEO of Challenger, Gray & Christmas, an executive outplacement firm. "Silicon Valley has been the vanguard of this type of work culture. It can get out of control. It can be too much and people can burn out. But it's who these companies are."

Work culture at tech companies, specifically at Amazon, hit the spotlight earlier this week when the New York Times ran a story on the online retailer and what it called its "bruising workplace."

The story talked about employees crying at their desks, working 80-plus-hour weeks and being expected to work when they're not well or after a family tragedy.

"At Amazon, workers are encouraged to tear apart one another's ideas in meetings, toil long and late (emails arrive past midnight, followed by text messages asking why they were not answered), and held to standards that the company boasts are "unreasonably high," the article noted.

In response, Amazon.com CEO Jeff Bezos sent a memo to employees saying he didn't recognize the company described in the Times article.

"The article doesn't describe the Amazon I know or the caring Amazonians I work with every day," Bezos wrote. "More broadly, I don't think any company adopting the approach portrayed could survive, much less thrive, in today's highly competitive tech hiring market."

Bezos hasn't been the only one at Amazon to respond. Nick Ciubotariu, head of Infrastructure development at Amazon.com, wrote a piece on LinkedIn, taking on the Times article.

"During my 18 months at Amazon, I've never worked a single weekend when I didn't want to. No one tells me to work nights," he wrote. "We work hard, and have fun. We have Nerf wars, almost daily, that often get a bit out of hand. We go out after work. We have 'Fun Fridays.' We banter, argue, play video games and Foosball. And we're vocal about our employee happiness."

Amazon has high expectations of its workers because it's one of the largest and most successful companies in the world, according to industry analysts.

The company, which started as an online book store, now sells everything from cosmetics to bicycles and toasters. With a valuation of $250 billion, Amazon even surpassed mega retailer Walmart this summer as the biggest retailer in the U.S.

With that kind of success comes a lot of pressure to stay on top and to come up with new, innovative ways to keep customers happy.

That kind of challenge can lead to a stressful workplace where employees are called on to work long hours and to outwork competitors' own employees.

It's just the way of the beast, according to Victor Janulaitis, CEO of Janco Associates Inc., a management consulting firm.

"If you go to work for a high-powered company where you have a chance of being a millionaire in a few years, you are going to work 70 to 80 hours a week," he said. "You are going to have to be right all the time and you are going to be under a lot of stress. Your regular Joe is really going to struggle there."

This kind of work stress isn't relegated to Amazon alone. Far from it, Janulaitis said.

"I think it's fairly widespread in any tech company that is successful," he noted. "It's just a very stressful environment. You're dealing with a lot of money and a lot of Type A personalities who want to get things done. If you're not a certain type of person, you're not going to make it. It's much like the Wild West. They have their own rules."

Of course, tech companies, whether Amazon, Google, Apple or Facebook, are known to work people hard, going back to the days when IBM was launching its first PCs and Microsoft was making its Office software ubiquitous around the world.

However, tech companies also are known for giving their employees perks that people working in other industries only dream of.

Google, for instance, has world-class chefs cooking free food for its employees, while also setting up nap pods, meditation classes and sandy volleyball courts.

Netflix recently made global headlines for offering mothers and fathers unlimited time off for up to a year after the birth or adoption of a child.

It's the yin and yang of Silicon Valley, said Megan Slabinski, district president of Robert Half Technology, a human resources consulting firm.

"All those perks - the ping pong tables, the free snacks, the free day care -- that started in the tech industry come with the job because the job is so demanding," she said. "There's a level of demand in the tech industry that translates to the work environment."

When asked if Amazon is any harder on its employees than other major tech companies, Slabinski laughed.

"Amazon isn't different culturally from other IT companies," she said. "I've been doing this for 16 years. You see the good, the bad and the ugly. If you are working for tech companies, the expectation is you are going to work really hard. This is bleeding-edge technology, and the trade-off is there's less work-life balance. The people who thrive in this industry, thrive on being on the bleeding edge. If you can't take it, you go into another industry."

Janulaitis noted that top-tier employees are always chased by other companies, but middle-tier workers - those who are doing a good job but might not be the brightest stars of the workforce - are hunkering down and staying put.

Fears of a still jittery job market have convinced a lot of people to keep their heads down, put up with whatever their managers ask of them and continue to be able to pay their mortgages, especially if they live in pricey Silicon Valley.

That, said Janulaitis, makes companies more apt to ask even more from their employees, who know they're likely stuck where they are for now.

"Once the job market changes, turnover will increase significantly in the IT field," he said.

Like stock traders working under extreme pressure on Wall Street or medical interns working 36-hour shifts, the tech industry is a high-stress environment - one that's not suited to every worker.

"If you can't live with that pressure, you should go somewhere else," said Reynolds. "For people in Silicon Valley, it's who they are. It's the kind of person they are."


Saturday 15 August 2015

Microsoft's rollout of Windows 10 gets B+ grade

General vibe of the new OS remains positive, say analysts

Microsoft has done a good job rolling out Windows 10 in the first two weeks, analysts said today, and the general vibe for Windows 8's replacement has been positive, even though glitches have dampened some enthusiasm.

"If I had to give Microsoft a letter grade, it would be a B or a B+," said Steve Kleynhans of Gartner. "It's not an A because it hasn't gone perfectly. They've stubbed their toe over privacy issues, for example."

Microsoft began serving up the free Windows 10 upgrade late on July 28, giving participants in the firm's Insider preview program first shot at the production code. It then slowly began triggering upgrade notices on Windows 7 and 8.1 machines whose owners had earlier "reserved" copies through an on-device app planted on their devices this spring.

The Redmond, Wash. company has said little of the rollout's performance other than to tout that 14 million systems were running Windows 10 within 24 hours of its debut.

Estimates based on user share data from U.S. analytics company Net Applications, however, suggests that by Aug. 8, some 45 million PCs were powered by Windows 10.

Analysts largely applauded the launch. "As far as the roll-out, it's not any worse than any other Windows," said Kleynhans. "But it's all happening at this compressed timetable.

"And social media now amplifies any problems," he continued, much more so than three years ago when Windows 8 released, much less in 2009, when Microsoft last had a hit on its hands.

Others were more bullish on Microsoft's performance. "Windows 10's go-to-market was really quite good," said Wes Miller of Directions on Microsoft, a research firm that specializes in tracking the company's moves.

Miller was especially impressed with Microsoft's ability to make customers covet the upgrade. "Something Microsoft has not always done a great job of is creating a sense of exclusivity," said Miller. "But they're withholding [the upgrade] just enough that there's a sense of excitement. People are saying, 'I want it, I'm not getting the upgrade yet.' Arguably, that exactly what Microsoft wants."

Windows 10's rollout has departed from those of past editions in significant ways.
Historically, Microsoft released a new Windows to its OEM (original equipment manufacturer) partners first, who were given months to prepare new devices pre-loaded with the operating system. Only when the computer makers were ready did Microsoft deliver paid upgrades to customers who wanted to refresh their current hardware. Relatively few users paid for the upgrades; most preferred to purchase a new PC with the new OS already installed.

This cycle, Microsoft gave away the Windows 10 upgrade to hundreds of millions of customers -- those running a Home or Pro/Professional edition of Windows 7 or Windows 8.1 -- to jumpstart the new OS's adoption. With some exceptions, the upgrade hit before OEMs had prepared new devices or seeded them to retail.

Because of the large number of customers eligible for the free upgrade, Microsoft announced it would distribute the code in several waves that would take weeks (according to Microsoft) or months (the consensus of analysts) to complete. While some had predicted that the upgrade's massive audience would stress the delivery system Microsoft had built, or even affect the Internet at large, neither happened.

The "Get Windows 10" app -- which was silently placed on PCs beginning in March -- not only served as a way to queue customers for the upgrade, but also ran compatibility checks to ensure the hardware and software would support the new operating system, another slick move by Microsoft.

"Microsoft rolled out Windows 10 to the audience that would be most receptive," said Patrick Moorhead, principal analyst at Moor Insights & Strategy, referring to the Insiders-get-it-first tactic. "Then they rolled it out to those who weren't Insiders, but who had expressed a desire to get the upgrade. And only those [whose devices] passed all of its tests got it. That was a smart thing to do."

The latter was designed to limit upgrade snafus, something Microsoft has chiefly, although not entirely, accomplished. "While the rollout was pretty clean, there have been glitchy issues here and there," said Kleynhans, who cited post-Windows-10-upgrade updates that crippled some consumers' machines.

Moorhead echoed that, highlighting the out-the-gate problem many had keeping Nvidia's graphic drivers up-to-date as Microsoft's and Nvidia's update services tussled over which got to install a driver. "Problems have been more anecdotal than system-wide," Moorhead said. "And they seem to get remedied very quickly."

The bungles haven't been widespread enough to taint the generally favorable impression of Windows 10 generated by social media, news reports and Microsoft's PR machine, the analysts argued.

"Overall, I'd say Windows 10 has received a much more positive reception than other [editions of] Windows," said Moorhead, who said the reaction was justified, since the developing consensus is that Windows 10 is a big improvement over its flop-of-a-predecessor, Windows 8.

"The vibe is positive, but it's much more about consumers now than businesses," said Directions' Miller. Enterprises, he said, will take a wait-and-see approach -- as they always do -- before jumping onto Windows 10, as they must if they're to stick with Microsoft, a given since there isn't a viable alternative.

A credible reaction from corporate customers, Miller continued, won't be visible until Microsoft finishes unveiling its update tracks, called "branches," particularly the "Long-term servicing branch" (LTSB). That branch will mimic the traditional servicing model where new features and functionality will be blocked from reaching systems that businesses don't want to see constantly changing.

"People are liking what they are getting out of the other end" of the upgrade, added Kleynhans. "From what I've heard, they're happy, surprisingly happy, and generally pretty positive about the OS. But I'd expect the new shine to wear off after the first couple of weeks."

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com



Tuesday 4 August 2015

Bad vibe brews about Windows 10

Upgrade errors, Edge-by-default, other problems and gripes sour social media buzz on new OS

Windows 10's vibe on social media has soured since Microsoft launched the operating system last week, Adobe today said as it cited new data from its metrics platform.

Adobe's Social, analytics that collect and categorize mentions from blogs, Instagram, Reddit, Tumblr, Twitter and elsewhere, has seen a turn toward skepticism since July 29, when Microsoft began distributing Windows 10 upgrades.

Adobe drops social media impressions into a bunch of buckets labeled "admiration," "anger," "anticipation," "disgust," "joy," "sadness" and "surprise."

On July 29, Windows 10 garnered 49% from admiration and joy, the two most positive categories. After launch day, however, the collective admiration + joy percentage dipped to 40%.

Also notable was the increase in the slice tagged as sadness after Wednesday: On launch day, that negative metric stood at 29%, but post-launch it climbed to 35%.

(The launch-day numbers provided today at Computerworld's request were slightly different than Adobe published last week; the latter were based on about half a day's data on July 29, the company clarified today.)

Adobe credited the changes in Windows 10 buzz factor to several sources, including publicized bugs, upgrade problems, some Microsoft practices, and even to a "ransomware" campaign now circulating that leverages the widespread news about the OS's launch.

Mentions of Windows 10 bugs -- a generic term that could include everything from quirks in the OS and its apps, to error messages encountered when trying to upgrade -- soared 10-fold in the post-launch period, Adobe said.

In the last two days, Windows 10 bug mentions on social media jumped to a daily average of more than 11,000 from a pre-launch average of just 1,150. Although the 11,000 represented a small fraction -- just 0.4% of the 3 million or so Adobe captured -- the 10-fold increase signaled that, if nothing else, a bad vibe was brewing.

Contributing to the overall sadness metric -- again, Adobe pegged that at 35% post-launch, compared to 29% on July 29 and 27% leading up to the debut -- were some surprising factors. While some were expected, including the 13% of the sadness quotient derived from generic error messages some have seen when trying to upgrade (among the least helpful, one that simply read "Something happened"), others were not.

A fifth of the sadness score came from Microsoft's decision to make the new Edge browser the default in Windows 10 unless users interrupted the "Express Settings" part of the upgrade process, or later manually switched back to a rival browser, like Google's Chrome or Mozilla's Firefox. Last week, Mozilla's CEO Chris Beard demanded that his rival, Microsoft's Satya Nadella, step in to eliminate Windows 10's browser switcheroo.

And slightly more than a fifth was attributed to a new malware campaign that is slinging the free Windows 10 upgrade as bait for ransomware, attack code that encrypts the victim's files and demands payment for unlocking them. Cisco's security team first reported the campaign on Friday.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Saturday 25 July 2015

The fake apps visit porn sites in order to click on ads

Google has removed dozens of apps from its Play Store that purport to be games but secretly click on advertisements on pornographic websites.

Security company Eset found 51 new apps that contained the "porn clicker" component, which it first discovered in April in a fake app mimicking a video app called Dubsmash.

Over the last three months, some 60 fake apps have been downloaded 210,000 times, showing how common it is for users to stumble across and download them.

"Following ESET's notification, Google has pulled the malware from the Play Store and also reports some of them as potentially harmful applications using its built-in security service," wrote Lukas Stefanko, an Eset malware researcher.

The bogus apps do not try to steal authentication credentials. If downloaded, the application presents itself as game or system application. It runs in the background and accesses porn websites and clicks on ads. The app could eat up data allowances on a person's mobile phone account.

Google scans apps uploaded to its Play Store using technology called Bouncer. The automated scan checks an app for five minutes, performing a dynamic analysis of its code, according to Trend Micro. But apps that do not misbehave in that time period may not be caught.

Although Google can catch malicious apps, malware authors have become more clever in finding ways to avoid Bouncer, which has apparently happened with the porn clicker applications.

This time around, bogus versions of Dubsmash were uploaded again along with fake versions of other legitimate apps including Pou 2, Clash of Clans 2, Subway Surfers 2, Subway Surfers 3, Minecraft 3, Flappy Birds and Hay Day 2. The harmful apps were available for almost a week.

Since it's hard for users to see if an app is malicious, Eset recommended that people pay close attention to the reviews of apps, which may provide a clue if a particular app is suspicious.

"Hopefully, Google is doing its best to fix this issue and find a way to prevent the developers of these porn clickers from publishing them to the Play Store," Eset wrote.


Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Thursday 9 July 2015

Microsoft pulls back from phone business, announces 7,800 layoffs

Microsoft is scaling down its mobile phone activities, writing off the entire value of the former Nokia smartphone business it bought last year and laying off almost one-third of that business’ staff.

The company will no longer try to build a standalone phone business, but instead plans to build a Windows ecosystem that includes its own devices, CEO Satya Nadella told staff in an email announcing the changes.

Up to 7,800 jobs will be cut, most of them in the phone business. The cuts come in addition to 18,000 layoffs announced last year: Those cuts included around half of the 25,000 staff who joined Microsoft from Nokia.

MORE ON NETWORK WORLD: 13 awesome and scary things in near Earth space

Microsoft also announced plans to write down the value of its Nokia acquisition, recording an impairment charge of US$7.6 billion. It bought the Finnish company’s devices and services business only last year for $7.2 billion.

The company explained the write-down by saying that it’s restructuring of the phone business meant that its future prospects were below original expectations. Its Lumia phones are languishing with a single-digit market share, and the company has produced no break-out successes to rival flagship phones from Samsung Electronics or Apple.

The layoffs should happen by year end, Microsoft said, adding that it would provide more information about the impairment charge in its fourth-quarter earnings announcement on July 21.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


Monday 22 June 2015

Can’t find all the tech people you need? The Blind Institute of Technology can help

The fledgling organization says there is a large untapped pool of talent waiting in the wings

Mike Hess is the founder and Executive Director of the Blind Institute of Technology, a Colorado-based nonprofit transitioning to be a national outfit, whose goal is to find tech roles for the chronically underemployed visually impaired community. Hess, who runs the organization with 40+ volunteers, including eight C-level executives on his board of directors, recently outlined his goals for Network World Editor in Chief John Dix.

Why did you start this organization and what is it about?

Mike Hess is the founder and Executive Director of the Blind Institute of Technology

I started in technology 18 years ago in the mid-90s and most of my career was in telecommunications. I started with US West as a mainframe developer and when US West Wireless started I thought that sounded fun so I moved over and that’s when I started expanding my technical skills. In the mid-2000s when VoIP became the latest craze I went and got Cisco certified and learned how to overcome those challenges, and then ultimately I ended up at Level 3 Communications.

Through all of that I noticed I was always the token blind guy in the organization, so I started doing some digging and came to realize the unemployment rate for the vision-impaired (VI) ranged from 70% to 80%. I found the numbers just staggering and I thought, I can make a difference by bringing awareness to executives here locally in Denver.

The first six to eight months was all about proof of concept. I kept knocking on doors, talking to executives, telling them about how I was able to overcome visual obstacles in environments just like theirs, so I was bringing credibility to the story. I was talking to them about the amazing candidates they were overlooking even as they were struggling to find talent. In Denver, unemployment within IT is less than two percent.

Was the focus to encourage employers to hire visually-impaired people or were you also out to encourage visually impaired people to pursue technology careers?

My initial focus was on awareness with a mission to impact unemployment. I didn’t start out to build a staffing or placement organization. That’s kind of evolved over the last two years.

Today BIT offers multiple programs designed to enable success in the workplace for both employers and the VI community. Our Education and Outreach Program (Art of Blinders) teaches organizations the true power of listening. These workshops help educate organizations about the innate assets a vision-impaired person brings to the workplace, and helps with organizational development by having participants practice listening skills while blind folded.

Our second program is Workplace Preparation. We provide technical assistance to organizations that are interested in learning how to make software accessible to consumers, or organizations that need technical assistance for a VI employee.

The third program is Certification and Training, so it is all about education. We have partnered with the Tuliva Academy in downtown Denver to offer technical certifications that are fully accessible in the classroom.

And the fourth program is Staffing and Placements. We have signed direct placement agreements and master service agreements with organizations for full-time employment, project and contract work.

Since we’re a 501C3 Nonprofit, organizations can donate to one of our programs to help us impact the unemployment within the vision-impaired community.

When you approach a large company, is it hard to get in the door or are they receptive to the idea and just haven’t thought it through?

When I talk to CIOs or CTOs I talk pure technology. I explain that bringing in technology to support visually impaired programmers adds less than one percent to software development lifecycle costs, and suddenly you have access to this large talent pool out there. Technically minded executives get this concept. Every organization is looking for scalability. When I explain how many millions of blind people there are, it’s kind of a no-brainer to start incorporating accessible technology in the workplace because it allows you to scale immediately.

Where I get more resistance is when I talk to HR types. Their goal is to mitigate risk, but I’ve found zero statistics that show that the visually impaired are any more problematic for organizations. As a matter of fact, all the testimonials and statistics I’ve found show that companies that have embraced the vision-impaired community have some of the lowest churn in the industry because, quite honestly, once I know my way to my office, I continue to walk that path. So I think the loyalty factor is a huge win for organizations.

So yeah, it’s kind of a mixed reaction, although the reason we’ve been able to grow is because when I talk to an executive I always ask if they can introduce me to two or three peers and they’re like, “Absolutely,” because what we’re selling is this amazing talent pool that they’re probably not tapping into.

How many people are visually impaired?

In Colorado alone there are 45,000 blind people between the ages of 18 and 64. And if 70%-80% are unemployed? Do the math. And the vision-impaired community has roughly the same level of higher education degrees as our sighted peers, which is about 20% percent of the population.

Then we look for the unemployed visually impaired that have what I call the AA standard. The first A is for attitude. Is your vision impairment an obstacle or is it a barrier, because if it’s a barrier, BIT is not the right organization for you. If it’s just an obstacle, and you’ve got the attitude that you can overcome whatever is in front of you, to me that is a great asset for any technical organization.

The second A is your aptitude. Do you have skills? We literally represent double master, double bachelor’s degree candidates that are just sitting on the sidelines right now chomping at the bit, waiting for a friendly organization to say, “You know what? I’m not worried about the accessible technology. I’m not worried about the perception. I’m just looking for a talented, loyal professional to help our group.”

What was it like for you to learn technology as a visually-impaired person? What kind of obstacles did you face as you pursued this career?

I think you’ll find a lot of vision impaired people can memorize copious amounts of information. When I was coding, my learning curve in the beginning was slower because I had to memorize large COBOL programs, although give me a couple of months and I was way more proficient because I knew exactly where to go to update my data division or go to my procedure division. I could do the correlating of data elements so much faster than my sighted peers because memorizing was secondary to them because they could just see what they were doing.

And because of my sight, I use a lot of tactile representations. For network topologies, for example, I would lay a document over a hard rubber mat and ask a coworker to use a pen to perforate around the shapes, giving me a tactical, three-dimensional layout.

So I leverage all my senses, I leverage every tool and technique I can. There’s actually a lot of science that quantifies how, if you use multiple senses during your transfer of information, your retention and recall go up exponentially. I’ve had high success of getting projects out on time and on budget and that is an anomaly within the IT network space.

When you were going to school for technology, was it hard to find adequate tools to help you learn?

In the early 90s IBM provided a grant to four community colleges and the program I attended was called Computer Training for People with Disabilities. It was designed to get people with physical challenges into technology organizations. There were screen reader and early speech-to-text software and other technologies, but when I first started the software that would help me had not yet arrived. However, there was another student there who had crippling carpal tunnel and so I said “I’ll be your hands, you be my eyes,” and for the first two months of the program that’s how we turned in our assignments. Today, 20 years later, the technology is so much better, thank goodness.

When you transitioned into the corporate world, did they have adequate tools for you?

Back then the technology was a lot more pricey than it is now, but organizations could write-off the investment and they were more than willing to do that because there was this boom in IT like we’re going through now.

Today the technology is so much better. One of the brilliant things Steve Jobs did with the i-devices, he went out and talked to the blindness community and made sure the very first i-device was completely accessible to the VI community. Now, for example, you have applications from companies like Salesforce that I can use to do everything a sighted person would do. The technology is 100% percent innate within iOS.

A lot of what we do now when we go in to talk to an organization is showcase the new capabilities. We say, “Here’s how the technology looks and feels, here’s some of the code you can implement, and here’s how our devices actually respond to that code.”

Are schools doing enough to prepare visually impaired people for tech roles?

In Colorado I’ve checked out all of the major universities, and the thing that saddens me is there’s not one program that actually offers an accessible technology class or tutorial. So BIT is going to be a game changer within the educational realm. We will challenge the IT programs to offer accessibility as a portion of its curriculum. Currently, Universities are not teaching anything about accessible technology. We believe that is important not just to have accessible technology available but teach students about using accessible technology. Therefore, graduates will know what it looks and feels like to code for accessibility.

We’re also partnering with a local technology school that has the curriculum for Cisco and Salesforce and Project Management certifications, and they’re going to be the first technical school in the country that is 100% percent accessible to the visually-impaired community.

So if we have a visually-impaired person reach out to us that has, say, a bachelor’s in English, we can say, “With that degree and with this certification, you’ll be able to line up for a project management role,” or something like that. So we can help them leverage their current skills, augment them with some additional certifications that are completely VI accessible, and then place them in an industry with the lowest unemployment rate out there.

Security is an interesting opportunity. A lot of healthcare organizations, for example, are building out security operation centers, and they’ve told us, “We just want the right personality. We’ll teach them the hard skills.”

Well, Mike, anything else that’s important to know about your organization that I haven’t thought to ask about?

I just want to reiterate that we have national reach. We’re completely connected with all of the blindness organizations nationwide, and this is of national importance and I know with community effort, with organizations who are just looking for talented, loyal people, BIT can absolutely be a brand name that they can come to depend on to help them get those resources out there nationwide.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com