Microsoft slates IE9 beta for September
MIcrosoft will ship a beta of Internet Explorer 9 (IE9) in September, a company executive said today.
If the timeline is accurate, the IE9 beta release will come a month later than earlier speculation, which had settled on August, a pick based in large part on PowerPoint slides purportedly from a Microsoft MCTS Training presentation that focused on Windows 8 , the next iteration of the company's OS.
Gartner Research Report: Magic Quadrant for Application Delivery Controllers, 2009: Download this special report
Today, Kevin Turner, Microsoft's chief operating officer, said that IE9 would reach beta this fall. "We're really excited about IE9, which will be beta and coming out in September," said Turner during the company's annual day-long presentation to Wall Street analysts.
Turner also boasted of Internet Explorer's recent turnaround, claiming that it had gained usage share the last two months.
According to Web analytics company Net Applications, IE did increase its global share by a record six-tenths of a percentage point during June. However, Net Applications had IE losing, not gaining, ground worldwide in May.
As of June 30, IE accounted for an estimated 60.3% of all browsers used during the month.
Since March, when the company debuted a rough-around-the-edges IE9 developer preview, the company has updated the bare-bones browser twice, most recently in late June .
After Turner's announcement of a September beta for IE9, Microsoft declined to answer additional questions, including when during the month users could expect the more stable preview, or whether the beta would be open to everyone, as the developer previews have been.
"We do not have any additional specifics to share at this time about when Internet Explorer 9 Beta will be available," a company spokeswoman said.
Microsoft has also refused to name a release schedule for the final build of IE9. Most pundits now believe Microsoft won't wrap up the browser until 2011.
That will be the case if Microsoft MCITP Certification mimics the timeline it used for Internet Explorer 8 (IE8), which reached the beta milestone in March 2008 but didn't ship until March 2009 .
Using IE8's schedule as a guide, users can expect to see the final version of IE9 in September 2011.
IE9 will run on Windows Vista and Windows 7 , but not on Windows XP, the nearly-nine-year-old operating system that still accounts for 68% of all versions of Windows still in use.
Friday, July 30, 2010
Microsoft slates IE9 beta for September
Microsoft slates IE9 beta for September
MIcrosoft will ship a beta of Internet Explorer 9 (IE9) in September, a company executive said today.
If the timeline is accurate, the IE9 beta release will come a month later than earlier speculation, which had settled on August, a pick based in large part on PowerPoint slides purportedly from a Microsoft MCTS Training presentation that focused on Windows 8 , the next iteration of the company's OS.
Gartner Research Report: Magic Quadrant for Application Delivery Controllers, 2009: Download this special report
Today, Kevin Turner, Microsoft's chief operating officer, said that IE9 would reach beta this fall. "We're really excited about IE9, which will be beta and coming out in September," said Turner during the company's annual day-long presentation to Wall Street analysts.
Turner also boasted of Internet Explorer's recent turnaround, claiming that it had gained usage share the last two months.
According to Web analytics company Net Applications, IE did increase its global share by a record six-tenths of a percentage point during June. However, Net Applications had IE losing, not gaining, ground worldwide in May.
As of June 30, IE accounted for an estimated 60.3% of all browsers used during the month.
Since March, when the company debuted a rough-around-the-edges IE9 developer preview, the company has updated the bare-bones browser twice, most recently in late June .
After Turner's announcement of a September beta for IE9, Microsoft declined to answer additional questions, including when during the month users could expect the more stable preview, or whether the beta would be open to everyone, as the developer previews have been.
"We do not have any additional specifics to share at this time about when Internet Explorer 9 Beta will be available," a company spokeswoman said.
Microsoft has also refused to name a release schedule for the final build of IE9. Most pundits now believe Microsoft won't wrap up the browser until 2011.
That will be the case if Microsoft MCITP Certification mimics the timeline it used for Internet Explorer 8 (IE8), which reached the beta milestone in March 2008 but didn't ship until March 2009 .
Using IE8's schedule as a guide, users can expect to see the final version of IE9 in September 2011.
IE9 will run on Windows Vista and Windows 7 , but not on Windows XP, the nearly-nine-year-old operating system that still accounts for 68% of all versions of Windows still in use.
MIcrosoft will ship a beta of Internet Explorer 9 (IE9) in September, a company executive said today.
If the timeline is accurate, the IE9 beta release will come a month later than earlier speculation, which had settled on August, a pick based in large part on PowerPoint slides purportedly from a Microsoft MCTS Training presentation that focused on Windows 8 , the next iteration of the company's OS.
Gartner Research Report: Magic Quadrant for Application Delivery Controllers, 2009: Download this special report
Today, Kevin Turner, Microsoft's chief operating officer, said that IE9 would reach beta this fall. "We're really excited about IE9, which will be beta and coming out in September," said Turner during the company's annual day-long presentation to Wall Street analysts.
Turner also boasted of Internet Explorer's recent turnaround, claiming that it had gained usage share the last two months.
According to Web analytics company Net Applications, IE did increase its global share by a record six-tenths of a percentage point during June. However, Net Applications had IE losing, not gaining, ground worldwide in May.
As of June 30, IE accounted for an estimated 60.3% of all browsers used during the month.
Since March, when the company debuted a rough-around-the-edges IE9 developer preview, the company has updated the bare-bones browser twice, most recently in late June .
After Turner's announcement of a September beta for IE9, Microsoft declined to answer additional questions, including when during the month users could expect the more stable preview, or whether the beta would be open to everyone, as the developer previews have been.
"We do not have any additional specifics to share at this time about when Internet Explorer 9 Beta will be available," a company spokeswoman said.
Microsoft has also refused to name a release schedule for the final build of IE9. Most pundits now believe Microsoft won't wrap up the browser until 2011.
That will be the case if Microsoft MCITP Certification mimics the timeline it used for Internet Explorer 8 (IE8), which reached the beta milestone in March 2008 but didn't ship until March 2009 .
Using IE8's schedule as a guide, users can expect to see the final version of IE9 in September 2011.
IE9 will run on Windows Vista and Windows 7 , but not on Windows XP, the nearly-nine-year-old operating system that still accounts for 68% of all versions of Windows still in use.
Microsoft research depth enabled Kinect
Mundie: Microsoft's research depth enabled Kinect
Few companies have the research depth to build something like Kinect, Microsoft's forthcoming Xbox add-on that allows a user to control a game through body movements -- in fact, Microsoft itself initially thought it would be impossible, its top research executive said Thursday.
Microsoft MCTS Training came up with the concept behind Kinect after the Wii proved there is a gaming segment beyond the traditional young male, said Craig Mundie, Microsoft's chief research and strategy officer, speaking at the company's annual analyst day. The company sought to advance the Wii idea by getting rid of the controller completely, he said.
Least Privilege Application Compatibility for Windows 7 Migrations: Download now
People in the Xbox business unit researched the concept and determined it couldn't be done, he said. "They concluded it was impossible. It wasn't going to work," he said.
But then they decided to approach workers in Microsoft's research arm. Researchers there in a wide array of fields including depth sensing, machine learning, speech recognition, gestural interface, computer vision, identity recognition, sound processing and parallel computing got together to build what is now known as Kinect.
"To build this product, you had to have all of them," Mundie said. Few if any other companies are likely to have researchers in all of those fields, he said.
Microsoft will have gone, in three years, from "impossible to shipping" when it starts sending out Kinects, Mundie said. The Kinect will be available in early November, he said.
The 3-D sensing technology for Kinect comes from the Israeli chip-design startup PrimeSense. The technology senses a user's movements, such as a kick, jump or punch. PrimeSense is supplying the chips for Kinect, which had been called "Project Natal" during research and development, as well as licensing the reference design for the 3D sensor.
The concept behind Kinect has applications beyond gaming, Mundie noted. "It portends a revolution in the way people will interact with computers," Mundie said.
But Kinect is only one half of the puzzle. While it handles natural user interface on the input side, computers will also need a natural interface on the output side. To display a combination of the two, Mundie showed a video clip of a research product the company has been working on. It showed a woman speaking with an avatar of a nurse on a computer about her son's illness. The woman and the avatar interacted as a patient might talk to a nurse Microsoft MCITP Certification.
Few companies have the research depth to build something like Kinect, Microsoft's forthcoming Xbox add-on that allows a user to control a game through body movements -- in fact, Microsoft itself initially thought it would be impossible, its top research executive said Thursday.
Microsoft MCTS Training came up with the concept behind Kinect after the Wii proved there is a gaming segment beyond the traditional young male, said Craig Mundie, Microsoft's chief research and strategy officer, speaking at the company's annual analyst day. The company sought to advance the Wii idea by getting rid of the controller completely, he said.
Least Privilege Application Compatibility for Windows 7 Migrations: Download now
People in the Xbox business unit researched the concept and determined it couldn't be done, he said. "They concluded it was impossible. It wasn't going to work," he said.
But then they decided to approach workers in Microsoft's research arm. Researchers there in a wide array of fields including depth sensing, machine learning, speech recognition, gestural interface, computer vision, identity recognition, sound processing and parallel computing got together to build what is now known as Kinect.
"To build this product, you had to have all of them," Mundie said. Few if any other companies are likely to have researchers in all of those fields, he said.
Microsoft will have gone, in three years, from "impossible to shipping" when it starts sending out Kinects, Mundie said. The Kinect will be available in early November, he said.
The 3-D sensing technology for Kinect comes from the Israeli chip-design startup PrimeSense. The technology senses a user's movements, such as a kick, jump or punch. PrimeSense is supplying the chips for Kinect, which had been called "Project Natal" during research and development, as well as licensing the reference design for the 3D sensor.
The concept behind Kinect has applications beyond gaming, Mundie noted. "It portends a revolution in the way people will interact with computers," Mundie said.
But Kinect is only one half of the puzzle. While it handles natural user interface on the input side, computers will also need a natural interface on the output side. To display a combination of the two, Mundie showed a video clip of a research product the company has been working on. It showed a woman speaking with an avatar of a nurse on a computer about her son's illness. The woman and the avatar interacted as a patient might talk to a nurse Microsoft MCITP Certification.
Microsoft research depth enabled Kinect
Mundie: Microsoft's research depth enabled Kinect
Few companies have the research depth to build something like Kinect, Microsoft's forthcoming Xbox add-on that allows a user to control a game through body movements -- in fact, Microsoft itself initially thought it would be impossible, its top research executive said Thursday.
Microsoft MCTS Training came up with the concept behind Kinect after the Wii proved there is a gaming segment beyond the traditional young male, said Craig Mundie, Microsoft's chief research and strategy officer, speaking at the company's annual analyst day. The company sought to advance the Wii idea by getting rid of the controller completely, he said.
Least Privilege Application Compatibility for Windows 7 Migrations: Download now
People in the Xbox business unit researched the concept and determined it couldn't be done, he said. "They concluded it was impossible. It wasn't going to work," he said.
But then they decided to approach workers in Microsoft's research arm. Researchers there in a wide array of fields including depth sensing, machine learning, speech recognition, gestural interface, computer vision, identity recognition, sound processing and parallel computing got together to build what is now known as Kinect.
"To build this product, you had to have all of them," Mundie said. Few if any other companies are likely to have researchers in all of those fields, he said.
Microsoft will have gone, in three years, from "impossible to shipping" when it starts sending out Kinects, Mundie said. The Kinect will be available in early November, he said.
The 3-D sensing technology for Kinect comes from the Israeli chip-design startup PrimeSense. The technology senses a user's movements, such as a kick, jump or punch. PrimeSense is supplying the chips for Kinect, which had been called "Project Natal" during research and development, as well as licensing the reference design for the 3D sensor.
The concept behind Kinect has applications beyond gaming, Mundie noted. "It portends a revolution in the way people will interact with computers," Mundie said.
But Kinect is only one half of the puzzle. While it handles natural user interface on the input side, computers will also need a natural interface on the output side. To display a combination of the two, Mundie showed a video clip of a research product the company has been working on. It showed a woman speaking with an avatar of a nurse on a computer about her son's illness. The woman and the avatar interacted as a patient might talk to a nurse Microsoft MCITP Certification.
Few companies have the research depth to build something like Kinect, Microsoft's forthcoming Xbox add-on that allows a user to control a game through body movements -- in fact, Microsoft itself initially thought it would be impossible, its top research executive said Thursday.
Microsoft MCTS Training came up with the concept behind Kinect after the Wii proved there is a gaming segment beyond the traditional young male, said Craig Mundie, Microsoft's chief research and strategy officer, speaking at the company's annual analyst day. The company sought to advance the Wii idea by getting rid of the controller completely, he said.
Least Privilege Application Compatibility for Windows 7 Migrations: Download now
People in the Xbox business unit researched the concept and determined it couldn't be done, he said. "They concluded it was impossible. It wasn't going to work," he said.
But then they decided to approach workers in Microsoft's research arm. Researchers there in a wide array of fields including depth sensing, machine learning, speech recognition, gestural interface, computer vision, identity recognition, sound processing and parallel computing got together to build what is now known as Kinect.
"To build this product, you had to have all of them," Mundie said. Few if any other companies are likely to have researchers in all of those fields, he said.
Microsoft will have gone, in three years, from "impossible to shipping" when it starts sending out Kinects, Mundie said. The Kinect will be available in early November, he said.
The 3-D sensing technology for Kinect comes from the Israeli chip-design startup PrimeSense. The technology senses a user's movements, such as a kick, jump or punch. PrimeSense is supplying the chips for Kinect, which had been called "Project Natal" during research and development, as well as licensing the reference design for the 3D sensor.
The concept behind Kinect has applications beyond gaming, Mundie noted. "It portends a revolution in the way people will interact with computers," Mundie said.
But Kinect is only one half of the puzzle. While it handles natural user interface on the input side, computers will also need a natural interface on the output side. To display a combination of the two, Mundie showed a video clip of a research product the company has been working on. It showed a woman speaking with an avatar of a nurse on a computer about her son's illness. The woman and the avatar interacted as a patient might talk to a nurse Microsoft MCITP Certification.
Wednesday, July 28, 2010
Microsoft Security Essentials beta out just when it needed most
Microsoft Security Essentials beta out just when it needed most
As Microsoft and everyone else running a Windows shop scrambles to thwart a “highly dangerous zero-day vulnerability,” the software giant stays on schedule, today releasing a beta version of the next Microsoft MCTS Training Security Essentials anti-malware service.
Security Essentials, launched in September 2009, is free software that protects computers running ”genuine” versions of Windows XP, Windows Vista and Windows 7. On a blog post Tuesday, Microsoft’s Brandon LeBlanc itemizes the new features of the beta:
Windows firewall integration. During setup, Security Essentials gives users the option of turning the Windows Firewall on or off.
Enhanced protection for web-based threats. Security Essentials integrates with the Internet Explorer Web browser to protect against Web-based threats.
New protection engine. The beta offers enhanced performance, detection and cleanup of malware.
Network inspection system. Security Essentials will now have built-in protection from network-based exploits.
It’s unlikely the new Microsoft Security Essentials beta will protect against the latest zero-day vulnerability since so little is known about it -- except that it’s bad. As Network World's Jon Brodkin reported, the threat "allows attackers to hack systems using malicious shortcut files. The vulnerability could be exploited remotely, but is more likely to be exploited using removable drives, such as USB sticks, according to Microsoft MCITP Certification." The company said it has some "workarounds" to minimize the threat but no patch as of yet.
Security Essentials ranked fourth in market share -- at 7.48 percent -- among free computer security software offerings, according to a study released earlier this month by Opswat, a security software vendor.
This latest beta version of Security Essentials is available now on a limited, first-come-first-served basis in English, Israel and Brazilian Portuguese. It will be available in China in Simplified Chinese later this year.
As Microsoft and everyone else running a Windows shop scrambles to thwart a “highly dangerous zero-day vulnerability,” the software giant stays on schedule, today releasing a beta version of the next Microsoft MCTS Training Security Essentials anti-malware service.
Security Essentials, launched in September 2009, is free software that protects computers running ”genuine” versions of Windows XP, Windows Vista and Windows 7. On a blog post Tuesday, Microsoft’s Brandon LeBlanc itemizes the new features of the beta:
Windows firewall integration. During setup, Security Essentials gives users the option of turning the Windows Firewall on or off.
Enhanced protection for web-based threats. Security Essentials integrates with the Internet Explorer Web browser to protect against Web-based threats.
New protection engine. The beta offers enhanced performance, detection and cleanup of malware.
Network inspection system. Security Essentials will now have built-in protection from network-based exploits.
It’s unlikely the new Microsoft Security Essentials beta will protect against the latest zero-day vulnerability since so little is known about it -- except that it’s bad. As Network World's Jon Brodkin reported, the threat "allows attackers to hack systems using malicious shortcut files. The vulnerability could be exploited remotely, but is more likely to be exploited using removable drives, such as USB sticks, according to Microsoft MCITP Certification." The company said it has some "workarounds" to minimize the threat but no patch as of yet.
Security Essentials ranked fourth in market share -- at 7.48 percent -- among free computer security software offerings, according to a study released earlier this month by Opswat, a security software vendor.
This latest beta version of Security Essentials is available now on a limited, first-come-first-served basis in English, Israel and Brazilian Portuguese. It will be available in China in Simplified Chinese later this year.
Microsoft Security Essentials beta out just when it needed most
Microsoft Security Essentials beta out just when it needed most
As Microsoft and everyone else running a Windows shop scrambles to thwart a “highly dangerous zero-day vulnerability,” the software giant stays on schedule, today releasing a beta version of the next Microsoft MCTS Training Security Essentials anti-malware service.
Security Essentials, launched in September 2009, is free software that protects computers running ”genuine” versions of Windows XP, Windows Vista and Windows 7. On a blog post Tuesday, Microsoft’s Brandon LeBlanc itemizes the new features of the beta:
Windows firewall integration. During setup, Security Essentials gives users the option of turning the Windows Firewall on or off.
Enhanced protection for web-based threats. Security Essentials integrates with the Internet Explorer Web browser to protect against Web-based threats.
New protection engine. The beta offers enhanced performance, detection and cleanup of malware.
Network inspection system. Security Essentials will now have built-in protection from network-based exploits.
It’s unlikely the new Microsoft Security Essentials beta will protect against the latest zero-day vulnerability since so little is known about it -- except that it’s bad. As Network World's Jon Brodkin reported, the threat "allows attackers to hack systems using malicious shortcut files. The vulnerability could be exploited remotely, but is more likely to be exploited using removable drives, such as USB sticks, according to Microsoft MCITP Certification." The company said it has some "workarounds" to minimize the threat but no patch as of yet.
Security Essentials ranked fourth in market share -- at 7.48 percent -- among free computer security software offerings, according to a study released earlier this month by Opswat, a security software vendor.
This latest beta version of Security Essentials is available now on a limited, first-come-first-served basis in English, Israel and Brazilian Portuguese. It will be available in China in Simplified Chinese later this year.
As Microsoft and everyone else running a Windows shop scrambles to thwart a “highly dangerous zero-day vulnerability,” the software giant stays on schedule, today releasing a beta version of the next Microsoft MCTS Training Security Essentials anti-malware service.
Security Essentials, launched in September 2009, is free software that protects computers running ”genuine” versions of Windows XP, Windows Vista and Windows 7. On a blog post Tuesday, Microsoft’s Brandon LeBlanc itemizes the new features of the beta:
Windows firewall integration. During setup, Security Essentials gives users the option of turning the Windows Firewall on or off.
Enhanced protection for web-based threats. Security Essentials integrates with the Internet Explorer Web browser to protect against Web-based threats.
New protection engine. The beta offers enhanced performance, detection and cleanup of malware.
Network inspection system. Security Essentials will now have built-in protection from network-based exploits.
It’s unlikely the new Microsoft Security Essentials beta will protect against the latest zero-day vulnerability since so little is known about it -- except that it’s bad. As Network World's Jon Brodkin reported, the threat "allows attackers to hack systems using malicious shortcut files. The vulnerability could be exploited remotely, but is more likely to be exploited using removable drives, such as USB sticks, according to Microsoft MCITP Certification." The company said it has some "workarounds" to minimize the threat but no patch as of yet.
Security Essentials ranked fourth in market share -- at 7.48 percent -- among free computer security software offerings, according to a study released earlier this month by Opswat, a security software vendor.
This latest beta version of Security Essentials is available now on a limited, first-come-first-served basis in English, Israel and Brazilian Portuguese. It will be available in China in Simplified Chinese later this year.
Tuesday, July 20, 2010
The Ongoing Transformation Of Hardware
The Ongoing Transformation Of Hardware
Before the 1970s the word “hardware” usually meant one of two things: the beautiful chrome handles on your new dresser and the kitchen cabinets, or the hammer, saw, and nails that you purchased at the local hardware store. Then came the computer boom! Hardware took on a new meaning! If all the programming that made a computer work were called software, then the hard box and its components took on the name of hardware Microsoft MCTS Training.
Hardware became a massive, competitive industry that expanded beyond the largest, most powerful dreams of the 1970s. Made of hundreds of various components that can be added, disconnected or exchanged depending on which features you want, the computer has a versatility that is limited only by ones imagination, budget and, realistically, one’s patience.
The basic components consist of the system unit itself (which contains the so-called brains of the computer, the CPU, plus various items referred to as ‘boards’), the keyboard, mouse, speakers, and of course, the monitor. To these basics one can add printers, scanners, PC cameras, digital cameras, video cameras, and joysticks.
During the mid 1980s several home-type computers became available for the courageous home-computer geek. These used only floppy disks, for the hard disk was still not portable in size. Writing a book could use up to 75 floppy disks and nevertheless was a major improvement over creating or working with a typewriter.
After a few years the amazingly huge 10 MB Hard Disk came out for home use, replacing the need for using floppies except for backups. Since 10 MB didn’t really hold all much data, the world of floppies was still lively.
There was a word whispered about in murmurs in computer circles back then: Gigabyte! It meant something so huge in size that the human mind couldn’t quite grasp it. Then it happened. A 100 MB hard disk evolved into a 1 Gigabyte hard disk. People wondered if it could possibly be reliable. And while they wondered, computer stores started selling 10 Gigabyte hard disks. People blinked and the hard disks were 100 Gigabytes.
While the capacity of the hard disk increased, the size of the outside hardware began to get smaller and smaller, and before long – there it is, sitting in the palm of your hand! The flexibility of the hardware opens the door to thousands of various software applications: now, instead of using the keyboard to punch in letters, one can just talk to a computer and it will record what was said. Modern e-mail delights people of all ages as they communicate in seconds around the world. And, computers can also read your e-mail back to you in the language of your choice Microsoft MCITP Certification.
The competition between the hardware manufacturers has resulted in prices dropping and dropping, creating a beautiful opportunity for people of all income levels and all ages to now enjoy a computer in their own home.
Before the 1970s the word “hardware” usually meant one of two things: the beautiful chrome handles on your new dresser and the kitchen cabinets, or the hammer, saw, and nails that you purchased at the local hardware store. Then came the computer boom! Hardware took on a new meaning! If all the programming that made a computer work were called software, then the hard box and its components took on the name of hardware Microsoft MCTS Training.
Hardware became a massive, competitive industry that expanded beyond the largest, most powerful dreams of the 1970s. Made of hundreds of various components that can be added, disconnected or exchanged depending on which features you want, the computer has a versatility that is limited only by ones imagination, budget and, realistically, one’s patience.
The basic components consist of the system unit itself (which contains the so-called brains of the computer, the CPU, plus various items referred to as ‘boards’), the keyboard, mouse, speakers, and of course, the monitor. To these basics one can add printers, scanners, PC cameras, digital cameras, video cameras, and joysticks.
During the mid 1980s several home-type computers became available for the courageous home-computer geek. These used only floppy disks, for the hard disk was still not portable in size. Writing a book could use up to 75 floppy disks and nevertheless was a major improvement over creating or working with a typewriter.
After a few years the amazingly huge 10 MB Hard Disk came out for home use, replacing the need for using floppies except for backups. Since 10 MB didn’t really hold all much data, the world of floppies was still lively.
There was a word whispered about in murmurs in computer circles back then: Gigabyte! It meant something so huge in size that the human mind couldn’t quite grasp it. Then it happened. A 100 MB hard disk evolved into a 1 Gigabyte hard disk. People wondered if it could possibly be reliable. And while they wondered, computer stores started selling 10 Gigabyte hard disks. People blinked and the hard disks were 100 Gigabytes.
While the capacity of the hard disk increased, the size of the outside hardware began to get smaller and smaller, and before long – there it is, sitting in the palm of your hand! The flexibility of the hardware opens the door to thousands of various software applications: now, instead of using the keyboard to punch in letters, one can just talk to a computer and it will record what was said. Modern e-mail delights people of all ages as they communicate in seconds around the world. And, computers can also read your e-mail back to you in the language of your choice Microsoft MCITP Certification.
The competition between the hardware manufacturers has resulted in prices dropping and dropping, creating a beautiful opportunity for people of all income levels and all ages to now enjoy a computer in their own home.
The Ongoing Transformation Of Hardware
The Ongoing Transformation Of Hardware
Before the 1970s the word “hardware” usually meant one of two things: the beautiful chrome handles on your new dresser and the kitchen cabinets, or the hammer, saw, and nails that you purchased at the local hardware store. Then came the computer boom! Hardware took on a new meaning! If all the programming that made a computer work were called software, then the hard box and its components took on the name of hardware Microsoft MCTS Training.
Hardware became a massive, competitive industry that expanded beyond the largest, most powerful dreams of the 1970s. Made of hundreds of various components that can be added, disconnected or exchanged depending on which features you want, the computer has a versatility that is limited only by ones imagination, budget and, realistically, one’s patience.
The basic components consist of the system unit itself (which contains the so-called brains of the computer, the CPU, plus various items referred to as ‘boards’), the keyboard, mouse, speakers, and of course, the monitor. To these basics one can add printers, scanners, PC cameras, digital cameras, video cameras, and joysticks.
During the mid 1980s several home-type computers became available for the courageous home-computer geek. These used only floppy disks, for the hard disk was still not portable in size. Writing a book could use up to 75 floppy disks and nevertheless was a major improvement over creating or working with a typewriter.
After a few years the amazingly huge 10 MB Hard Disk came out for home use, replacing the need for using floppies except for backups. Since 10 MB didn’t really hold all much data, the world of floppies was still lively.
There was a word whispered about in murmurs in computer circles back then: Gigabyte! It meant something so huge in size that the human mind couldn’t quite grasp it. Then it happened. A 100 MB hard disk evolved into a 1 Gigabyte hard disk. People wondered if it could possibly be reliable. And while they wondered, computer stores started selling 10 Gigabyte hard disks. People blinked and the hard disks were 100 Gigabytes.
While the capacity of the hard disk increased, the size of the outside hardware began to get smaller and smaller, and before long – there it is, sitting in the palm of your hand! The flexibility of the hardware opens the door to thousands of various software applications: now, instead of using the keyboard to punch in letters, one can just talk to a computer and it will record what was said. Modern e-mail delights people of all ages as they communicate in seconds around the world. And, computers can also read your e-mail back to you in the language of your choice Microsoft MCITP Certification.
The competition between the hardware manufacturers has resulted in prices dropping and dropping, creating a beautiful opportunity for people of all income levels and all ages to now enjoy a computer in their own home.
Before the 1970s the word “hardware” usually meant one of two things: the beautiful chrome handles on your new dresser and the kitchen cabinets, or the hammer, saw, and nails that you purchased at the local hardware store. Then came the computer boom! Hardware took on a new meaning! If all the programming that made a computer work were called software, then the hard box and its components took on the name of hardware Microsoft MCTS Training.
Hardware became a massive, competitive industry that expanded beyond the largest, most powerful dreams of the 1970s. Made of hundreds of various components that can be added, disconnected or exchanged depending on which features you want, the computer has a versatility that is limited only by ones imagination, budget and, realistically, one’s patience.
The basic components consist of the system unit itself (which contains the so-called brains of the computer, the CPU, plus various items referred to as ‘boards’), the keyboard, mouse, speakers, and of course, the monitor. To these basics one can add printers, scanners, PC cameras, digital cameras, video cameras, and joysticks.
During the mid 1980s several home-type computers became available for the courageous home-computer geek. These used only floppy disks, for the hard disk was still not portable in size. Writing a book could use up to 75 floppy disks and nevertheless was a major improvement over creating or working with a typewriter.
After a few years the amazingly huge 10 MB Hard Disk came out for home use, replacing the need for using floppies except for backups. Since 10 MB didn’t really hold all much data, the world of floppies was still lively.
There was a word whispered about in murmurs in computer circles back then: Gigabyte! It meant something so huge in size that the human mind couldn’t quite grasp it. Then it happened. A 100 MB hard disk evolved into a 1 Gigabyte hard disk. People wondered if it could possibly be reliable. And while they wondered, computer stores started selling 10 Gigabyte hard disks. People blinked and the hard disks were 100 Gigabytes.
While the capacity of the hard disk increased, the size of the outside hardware began to get smaller and smaller, and before long – there it is, sitting in the palm of your hand! The flexibility of the hardware opens the door to thousands of various software applications: now, instead of using the keyboard to punch in letters, one can just talk to a computer and it will record what was said. Modern e-mail delights people of all ages as they communicate in seconds around the world. And, computers can also read your e-mail back to you in the language of your choice Microsoft MCITP Certification.
The competition between the hardware manufacturers has resulted in prices dropping and dropping, creating a beautiful opportunity for people of all income levels and all ages to now enjoy a computer in their own home.
Sunday, July 18, 2010
Linux Dedicated Cheap Web Hosting Servers London UK
Linux Dedicated Cheap Web Hosting Servers London UK
Reliable, Affordable and Business material hosting service is requisite matter for online rental companies. hosting are many sort much as reseller hosting, realistic offstage server, free of web hosting, collocation web hosting, organized inaugurated servers and given out inaugurated hosting etc
When we want to run of website on Internet then we require a space on Internet. This grapheme accommodated by cloth hosting complement Microsoft MCTS Training. Web hosting religious service provider sacrifice many irresistible bundle but these bundles may be role player. Actually we be ungenerous web hosting and given servers
Now most popular hosting servers are Linux dedicated hosting servers and windows hosting servers. When we take organization to textile hosting disservice we should be bill sticking features:-
Web space 100MB and 1500MB etc
Bandwidth/Month such as 500MB, 1000MB, 2000MB, 3000MB and 5000MB etc
Other features such as Install activation, secure c panel and web mail, .htaccess leg, MySQL database, phphmydmin GUI, textile logs and reports, anti representation activity, personal SMTP divide, FTP accounts, multi voice communication mastery board and attendance appointed according features
Free Web Hosting: free cpanel hosting, free Linux hosting and other web hosting service offer only for advertisement supported and limited functionality
Shared dedicated hosting: multiple users share same server such as cpanel hosting and plesk hosting.
Reseller Hosting: Linux or windows reseller hosting provides total control themselves clients. Reseller Hosting World Wide Web hosting furnish fate of untrammeled features much as untrammeled MySQL database, alteration password, untrammeled FTP code, untrammeled SMTP server, untrammeled hero domains and many other features
Virtual Private Server: this is also popular as Virtual Dedicated Server. In this profession an immense server changed into triple servers and each server can reboot severally.
In UK has many companies those condition windows and Linux website hosting inspection and repair. Some unit declare oneself inferior value reseller hosting, aweigh Linux hosting, headline swap and ecommerce vane hosting service extract.
The hosting services should be dedicated and reliable because all IT and other companies depend on online transactions Microsoft MCITP Certification. Now onshore outsourcing business is necessary for all countries and Time to indication involve background from intact worldly concern. Any inquiry or monumental information can spring up from any where to establishment. If hosting company server down so lot of dolor deductible will be end. So hosting companies sphere relaxation nutlike the timekeeper
Reliable, Affordable and Business material hosting service is requisite matter for online rental companies. hosting are many sort much as reseller hosting, realistic offstage server, free of web hosting, collocation web hosting, organized inaugurated servers and given out inaugurated hosting etc
When we want to run of website on Internet then we require a space on Internet. This grapheme accommodated by cloth hosting complement Microsoft MCTS Training. Web hosting religious service provider sacrifice many irresistible bundle but these bundles may be role player. Actually we be ungenerous web hosting and given servers
Now most popular hosting servers are Linux dedicated hosting servers and windows hosting servers. When we take organization to textile hosting disservice we should be bill sticking features:-
Web space 100MB and 1500MB etc
Bandwidth/Month such as 500MB, 1000MB, 2000MB, 3000MB and 5000MB etc
Other features such as Install activation, secure c panel and web mail, .htaccess leg, MySQL database, phphmydmin GUI, textile logs and reports, anti representation activity, personal SMTP divide, FTP accounts, multi voice communication mastery board and attendance appointed according features
Free Web Hosting: free cpanel hosting, free Linux hosting and other web hosting service offer only for advertisement supported and limited functionality
Shared dedicated hosting: multiple users share same server such as cpanel hosting and plesk hosting.
Reseller Hosting: Linux or windows reseller hosting provides total control themselves clients. Reseller Hosting World Wide Web hosting furnish fate of untrammeled features much as untrammeled MySQL database, alteration password, untrammeled FTP code, untrammeled SMTP server, untrammeled hero domains and many other features
Virtual Private Server: this is also popular as Virtual Dedicated Server. In this profession an immense server changed into triple servers and each server can reboot severally.
In UK has many companies those condition windows and Linux website hosting inspection and repair. Some unit declare oneself inferior value reseller hosting, aweigh Linux hosting, headline swap and ecommerce vane hosting service extract.
The hosting services should be dedicated and reliable because all IT and other companies depend on online transactions Microsoft MCITP Certification. Now onshore outsourcing business is necessary for all countries and Time to indication involve background from intact worldly concern. Any inquiry or monumental information can spring up from any where to establishment. If hosting company server down so lot of dolor deductible will be end. So hosting companies sphere relaxation nutlike the timekeeper
Saturday, July 17, 2010
IBM New Software Platform To Help Create Intelligent Products
IBM New Software Platform To Help Create Intelligent Products
IBM's new software platform and related services will help manufacturers create more intelligent products at low cost.
To help manufacturers and designers create products that enable people to live and work in a smarter manner, IBM has launched a new software platform Microsoft MCTS Training.
To help manufacturers and designers create products that enable people to live and work in a smarter manner, IBM has launched a new software platform. The software, with related services, will provide capabilities that support collaboration, and help reduce the cost and risk of bringing more intelligent, instrumented and interconnected products to market, the company claims.
It will provide a fully integrated software delivery platform that addresses requirements, design, development and management -- across electrical, mechanical and software technologies.
The platforms and services launched include:
* IBM Rational Team Webtop -- the integrated user front-end to increase communication and productivity
* IBM Rational DOORS -- that enables an expanded set of stakeholders to review, analyse and modify requirements
* IBM Rational Change and IBM Rational Synergy -- that help companies improve application quality
* IBM Rational Team Concert -- that provides new levels of scalability and security to enable collaborative and agile development among distributed product teams, and
* IBM Rational Rhapsody -- that helps identify and correct potential design flaws as early as possible.
All these platforms and services will allow manufacturers to bring out low-cost but intelligent products.
(For more on the platforms and tools keep watching this space!) Microsoft MCITP Certification
IBM's new software platform and related services will help manufacturers create more intelligent products at low cost.
To help manufacturers and designers create products that enable people to live and work in a smarter manner, IBM has launched a new software platform Microsoft MCTS Training.
To help manufacturers and designers create products that enable people to live and work in a smarter manner, IBM has launched a new software platform. The software, with related services, will provide capabilities that support collaboration, and help reduce the cost and risk of bringing more intelligent, instrumented and interconnected products to market, the company claims.
It will provide a fully integrated software delivery platform that addresses requirements, design, development and management -- across electrical, mechanical and software technologies.
The platforms and services launched include:
* IBM Rational Team Webtop -- the integrated user front-end to increase communication and productivity
* IBM Rational DOORS -- that enables an expanded set of stakeholders to review, analyse and modify requirements
* IBM Rational Change and IBM Rational Synergy -- that help companies improve application quality
* IBM Rational Team Concert -- that provides new levels of scalability and security to enable collaborative and agile development among distributed product teams, and
* IBM Rational Rhapsody -- that helps identify and correct potential design flaws as early as possible.
All these platforms and services will allow manufacturers to bring out low-cost but intelligent products.
(For more on the platforms and tools keep watching this space!) Microsoft MCITP Certification
Friday, July 16, 2010
Open Source: A Panacea For The Recession
Open Source: A Panacea For The Recession
As the recession grips more economies and enterprises, it's the perfect time to adopt the open source business model. We explain why.
the technology landscape has been undergoing a massive transformation over the past couple of years. In the early 2000s Microsoft MCTS Training, organisations were going after products and appliances irrationally, investing huge sums without any guarantees of a quantifiable ROI (return on investment). Today, awareness of technology has grown and organisations tend to demand a measurable ROI before adopting a new technology. Open source software has always been a good option to provide effective solutions within relatively low budgets. Not surprisingly, a number of organisations have started adopting open source software solutions. This trend has been boosted by the ongoing recession, with companies looking to cut costs.
Foss1Open source can mean big bucks!
The revenues of Red Hat grew by 14 per cent during the last economic bust in 2001-2002, which then increased to 38 per cent and 58 per cent in 2003 and 2004, respectively, demonstrating the increased usage of open source software during the economic crunch. Novell also showed interest in playing a significant role in the open source software market in November 2003 by acquiring SUSE Linux for $210 million. Last year, Sun Microsystems acquired MySQL AB, the developer of the world's most popular and fastest growing database, for $1 billion. Writing open source software enables a company to gain access to the open community, which in turn helps in accelerating the pace at which an idea matures.
John Roberts, CEO and founder, SugarCRM, started his company in 2004 with a commercial open source concept. In one of his interviews given to Sramana Mitra, in December 2008, he said, "I convinced two strong engineers at E.piphany to join me. We all resigned together and started SugarCRM without any angel or VC (venture capitalist) money. It was the three of us, each in his house with headphones on, writing and designing code and posting it up on SourceForge.net. We did that for three months. And soon enough, people all over the world started downloading the code." Early this year, SugarCRM joined hands with Tata Communications to make its software accessible to the Indian industry.
A matter of generating revenues
But how do open source software companies make money? There are a variety of business models to generate revenues from open source software:
• Releasing commercial extensions/plug-ins to open source software
• Offering free community-based editions and paid commercial editions with more functionality and features
• Using free and open source to gain media attention, and attract users who might become potential customers for other commercial products
• Offering paid technical support along with free community-based support
• Making the software available via the Internet like on-demand applications, and offering paid subscriptions for online accounts and services
The point about paid technical support is particularly relevant in these times. A recent survey by IDC, a global market intelligence firm, suggests: "The economic slowdown in the United States may actually boost demand for open source services. If organisations adopt more open source software as part of a strategy to reduce software costs, the demand for related services should increase." Many service providers have switched from expensive proprietary system management software to open source software like OpenNMS, Zenoss, Hyperic, Groundworks, Nagios, etc, so that they can cut down the technology cost overheads of their customers.
Zoho_vs_Salesforce
Finally, the SaaS (Software as a Service) business model has proved successful. SaaS delivers non-intrusive and hassle-free cloud-based products via a subscription-based model with no one-time costs involved-an organisation can pay as per software usage. The key to success for a SaaS player is obviously best technology usage, application features, and more importantly, an optimised pricing model. Coming up with a competitive pricing model becomes very difficult if the technology is built over expensive hardware or proprietary software licences. This challenge provides a great opportunity to utilise open source software as SaaS-ready solutions. The success enjoyed by companies like SugarCRM, Zoho (a Chennai-based offshoot of AdventNet) and Zimbra (acquired by Yahoo! in 2007 for $350 million), follows the same concept-enabling organisations to reduce their IT expenditure and increase flexibility by leveraging open source software. Zoho prepared a cost saving chart that compared its services with those offered by its competitor, SalesForce, highlighting the difference in costs between the two (see diagram).
According to Springboard Research, the Indian SaaS market is set to reach $165 million by 2010, due to a compound annual growth rate (CAGR) of 77 per cent from 2006 to 2010. We might see greater demand for software available under SaaS model running over private clouds or corporate networks than public clouds due to data security and compliance regulations, but small and medium-sized companies can utilise the software over public clouds to boost their performance at a much lower cost Microsoft MCITP Certification. The increasing demands for such models provides a huge opportunity for service providers to make a shift from traditional delivery models to avant-garde technology models. The economy might be having a tough time, but if they play their cards right, open source companies might never have had it so good.
As the recession grips more economies and enterprises, it's the perfect time to adopt the open source business model. We explain why.
the technology landscape has been undergoing a massive transformation over the past couple of years. In the early 2000s Microsoft MCTS Training, organisations were going after products and appliances irrationally, investing huge sums without any guarantees of a quantifiable ROI (return on investment). Today, awareness of technology has grown and organisations tend to demand a measurable ROI before adopting a new technology. Open source software has always been a good option to provide effective solutions within relatively low budgets. Not surprisingly, a number of organisations have started adopting open source software solutions. This trend has been boosted by the ongoing recession, with companies looking to cut costs.
Foss1Open source can mean big bucks!
The revenues of Red Hat grew by 14 per cent during the last economic bust in 2001-2002, which then increased to 38 per cent and 58 per cent in 2003 and 2004, respectively, demonstrating the increased usage of open source software during the economic crunch. Novell also showed interest in playing a significant role in the open source software market in November 2003 by acquiring SUSE Linux for $210 million. Last year, Sun Microsystems acquired MySQL AB, the developer of the world's most popular and fastest growing database, for $1 billion. Writing open source software enables a company to gain access to the open community, which in turn helps in accelerating the pace at which an idea matures.
John Roberts, CEO and founder, SugarCRM, started his company in 2004 with a commercial open source concept. In one of his interviews given to Sramana Mitra, in December 2008, he said, "I convinced two strong engineers at E.piphany to join me. We all resigned together and started SugarCRM without any angel or VC (venture capitalist) money. It was the three of us, each in his house with headphones on, writing and designing code and posting it up on SourceForge.net. We did that for three months. And soon enough, people all over the world started downloading the code." Early this year, SugarCRM joined hands with Tata Communications to make its software accessible to the Indian industry.
A matter of generating revenues
But how do open source software companies make money? There are a variety of business models to generate revenues from open source software:
• Releasing commercial extensions/plug-ins to open source software
• Offering free community-based editions and paid commercial editions with more functionality and features
• Using free and open source to gain media attention, and attract users who might become potential customers for other commercial products
• Offering paid technical support along with free community-based support
• Making the software available via the Internet like on-demand applications, and offering paid subscriptions for online accounts and services
The point about paid technical support is particularly relevant in these times. A recent survey by IDC, a global market intelligence firm, suggests: "The economic slowdown in the United States may actually boost demand for open source services. If organisations adopt more open source software as part of a strategy to reduce software costs, the demand for related services should increase." Many service providers have switched from expensive proprietary system management software to open source software like OpenNMS, Zenoss, Hyperic, Groundworks, Nagios, etc, so that they can cut down the technology cost overheads of their customers.
Zoho_vs_Salesforce
Finally, the SaaS (Software as a Service) business model has proved successful. SaaS delivers non-intrusive and hassle-free cloud-based products via a subscription-based model with no one-time costs involved-an organisation can pay as per software usage. The key to success for a SaaS player is obviously best technology usage, application features, and more importantly, an optimised pricing model. Coming up with a competitive pricing model becomes very difficult if the technology is built over expensive hardware or proprietary software licences. This challenge provides a great opportunity to utilise open source software as SaaS-ready solutions. The success enjoyed by companies like SugarCRM, Zoho (a Chennai-based offshoot of AdventNet) and Zimbra (acquired by Yahoo! in 2007 for $350 million), follows the same concept-enabling organisations to reduce their IT expenditure and increase flexibility by leveraging open source software. Zoho prepared a cost saving chart that compared its services with those offered by its competitor, SalesForce, highlighting the difference in costs between the two (see diagram).
According to Springboard Research, the Indian SaaS market is set to reach $165 million by 2010, due to a compound annual growth rate (CAGR) of 77 per cent from 2006 to 2010. We might see greater demand for software available under SaaS model running over private clouds or corporate networks than public clouds due to data security and compliance regulations, but small and medium-sized companies can utilise the software over public clouds to boost their performance at a much lower cost Microsoft MCITP Certification. The increasing demands for such models provides a huge opportunity for service providers to make a shift from traditional delivery models to avant-garde technology models. The economy might be having a tough time, but if they play their cards right, open source companies might never have had it so good.
Open Source: A Panacea For The Recession
Open Source: A Panacea For The Recession
As the recession grips more economies and enterprises, it's the perfect time to adopt the open source business model. We explain why.
the technology landscape has been undergoing a massive transformation over the past couple of years. In the early 2000s Microsoft MCTS Training, organisations were going after products and appliances irrationally, investing huge sums without any guarantees of a quantifiable ROI (return on investment). Today, awareness of technology has grown and organisations tend to demand a measurable ROI before adopting a new technology. Open source software has always been a good option to provide effective solutions within relatively low budgets. Not surprisingly, a number of organisations have started adopting open source software solutions. This trend has been boosted by the ongoing recession, with companies looking to cut costs.
Foss1Open source can mean big bucks!
The revenues of Red Hat grew by 14 per cent during the last economic bust in 2001-2002, which then increased to 38 per cent and 58 per cent in 2003 and 2004, respectively, demonstrating the increased usage of open source software during the economic crunch. Novell also showed interest in playing a significant role in the open source software market in November 2003 by acquiring SUSE Linux for $210 million. Last year, Sun Microsystems acquired MySQL AB, the developer of the world's most popular and fastest growing database, for $1 billion. Writing open source software enables a company to gain access to the open community, which in turn helps in accelerating the pace at which an idea matures.
John Roberts, CEO and founder, SugarCRM, started his company in 2004 with a commercial open source concept. In one of his interviews given to Sramana Mitra, in December 2008, he said, "I convinced two strong engineers at E.piphany to join me. We all resigned together and started SugarCRM without any angel or VC (venture capitalist) money. It was the three of us, each in his house with headphones on, writing and designing code and posting it up on SourceForge.net. We did that for three months. And soon enough, people all over the world started downloading the code." Early this year, SugarCRM joined hands with Tata Communications to make its software accessible to the Indian industry.
A matter of generating revenues
But how do open source software companies make money? There are a variety of business models to generate revenues from open source software:
• Releasing commercial extensions/plug-ins to open source software
• Offering free community-based editions and paid commercial editions with more functionality and features
• Using free and open source to gain media attention, and attract users who might become potential customers for other commercial products
• Offering paid technical support along with free community-based support
• Making the software available via the Internet like on-demand applications, and offering paid subscriptions for online accounts and services
The point about paid technical support is particularly relevant in these times. A recent survey by IDC, a global market intelligence firm, suggests: "The economic slowdown in the United States may actually boost demand for open source services. If organisations adopt more open source software as part of a strategy to reduce software costs, the demand for related services should increase." Many service providers have switched from expensive proprietary system management software to open source software like OpenNMS, Zenoss, Hyperic, Groundworks, Nagios, etc, so that they can cut down the technology cost overheads of their customers.
Zoho_vs_Salesforce
Finally, the SaaS (Software as a Service) business model has proved successful. SaaS delivers non-intrusive and hassle-free cloud-based products via a subscription-based model with no one-time costs involved-an organisation can pay as per software usage. The key to success for a SaaS player is obviously best technology usage, application features, and more importantly, an optimised pricing model. Coming up with a competitive pricing model becomes very difficult if the technology is built over expensive hardware or proprietary software licences. This challenge provides a great opportunity to utilise open source software as SaaS-ready solutions. The success enjoyed by companies like SugarCRM, Zoho (a Chennai-based offshoot of AdventNet) and Zimbra (acquired by Yahoo! in 2007 for $350 million), follows the same concept-enabling organisations to reduce their IT expenditure and increase flexibility by leveraging open source software. Zoho prepared a cost saving chart that compared its services with those offered by its competitor, SalesForce, highlighting the difference in costs between the two (see diagram).
According to Springboard Research, the Indian SaaS market is set to reach $165 million by 2010, due to a compound annual growth rate (CAGR) of 77 per cent from 2006 to 2010. We might see greater demand for software available under SaaS model running over private clouds or corporate networks than public clouds due to data security and compliance regulations, but small and medium-sized companies can utilise the software over public clouds to boost their performance at a much lower cost Microsoft MCITP Certification. The increasing demands for such models provides a huge opportunity for service providers to make a shift from traditional delivery models to avant-garde technology models. The economy might be having a tough time, but if they play their cards right, open source companies might never have had it so good.
As the recession grips more economies and enterprises, it's the perfect time to adopt the open source business model. We explain why.
the technology landscape has been undergoing a massive transformation over the past couple of years. In the early 2000s Microsoft MCTS Training, organisations were going after products and appliances irrationally, investing huge sums without any guarantees of a quantifiable ROI (return on investment). Today, awareness of technology has grown and organisations tend to demand a measurable ROI before adopting a new technology. Open source software has always been a good option to provide effective solutions within relatively low budgets. Not surprisingly, a number of organisations have started adopting open source software solutions. This trend has been boosted by the ongoing recession, with companies looking to cut costs.
Foss1Open source can mean big bucks!
The revenues of Red Hat grew by 14 per cent during the last economic bust in 2001-2002, which then increased to 38 per cent and 58 per cent in 2003 and 2004, respectively, demonstrating the increased usage of open source software during the economic crunch. Novell also showed interest in playing a significant role in the open source software market in November 2003 by acquiring SUSE Linux for $210 million. Last year, Sun Microsystems acquired MySQL AB, the developer of the world's most popular and fastest growing database, for $1 billion. Writing open source software enables a company to gain access to the open community, which in turn helps in accelerating the pace at which an idea matures.
John Roberts, CEO and founder, SugarCRM, started his company in 2004 with a commercial open source concept. In one of his interviews given to Sramana Mitra, in December 2008, he said, "I convinced two strong engineers at E.piphany to join me. We all resigned together and started SugarCRM without any angel or VC (venture capitalist) money. It was the three of us, each in his house with headphones on, writing and designing code and posting it up on SourceForge.net. We did that for three months. And soon enough, people all over the world started downloading the code." Early this year, SugarCRM joined hands with Tata Communications to make its software accessible to the Indian industry.
A matter of generating revenues
But how do open source software companies make money? There are a variety of business models to generate revenues from open source software:
• Releasing commercial extensions/plug-ins to open source software
• Offering free community-based editions and paid commercial editions with more functionality and features
• Using free and open source to gain media attention, and attract users who might become potential customers for other commercial products
• Offering paid technical support along with free community-based support
• Making the software available via the Internet like on-demand applications, and offering paid subscriptions for online accounts and services
The point about paid technical support is particularly relevant in these times. A recent survey by IDC, a global market intelligence firm, suggests: "The economic slowdown in the United States may actually boost demand for open source services. If organisations adopt more open source software as part of a strategy to reduce software costs, the demand for related services should increase." Many service providers have switched from expensive proprietary system management software to open source software like OpenNMS, Zenoss, Hyperic, Groundworks, Nagios, etc, so that they can cut down the technology cost overheads of their customers.
Zoho_vs_Salesforce
Finally, the SaaS (Software as a Service) business model has proved successful. SaaS delivers non-intrusive and hassle-free cloud-based products via a subscription-based model with no one-time costs involved-an organisation can pay as per software usage. The key to success for a SaaS player is obviously best technology usage, application features, and more importantly, an optimised pricing model. Coming up with a competitive pricing model becomes very difficult if the technology is built over expensive hardware or proprietary software licences. This challenge provides a great opportunity to utilise open source software as SaaS-ready solutions. The success enjoyed by companies like SugarCRM, Zoho (a Chennai-based offshoot of AdventNet) and Zimbra (acquired by Yahoo! in 2007 for $350 million), follows the same concept-enabling organisations to reduce their IT expenditure and increase flexibility by leveraging open source software. Zoho prepared a cost saving chart that compared its services with those offered by its competitor, SalesForce, highlighting the difference in costs between the two (see diagram).
According to Springboard Research, the Indian SaaS market is set to reach $165 million by 2010, due to a compound annual growth rate (CAGR) of 77 per cent from 2006 to 2010. We might see greater demand for software available under SaaS model running over private clouds or corporate networks than public clouds due to data security and compliance regulations, but small and medium-sized companies can utilise the software over public clouds to boost their performance at a much lower cost Microsoft MCITP Certification. The increasing demands for such models provides a huge opportunity for service providers to make a shift from traditional delivery models to avant-garde technology models. The economy might be having a tough time, but if they play their cards right, open source companies might never have had it so good.
Thursday, July 15, 2010
Support Transitions for Office 2000 and Office 2003 SP2
Support Transitions for Office 2000 and Office 2003 SP2
It's time for another friendly product transition reminder... This time, we are going to focus on Office 2000 and Office 2003 SP2.
All editions of Office 2000 will reach the end of the Extended Support phase on July 14, 2009. After this date, Office 2000 will no longer be publicly supported. This means that Microsoft MCTS Training will no longer provide any assisted support and will no longer provide security updates for this product. Self-Help Online Support (including the knowledge base and other articles on http://support.microsoft.com/) will continue to be available for a minimum of 12 months after this date. This means that there is very little time remaining to complete your migration to a newer version of Office! If you haven't already done so, I would recommend discussing your options with your local Microsoft representative.
In addition, I also want to take this opportunity to remind everyone that support for Office 2003 SP2 ended on October 14, 2008. To continue to receive support for Office 2003 (including future security updates), you will need to upgrade to a supported service pack. Office 2003 SP3 is currently available from the Download Center and Microsoft MCITP Certification Update websites. Unfortunately, we still occasionally recieve questions about the Service Pack Support Policy. Please be sure to keep updated on Microsoft service packs, to remain supported!
Each of these product transitions have previously been announced on the Support Lifecycle website and within our quarterly newsletter. Be sure to check the site for updates or subscribe to the newsletter, today!
It's time for another friendly product transition reminder... This time, we are going to focus on Office 2000 and Office 2003 SP2.
All editions of Office 2000 will reach the end of the Extended Support phase on July 14, 2009. After this date, Office 2000 will no longer be publicly supported. This means that Microsoft MCTS Training will no longer provide any assisted support and will no longer provide security updates for this product. Self-Help Online Support (including the knowledge base and other articles on http://support.microsoft.com/) will continue to be available for a minimum of 12 months after this date. This means that there is very little time remaining to complete your migration to a newer version of Office! If you haven't already done so, I would recommend discussing your options with your local Microsoft representative.
In addition, I also want to take this opportunity to remind everyone that support for Office 2003 SP2 ended on October 14, 2008. To continue to receive support for Office 2003 (including future security updates), you will need to upgrade to a supported service pack. Office 2003 SP3 is currently available from the Download Center and Microsoft MCITP Certification Update websites. Unfortunately, we still occasionally recieve questions about the Service Pack Support Policy. Please be sure to keep updated on Microsoft service packs, to remain supported!
Each of these product transitions have previously been announced on the Support Lifecycle website and within our quarterly newsletter. Be sure to check the site for updates or subscribe to the newsletter, today!
Support Transitions for Office 2000 and Office 2003 SP2
Support Transitions for Office 2000 and Office 2003 SP2
It's time for another friendly product transition reminder... This time, we are going to focus on Office 2000 and Office 2003 SP2.
All editions of Office 2000 will reach the end of the Extended Support phase on July 14, 2009. After this date, Office 2000 will no longer be publicly supported. This means that Microsoft MCTS Training will no longer provide any assisted support and will no longer provide security updates for this product. Self-Help Online Support (including the knowledge base and other articles on http://support.microsoft.com/) will continue to be available for a minimum of 12 months after this date. This means that there is very little time remaining to complete your migration to a newer version of Office! If you haven't already done so, I would recommend discussing your options with your local Microsoft representative.
In addition, I also want to take this opportunity to remind everyone that support for Office 2003 SP2 ended on October 14, 2008. To continue to receive support for Office 2003 (including future security updates), you will need to upgrade to a supported service pack. Office 2003 SP3 is currently available from the Download Center and Microsoft MCITP Certification Update websites. Unfortunately, we still occasionally recieve questions about the Service Pack Support Policy. Please be sure to keep updated on Microsoft service packs, to remain supported!
Each of these product transitions have previously been announced on the Support Lifecycle website and within our quarterly newsletter. Be sure to check the site for updates or subscribe to the newsletter, today!
It's time for another friendly product transition reminder... This time, we are going to focus on Office 2000 and Office 2003 SP2.
All editions of Office 2000 will reach the end of the Extended Support phase on July 14, 2009. After this date, Office 2000 will no longer be publicly supported. This means that Microsoft MCTS Training will no longer provide any assisted support and will no longer provide security updates for this product. Self-Help Online Support (including the knowledge base and other articles on http://support.microsoft.com/) will continue to be available for a minimum of 12 months after this date. This means that there is very little time remaining to complete your migration to a newer version of Office! If you haven't already done so, I would recommend discussing your options with your local Microsoft representative.
In addition, I also want to take this opportunity to remind everyone that support for Office 2003 SP2 ended on October 14, 2008. To continue to receive support for Office 2003 (including future security updates), you will need to upgrade to a supported service pack. Office 2003 SP3 is currently available from the Download Center and Microsoft MCITP Certification Update websites. Unfortunately, we still occasionally recieve questions about the Service Pack Support Policy. Please be sure to keep updated on Microsoft service packs, to remain supported!
Each of these product transitions have previously been announced on the Support Lifecycle website and within our quarterly newsletter. Be sure to check the site for updates or subscribe to the newsletter, today!
Wednesday, July 14, 2010
Focus on addressing a pain point in a market that is large
Focus on addressing a pain point in a market that is large
If you met a venture capitalist, what questions would you ask? Here is a rapid-fire round with Suvir Sujan, partner, Nexus India Capital.
What are the prime areas of IT Microsoft MCTS Training that you think technopreneurs should target now and why?
Technopreneurs should focus on businesses in sectors they are most comfortable with. They need to focus on addressing a pain point in a market that is large. The market need not necessarily be in India only. Technopreneurs need to look at the world as their market and then pick the markets they can be most competitive in. There is an opportunity for entrepreneurs across sectors in technology—semiconductors, software, systems, KPO, Internet, mobile, etc.
In these, can you share any examples of specific problems or user needs that you think start-ups should focus their products/services on to be profitable?
One example of a user need is for better website security software. There are so many websites being hacked in India and globally, on a weekly basis.
Another example of what users would like is free mobile phone service via Voice over IP.
From which segment of IT are the many tech-projects that come to you?
We get technology plans from across software, communication, KPO, etc. There are good opportunities across sectors in technology.
At what stage should a technopreneur come to you for support? To what level should the project have been shaped before it comes to you?
The technology should have some initial customer validation before the team approaches us.
What basic information should a project proposal contain?
The team, market and product roadmap are essential. Check out our website www.nexusindiacap.com/submitplan.asp for more information Microsoft MCITP Certification.
What are the key aspects you evaluate while deciding whether or not to go with a project?
The team, market size and the competitive differentiation of the product or service are important.
If you met a venture capitalist, what questions would you ask? Here is a rapid-fire round with Suvir Sujan, partner, Nexus India Capital.
What are the prime areas of IT Microsoft MCTS Training that you think technopreneurs should target now and why?
Technopreneurs should focus on businesses in sectors they are most comfortable with. They need to focus on addressing a pain point in a market that is large. The market need not necessarily be in India only. Technopreneurs need to look at the world as their market and then pick the markets they can be most competitive in. There is an opportunity for entrepreneurs across sectors in technology—semiconductors, software, systems, KPO, Internet, mobile, etc.
In these, can you share any examples of specific problems or user needs that you think start-ups should focus their products/services on to be profitable?
One example of a user need is for better website security software. There are so many websites being hacked in India and globally, on a weekly basis.
Another example of what users would like is free mobile phone service via Voice over IP.
From which segment of IT are the many tech-projects that come to you?
We get technology plans from across software, communication, KPO, etc. There are good opportunities across sectors in technology.
At what stage should a technopreneur come to you for support? To what level should the project have been shaped before it comes to you?
The technology should have some initial customer validation before the team approaches us.
What basic information should a project proposal contain?
The team, market and product roadmap are essential. Check out our website www.nexusindiacap.com/submitplan.asp for more information Microsoft MCITP Certification.
What are the key aspects you evaluate while deciding whether or not to go with a project?
The team, market size and the competitive differentiation of the product or service are important.
Focus on addressing a pain point in a market that is large
Focus on addressing a pain point in a market that is large
If you met a venture capitalist, what questions would you ask? Here is a rapid-fire round with Suvir Sujan, partner, Nexus India Capital.
What are the prime areas of IT Microsoft MCTS Training that you think technopreneurs should target now and why?
Technopreneurs should focus on businesses in sectors they are most comfortable with. They need to focus on addressing a pain point in a market that is large. The market need not necessarily be in India only. Technopreneurs need to look at the world as their market and then pick the markets they can be most competitive in. There is an opportunity for entrepreneurs across sectors in technology—semiconductors, software, systems, KPO, Internet, mobile, etc.
In these, can you share any examples of specific problems or user needs that you think start-ups should focus their products/services on to be profitable?
One example of a user need is for better website security software. There are so many websites being hacked in India and globally, on a weekly basis.
Another example of what users would like is free mobile phone service via Voice over IP.
From which segment of IT are the many tech-projects that come to you?
We get technology plans from across software, communication, KPO, etc. There are good opportunities across sectors in technology.
At what stage should a technopreneur come to you for support? To what level should the project have been shaped before it comes to you?
The technology should have some initial customer validation before the team approaches us.
What basic information should a project proposal contain?
The team, market and product roadmap are essential. Check out our website www.nexusindiacap.com/submitplan.asp for more information Microsoft MCITP Certification.
What are the key aspects you evaluate while deciding whether or not to go with a project?
The team, market size and the competitive differentiation of the product or service are important.
If you met a venture capitalist, what questions would you ask? Here is a rapid-fire round with Suvir Sujan, partner, Nexus India Capital.
What are the prime areas of IT Microsoft MCTS Training that you think technopreneurs should target now and why?
Technopreneurs should focus on businesses in sectors they are most comfortable with. They need to focus on addressing a pain point in a market that is large. The market need not necessarily be in India only. Technopreneurs need to look at the world as their market and then pick the markets they can be most competitive in. There is an opportunity for entrepreneurs across sectors in technology—semiconductors, software, systems, KPO, Internet, mobile, etc.
In these, can you share any examples of specific problems or user needs that you think start-ups should focus their products/services on to be profitable?
One example of a user need is for better website security software. There are so many websites being hacked in India and globally, on a weekly basis.
Another example of what users would like is free mobile phone service via Voice over IP.
From which segment of IT are the many tech-projects that come to you?
We get technology plans from across software, communication, KPO, etc. There are good opportunities across sectors in technology.
At what stage should a technopreneur come to you for support? To what level should the project have been shaped before it comes to you?
The technology should have some initial customer validation before the team approaches us.
What basic information should a project proposal contain?
The team, market and product roadmap are essential. Check out our website www.nexusindiacap.com/submitplan.asp for more information Microsoft MCITP Certification.
What are the key aspects you evaluate while deciding whether or not to go with a project?
The team, market size and the competitive differentiation of the product or service are important.
Tuesday, July 13, 2010
Boost Your Career And Benefit From A Microsoft MCTS Certification Or Two Or Three!
Boost Your Career And Benefit From A Microsoft MCTS Certification Or Two Or Three!
You went to college and thought you were prepared for the job market. If you are going for entry-level work, yeah, you are prepared. However, to really get ahead, you need Microsoft MCTS certification, whether it is an MCP, MCSA, MCSE or any other string of letters. Quite a few people will go for multiple certifications to broaden their experience and scope of possible job opportunities.
Some of the Microsoft MCITP certification require you have to have at least one year of practical experience in order to pursue a certification, namely an MCSE or Microsoft MCTS Certified Systems Engineer. It is important to have that experience that these certain certifications require because the training, like the MCSE training and the MCSE exams that follow, are very intense. In fact, some people will not only partake of the standard MCSE training, but also MCSE boot camps for more in-depth studies into their certification.
One standard benefit to having a Microsoft MCTS certification is that it is a great basic means of analyzing the aptitude of an employee. If you are a manager or owner in a business, you want some way to evaluate that employees skills. And if you are the employee, you know that your boss recognizes your abilities.
If you are on the hunt for a new job, then potential hiring managers and employers have a basis in which to assess your qualifications. Without that Microsoft MCTS certification on your resume, these employers would have no idea about your skills and most likely would consider someone else, someone with a certification, for the position you were aiming for.
If you do not have much hands-on experience in your field, but you do have the Microsoft MCTS certification to prove that you know the material, you would also have a leg up on anyone else applying for the same position that may have more hands-on experience, but no certification. For some reason, that certification, those little string of letters like MCP or MCSE, hold a lot of power.
Yet another benefit to holding a Microsoft MCTS certification or two is the money aspect of it all. Sure, you shelled out some major bucks to fund your education in those MCP courses or that MCSE training, but consider it an investment in yourself. With certification, you can bargain a higher salary and even reimbursement for your training!
Many professionals in the IT field or in a company in which you work in an IT department could benefit from Microsoft MCTS Training. Do you work as an Administrator for a network, mail or web server? Are you involved in the security of networks and the internet? Any of those positions and much more benefit with additional training and certification. Just think money! It is the biggest motivator. The more you know and can bring to a position, the more money you stand to make.
So think about going for your MCSE or MCP certification or any number of others available. More training; more knowledge; more money ... sounds like a no-brainer! Go nuts and get certified today!
You went to college and thought you were prepared for the job market. If you are going for entry-level work, yeah, you are prepared. However, to really get ahead, you need Microsoft MCTS certification, whether it is an MCP, MCSA, MCSE or any other string of letters. Quite a few people will go for multiple certifications to broaden their experience and scope of possible job opportunities.
Some of the Microsoft MCITP certification require you have to have at least one year of practical experience in order to pursue a certification, namely an MCSE or Microsoft MCTS Certified Systems Engineer. It is important to have that experience that these certain certifications require because the training, like the MCSE training and the MCSE exams that follow, are very intense. In fact, some people will not only partake of the standard MCSE training, but also MCSE boot camps for more in-depth studies into their certification.
One standard benefit to having a Microsoft MCTS certification is that it is a great basic means of analyzing the aptitude of an employee. If you are a manager or owner in a business, you want some way to evaluate that employees skills. And if you are the employee, you know that your boss recognizes your abilities.
If you are on the hunt for a new job, then potential hiring managers and employers have a basis in which to assess your qualifications. Without that Microsoft MCTS certification on your resume, these employers would have no idea about your skills and most likely would consider someone else, someone with a certification, for the position you were aiming for.
If you do not have much hands-on experience in your field, but you do have the Microsoft MCTS certification to prove that you know the material, you would also have a leg up on anyone else applying for the same position that may have more hands-on experience, but no certification. For some reason, that certification, those little string of letters like MCP or MCSE, hold a lot of power.
Yet another benefit to holding a Microsoft MCTS certification or two is the money aspect of it all. Sure, you shelled out some major bucks to fund your education in those MCP courses or that MCSE training, but consider it an investment in yourself. With certification, you can bargain a higher salary and even reimbursement for your training!
Many professionals in the IT field or in a company in which you work in an IT department could benefit from Microsoft MCTS Training. Do you work as an Administrator for a network, mail or web server? Are you involved in the security of networks and the internet? Any of those positions and much more benefit with additional training and certification. Just think money! It is the biggest motivator. The more you know and can bring to a position, the more money you stand to make.
So think about going for your MCSE or MCP certification or any number of others available. More training; more knowledge; more money ... sounds like a no-brainer! Go nuts and get certified today!
Monday, July 12, 2010
How To Study For Microsoft MCTS Exams
How To Study For Microsoft MCTS Exams
Just type in MCITP certification in google and you will see thousands of results. How is one to make a decision on which MCTS books to buy, what kind of training material to use , which test to take first, which ones are not brain dumps,etc. Alot of people don't know how long to study, what they should be getting on practice test, or how many different MCTS certification books they should read.Here we are going to review the different types of training material there are and give you our picks of each group.
MCTS Certification Books
Training books are by far the most used training material used. Books are great you study almost anywhere, you can mark in them,most of them have practice tests and online versions if you like reading ebooks. Our favorite book series for the MCTS has to be Microsoft's MCTS Self-Paced Training Kit. These are great, they come with 180 day trial editions of the operating systems you need, the format is clear and easy to read, and the books do a fantastic job of outlining WHY you are learning something, not just WHAT you need to know to pass the exam. These books would be a great investment to your career future.
MCTS Certification Practice Tests
Just don't go down the road of braindumps. You learn little, and degrade the certifications even more than they are now. Braindumps are bad. That said practice tests are probably the most important part of your training. They get you thinking about problems and how to solve them. The most important part of taking the practice tests are reviewing the ones that you missed. Our pick in the practice tests category has to be Transcender. These guys have been around forever and know how to write questions. They provide the most realistic exam experience outside the real thing.
MCTS Certification CBT's
CBT stands for Computer Based Training, these are great because they show you how to do it instead of
telling you how. These CBT's don't replace Books and practice tests but they are a great addition to them.
Our pick in this category has to be Cbt Nuggets. The quality is great, the instructors are very knowledgeable and have great speaking voices. They also mix in some jokes and try to make things fun and interesting. Thumbs up to Cbt Nuggets.
MCTS Audio Training
Last buy not least we are going to look at MCTS Training in audio format. This is by no means a replacement of books, but a great addition. In this day and age where free time is so scarce, these are perfect. You can listen to them while working out, while working,or while in the car. Our pick in this category has to go to Audiocerts.com. The questions are great, and every question has an answer and explanation. Not only that they seem to be the least expensive.
Conclusion
The most important thing to remember is to use alot of different training material. Using training materials
from each of the categories listed above are sure to get you a passing score. Good luck on the exam.
Just type in MCITP certification in google and you will see thousands of results. How is one to make a decision on which MCTS books to buy, what kind of training material to use , which test to take first, which ones are not brain dumps,etc. Alot of people don't know how long to study, what they should be getting on practice test, or how many different MCTS certification books they should read.Here we are going to review the different types of training material there are and give you our picks of each group.
MCTS Certification Books
Training books are by far the most used training material used. Books are great you study almost anywhere, you can mark in them,most of them have practice tests and online versions if you like reading ebooks. Our favorite book series for the MCTS has to be Microsoft's MCTS Self-Paced Training Kit. These are great, they come with 180 day trial editions of the operating systems you need, the format is clear and easy to read, and the books do a fantastic job of outlining WHY you are learning something, not just WHAT you need to know to pass the exam. These books would be a great investment to your career future.
MCTS Certification Practice Tests
Just don't go down the road of braindumps. You learn little, and degrade the certifications even more than they are now. Braindumps are bad. That said practice tests are probably the most important part of your training. They get you thinking about problems and how to solve them. The most important part of taking the practice tests are reviewing the ones that you missed. Our pick in the practice tests category has to be Transcender. These guys have been around forever and know how to write questions. They provide the most realistic exam experience outside the real thing.
MCTS Certification CBT's
CBT stands for Computer Based Training, these are great because they show you how to do it instead of
telling you how. These CBT's don't replace Books and practice tests but they are a great addition to them.
Our pick in this category has to be Cbt Nuggets. The quality is great, the instructors are very knowledgeable and have great speaking voices. They also mix in some jokes and try to make things fun and interesting. Thumbs up to Cbt Nuggets.
MCTS Audio Training
Last buy not least we are going to look at MCTS Training in audio format. This is by no means a replacement of books, but a great addition. In this day and age where free time is so scarce, these are perfect. You can listen to them while working out, while working,or while in the car. Our pick in this category has to go to Audiocerts.com. The questions are great, and every question has an answer and explanation. Not only that they seem to be the least expensive.
Conclusion
The most important thing to remember is to use alot of different training material. Using training materials
from each of the categories listed above are sure to get you a passing score. Good luck on the exam.
Saturday, July 10, 2010
All About Gaining An MCTIP Certification
All About Gaining An MCTIP Certification
Most of us probably know by now that the Microsoft Company's Windows operating system is extremely common these days. If you have a computer, the odds are pretty high that you are working in a windows based environment. It seems like everyone has dealt with Windows at one point or another. So it should not come as much of a shock that most employers require a Microsoft certification as a prerequisite to employment or even career advancement in most fields. MCTIP Certification simply stands for Microsoft Certified Systems Engineer and is actually the most widely recognized and used professional certification in the field of Information Technology, or IT for short.
Having this certification actually enables the IT professionals to be able to analyze business requirements, as well as design, build, and later implement the infrastructures for their business solutions based on that common Microsoft Windows platform, and the server software.
In order to obtain a Microsoft Certified Systems Engineer certification, one must pass a series of tests that deal with network security, server operating systems, and also basic computer network infrastructure engineering. Microsoft Certified Systems Engineer is also available for two different Windows systems, being Windows Server 2003 and Windows 2000, and each has their own specific set of exams. In order to obtain certification for Windows 2000, there is one core exam that is followed by two elective exams. However, for the Windows 2003 certification, there is only one core exam and one elective exam. Each one of these tests will run around $125, and take two or three hours to finish. There are fifty to ninety questions on each test. However, the time and money you spend on getting trained and certified in MCTIP will be well worth it in the long run.
The MCTIP training courses that you will have to take in order to take your certification tests will probably cost you around $250 for a package that includes all you need to train on the subject and be able to successfully pass a certification exam. Generally, you will be looking at about a thousand hours of training on the subject, and most package deals also come with at least a years worth of access to the online MCTIP library, which will help you immensely. The very best thing about these MCTIP training courses is that many of them can be found online, so you never have to leave the comfort of your own home. You can learn at your own pace, and in an environment that is the most comfortable to you.
It is also very easy to find reputable Microsoft Certified Systems Engineer training programs online. The only thing you need to do is type MCTIP into your search engine, and the odds are very high that you will instantly be presented with thousands of web sites that can help you with every aspect of your MCTS training, as well as the professional courses that you will need in order to pass your certification tests.
Thursday, July 8, 2010
Mcse 70-293 Training Guide
Mcse 70-293 Training Guide
The 70-293 exam is a core exam for the MCSE Windows 2003 certification, and tests professionals on their ability to plan and maintain a Windows 2003 network infrastructure. As of January 2003 there were over 200,000 Microsoft Certified Professionals. Not only will the majority of these be looking to upgrade to their 2003 MCTS Training, but the exam is expected to grow with new users. This Training Guide offers in-depth coverage of exam topics and offers hands-on instruction that helps readers to pass the 70-293 exam. This book can be used as a sole study guide or it can be used with instructor-led classes, Exam Cram 2 books, and/or CBT training.
Download MCSE 70-293 Cert Flash Cards App to try out all the features of the app and sample a featured card pack. If you like it, you can buy the entire application and unlock all remaining packs through the convenient in-app purchase option.
The MCSE 70-293 Cert Flash Cards App provides a concise review of all objectives on the Windows Server 2003 70-293
Exam: MCSE: Planning and Maintaining a Windows Server 2003 Network Infrastructure. This alternative learning format presents a unique approach that compliments other self-study formats like books and practice tests. Cert flash cards online consist of a custom flash card application loaded with 355 total questions that test your skills and enhance retention of exam topics.
Questions are organized by exam objective, allowing you to focus your study on selected topics. You can choose to view cards in order or at random, and you can create custom sets from the entire bank of cards. The engine provides you with the ability to mark each question correct or incorrect and provides a detailed score report by category at the end of the exam. You can even write notes on each question and then view or email a report of all your notes aligned to the relevant questions.
These robust features make this a truly unique learning tool:
Test your knowledge by entering your own answers
Grade your answers against the correct answer
Create custom question sets
View detailed score reports
Enter notes on each question
MCSA/MCSE 70-293 Exam Cram, Second Edition is the perfect study guide if you need help passing the 70-293 exam. Among exam objectives, you must learn to use remote desktop for administration, manage IIS 6.0, revive a failed server, choose between forest and domain functional levels, and configure software update services. This new edition covers all these topics, includes two full practice exams, and has been updated against Microsoft's official courseware (MOC) that corresponds to this exam. MCITP Certification Exam, Second Edition is perfect for you if you need a refresher on important concepts as well as a guide to exam topics and objectives. You'll get test-taking strategies, time-saving study tips, a CD-ROM testing engine, and a special Certkingdom that includes tips, acronyms, and memory joggers not available anywhere else.
The 70-293 exam is a core exam for the MCSE Windows 2003 certification, and tests professionals on their ability to plan and maintain a Windows 2003 network infrastructure. As of January 2003 there were over 200,000 Microsoft Certified Professionals. Not only will the majority of these be looking to upgrade to their 2003 MCTS Training, but the exam is expected to grow with new users. This Training Guide offers in-depth coverage of exam topics and offers hands-on instruction that helps readers to pass the 70-293 exam. This book can be used as a sole study guide or it can be used with instructor-led classes, Exam Cram 2 books, and/or CBT training.
Download MCSE 70-293 Cert Flash Cards App to try out all the features of the app and sample a featured card pack. If you like it, you can buy the entire application and unlock all remaining packs through the convenient in-app purchase option.
The MCSE 70-293 Cert Flash Cards App provides a concise review of all objectives on the Windows Server 2003 70-293
Exam: MCSE: Planning and Maintaining a Windows Server 2003 Network Infrastructure. This alternative learning format presents a unique approach that compliments other self-study formats like books and practice tests. Cert flash cards online consist of a custom flash card application loaded with 355 total questions that test your skills and enhance retention of exam topics.
Questions are organized by exam objective, allowing you to focus your study on selected topics. You can choose to view cards in order or at random, and you can create custom sets from the entire bank of cards. The engine provides you with the ability to mark each question correct or incorrect and provides a detailed score report by category at the end of the exam. You can even write notes on each question and then view or email a report of all your notes aligned to the relevant questions.
These robust features make this a truly unique learning tool:
Test your knowledge by entering your own answers
Grade your answers against the correct answer
Create custom question sets
View detailed score reports
Enter notes on each question
MCSA/MCSE 70-293 Exam Cram, Second Edition is the perfect study guide if you need help passing the 70-293 exam. Among exam objectives, you must learn to use remote desktop for administration, manage IIS 6.0, revive a failed server, choose between forest and domain functional levels, and configure software update services. This new edition covers all these topics, includes two full practice exams, and has been updated against Microsoft's official courseware (MOC) that corresponds to this exam. MCITP Certification Exam, Second Edition is perfect for you if you need a refresher on important concepts as well as a guide to exam topics and objectives. You'll get test-taking strategies, time-saving study tips, a CD-ROM testing engine, and a special Certkingdom that includes tips, acronyms, and memory joggers not available anywhere else.
Wednesday, July 7, 2010
False Positive And Database Consistency In Microsoft Sql Server
False Positive And Database Consistency In Microsoft Sql Server
Are you facing various instances of the 'False Positive' on your Microsoft MCTS Training SQL Server when you run DBCC CHECKDB statement for checking database consistency? The problem may occur due to inconsistency of the MDF (Master Database File) of MS SQL Server. Database inconsistency can be due to numerous reasons, such as database corruption, missing database objects, and more. In all such cases, the database becomes completely unusable and you face severe data loss problems. In such circumstances, it becomes essential to perform SQL Database Recovery to overcome the problem.
For instance, when you run DBCC CHECKDB statement on your SQL Server database, it gives consistency errors in database tables. However, if you run DBCC CHECKTABLE statement to repair the table and fix inconsistency problems, it does not display any errors. When you face a false positive situation, you get either of the below errors:
DBCC CHECKDB is performing an exhaustive search of indexes for possible inconsistencies.
Or
SQL Server has encountered 1 occurrence(s) of I/O requests taking longer than 15 seconds to complete on file in database .
At the same time, Application Event Log of MS SQL Server may contain entries similar to the following ones:
Msg 8978, Sev 16, State 1, Line 1 : Table error: Object ID 1789795471, index ID 1, partition ID 72057602467495936, alloc unit ID 72057602585395200 (type In-row data). Page (1:2387522) is missing a reference from previous page (1:2387521). Possible chain linkage problem. [SQLSTATE 42000]
Msg 8958, Sev 16, State 1, Line 1 : repair_allow_data_loss is the minimum repair level for the errors found by DBCC CHECKDB . [SQLSTATE 01000]
Cause
The problem occurs due to inconsistency or corruption in the MDF file. It may be due to unexpected system shutdown, virus infection, and other such reasons.
Resolution
You can get your database in working state by restoring it from an updated backup. After restoring the database, you must run database defragmentation. However, if the backup is not current, then only SQL Server Recovery can help you to extract inaccessible data.
Effective and absolute recovery is possible with SQL Recovery software. These are powerful third-party tools, which scan whole database and retrieve all damaged and inaccessible data from it. You need not have sound technical skills to use these MS SQL Recovery software as they have simple graphical user interface.
SQL Recovery is the most advanced utility that ensures perfect recovery of damaged SQL Server database. The software repairs and restores MDF files of Microsoft MCITP Certification SQL Server 2008, 2005, and 2000. It recovers all SQL Server database objects such as tables, reports, forms, triggers, and stored procedures.
Are you facing various instances of the 'False Positive' on your Microsoft MCTS Training SQL Server when you run DBCC CHECKDB statement for checking database consistency? The problem may occur due to inconsistency of the MDF (Master Database File) of MS SQL Server. Database inconsistency can be due to numerous reasons, such as database corruption, missing database objects, and more. In all such cases, the database becomes completely unusable and you face severe data loss problems. In such circumstances, it becomes essential to perform SQL Database Recovery to overcome the problem.
For instance, when you run DBCC CHECKDB statement on your SQL Server database, it gives consistency errors in database tables. However, if you run DBCC CHECKTABLE statement to repair the table and fix inconsistency problems, it does not display any errors. When you face a false positive situation, you get either of the below errors:
DBCC CHECKDB is performing an exhaustive search of indexes for possible inconsistencies.
Or
SQL Server has encountered 1 occurrence(s) of I/O requests taking longer than 15 seconds to complete on file in database .
At the same time, Application Event Log of MS SQL Server may contain entries similar to the following ones:
Msg 8978, Sev 16, State 1, Line 1 : Table error: Object ID 1789795471, index ID 1, partition ID 72057602467495936, alloc unit ID 72057602585395200 (type In-row data). Page (1:2387522) is missing a reference from previous page (1:2387521). Possible chain linkage problem. [SQLSTATE 42000]
Msg 8958, Sev 16, State 1, Line 1 : repair_allow_data_loss is the minimum repair level for the errors found by DBCC CHECKDB . [SQLSTATE 01000]
Cause
The problem occurs due to inconsistency or corruption in the MDF file. It may be due to unexpected system shutdown, virus infection, and other such reasons.
Resolution
You can get your database in working state by restoring it from an updated backup. After restoring the database, you must run database defragmentation. However, if the backup is not current, then only SQL Server Recovery can help you to extract inaccessible data.
Effective and absolute recovery is possible with SQL Recovery software. These are powerful third-party tools, which scan whole database and retrieve all damaged and inaccessible data from it. You need not have sound technical skills to use these MS SQL Recovery software as they have simple graphical user interface.
SQL Recovery is the most advanced utility that ensures perfect recovery of damaged SQL Server database. The software repairs and restores MDF files of Microsoft MCITP Certification SQL Server 2008, 2005, and 2000. It recovers all SQL Server database objects such as tables, reports, forms, triggers, and stored procedures.
Tuesday, July 6, 2010
Fixing 'unexpected Error 35012' In Microsoft Access And Repairing Corrupt Database
Fixing 'unexpected Error 35012' In Microsoft Access And Repairing Corrupt Database
Microsoft Access is the most extensively used database system all over the world. The application, which integrates well with other members of the Microsoft Office suite of products, stores valuable information in an .mdb file. At times, when you try and open your Access database, you may encounter several nagging errors. Such errors are clear signs that either one or more objects in your MS Access database is corrupt. In such events of corruption, your Access database becomes inaccessible. In order to repair Access file, it becomes essential for you to rely on a third-party software Microsoft MCTS Training.
Consider a scenario, wherein you try and open an Access database, containing your customer's details, and receive the following error message:
Unexpected Error 35012
As a result of the above error, you are not able to access information stored in your customer's database. In order to eliminate the above error message, you must record the possible causes first.
Cause:
The above error points towards possible presence of one or more damaged/corrupt object(s) in your Microsoft Access database. The object (s) may have got damaged due to a variety of reasons including Jet database engine errors, OS corruption or application malfunction.
Resolution:
You can observe the following troubleshooting mechanisms in order to resolve the error message and repair Access file:
Create a new Microsoft Access database file
Go to File menu>>Get External Data>>Click Import (Note: Import all database objects including tables, queries, forms etc) into the new database file
If you receive the same error message while importing a certain object, repeat step 2 and don't include the object and restore the damaged object from an updated backup
In case you don't have a backup to restore the damaged object or if the above steps do not help you in resolving the problem, don't worry. You must download an Access database repair utility from the Internet in order to repair corrupt objects and recover your Access database Microsoft MCITP Certification.
Such utilities are made to employ improved and sophisticated algorithms to extract information from corrupt Access database. Moreover, these tools include simple and graphical user interface which doesn't require a person to be very tech-savvy.
Microsoft Access is the most extensively used database system all over the world. The application, which integrates well with other members of the Microsoft Office suite of products, stores valuable information in an .mdb file. At times, when you try and open your Access database, you may encounter several nagging errors. Such errors are clear signs that either one or more objects in your MS Access database is corrupt. In such events of corruption, your Access database becomes inaccessible. In order to repair Access file, it becomes essential for you to rely on a third-party software Microsoft MCTS Training.
Consider a scenario, wherein you try and open an Access database, containing your customer's details, and receive the following error message:
Unexpected Error 35012
As a result of the above error, you are not able to access information stored in your customer's database. In order to eliminate the above error message, you must record the possible causes first.
Cause:
The above error points towards possible presence of one or more damaged/corrupt object(s) in your Microsoft Access database. The object (s) may have got damaged due to a variety of reasons including Jet database engine errors, OS corruption or application malfunction.
Resolution:
You can observe the following troubleshooting mechanisms in order to resolve the error message and repair Access file:
Create a new Microsoft Access database file
Go to File menu>>Get External Data>>Click Import (Note: Import all database objects including tables, queries, forms etc) into the new database file
If you receive the same error message while importing a certain object, repeat step 2 and don't include the object and restore the damaged object from an updated backup
In case you don't have a backup to restore the damaged object or if the above steps do not help you in resolving the problem, don't worry. You must download an Access database repair utility from the Internet in order to repair corrupt objects and recover your Access database Microsoft MCITP Certification.
Such utilities are made to employ improved and sophisticated algorithms to extract information from corrupt Access database. Moreover, these tools include simple and graphical user interface which doesn't require a person to be very tech-savvy.
Fixing 'unexpected Error 35012' In Microsoft Access And Repairing Corrupt Database
Fixing 'unexpected Error 35012' In Microsoft Access And Repairing Corrupt Database
Microsoft Access is the most extensively used database system all over the world. The application, which integrates well with other members of the Microsoft Office suite of products, stores valuable information in an .mdb file. At times, when you try and open your Access database, you may encounter several nagging errors. Such errors are clear signs that either one or more objects in your MS Access database is corrupt. In such events of corruption, your Access database becomes inaccessible. In order to repair Access file, it becomes essential for you to rely on a third-party software Microsoft MCTS Training.
Consider a scenario, wherein you try and open an Access database, containing your customer's details, and receive the following error message:
Unexpected Error 35012
As a result of the above error, you are not able to access information stored in your customer's database. In order to eliminate the above error message, you must record the possible causes first.
Cause:
The above error points towards possible presence of one or more damaged/corrupt object(s) in your Microsoft Access database. The object (s) may have got damaged due to a variety of reasons including Jet database engine errors, OS corruption or application malfunction.
Resolution:
You can observe the following troubleshooting mechanisms in order to resolve the error message and repair Access file:
Create a new Microsoft Access database file
Go to File menu>>Get External Data>>Click Import (Note: Import all database objects including tables, queries, forms etc) into the new database file
If you receive the same error message while importing a certain object, repeat step 2 and don't include the object and restore the damaged object from an updated backup
In case you don't have a backup to restore the damaged object or if the above steps do not help you in resolving the problem, don't worry. You must download an Access database repair utility from the Internet in order to repair corrupt objects and recover your Access database Microsoft MCITP Certification.
Such utilities are made to employ improved and sophisticated algorithms to extract information from corrupt Access database. Moreover, these tools include simple and graphical user interface which doesn't require a person to be very tech-savvy.
Microsoft Access is the most extensively used database system all over the world. The application, which integrates well with other members of the Microsoft Office suite of products, stores valuable information in an .mdb file. At times, when you try and open your Access database, you may encounter several nagging errors. Such errors are clear signs that either one or more objects in your MS Access database is corrupt. In such events of corruption, your Access database becomes inaccessible. In order to repair Access file, it becomes essential for you to rely on a third-party software Microsoft MCTS Training.
Consider a scenario, wherein you try and open an Access database, containing your customer's details, and receive the following error message:
Unexpected Error 35012
As a result of the above error, you are not able to access information stored in your customer's database. In order to eliminate the above error message, you must record the possible causes first.
Cause:
The above error points towards possible presence of one or more damaged/corrupt object(s) in your Microsoft Access database. The object (s) may have got damaged due to a variety of reasons including Jet database engine errors, OS corruption or application malfunction.
Resolution:
You can observe the following troubleshooting mechanisms in order to resolve the error message and repair Access file:
Create a new Microsoft Access database file
Go to File menu>>Get External Data>>Click Import (Note: Import all database objects including tables, queries, forms etc) into the new database file
If you receive the same error message while importing a certain object, repeat step 2 and don't include the object and restore the damaged object from an updated backup
In case you don't have a backup to restore the damaged object or if the above steps do not help you in resolving the problem, don't worry. You must download an Access database repair utility from the Internet in order to repair corrupt objects and recover your Access database Microsoft MCITP Certification.
Such utilities are made to employ improved and sophisticated algorithms to extract information from corrupt Access database. Moreover, these tools include simple and graphical user interface which doesn't require a person to be very tech-savvy.
Monday, July 5, 2010
How Inbox Repair Tool Works To Corrects Errors?
How Inbox Repair Tool Works To Corrects Errors?
Scanpst.exe is executable file of Inbox Repair tool. After reading this article you will come to know how Inbox Repair tool works to validate and correct errors in the internal data structures of a .PST file. First of all, Inbox Repair tool checks for structures, such as BTrees and reference counts and repair them. These low-level objects have no knowledge of the upper-level structures, such as messages, calendar items, and so on, that are built upon them.
When scanpst.exe tool determines that a specific block of the structure or table is unreadable or corrupted, it simply removes it. If that block was part of a specific item in Outlook, the item will be removed when it is validated Microsoft MCTS Training.
Folders and messages are the area where changes are more visible.
Folders
Scanpst.exe examines every folder in the .PST and performs the following operations:
ScanPST makes sure that there are the correct tables associated with the folder.
It checks every row in each table and makes sure that the message or the subfolder exists in the system.
If message or the subfolders are not found, it removes the row from the table or tries to validate the message or the folder.
If that validation fails, the message or folder is considered corrupted, and it is removed from the table and deleted from the database.
Corrupted folders are recreated from scratch as scanpst performs PST repair.
Messages
ScanPST performs the following operations on messages:
ScanPST does some basic validation of attachment tables and recipient tables.
As soon as the recipient table is validated to guarantee correctly formatted recipients, ScanPST makes any changes that are required to synchronize these valid recipient table contents to the recipient properties on the message. It also guarantees that the message's parent folder refers to a valid folder. The following message properties are checked to make sure that they follow valid data formats Microsoft MCITP Certification:
PR_MESSAGE_CLASS
ScanPST checks that this property exists. If the property does not exist, it is set to IPM.Note.
PR_MESSAGE_FLAGS
Each flag is validated separately.
PR_SUBMIT_FLAGS
This validation resembles the operation for message flags.
PR_CLIENT_SUBMIT_TIME
If the submit flags indicate that the message is marked as submitted, this property must exist. If not, the time is set to Now.
PR_SEARCH_KEY
This property must exist. If the property is not present, a random GUID is generated for it.
PR_CREATION_TIME
This property must exist. If the property is not present, the time is set to Now.
PR_LAST_MODIFICATION_TIME
This property must exist. If the property is not present, the time is set to Now.
PR_MESSAGE_SIZE
Sizes are recalculated and compared to stored values. If sizes differ by some delta, the calculated value is written.
This way Scanpst.exe (Inbox Repair) operates and checks for errors in corrupt PST file and resolve the same. Sometimes Inbox Repair tool fails to perform PST Repair. But using PST recovery software you are assured of complete and successful PST repair.
Scanpst.exe is executable file of Inbox Repair tool. After reading this article you will come to know how Inbox Repair tool works to validate and correct errors in the internal data structures of a .PST file. First of all, Inbox Repair tool checks for structures, such as BTrees and reference counts and repair them. These low-level objects have no knowledge of the upper-level structures, such as messages, calendar items, and so on, that are built upon them.
When scanpst.exe tool determines that a specific block of the structure or table is unreadable or corrupted, it simply removes it. If that block was part of a specific item in Outlook, the item will be removed when it is validated Microsoft MCTS Training.
Folders and messages are the area where changes are more visible.
Folders
Scanpst.exe examines every folder in the .PST and performs the following operations:
ScanPST makes sure that there are the correct tables associated with the folder.
It checks every row in each table and makes sure that the message or the subfolder exists in the system.
If message or the subfolders are not found, it removes the row from the table or tries to validate the message or the folder.
If that validation fails, the message or folder is considered corrupted, and it is removed from the table and deleted from the database.
Corrupted folders are recreated from scratch as scanpst performs PST repair.
Messages
ScanPST performs the following operations on messages:
ScanPST does some basic validation of attachment tables and recipient tables.
As soon as the recipient table is validated to guarantee correctly formatted recipients, ScanPST makes any changes that are required to synchronize these valid recipient table contents to the recipient properties on the message. It also guarantees that the message's parent folder refers to a valid folder. The following message properties are checked to make sure that they follow valid data formats Microsoft MCITP Certification:
PR_MESSAGE_CLASS
ScanPST checks that this property exists. If the property does not exist, it is set to IPM.Note.
PR_MESSAGE_FLAGS
Each flag is validated separately.
PR_SUBMIT_FLAGS
This validation resembles the operation for message flags.
PR_CLIENT_SUBMIT_TIME
If the submit flags indicate that the message is marked as submitted, this property must exist. If not, the time is set to Now.
PR_SEARCH_KEY
This property must exist. If the property is not present, a random GUID is generated for it.
PR_CREATION_TIME
This property must exist. If the property is not present, the time is set to Now.
PR_LAST_MODIFICATION_TIME
This property must exist. If the property is not present, the time is set to Now.
PR_MESSAGE_SIZE
Sizes are recalculated and compared to stored values. If sizes differ by some delta, the calculated value is written.
This way Scanpst.exe (Inbox Repair) operates and checks for errors in corrupt PST file and resolve the same. Sometimes Inbox Repair tool fails to perform PST Repair. But using PST recovery software you are assured of complete and successful PST repair.
How Inbox Repair Tool Works To Corrects Errors?
How Inbox Repair Tool Works To Corrects Errors?
Scanpst.exe is executable file of Inbox Repair tool. After reading this article you will come to know how Inbox Repair tool works to validate and correct errors in the internal data structures of a .PST file. First of all, Inbox Repair tool checks for structures, such as BTrees and reference counts and repair them. These low-level objects have no knowledge of the upper-level structures, such as messages, calendar items, and so on, that are built upon them.
When scanpst.exe tool determines that a specific block of the structure or table is unreadable or corrupted, it simply removes it. If that block was part of a specific item in Outlook, the item will be removed when it is validated Microsoft MCTS Training.
Folders and messages are the area where changes are more visible.
Folders
Scanpst.exe examines every folder in the .PST and performs the following operations:
ScanPST makes sure that there are the correct tables associated with the folder.
It checks every row in each table and makes sure that the message or the subfolder exists in the system.
If message or the subfolders are not found, it removes the row from the table or tries to validate the message or the folder.
If that validation fails, the message or folder is considered corrupted, and it is removed from the table and deleted from the database.
Corrupted folders are recreated from scratch as scanpst performs PST repair.
Messages
ScanPST performs the following operations on messages:
ScanPST does some basic validation of attachment tables and recipient tables.
As soon as the recipient table is validated to guarantee correctly formatted recipients, ScanPST makes any changes that are required to synchronize these valid recipient table contents to the recipient properties on the message. It also guarantees that the message's parent folder refers to a valid folder. The following message properties are checked to make sure that they follow valid data formats Microsoft MCITP Certification:
PR_MESSAGE_CLASS
ScanPST checks that this property exists. If the property does not exist, it is set to IPM.Note.
PR_MESSAGE_FLAGS
Each flag is validated separately.
PR_SUBMIT_FLAGS
This validation resembles the operation for message flags.
PR_CLIENT_SUBMIT_TIME
If the submit flags indicate that the message is marked as submitted, this property must exist. If not, the time is set to Now.
PR_SEARCH_KEY
This property must exist. If the property is not present, a random GUID is generated for it.
PR_CREATION_TIME
This property must exist. If the property is not present, the time is set to Now.
PR_LAST_MODIFICATION_TIME
This property must exist. If the property is not present, the time is set to Now.
PR_MESSAGE_SIZE
Sizes are recalculated and compared to stored values. If sizes differ by some delta, the calculated value is written.
This way Scanpst.exe (Inbox Repair) operates and checks for errors in corrupt PST file and resolve the same. Sometimes Inbox Repair tool fails to perform PST Repair. But using PST recovery software you are assured of complete and successful PST repair.
Scanpst.exe is executable file of Inbox Repair tool. After reading this article you will come to know how Inbox Repair tool works to validate and correct errors in the internal data structures of a .PST file. First of all, Inbox Repair tool checks for structures, such as BTrees and reference counts and repair them. These low-level objects have no knowledge of the upper-level structures, such as messages, calendar items, and so on, that are built upon them.
When scanpst.exe tool determines that a specific block of the structure or table is unreadable or corrupted, it simply removes it. If that block was part of a specific item in Outlook, the item will be removed when it is validated Microsoft MCTS Training.
Folders and messages are the area where changes are more visible.
Folders
Scanpst.exe examines every folder in the .PST and performs the following operations:
ScanPST makes sure that there are the correct tables associated with the folder.
It checks every row in each table and makes sure that the message or the subfolder exists in the system.
If message or the subfolders are not found, it removes the row from the table or tries to validate the message or the folder.
If that validation fails, the message or folder is considered corrupted, and it is removed from the table and deleted from the database.
Corrupted folders are recreated from scratch as scanpst performs PST repair.
Messages
ScanPST performs the following operations on messages:
ScanPST does some basic validation of attachment tables and recipient tables.
As soon as the recipient table is validated to guarantee correctly formatted recipients, ScanPST makes any changes that are required to synchronize these valid recipient table contents to the recipient properties on the message. It also guarantees that the message's parent folder refers to a valid folder. The following message properties are checked to make sure that they follow valid data formats Microsoft MCITP Certification:
PR_MESSAGE_CLASS
ScanPST checks that this property exists. If the property does not exist, it is set to IPM.Note.
PR_MESSAGE_FLAGS
Each flag is validated separately.
PR_SUBMIT_FLAGS
This validation resembles the operation for message flags.
PR_CLIENT_SUBMIT_TIME
If the submit flags indicate that the message is marked as submitted, this property must exist. If not, the time is set to Now.
PR_SEARCH_KEY
This property must exist. If the property is not present, a random GUID is generated for it.
PR_CREATION_TIME
This property must exist. If the property is not present, the time is set to Now.
PR_LAST_MODIFICATION_TIME
This property must exist. If the property is not present, the time is set to Now.
PR_MESSAGE_SIZE
Sizes are recalculated and compared to stored values. If sizes differ by some delta, the calculated value is written.
This way Scanpst.exe (Inbox Repair) operates and checks for errors in corrupt PST file and resolve the same. Sometimes Inbox Repair tool fails to perform PST Repair. But using PST recovery software you are assured of complete and successful PST repair.
Sunday, July 4, 2010
My This Year Passed Certifications Review
My This Year Passed Certifications Review
Garth had a post a few week back about his certification achievements this past year. Seeing this is the last week of the year, I was reflecting on what I accomplished this past year. Listing what you have accomplished in the past year along with setting goals for the future is a good way to mark your progress and then set goals to achieve going ahead MCTS Training.
This past year I have been fairly steady with the certifications I passed the following exams:
* 70-640 TS: Windows Server 2008 Active Directory, Configuring
* 70-642 TS: Windows Server 2008 Network Infrastructure, Configuring
* 70-625 TS: Connected Home Integrator
* 70-626 Consumer Sales Specialist
* 70-622 PRO: Supporting and Troubleshooting Applications on a Windows Vista Client for Enterprise Support Technicians
* 70-293 Planning and Maintaining a Windows Server 2003 Network Infrastructure
* 70-294 Planning, Implementing, and Maintaining a Windows Server 2003 Active Directory Infrastructure
* 70-297 Designing a Windows Server 2003 Active Directory and Network Infrastructure
As a result of these exams I received the MCITP Certification : Enterprise Support Technician and the MCSE 2003 credential.
I am also taking a program through Loyalist College’s Loyalist Training and Development Centre called Managing and Leading in a Municipal Environment as part of my job at the County.
In 2009 my plan is to pass the following exams:
* 70-643 TS: Windows Server 2008 Applications Infrastructure, Configuring
* 70-646 PRO: Windows Server 2008, Server Administrator
* 70-647 PRO: Windows Server 2008, Enterprise Administrator
* 70-236 TS: Exchange Server 2007, Configuring
* 70-635 TS: Microsoft Deployment Toolkit 2008, Desktop Deployment
As well as these Microsoft exams, I also want to do an ITIL course this year and Security+ and maybe look at the CCNA from Cisco but probably won’t write that exam in 2009. I may also try and write some other Microsoft exams besides the ones above, but we’ll see how it goes. I am going to try to get through the ones listed first.
Garth had a post a few week back about his certification achievements this past year. Seeing this is the last week of the year, I was reflecting on what I accomplished this past year. Listing what you have accomplished in the past year along with setting goals for the future is a good way to mark your progress and then set goals to achieve going ahead MCTS Training.
This past year I have been fairly steady with the certifications I passed the following exams:
* 70-640 TS: Windows Server 2008 Active Directory, Configuring
* 70-642 TS: Windows Server 2008 Network Infrastructure, Configuring
* 70-625 TS: Connected Home Integrator
* 70-626 Consumer Sales Specialist
* 70-622 PRO: Supporting and Troubleshooting Applications on a Windows Vista Client for Enterprise Support Technicians
* 70-293 Planning and Maintaining a Windows Server 2003 Network Infrastructure
* 70-294 Planning, Implementing, and Maintaining a Windows Server 2003 Active Directory Infrastructure
* 70-297 Designing a Windows Server 2003 Active Directory and Network Infrastructure
As a result of these exams I received the MCITP Certification : Enterprise Support Technician and the MCSE 2003 credential.
I am also taking a program through Loyalist College’s Loyalist Training and Development Centre called Managing and Leading in a Municipal Environment as part of my job at the County.
In 2009 my plan is to pass the following exams:
* 70-643 TS: Windows Server 2008 Applications Infrastructure, Configuring
* 70-646 PRO: Windows Server 2008, Server Administrator
* 70-647 PRO: Windows Server 2008, Enterprise Administrator
* 70-236 TS: Exchange Server 2007, Configuring
* 70-635 TS: Microsoft Deployment Toolkit 2008, Desktop Deployment
As well as these Microsoft exams, I also want to do an ITIL course this year and Security+ and maybe look at the CCNA from Cisco but probably won’t write that exam in 2009. I may also try and write some other Microsoft exams besides the ones above, but we’ll see how it goes. I am going to try to get through the ones listed first.
Friday, July 2, 2010
Microsoft's support of web standards HTML 5
HTML 5
Google won some points in the I/O keynote by pointing out that, even with Internet Explorer (IE) 9, Microsoft's support of web standards dramatically trailed all of the competition. Microsoft's hope is that the continued success of its desktop products will render that fact less damaging Microsoft MCTS Training.
Google, meanwhile, is claiming that all meaningful software development since 2004 has occurred on the web and not on traditional PC platforms like Windows. I suspect it really meant all meaningful "new" software development, since new versions of products like Microsoft Office and Adobe Flash continue to be hugely successful and are installed on hundreds of millions of PCs. But the point is valid enough. And web apps based on the emerging HTML 5 standard are an important focus for all major platform makers, including Microsoft.
One advantage that Google has here is that virtually all of its applications are web applications, so it behooves the company to update them rapidly with support for new web technologies. While doing so, it's gaining valuable experience about how these web apps perform and scale. Microsoft, meanwhile, has cash cows to protect. And it's most innovative work—I'm thinking of Windows Phone 7 here—is occurring only in those markets where the previous product failed, so there's no reason to carry it forward. I've said it before, but Microsoft is going to need to adopt this mindset for all its product lines if it intends to remain dominant in the coming generation of web apps.
VP8
Google announced that it would open source and freely license a video codec called VP8, positioning it as an alternative to the expensive and complicated H.264 pseudo-standard. Critics—i.e., H.264 backers—note that VP8 isn't as high quality as H.264, and they may have a point. But it won't matter. For mobile devices and You Tube-type web video, VP8 looks just fine. Murkier is the intellectual property concerns around VP8. Since Google isn't offering indemnity against IP lawsuits, Microsoft will support VP8 but not include it with IE 9. This is the right decision, unless and until Google offers indemnity. (IE 9 will include H.264 video support, as Microsoft is paying for that license.) Microsoft MCITP Certification
Google won some points in the I/O keynote by pointing out that, even with Internet Explorer (IE) 9, Microsoft's support of web standards dramatically trailed all of the competition. Microsoft's hope is that the continued success of its desktop products will render that fact less damaging Microsoft MCTS Training.
Google, meanwhile, is claiming that all meaningful software development since 2004 has occurred on the web and not on traditional PC platforms like Windows. I suspect it really meant all meaningful "new" software development, since new versions of products like Microsoft Office and Adobe Flash continue to be hugely successful and are installed on hundreds of millions of PCs. But the point is valid enough. And web apps based on the emerging HTML 5 standard are an important focus for all major platform makers, including Microsoft.
One advantage that Google has here is that virtually all of its applications are web applications, so it behooves the company to update them rapidly with support for new web technologies. While doing so, it's gaining valuable experience about how these web apps perform and scale. Microsoft, meanwhile, has cash cows to protect. And it's most innovative work—I'm thinking of Windows Phone 7 here—is occurring only in those markets where the previous product failed, so there's no reason to carry it forward. I've said it before, but Microsoft is going to need to adopt this mindset for all its product lines if it intends to remain dominant in the coming generation of web apps.
VP8
Google announced that it would open source and freely license a video codec called VP8, positioning it as an alternative to the expensive and complicated H.264 pseudo-standard. Critics—i.e., H.264 backers—note that VP8 isn't as high quality as H.264, and they may have a point. But it won't matter. For mobile devices and You Tube-type web video, VP8 looks just fine. Murkier is the intellectual property concerns around VP8. Since Google isn't offering indemnity against IP lawsuits, Microsoft will support VP8 but not include it with IE 9. This is the right decision, unless and until Google offers indemnity. (IE 9 will include H.264 video support, as Microsoft is paying for that license.) Microsoft MCITP Certification
Thursday, July 1, 2010
Hyper-V Live Migration: A Step-by-Step Guide 2
Hyper-V Live Migration: A Step-by-Step Guide 2
Storage Configuration
I used a LeftHand Networks ISCSI SAN for Hyper-V live migration as well as a test SQL Server implementation. On the iSCSI SAN I created four LUNs. One LUN was sized at 500MB to be used for the cluster quorum. Another was sized at 1024GB to be used for 10 VMs. Two other LUNS were for the test SQL Server implementation and consisted of a 200MB LUN for the Distributed Transaction Coordinator and a 500GB LUN for SQL Server data files Microsoft MCTS Training.
After creating the LUNs, I configured the iSCSI Initiator on both the Windows Server nodes. To add the iSCSI targets, I selected the Administrative Tools, iSCSI Initiator option, then on the Discovery tab I chose the Discover Portal option. This displayed the Discover Portal dialog box where I entered the IP address and iSCSI port of the SAN. In my case, this was 192.168.0.1 and 3260, respectively.
Next, in the Connect to Target dialog box, I supplied the target name of the iSCSI SAN. This name came from the properties of the SAN and varies depending on the SAN vendor, the domain name, and the names of the LUNs that are created. I checked the option Add this connection to the list of Favorite Targets. After completing the ISCSI configuration, the iSCSI Initiator Targets tab was populated with the LUNs.
Finally, using Disk Administrator I assigned drive letters to the LUNs. I opened Disk Management and used Q for the quorum, R for DTC, S for SQL Server, and V for the VMs. You need to make the assignments on one node, then bring the disks offline and make identical assignments in the second node. Figure 3 shows the completed Disk Management disk assignments for one of the nodes.
Adding the Hyper-V Role and Failover Clustering Feature
The next step is to add the Hyper-V role, then the Failover Clustering feature. You add both by using Server Manager. To add the Hyper-V role, select Administrative Tools, Server Manager, then click the Add Role link. From the Select Server Roles dialog box, select Hyper-V, then click Next. You’ll be prompted with Create Virtual Networks. This essentially creates a bridge between the Hyper-V VMs and your external network Microsoft MCITP Certification.
Select the NICs that you want to use for your VM traffic. Be careful not to choose the NICs that are used for the iSCSI SAN connection. Click Next to complete the Add Role Wizard. The system then reboots. You need to perform this process for all of the nodes in the cluster.
Next, add the Failover Cluster Feature by using the Administrative Tools, Server Manager, Add Feature option. This starts the Add Features wizard. Scroll through the list of features and select the Failover Clustering feature. Click Next to complete the wizard. This process must be completed on all nodes.
Configuring Failover Clustering
Next, create a Failover Cluster. You can do this on any of the cluster nodes. Select the Administrative Tools, Failover Cluster Manager option to start the Failover Cluster Management console. Then select the Validate a Configuration link to start the wizard, which displays the Select Servers or Cluster dialog box.
Enter the fully quailed names of all the nodes that will belong to the cluster, then click Next. Click Next through the subsequent wizard screens to run the cluster validation tests, which check the OS level, network configuration, and storage of all cluster nodes. A summary of the test results is displayed. If the validation tests succeed, you can continue and create the cluster. If there are errors or warnings, you can display them in the report, correct them, and rerun the validation tests.
After the validation tests have run, you create the cluster using the Create a Cluster link from the Failover Cluster Management console. Like the validate option, the Create a Cluster option first starts by displaying a Select Servers dialog box where you enter the names of all cluster nodes. Clicking Next displays the Access Point for Administering the Cluster dialog box, which you can see in Figure 4.
You use the dialog box labeled Access Point for Administering the Cluster to assign the cluster a name and an IP address. The name and IP address both must be unique in the network. In Figure 4, you can see that I named the cluster WS08R2-CL01 and gave the cluster an IP address of 192.168.100.200. With Windows Server 2008 R2 you can choose to have the IP address assigned by DHCP, but I prefer to use manually assigned IP address for my server systems because it allows all of my servers to always have the same IP addresses, which is handy for troubleshooting problems.
Clicking Next displays the Confirmation screen where you review your cluster creation selections. You can page back and make changes. Click Next again to create the cluster. A summary screen then displays the configuration of the new cluster. This action configures the cluster on all of the selected clustered nodes.
Storage Configuration
I used a LeftHand Networks ISCSI SAN for Hyper-V live migration as well as a test SQL Server implementation. On the iSCSI SAN I created four LUNs. One LUN was sized at 500MB to be used for the cluster quorum. Another was sized at 1024GB to be used for 10 VMs. Two other LUNS were for the test SQL Server implementation and consisted of a 200MB LUN for the Distributed Transaction Coordinator and a 500GB LUN for SQL Server data files Microsoft MCTS Training.
After creating the LUNs, I configured the iSCSI Initiator on both the Windows Server nodes. To add the iSCSI targets, I selected the Administrative Tools, iSCSI Initiator option, then on the Discovery tab I chose the Discover Portal option. This displayed the Discover Portal dialog box where I entered the IP address and iSCSI port of the SAN. In my case, this was 192.168.0.1 and 3260, respectively.
Next, in the Connect to Target dialog box, I supplied the target name of the iSCSI SAN. This name came from the properties of the SAN and varies depending on the SAN vendor, the domain name, and the names of the LUNs that are created. I checked the option Add this connection to the list of Favorite Targets. After completing the ISCSI configuration, the iSCSI Initiator Targets tab was populated with the LUNs.
Finally, using Disk Administrator I assigned drive letters to the LUNs. I opened Disk Management and used Q for the quorum, R for DTC, S for SQL Server, and V for the VMs. You need to make the assignments on one node, then bring the disks offline and make identical assignments in the second node. Figure 3 shows the completed Disk Management disk assignments for one of the nodes.
Adding the Hyper-V Role and Failover Clustering Feature
The next step is to add the Hyper-V role, then the Failover Clustering feature. You add both by using Server Manager. To add the Hyper-V role, select Administrative Tools, Server Manager, then click the Add Role link. From the Select Server Roles dialog box, select Hyper-V, then click Next. You’ll be prompted with Create Virtual Networks. This essentially creates a bridge between the Hyper-V VMs and your external network Microsoft MCITP Certification.
Select the NICs that you want to use for your VM traffic. Be careful not to choose the NICs that are used for the iSCSI SAN connection. Click Next to complete the Add Role Wizard. The system then reboots. You need to perform this process for all of the nodes in the cluster.
Next, add the Failover Cluster Feature by using the Administrative Tools, Server Manager, Add Feature option. This starts the Add Features wizard. Scroll through the list of features and select the Failover Clustering feature. Click Next to complete the wizard. This process must be completed on all nodes.
Configuring Failover Clustering
Next, create a Failover Cluster. You can do this on any of the cluster nodes. Select the Administrative Tools, Failover Cluster Manager option to start the Failover Cluster Management console. Then select the Validate a Configuration link to start the wizard, which displays the Select Servers or Cluster dialog box.
Enter the fully quailed names of all the nodes that will belong to the cluster, then click Next. Click Next through the subsequent wizard screens to run the cluster validation tests, which check the OS level, network configuration, and storage of all cluster nodes. A summary of the test results is displayed. If the validation tests succeed, you can continue and create the cluster. If there are errors or warnings, you can display them in the report, correct them, and rerun the validation tests.
After the validation tests have run, you create the cluster using the Create a Cluster link from the Failover Cluster Management console. Like the validate option, the Create a Cluster option first starts by displaying a Select Servers dialog box where you enter the names of all cluster nodes. Clicking Next displays the Access Point for Administering the Cluster dialog box, which you can see in Figure 4.
You use the dialog box labeled Access Point for Administering the Cluster to assign the cluster a name and an IP address. The name and IP address both must be unique in the network. In Figure 4, you can see that I named the cluster WS08R2-CL01 and gave the cluster an IP address of 192.168.100.200. With Windows Server 2008 R2 you can choose to have the IP address assigned by DHCP, but I prefer to use manually assigned IP address for my server systems because it allows all of my servers to always have the same IP addresses, which is handy for troubleshooting problems.
Clicking Next displays the Confirmation screen where you review your cluster creation selections. You can page back and make changes. Click Next again to create the cluster. A summary screen then displays the configuration of the new cluster. This action configures the cluster on all of the selected clustered nodes.
Hyper-V Live Migration: A Step-by-Step Guide 2
Hyper-V Live Migration: A Step-by-Step Guide 2
Storage Configuration
I used a LeftHand Networks ISCSI SAN for Hyper-V live migration as well as a test SQL Server implementation. On the iSCSI SAN I created four LUNs. One LUN was sized at 500MB to be used for the cluster quorum. Another was sized at 1024GB to be used for 10 VMs. Two other LUNS were for the test SQL Server implementation and consisted of a 200MB LUN for the Distributed Transaction Coordinator and a 500GB LUN for SQL Server data files Microsoft MCTS Training.
After creating the LUNs, I configured the iSCSI Initiator on both the Windows Server nodes. To add the iSCSI targets, I selected the Administrative Tools, iSCSI Initiator option, then on the Discovery tab I chose the Discover Portal option. This displayed the Discover Portal dialog box where I entered the IP address and iSCSI port of the SAN. In my case, this was 192.168.0.1 and 3260, respectively.
Next, in the Connect to Target dialog box, I supplied the target name of the iSCSI SAN. This name came from the properties of the SAN and varies depending on the SAN vendor, the domain name, and the names of the LUNs that are created. I checked the option Add this connection to the list of Favorite Targets. After completing the ISCSI configuration, the iSCSI Initiator Targets tab was populated with the LUNs.
Finally, using Disk Administrator I assigned drive letters to the LUNs. I opened Disk Management and used Q for the quorum, R for DTC, S for SQL Server, and V for the VMs. You need to make the assignments on one node, then bring the disks offline and make identical assignments in the second node. Figure 3 shows the completed Disk Management disk assignments for one of the nodes.
Adding the Hyper-V Role and Failover Clustering Feature
The next step is to add the Hyper-V role, then the Failover Clustering feature. You add both by using Server Manager. To add the Hyper-V role, select Administrative Tools, Server Manager, then click the Add Role link. From the Select Server Roles dialog box, select Hyper-V, then click Next. You’ll be prompted with Create Virtual Networks. This essentially creates a bridge between the Hyper-V VMs and your external network Microsoft MCITP Certification.
Select the NICs that you want to use for your VM traffic. Be careful not to choose the NICs that are used for the iSCSI SAN connection. Click Next to complete the Add Role Wizard. The system then reboots. You need to perform this process for all of the nodes in the cluster.
Next, add the Failover Cluster Feature by using the Administrative Tools, Server Manager, Add Feature option. This starts the Add Features wizard. Scroll through the list of features and select the Failover Clustering feature. Click Next to complete the wizard. This process must be completed on all nodes.
Configuring Failover Clustering
Next, create a Failover Cluster. You can do this on any of the cluster nodes. Select the Administrative Tools, Failover Cluster Manager option to start the Failover Cluster Management console. Then select the Validate a Configuration link to start the wizard, which displays the Select Servers or Cluster dialog box.
Enter the fully quailed names of all the nodes that will belong to the cluster, then click Next. Click Next through the subsequent wizard screens to run the cluster validation tests, which check the OS level, network configuration, and storage of all cluster nodes. A summary of the test results is displayed. If the validation tests succeed, you can continue and create the cluster. If there are errors or warnings, you can display them in the report, correct them, and rerun the validation tests.
After the validation tests have run, you create the cluster using the Create a Cluster link from the Failover Cluster Management console. Like the validate option, the Create a Cluster option first starts by displaying a Select Servers dialog box where you enter the names of all cluster nodes. Clicking Next displays the Access Point for Administering the Cluster dialog box, which you can see in Figure 4.
You use the dialog box labeled Access Point for Administering the Cluster to assign the cluster a name and an IP address. The name and IP address both must be unique in the network. In Figure 4, you can see that I named the cluster WS08R2-CL01 and gave the cluster an IP address of 192.168.100.200. With Windows Server 2008 R2 you can choose to have the IP address assigned by DHCP, but I prefer to use manually assigned IP address for my server systems because it allows all of my servers to always have the same IP addresses, which is handy for troubleshooting problems.
Clicking Next displays the Confirmation screen where you review your cluster creation selections. You can page back and make changes. Click Next again to create the cluster. A summary screen then displays the configuration of the new cluster. This action configures the cluster on all of the selected clustered nodes.
Storage Configuration
I used a LeftHand Networks ISCSI SAN for Hyper-V live migration as well as a test SQL Server implementation. On the iSCSI SAN I created four LUNs. One LUN was sized at 500MB to be used for the cluster quorum. Another was sized at 1024GB to be used for 10 VMs. Two other LUNS were for the test SQL Server implementation and consisted of a 200MB LUN for the Distributed Transaction Coordinator and a 500GB LUN for SQL Server data files Microsoft MCTS Training.
After creating the LUNs, I configured the iSCSI Initiator on both the Windows Server nodes. To add the iSCSI targets, I selected the Administrative Tools, iSCSI Initiator option, then on the Discovery tab I chose the Discover Portal option. This displayed the Discover Portal dialog box where I entered the IP address and iSCSI port of the SAN. In my case, this was 192.168.0.1 and 3260, respectively.
Next, in the Connect to Target dialog box, I supplied the target name of the iSCSI SAN. This name came from the properties of the SAN and varies depending on the SAN vendor, the domain name, and the names of the LUNs that are created. I checked the option Add this connection to the list of Favorite Targets. After completing the ISCSI configuration, the iSCSI Initiator Targets tab was populated with the LUNs.
Finally, using Disk Administrator I assigned drive letters to the LUNs. I opened Disk Management and used Q for the quorum, R for DTC, S for SQL Server, and V for the VMs. You need to make the assignments on one node, then bring the disks offline and make identical assignments in the second node. Figure 3 shows the completed Disk Management disk assignments for one of the nodes.
Adding the Hyper-V Role and Failover Clustering Feature
The next step is to add the Hyper-V role, then the Failover Clustering feature. You add both by using Server Manager. To add the Hyper-V role, select Administrative Tools, Server Manager, then click the Add Role link. From the Select Server Roles dialog box, select Hyper-V, then click Next. You’ll be prompted with Create Virtual Networks. This essentially creates a bridge between the Hyper-V VMs and your external network Microsoft MCITP Certification.
Select the NICs that you want to use for your VM traffic. Be careful not to choose the NICs that are used for the iSCSI SAN connection. Click Next to complete the Add Role Wizard. The system then reboots. You need to perform this process for all of the nodes in the cluster.
Next, add the Failover Cluster Feature by using the Administrative Tools, Server Manager, Add Feature option. This starts the Add Features wizard. Scroll through the list of features and select the Failover Clustering feature. Click Next to complete the wizard. This process must be completed on all nodes.
Configuring Failover Clustering
Next, create a Failover Cluster. You can do this on any of the cluster nodes. Select the Administrative Tools, Failover Cluster Manager option to start the Failover Cluster Management console. Then select the Validate a Configuration link to start the wizard, which displays the Select Servers or Cluster dialog box.
Enter the fully quailed names of all the nodes that will belong to the cluster, then click Next. Click Next through the subsequent wizard screens to run the cluster validation tests, which check the OS level, network configuration, and storage of all cluster nodes. A summary of the test results is displayed. If the validation tests succeed, you can continue and create the cluster. If there are errors or warnings, you can display them in the report, correct them, and rerun the validation tests.
After the validation tests have run, you create the cluster using the Create a Cluster link from the Failover Cluster Management console. Like the validate option, the Create a Cluster option first starts by displaying a Select Servers dialog box where you enter the names of all cluster nodes. Clicking Next displays the Access Point for Administering the Cluster dialog box, which you can see in Figure 4.
You use the dialog box labeled Access Point for Administering the Cluster to assign the cluster a name and an IP address. The name and IP address both must be unique in the network. In Figure 4, you can see that I named the cluster WS08R2-CL01 and gave the cluster an IP address of 192.168.100.200. With Windows Server 2008 R2 you can choose to have the IP address assigned by DHCP, but I prefer to use manually assigned IP address for my server systems because it allows all of my servers to always have the same IP addresses, which is handy for troubleshooting problems.
Clicking Next displays the Confirmation screen where you review your cluster creation selections. You can page back and make changes. Click Next again to create the cluster. A summary screen then displays the configuration of the new cluster. This action configures the cluster on all of the selected clustered nodes.
Subscribe to:
Posts (Atom)
MCITP Training - MCITP Certificaion - MCTS Exams Training - CCNA Exams - and more at CertKingdom.com