Monday, October 31, 2011

How Android swallowed the UK smartphone market in 18 months

In just 18 months, Android has come from nowhere to become the mobile OS powering just under half of every smartphone sold in the UK – and the half the people owning a mobile phone in the UK have a smartphone.

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com


In the process it has bested Nokia's Symbian (since declared dead, though still stumbling to its grave), RIM's BlackBerry OS (which is fighting back) and Apple's iPhone (which, given its comparatively high price until the latest cuts to the iPhone 3GS and iPhone 4, was never likely to dominate long-term).

It's an amazing run for Android which is likely to carry on into 2012, since it's taken four years to reach this point (longer if you count Nokia's, RIM's and Microsoft's offerings from 2005/6 as smartphones) but the number of smartphones being sold is accelerating.

What these figures don't show you is that the entire market is growing; Kantar ComTech WorldPanel, which provides the statistics, declined to give absolute sales figures (they want to have something to tempt clients to buy the full reports). A minor note: these figures go up to 2 October, just before the iPhone 4S launch; expect that Apple's share will recover slightly. Even so, Android is just going to keep growing.

It's very likely that in the next two years you'll see smartphones reach something like 90% penetration in the UK - if only because fewer shops and carriers will be selling feature phones, for two reasons: (a) they make less money selling them in the first place (b) carriers get less money from phones that don't have data plans.

Android is almost certain to sweep the board here: it could hit up to 70% market share in one or two years (remember, market share is "share of handsets being sold", not "share of handsets in peoples' hands"). That's because Android handsets from cheaper manufacturers such as China's Huawei and ZTE will come in at the bottom of the market (it's noticeable how the "Other" segment has fallen to zero in the past year). Pretty soon you're going to be able to get a smartphone for almost nothing in your local supermarket. And you can already get really cheap PAYG data options from Three or GiffGaff.

For the record, I think it's great that smartphones are becoming pervasive. Putting the internet in everyone's hands, wherever they are? (If only the mobile carriers would stopholding up the 4G auction.) That's got to be a really good thing.

Does it matter, though, whether the pervasive OS is Android, or what share this or that OS has, beyond the willy-waving horse race that some people love to indulge in? Here's Henry Blodget over at BusinessInsider, who slams on the CAPS LOCK to pronounce ATTENTION APPLE FANS: Samsung Blowing Past Apple To Become The Biggest Smartphone Vendor Is Not Good News". (By which he means not good news for Apple. Though by implication, it would also be Not Good News for RIM and Nokia either.) Blodget's take: As the history of the tech industry has demonstrated again and again, technology platform markets tend to standardize around a single dominant platform. Although several different platforms can co-exist while a market is developing, eventually a clear leader emerges. And as it does, the leader's power and "network effects" grow, while the leverage of the smaller platforms diminishes.

In the case of Android, this growing power will not lead to enormous profits for Google, because, right now anyway, Google is not selling Android. (Instead, Google is building a "moat" around its wildly profitable search business and making it easier for people to use Google search from their phones. This may change when Google acquires Motorola and starts selling integrated handsets itself.) But the better Android phones get, and the more market share Android gains, the more Android's network effects will increase, and the more Apple's leverage over the iPhone ecosystem will diminish. And that can only be bad news for Apple's ability to continue to command exploding profits from iPhones, app developers, musicians, media companies, and others who now must pay it big distribution fees because they have no other choice.Similarly, the bigger other global handset manufacturers get relative to Apple, the less (relative) leverage Apple will have over partners in the global parts-and-manufacturing supply chains.

There's three things there. Let's take the last one first: supply chains. Apple didn't do badly in 2007 when it was an entrant to the mobile phone supply chain, and it's got enough money in the bank that it can guarantee supplies any time it likes. (That's what it uses its cash reserves outside the US to do: buy up future outputs from various factories.) Most smartphone manufacturers don't have much scale; that's unlikely to change. Samsung is likely to get bigger (though it would be helpful if it would be more forthcoming about how many phones and how many tablets it has pushed out the door). That won't stop Apple making phones, though. And by proxy, it won't stop RIM or Nokia making phones - Nokia is still the world's largest in handset volume. Only mismanagement can mess that up.

Now to the first point, about "the history of the tech industry". Actually, the history of the tech industry is a wide and varied thing, which doesn't show any clear lessons about dominant platforms. Yes, you do get dominant platforms, but that doesn't prevent other players existing within niches and making good money from it. Cite 1: Apple, making nice money, thanks, from the PC market. Cite 2: Microsoft, making nice money, thanks, from the server OS market, despite Linux being the most-used. The leverage of Apple and Microsoft in those respective spaces is helped by the existence of standards, and it's those - plus the internet - which make the "platform" idea less powerful on smartphones.

Think of it like this: if the PC market had started when the internet was already pervasive, then operating systems would have had to have internet standards built in; that would have forced more interoperability. It was the threat that Netscape might force interoperability on all computing platforms that scared the bejeezus out of Microsoft in the 1990s. So smartphones, which are arriving when the internet is pervasive, will live by different standards.

Horace Dediu, who runs the consultancy Asymco, puts it like this: imagine a world where 5 billion people have a smartphone. In that case, a 10% share translates to 500 million users. Even a 1% share is 50 million. If you couldn't make a profit from 50 million users, you probably shouldn't be in the business at all.

And just a side note on that "wildly profitable" Google search from their phones. All the web stats, and Google's own stats, indicate that - for now anyway - about two-thirds or more of mobile web browsing and searching is mostly done by iOS users (iPhone, iPod Touch, iPad). In some places it's much higher. Now, past performance is not necessarily a guide to the future (you only have to look at the graph to see that). But you have to ask too: what exactly is the "network effect" that Blodget thinks Google will get from Android? People writing apps? They already do; but it hasn't dented the bigger platforms.

The interesting challenge will be for Nokia and RIM, which have to establish themselves at the higher end of the market as everything shifts to smartphones. But in a growing market, the only problem is how to supply enough people. Android's a whopping success. But that doesn't shut anyone out - yet.

How-to: Create a bootable Windows 8 USB flash drive

Bootable USB flash drives are far more convenient than DVD discs.

This has become a popular question as of late so I thought I’d throw a quick page up outlining how to do it.



Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com



Note: This procedure also works for Windows 7.

I’ll warn you in advance that there are a lot of steps involved to do this! Also, you’ll need an 8GB or larger USB flash drive.

Download the Windows 8 .ISO from the Microsoft website.
Mount the .ISO file as a drive … if you don’t have a tool to do this, I suggest SlySoft’s Virtual CloneDrive - it’s free! Alternatively, you can burn it to a DVD using a tool such as ImgBurn and pop the disc in your drive.
Format your USB flash drive ready like this:
- Insert a USB flash drive into your computer
- Start a Command Prompt as an administrator (right-click on the entry and select Run as administrator) and type diskpart and then press ENTER
- Next, type the following BOLD lines a line at a time, pressing ENTER at the end of each line after the command has completed:
DISKPART> list disk
DISKPART> select disk X
Note: X is the number for your USB flash drive you obtained from the list command from the previous step.
DISKPART> clean
DISKPART> create partition primary
DISKPART> select partition 1
DISKPART> active
DISKPART> format FS=NTFS
DISKPART> assign
DISKPART> exit
Next you need to make your USB flash drive bootable. Start another Command Prompt as an administrator and navigate to the boot folder of the Windows 8 ISO image then type the following:
bootsect /nt60 X:
Note: Where X is the drive letter for your USB flash drive
From a Command Prompt type the following:
XCOPY X:\*.* Y:\ /E /F /H
Note: Where X is the drive letter for your USB flash drive and Y is the drive letter of your mounted Windows 8 .ISO file
Boot your PC up from your USB flash drive. If your PC won’t boot from your USB flash drive then you’ll need to dig out your motherboard manual and twiddle with the boot device settings.

And you’re done!

Sunday, October 30, 2011

Should your small business virtualize?

Virtualization is one of the hottest IT topics today. Everyone's talking about it, but few are really doing it -- and there's a big gulf between enterprise and small business adoption, even though many of the benefits are the same. Small business is one of my favorite technology segments, because of its diversity, unique needs, large size, yet small IT footprint. When working as an analyst during the mid-Noughties I launched JupiterResearch's SMB practice. I've been remiss by not writing more about small business tech at BetaNews.


Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com



There is much confusion about what is a small business -- how official statisticians and high-tech vendors segment sizes. Small businesses account for 97 percent of employee firms, according to US government agencies. But that segmentation counts firms with fewer than 500 employees as small business -- large by my measure -- and ignores the enormous number of operations with non-payroll employees. This segment is often overlooked by high-tech vendors, many of which count them as consumers. By the US Census Bureau's reckoning, there are nearly 27.3 million small businesses, but only 5.9 million have payrolls and 3.62 million employ fewer than five people. So there are 21.4 million businesses employing less than 5 people -- that's 78 percent of them.

Integrated Approach

For JupiterResearch, I segmented small businesses differently. Small is small. Companies with less than 50 employees counted as small businesses, those with fewer than 10 employees as very small businesses and those with no payroll employees were sole proprietorships. It's typical for business owners in this segment to run their establishments on the side or to have more than one operation. I am surprised to see how few high-tech firms address the unique needs of very small businesses or sole proprietorships.

Among PC manufacturers, HP and Dell stand out for their small business offerings, for no other reason than size, being No. 1 and No. 2 in global shipments, according to Gartner and IDC. But both vendors are going through dramatic realignments. Earlier this summer, HP announced plans to either sell off or spin off its PC division, separating it from valuable services necessary to support business needs of all sizes. Today, HP made the decision to keep its PC division.

Dell's changes are different, as the company makes the cloud, virtualization and supporting services priorities. Dell's emphasis is integration -- one place for software, hardware and services. IBM also is good at vertical integration but Big Blue sold its PC business to Lenovo years ago. Meanwhile IBM defines small businesses by the thousands of employees, which to most other vendors would qualify as enterprises. HP also is big on services, but uncertainty about the future of its PC business (including x86 servers) and recent CEO changes create competitive opportunities.

Dell, which has long had strong small business offerings, is trying to seize the opportunity and also take its renewed integration focus to mid-size and large organizations. Forrester analyst Richard Fichera says the company is "really trying to change its image. Old Dell was boxes, discounts and low-cost supply chain. New Dell is applications, solution, cloud (now there's a surprise!) and investments in software and integration. OK, good image, but what's the reality? All in all, I think they are telling the truth about their intentions, and their investments continue to be aligned with these intentions".

Virtualization Interest

The "new Dell", as Fichera calls it, has been hot pushing cloud computing and virtualization solutions to small businesses. While writing this post I wondered why? The cloud is plain as day, but virtualizaton? Cisco, Microsoft and VMWare are among the many other vendors looking at this segment, too. But is that small business by that 499 employees, lesser number or something really small? Do the smallest of the lot even need virtualization?

There surely is interest. In August, Symantec published the "Small Business Virtualization Poll". The security firm surveyed 658 small businesses with 5 to 249 employees in 28 countries. Symantec found that "70 percent of the small businesses surveyed are considering virtualization", but only "10 percent have deployed virtualized servers, and another 17 percent are now doing so. This leaves 43 percent in technology trials or discussions". Thirty-percent aren't considering virtualization at all.

Top-three applications being virtualized: Web, database management and email/calendaring. Who does the work for the small business, whether those with dedicated IT organizations or small shops where the business owner oversees tech? For 58 percent of small businesses, its the "hardware or software vendor's professional services organization", which makes lots of sense of Dell and other PC manufacturers focusing more on providing small businesses with vertically integrated hardware, software and services.

Small businesses' top two reasons for virtualizing are about money: "reduce capital expense" (70 percent) and "reduce operating expense" (68 percent), which doesn't surprise given economic crises in Europe and North America. No 3: "Use less servers for the same amount of applications". Surely server consolidation matters more to companies with larger numbers of employees than those with fewer. But Symantec didn't provide the important granular view -- priorities of businesses with 5 employees versus 249.

The Mobile Problem

Small businesses all share two common problems not revealed by Symantec's poll, which offers too many enterprise-like reasons to small businesses to choose from: Proliferation of mobile devices and the mixing of personal and corporate data. Virtualization can help solve both these problems, which I'd argue are more pronounced in the smallest businesses -- the ones not represented at all by Symnatec's survey or as strong sales segment focuses by many vendors selling hardware, software or services (if not all three).

In my experience as an analyst and journalist, non-payroll operations typically use the same devices for personal and professional purposes -- there is tremendous overlap of data and behavior. This situation is pervasive among very small businesses, too, with tight tech budgets being one reason. Perhaps an employee uses a personal laptop for work purposes or the small business lets the worker use the official-issue notebook personally. Personal and professional data also commingles on smartphones and tablets. Larger operations share similar problems, but more because of so-called "consumerization of IT", where workers bring in personal devices like tablets. Stronger IT management mitigates the extent compared to smaller shops where there is no dedicated IT person or someone else, often the small business owner, wears two hats.

Businesses of all sizes suffer from the larger mobility problem -- data leaving the safe confines of the firewall on all kinds portable devices -- laptops, smartphones and tablets, among them. These devices can become infected with malware or be lost or stolen -- creating unnecessary privacy and security risks. Cloud services and virtualization can help small businesses keep precious data where it belongs and mitigate the risks when devices are lost or stolen.

Server virtualization has led the way for providing this kind of service, but some vendors are adding client virtuatization and privately hosted web services to the mix. For example, Intel is taking this approach for its IT infrastructure, because employees want to use a broader range of devices, "including personally owned smartphones and tablets". Obviously, Intel is no small business but its approach to virtualization as a solution to the two aforementioned problems could be applied on smaller scale. You can download the white paper here.

Circling back to the question: Should your small business virtualize? Probably yes. For the smallest of businesses, that could be in tandem with setting up a private cloud or outsourcing purely cloud services like Office 365 and Salesforce.com. The smallest businesses get something they also probably don't have now -- centralized IT management. The case for operations with 10 or more employees is stronger, whether to consolidate servers, better manage applications, reduce costs, provide employees anytime, anywhere access or separate personal and professional workspaces on the same devices.

Tuesday, October 25, 2011

Netflix shifting focus away from DVDs to streaming

Netflix’s CEO likens DVD by-mail rentals now to what AOL dial-up Internet was in the early 2000s.

Best CCIE Training and CCIE Exams and more Cisco exams log in to Certkingdom.com



It’s no secret to anyone familiar with what Netflix has endured in the last few months that the online rental business is on the defense.

Netflix’s current damage control strategy is all about focusing on digital streaming subscriptions and backing off from pushing by-mail DVD rentals. We’re still a long ways off from Netflix giving up on DVDs entirely, but it might not be that long until DVDs fall into the shadows — at least from a marketing perspective.


“The future is brightest by focusing on streaming,” asserted CEO Reed Hastings during a Q&A conference call with investors on Monday. When asked about discounting hybrid DVD-streaming subscriptions, Hastings acknowledged that Netflix could do that, but there isn’t as much interest in subsidizing DVDs in comparison to discounting streaming.

Hastings went so far as to compare DVD by-mail rentals now to what AOL dial-up Internet subscriptions became in the late 2000s: a long-term residual market with variable costs that is steadily declining every year.

CFO David Wells added that the long-term margin for streaming will be driven by how many competitors Netflix has, but he anticipates that the growth of streaming subscribers to outpace content addition over the next year.

“Netflix is not the only service that our subscribers use to source their entertainment,” Wells acknowledged, confirming that many subscribers that also use other rental services such as Redbox to supplement content.

Hastings also responded about the competition, posting that the digital streaming industry will clamor around promoting exclusive deals more and more

“Relative to paid television, it’s not a zero-sum game,” Hastings said. “Many people, including me, subscribe to HBO because it’s got incredible content, in addition to Netflix.”

However, Netflix executives replied that they had not seen any impact from new products from competitors — specifically Dish’s Blockbuster Movie Pass or Amazon Instant Video.

Reflecting the loss of 800,000 customers during the third quarter that stemmed from price hikes and the Qwikster debacle, Hastings admitted that when budgets are tight, consumers figure out a hierarchy of the ones they want to keep most.

The goal for Netflix, Hastings posited, is to win those customers, touting Netflix’s “pure on-demand experience” with personalized features that make it easier to discover content one might not have known exists.

“The focus for us is building back our reputation and brand strength,” Hastings concluded. “But that’s not through grand gestures.”

Monday, October 24, 2011

What you need to know about Windows 8 app compatibility

Hidden in the ballyhoo of the Windows 8 developer rollout is a gem of a document with the unlikely name of Windows and Windows Server Developer Preview Compatibility Cookbook. If you're starting to get spooked about "legacy" app compatibility with Windows 8, it's a good place to start.

(It still sends a shudder up my spine when I call Windows 7 apps "legacy.")

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com


Microsoft distributed a similar document for Windows 7 called the Application Quality Cookbook. Like the earlier tome, this one's intended to help applications people figure out what will or won't work with the new version of Windows -- and points in the right direction to identify, if not rectify, many common problems.

Some of the highlights:

If your apps check for a Windows version number, they're probably going to choke. Windows 8 is identified internally (by GetVersion and GetVersionEx) as version 6.2. Go figure.
.Net Framework 4.5 is the default (apparently it's built into the Win8 Runtime, WinRT), but .Net Framework 3.5 can be automatically loaded, with user approval, from the Windows Update site. Some day, performing an upgrade from Windows 7 to Windows 8 Developer Preview -- the direct upgrade is not currently supported -- is supposed to bring along a copy of .Net Framework 3.5. The .Net Framework 3.5 runtime files are on the Developer Preview DVD.
There's a lengthy discussion of the changes made to accommodate new "advanced format" disks, with large sector sizes (up from 512 bytes to 4KB). The changes apply to all Windows systems with AF disks, under Vista, Windows 7, or Windows 8 Developer Preview. The paper also discusses application handling of Thin Provisioning LUNs for storage arrays, and the gradual elimination of the DiskPart and DiskRAID utilities in favor of the Windows Storage Management API and the PowerShell utility.
Windows Explorer 7's Previous Versions feature is disappearing, as well as the application hooks for it. Windows 7 Backup and Restore are similarly being deprecated, in favor of the new Windows 8 File History feature.
For new applications, there are much more stringent requirements for testing kernel mode drivers.
You can find volumes of warnings about creating autostarting programs and admonitions -- with code samples -- to turn periodic background checks into official Automatic Maintenance tasks.
Finally, the Compatibility Cookbook runs through new APIs for SSDs, including TRIM commands, and USB 3.0.

If you're worried that your current applications aren't going to run in Windows 8 or if you're thinking about creating applications that take advantage of the new Windows 8 capabilities, this 70-page doc is well worth a gander.

Friday, October 21, 2011

Secunia's patching tool integrated with Microsoft's WSUS

Secunia, a Danish security company that makes two tools that ensure applications have up-to-date patches, released a product on Wednesday that can deploy non-Microsoft patches using that company's widely used patching tool.

MCTS Certification, MCITP Certification
Cisco CCNA Training, Cisco CCNA Certification 2000+ Exams at Examkingdom.com




The feature is contained in Secunia's Corporate Software Inspector (CSI) 5.0, a paid product for enterprises. CSI 5.0 can now package third-party patches -- such as those from Adobe Apple and other vendors -- and publish those updates to Microsoft's Windows Server Update Services (WSUS).

WSUS is a ubiquitous tool used to distribute patches in nearly every Windows-dominated organization. Secunia's CSI allows administrators to use WSUS's distribution tools to apply the third-party patches to their computers. CSI also works with Microsoft's System Center Configuration Manager (SCCM), another Microsoft enterprise management tool.

Secunia's programmers used the APIs (application programming interfaces) for WSUS to integrate CSI 5.0, said Thomas Kristensen, the company's CTO. The CSI bundles the third-party patches and repackages them, cryptographically signs the package and publishes it to WSUS.

"This is completely seamless," Kristensen said.

Once that package is in WSUS, it can't be modified, but administrators can deploy it to selected computers, Kristensen said. WSUS can be used to uninstall patches as well, he said.

Secunia has published several studies revolving around the issue of patching third-party applications, such as Adobe Flash, the Java Runtime environment and many others. The problem is that the vendors all use different update mechanisms, meaning some applications may not get updated and could be exploited by hackers.

Secunia CSI, however, will download updates from vendors when technically possible and automatically install them on individual machines. A free consumer version of the product, called the Personal Software Inspector (PSI) 2.0, also has the same functions.

Secunia has added another key feature in CSI 5.0. The tool can now scan Apple computers running OS X to see if applications have the needed patches. Unlike the CSI and PSI tools for Windows, it can't automatically apply patches. The Mac scanning function is not in the PSI, however.

Kristensen said Secunia has seen just a bit of demand for the company's tool for Apple computers, but Secunia decided to include it. Apple users tend to be more lax about security even though the platform is just as vulnerable as Windows but is attacked much less due to its lower market share, Kristensen said.

Secunia through the end of the year is keeping the price of CSI 5.0 the same as the previous 4.1 product, which starts at US$2,900 per year for 100 hosts or fewer and increases incrementally based on the number of hosts.

Microsoft explains its location data collection practices

In the midst of an uproar over ways that Apple and Google collect and store location information from mobile phones, Microsoft has laid out details about its Windows Phone 7 data collection policies.

MCTS Certification, MCITP Certification
Best Comptia A+ Training | Comptia A+ Certification 2000+ Exams at Examkingdom.com



Microsoft says that it collects location information only if users allow an application to access location data and when that particular application requests location information. It also said that it keeps that data in a Microsoft database.

Apple has come under fire in recent weeks after researchers showed that the iPhone and iPad store location data about users on the devices. Additional research found that both Apple and Google collect location information about users even when applications that require location information aren't running.

Google has defended itself by saying that location sharing by users of Android-based mobile phones is opt-in and that all location data the company stores is anonymized. Apple has not commented on the situation.

Microsoft said that it assembles and maintains a database of the locations of cell towers and Wi-Fi access points in order to provide its location services. When a user accesses an application that requires location information, Microsoft compares the Wi-Fi access points and cell towers in range of the device with the location database, which contains details of the locations of the access points and cell towers.

Microsoft has assembled the database in two ways, it said. One is via teams of people who drive around with phones that collect information about Wi-Fi access points, matching that data with location information collected via GPS. The company started that process last year and plans to continue this year, it said.

In addition, when customers are using location-aware applications and Wi-Fi is turned on, the phones collect information about nearby Wi-Fi access points. If the user has GPS turned on, Microsoft will also collect location details.

Microsoft said it only collects location information when a particular application requests it. Also, it said that when it collects location information, it matches it with a randomly generated ID assigned to the device, which is retained for a limited period. It uses that ID to distinguish location requests.

The company left a few unanswered questions, including how long it retains data collected from user phones. It said it stores the data in a Microsoft database, but did not specify whether it also stores any such data on user devices.

Because Microsoft has a relatively small mobile market share, it may escape some of the questions aimed at its competitors. Over the past weeks, the Illinois attorney general, Minnesota Senator Al Franken and Congressman Edward Markey have all asked Apple and Google to respond to questions about their location collection activities. Two consumers have filed a lawsuit in Florida charging both companies with fraud. In addition, governments in Korea and Europe are reportedly investigating the matter.

Thursday, October 20, 2011

Microsoft preps System Center for the cloud

Microsoft is updating the next version of its System Center IT infrastructure and server management suite so it can manage virtual machines in the cloud. It is also adding controls that will allow departmental IT chiefs to manage their own system resources, the company announced Tuesday.



Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com



Both additions to System Center 2012 suite, slated for release later this year, are necessary to help central IT departments keep pace with the requests of individual departments within their organizations.

"If [central IT] does not move fast enough, departmental level [IT staff] are not above going around them and [will] procure space on a site like Windows Azure if they want to deploy something more quickly," said Amy Barzdukas, Microsoft senior director of product management.

System Center Virtual Machine Manager 2012 allows administrators to deploy virtual machines either on local servers or on Microsoft Azure-based hosted platforms. The administrator can pool virtual machines into different sets, allowing them to establish sets of servers dedicated for specific tasks or lines of business.

The program works with virtual machines using the Microsoft Hyper-V hypervisors and with those based on VMware and Xen hypervisors.

"You create a set of virtual machines with standard packages that have the app and the networking [settings], and put those out to the business-level owners," Barzdukas said. Microsoft has posted a beta version of Virtual Machine Manager that can be tested on a trial basis.

The release is timely. Cloud management has gone beyond the task of merely creating a virtual machine and deploying it on a cloud infrastructure, said Gartner Research Vice President Chris Wolf, in a statement. The organization will also need tools to automate configuration and operations as well.

Of the 7.5 million servers with Windows Server software that Microsoft expects to be shipped in 2012, around 1.5 million will be used in "highly virtualized" environments, Barzdukas said.

Also new for Systems Center 2012 will be a program that allows for greater control over departmental allocations of resources. Code-named "Concero," this application will allow an administrator to designate a set of servers or other resources to a departmental manager, giving that manager fine-grained control of how those resources can be used.

"Think of Concero as an administrative console that's been made available to department-level IT. It gives app owners the opportunity to manage their own resources that has been delegated to them by central IT," she said. "They will have a role-specific experience based on what their business unit needs, which allows them to do all the management themselves."

Microsoft announced these two new components of System Center at the Microsoft Management Summit, being held this week in Las Vegas.

In addition to these two new programs, Microsoft also offered more details about other improvements in the next version of the System Center.

Operations Manager 2012 will include .Net performance-monitoring technology that Microsoft acquired when it purchased AVIcode. Technology from another acquisition, Opalis, has been rebranded and updated under the new name of System Center Orchestrator 2012. Orchestrator allows users to automate workflows across different systems.

The updated Service Manager 2012 will allow data-center managers to file their own self-service requests, speeding the approval process for allocation of cloud resources. And a beta of a new service called System Center Advisor (formerly code-named "Atlanta"), which monitors cloud-based SQL Server deployments, has also been launched.

Also at the conference, Microsoft announced that Target deployed Hyper-V and System Center to manage in-store servers. By moving to this platform, Target was able to cut the number of servers it uses in each store from seven to two, Microsoft said. The move eliminated 8,000 servers across 1,755 stores.

Barzdukas pointed out that the Target servers even run, within virtual machines, a homegrown Linux application that Target built to manage pharmacy operations.

Tuesday, October 18, 2011

Microsoft, Red Hat spar over secure boot-loading tech

Is Microsoft using a next-generation computing boot-loading technology to lock out the use of Linux and other OSEs on certain computers? While Microsoft has denied malicious intent, one Red Hat developer maintains that this may be the case.

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com


Microsoft is mandating the use of the UEFI (Unified Extensible Firmware Interface) secure boot-loading capability with Windows 8 in such a way that "the end user is no longer in control of their PC," charged Red Hat developer Matthew Garrett in a blog entry posted Friday.

Microsoft has claimed that this charge is based on a misunderstanding of the company's intentions. "At the end of the day, the customer is in control of their PC," said Microsoft program manager Tony Mangefeste in another blog posting from Microsoft.

The controversy took root on Tuesday, when Garrett pointed out in a blog posting that Microsoft-certified computers running Windows 8 may not be able to be loaded with copies of other OSes, such as Linux. Users could not install Linux as a second OS, or replace Windows with a copy of Linux, Garrett argued.

Windows 8 will require its host computer to use the UEFI, the low-level interface between the computer firmware and the OS. Marketed as a replacement to BIOS, UEFI provides a secure boot protocol, which requires the OS to furnish a digital key in order to be loaded by the machine. UEFI then can block the operations of any programs or drivers unless they have been signed by this key, a move that should prevent malware from infecting machines by changing the boot-loading process.

With Windows 8, Microsoft will require hardware manufacturers (those wishing to display the Windows logo on their units) to ship their machines with secure boot enabled. Each machine would then require a digital key from Microsoft, the hardware manufacturer or, if it uses another OS, a secure key for that OS.

Users who customize their own versions of Linux, or use a generic OS that does not come with a key, may not be able to run these OSes on machines requiring this secure booting process, Garrett said. Nor would there be any guarantee that OEMs (original equipment manufacturers) even provide the ability for users to add their own keys, or give users the option to run other OSes without a key.

Garrett's blog post subsequently sparked debate in the trade press and Linux user communities.

Responding to the controversy on Thursday, Microsoft has denied that the intent was to shut out Linux. Although he did not mention Linux by name, Steven Sinofsky, president of the Windows and Windows Live Division, noted in a blog post that some of those commenting have used details of the new plan to "synthesize scenarios that are not the case."

The rest of the posting, authored by Mangefeste, noted that Microsoft is concerned only that Windows 8 be protected in a secure boot loader, and that OEMs are free to build in the option of disabling secure boot for running OSes without keys. Other OS providers are responsible for providing their own keys.

"For the enthusiast who wants to run older operating systems, the option is there to allow you to make that decision," Mangefeste wrote. "However, [disabling secure boot] comes at your own risk," he added.

"Microsoft's rebuttal is entirely factually accurate. But it's also misleading," Garrett responded in a follow-up blog item, posted Friday. Under the licensing agreement, the equipment manufacturer is under no obligation to provide users with the ability to disable the secure boot capability. Beyond the use of third-party OSes, this approach might also hamper the ability of users to upgrade components such as graphics cards, because there is no requirement to provide the user with the capability of installing additional keys.

"The truth is that UEFI secure boot is a valuable and worthwhile feature that Microsoft are misusing to gain tighter control over the market," Garrett charged.

Monday, October 17, 2011

CenterBeam takes on Microsoft with cloud collaboration suite

The big hook for CenterBeam’s new service is that organizations don’t necessarily have to ditch all their existing, on-premise Exchange or Microsoft Office infrastructure.

MCTS Certification, MCITP Certification
Best Comptia A+ Training | Comptia A+ Certification 2000+ Exams at Examkingdom.com



it isn’t all that hard to figure out the primary competition for the new CenterBeam 365+ cloud-based collaboration platform: CenterBeam’s marketing materials offer a detailed comparison between its new offering and the Microsoft Office 365 platform.

The company’s main message is that CenterBeam 365+ users won’t have to give up the Microsoft productivity applications with which they are familiar because their cloud collaboration service doesn’t require companies to upgrade all their underlying Microsoft applications.

Said CenterBeam president and CEO Kevin Francis: “Building on our experience as the first company to offer multi-tenant hosted Exchange in 1999, we saw a unique opportunity to meet a real need; giving mid-market enterprises the flexibility, economics and access of the could but with the look, functionality and high-level security of on-premise Exchange.”

CenterBeam 365+ includes Microsoft Office Web Apps, Microsoft SharePoint, Microsoft Lync and Microsoft Exchange. The big hook being pushed by the service provider is that companies can also integrate existing infrastructure and applications without having to ditch everything for the cloud version.

For example, CenterBeam 365+ supports PST files, it supports Outlook 2003 and it offers single sign-on for any version of Active Directory, not just ADFS 2.0. In effect, CenterBeam takes Microsoft Office 365 and does the integration that your organization might otherwise have had to do in order to get the serivice integrated into an existing infrastructure, just so.

Said William Santille, vice president of technology and CTO for Advanced Equities, one of the CenterBeam 365+ cloud service’s earlier users:

“We wanted to maintain our preferences and high level of security but move to a cloud-based solution that delivers the flexibility we need in the most affordable way possible. We chose CenterBeam 365+ because it enables us to continue providing our employees with the Microsoft tools they are comfortable with, yet we do not have to sacrifice on functionality, control, support and most importantly, security, as we move to the cloud.”

CenterBeam, an IT services company with 185 employees, has a long history in hosted Microsoft solutions. It has been migrating businesses into the cloud since 1999 through a series of major Microsoft upgrade cycles, including 2003, 2007 and 2010. The sweet spot of CenterBeam’s target customer base is midsize organizations with 100 to 4,000 computers to support.

Here’s what each level of service for CenterBeam 365+ provides:

CenterBeam 365 E1 - $10 per month per user (Exchange Plan 1, SharePoint Plan 1, Lync Plan 2)

E-mail/Antivirus/Antispam/Calendaring
Collaboration Portal
Conferencing
Instant Message/Presence
25 gigabytes per user
ActiveSync

CenterBeam 365 E2 - $16 per month per user (Exchange Plan 1, SharePoint Plan 1, Lync Plan 2, Office Web Apps)
All features of basic package, plus:

Office Web Apps

CenterBeam 365 E3 - $21 per month per user (Exchange Plan 2, SharePoint Plan 2, Lync Plan 2, Office Web Apps)
All features of basic package, plus:

Office Web Apps
Forms, Visio, Excel Services
Voicemail and advance archive features

CenterBeam hosts its cloud offerings in a Tier 3 Class A data center that offers triple redundancy. It works with CenturyLink (formerly Qwest Communications); both are SAS-70, Type II certified.

Sunday, October 16, 2011

Microsoft scales up CRM to thwart Salesforce.com, Oracle

Microsoft announced the availability Wednesday of Dynamics CRM 2011, the on-premises and partner-hosted version of its CRM (customer relationship management) software.

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com


The new release can scale up to 150,000 concurrent users in a single instance while maintaining fast response times, "once again raising the bar for performance and scalability in the CRM industry," Microsoft said in a statement.

While vendor boasts about product performance are a staple of many product announcements, Microsoft's decision to highlight the benchmark shows it wants to win deals in the largest enterprises at the expense of competitors like Salesforce.com and Oracle CRM on Demand, both of which are delivered as SaaS (software as a service).

Microsoft has a SaaS product as well, CRM Online, which is based on the same code as CRM 2011, and released the latest version last month. But Microsoft and its partners can tout the scalability of the on-premises version when competing for business with customers that may be on the fence regarding SaaS.

To one observer, however, usability, not scalability, is the main selling point for Microsoft's latest CRM products.

"All vendors today have the ability to support huge user bases with very fast response times," said Denis Pombriant, managing principal of Beagle Research, via e-mail. "That's mostly thanks to beefed up hardware offerings -- what a difference a decade makes. Recall that 10 years ago the ASP vendors floundered because they couldn't field enough horsepower economically to make a cloud-like architecture work."

"But take nothing away from Microsoft, they've arrived in market with a powerful offering and, most importantly, an offering that pays attention to the ways that people work," he added. "The company spent a lot of time and effort on the UI and for me that's the story."

The software's features include "role-tailored" user experiences, a native Outlook client and various dashboards and BI (business intelligence) tools meant to help workers do their jobs better.

CRM 2011 also takes a cue from Salesforce.com's AppExchange with the integrated Dynamics Marketplace. The online catalog contains more than 1,400 software and services offerings from partners, and is also available to CRM Online customers.

Thursday, October 13, 2011

Microsoft: One in 14 downloads is malicious

The next time a website says to download new software to view a movie or fix a problem, think twice. There's a pretty good chance that the program is malicious.



Best comptia A+ Training, Comptia A+ Certification at Certkingdom.com



In fact, about one out of every 14 programs downloaded by Windows users turns out to be malicious, Microsoft said Tuesday. And even though Microsoft has a feature in its Internet Explorer browser designed to steer users away from unknown and potentially untrustworthy software, about 5 percent of users ignore the warnings and download malicious Trojan horse programs anyway.

Five years ago, it was pretty easy for criminals to sneak their code onto computers. There were plenty of browser bugs, and many users weren't very good at patching. But since then, the cat-and-mouse game of Internet security has evolved: Browsers have become more secure, and software makers can quickly and automatically push out patches when there's a known problem.

So increasingly, instead of hacking the browsers themselves, the bad guys try to hack the people using them. It's called social engineering, and it's a big problem these days. "The attackers have figured out that it's not that hard to get users to download Trojans," said Alex Stamos, a founding partner with Isec Partners, a security consultancy that's often called in to clean up the mess after companies have been hacked.

Social engineering is how the Koobface virus spreads on Facebook. Users get a message from a friend telling them to go and view a video. When they click on the link, they're then told that they need to download some sort of video playing software in order to watch. That software is actually a malicious program.

Social-engineering hackers also try to infect victims by hacking into Web pages and popping up fake antivirus warnings designed to look like messages from the operating system. Download these and you're infected. The criminals also use spam to send Trojans, and they will trick search engines into linking to malicious websites that look like they have interesting stories or video about hot news such as the royal wedding or the death of Osama bin Laden.

"The attackers are very opportunistic, and they latch onto any event that might be used to lure people," said Joshua Talbot, a manager with Symantec Security Response. When Symantec tracked the 50 most common malicious programs last year, it found that 56 percent of all attacks included Trojan horse programs.

In enterprises, a social-engineering technique called spearphishing is a serious problem. In spearphishing, the criminals take the time to figure out who they're attacking, and then they create a specially crafted program or a maliciously encoded document that the victim is likely to want to open -- materials from a conference they've attended or a planning document from an organization that they do business with.

With its new SmartScreen Filter Application Reputation screening, introduced in IE 9, Internet Explorer provides a first line of defense against Trojan horse programs, including Trojans sent in spearphishing attacks.


IE also warns users when they're being tricked into visiting malicious websites, another way that social-engineering hackers can infect computer users. In the past two years, IE's SmartScreen has blocked more than 1.5 billion Web and download attacks, according to Jeb Haber, program manager lead for SmartScreen.

Haber agreed that better browser protection is pushing the criminals into social engineering, especially over the past two years. "You're just seeing an explosion in direct attacks on users with social engineering," he said. "We were really surprised by the volumes. The volumes have been crazy."

When the SmartScreen warning pops up to tell users that they're about to run a potentially harmful program, the odds are between 25 percent and 70 percent that the program will actually be malicious, Haber said. A typical user will only see a couple of these warnings each year, so it's best to take them very seriously.

Microsoft, Skype deal gets U.S. clearance

Microsoft has received clearance from U.S. antitrust regulators for its proposed purchase of Internet telephony company Skype.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com



The transaction was granted an "early termination" of a review into the proposed deal, according to an update on Friday from the U.S. Federal Trade Commission (FTC).

Microsoft said in May that it has agreed to buy Skype for US$8.5 billion. Once the merger is complete, Microsoft plans to add Skype support to its Xbox and Kinect gaming devices and Windows Phone mobile operating system, and connect Skype users with its own Lync, Outlook and Xbox Live communications services.

Microsoft said it will continue to invest in and support Skype clients on non-Microsoft platforms.

Under the Hart-Scott-Rodino (HSR) Act, parties to certain large mergers and acquisitions must file a pre-merger notification and wait for government review, according to the FTC website. Parties proposing a deal file with both the FTC and Department of Justice, but only one antitrust agency will review the proposed merger.

Persons filing an HSR form may request that the waiting period be terminated before the statutory period expires, but such a request for "early termination" will be granted only after the FTC and the DOJ's Antitrust Division have completed their review and determined not to take any enforcement action during the waiting period, FTC said.

Microsoft said in May that the parties hope to obtain all required regulatory clearances during the course of this calendar year.

Wednesday, October 12, 2011

Certkingdom 70-647 Exam Q & A

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com

QUESTION 1
You work as an enterprise administrator at Certkingdom.com. The Certkingdom.com network has a domain named
Certkingdom.com. All servers in the Certkingdom.com network run Windows Server 2008.
The Certkingdom.com network has a file server named ABC-SR07 that hosts a shared folder named
ABCDocs. Several Microsoft Word documents are stored in the ABCDocs share. You want to
enable document version history on these documents. You also want the documents in the
ABCDocs share to be accessed through a Web page.
Which of the following roles or services would you install on ABC-SR07 to achieve the desired
results cost effectively?

A. FTP Server role.
B. Application Server role.
C. Microsoft Windows SharePoint Services (WSS) 3.0.
D. File and Print Services role.
E. Microsoft Office SharePoint Server (MOSS) 2007.
F. SMTP Server role.

Answer: C

Explanation:
To achieve the desired results without requiring any additional cost, you need to use Microsoft
Windows SharePoint Services (WSS) 3.0.
Reference: Microsoft Windows SharePoint Services 3.0 and the Mobile Workplace
http://download.microsoft.com/download/b/b/6/bb6672dd-252c-4a21-89de-
78cfc8e0b69e/WSS%20Mobile%20Workplace.doc


QUESTION 2
You work as an enterprise administrator at Certkingdom.com. The Certkingdom.com network has a domain named
Certkingdom.com with a single site named Site
A. All servers in the Certkingdom.com network run Windows Server
2008.
You reorganize the Active Directory infrastructure to include a second site named SiteB with its
own domain controller.
How would you configured the firewall to allow replication between SiteA and SiteB?

A. Enable IPSec traffic to pass through the firewall.
B. Enable RPC traffic to pass through the firewall.
C. Enable SMTP traffic to pass through the firewall.
D. Enable NNTP traffic to pass through the firewall.
E. Enable FTP traffic to pass through the firewall.

Answer: B

Explanation:
You should permit RPC traffic through the firewall to enable the domain controllers to replicate
between the two sites because the Active Directory relies on remote procedure call (RPC) for
replication between domain controllers. You can open the firewall wide to permit RPC's native
dynamic behavior.
Reference: Active Directory Replication over Firewalls
http://technet.microsoft.com/en-us/library/bb727063.aspx


QUESTION 3
You work as an enterprise administrator at Certkingdom.com. The Certkingdom.com network has a domain named
Certkingdom.com. All servers in the Certkingdom.com network run Windows Server 2008.
Certkingdom.com runs a critical application that accesses data that is stored in a Microsoft SQL Server
2005 database server named ABC-DB02. Which of the following options would you choose to
ensure that the database is always available?

A. Two Windows Server 2008 servers running MS SQL Server 2005 Standard Edition in a
Network Load Balancing (NLB) cluster.
B. Two Windows Server 2008 servers running MS SQL Server 2005 Enterprise Edition in a
Network Load Balancing (NLB) cluster
C. Two Windows Server 2008 servers running MS SQL Server 2005 Standard Edition in a failover
cluster.
D. Two Windows Server 2008 servers running MS SQL Server 2005 Enterprise Edition in a
failover cluster.

Answer: D

Explanation:
To ensure the high availability of the data store, you need to use a Windows Server 2008 failover
cluster with shared storage.
Failover clustering can help you build redundancy into your network and eliminate single points of
failure.
Administrators have better control and can achieve better performance with storage than was
possible in previous releases. Failover clusters now support GUID partition table (GPT) disks that
can have capacities of larger than 2 terabytes, for increased disk size and robustness.
Administrators can now modify resource dependencies while resources are online, which means
they can make an additional disk available without interrupting access to the application that will
use it. And administrators can run tools in Maintenance Mode to check, fix, back up, or restore
disks more easily and with less disruption to the cluster
You should not use Network Load Balancing (NLB) because it only allows you to distribute TCP/IP
requests to multiple systems in order to optimize resource utilization, decrease computing time,
and ensure system availability.
Reference: High Availability
http://www.microsoft.com/windowsserver2008/en/us/high-availability.aspx


QUESTION 4
You work as an enterprise administrator at Certkingdom.com. The Certkingdom.com network has a domain named
Certkingdom.com. All servers in the Certkingdom.com network run Windows Server 2008. Certkingdom.com has its
headquarters in Chicago and sub-divisions in Boston, Atlanta, Miami and Dallas. All domain
controllers are currently installed in the Chicago.
You need to have new domain controllers installed in the Boston, Atlanta, Miami and Dallas subdivisions.
Certkingdom.com issues a security policy for the new domain controllers that states the
following:
• Unauthorized user must not be able to access the Active Directory database.
• Unauthorized user must not be able to boot a domain controller from an alternate boot disk.
Which of the following options would you choose to implement the security policy?

A. Modify the permissions of the ntds.dat file.
B. Configure a read-only domain controller (RODC) in the Boston, Atlanta, Miami and Dallas.
C. Disable replication of the Sysvol folder on the new domain controllers.
D. Configure Windows BitLocker Drive Encryption (BitLocker) on the new domain controllers.
E. Disable the Global Catalog role on the new domain controllers.
F. Configure EFS encryption on the new domain controllers.

Answer: D

Explanation:
To configure domain controller at each branch office to ensure that no unauthorized user should
be allowed to copy the Active Directory database from a branch office domain controller by starting
the server from an alternate startup disk, you need to use Windows BitLocker Drive Encryption
(BitLocker)
BitLocker allows you to encrypt all data stored on the Windows operating system volume and use
the security of using a Trusted Platform Module (TPM) that helps protect user data and to ensure
that a computer running Windows Vista or Server 2008 have not been tampered with while the
system was offline.
In addition, BitLocker offers the option to lock the normal startup process until the user supplies a
personal identification number (PIN) or inserts a removable USB device, such as a flash drive, that
contains a startup key. This process will ensure that users can only access all files on the servers
if they have the PIN. You cannot use an alternate startup disk to boot the server.
Reference: BitLocker Drive Encryption Technical Overview
http://technet2.microsoft.com/windowsserver2008/en/library/a2ba17e6-153b-4269-bc46-
6866df4b253c1033.mspx?mfr=true


QUESTION 5
You work as an enterprise administrator at Certkingdom.com. The Certkingdom.com network has a domain named
Certkingdom.com that runs at the domain functional level of Windows Server 2008.
Which of the following options can be used for tracking any modification to Active Directory
Objections?

A. Configure a Group Policy to run the Security Configuration Wizard on all computers in the ABC
network.
B. Configure the Default Domain Controllers Group Policy to audit Directory Services.
C. Configure the Default Domain Group Policy to audit Directory Services.
D. Enable auditing of the ntds.dat file in the Default Domain Group Policy.
E. Enable auditing of the ntds.dat file in the Default Domain Group Policy.

Answer: B

Explanation:
To implement an audit and compliance policy and ensure that all changes made to Active
Directory objects are recorded, you need to configure a Directory Services Auditing policy in the
Default Domain Controller Policy
In Windows Server 2008, you can enable Audit Directory Service Access policy to log events in
the Security event log whenever certain operations are performed on objects stored in Active
Directory.
Enabling the global audit policy, Audit directory service access, enables all directory service policy
subcategories. You can set this global audit policy in the Default Domain Controllers Group Policy
(under Security Settings\Local Policies\Audit Policy).
Reference: Windows Server 2008 Auditing AD DS Changes Step-by-Step Guide
http://technet2.microsoft.com/windowsserver2008/en/library/a9c25483-89e2-4202-881cea8e02b4b2a51033.
mspx?mfr=true


QUESTION 6
You work as an enterprise administrator at Certkingdom.com. The Certkingdom.com network has a domain named
Certkingdom.com. All servers in the Certkingdom.com network run Windows Server 2003.
You want to install a read-only domain controller (RODC) without uABCrading the existing domain
controllers Windows Server 2008.
What action should you take? (Each correct option will form a part of the answer. Select TWO.)

A. Raise the forest functional level to Windows 2000.
B. Raise the forest functional level to Windows 2003.
C. Raise the forest functional level to Windows 2008.
D. Raise the domain functional level to Windows Server 2000
E. Raise the domain functional level to Windows Server 2003
F. Raise the domain functional level to Windows Server 2008

Answer: B,E

Explanation:
To create an Active Directory forest and domain functional levels to support Read-only domain
controllers (RODC) and Windows Server 2003 domain controllers, you need to create both the
forest and domain functional levels of Windows Server 2003. This is because only when you use
both the forest and domain functional levels of Windows Server 2003, you will be able to support
Read-only domain controllers (RODC) and Windows Server 2003 domain controllers.
Reference: Appendix of Functional Level Features
http://technet2.microsoft.com/windowsserver2008/en/library/34678199-98f1-465f-9156-
c600f723b31f1033.mspx?mfr=true


QUESTION 7
You work as an enterprise administrator at Certkingdom.com. The Certkingdom.com network has a forest named
and Certkingdom.com that runs at the forest functional level of Windows Server 2003. Certkingdom.com has a
subsidiary company named TestLabs, Inc. The TestLabs, Inc. network has a forest named and
testlabs.com that runs at the forest functional level of Windows Server 2003. All domain controllers
on both the Certkingdom.com network and the TestLabs, Inc. network run Windows Server 2008.
Certkingdom.com users do not have access to network resources in TestLabs, Inc.
TestLabs, Inc. has a file server named TESTLABS-SR07. Certkingdom.com users must be able to access
shared folders on TESTLABS-SR07. However, Certkingdom.com users must not be able to access any
other network resources in TestLabs, Inc.
Which of the following options would you choose to accomplish this task? (Each correct option will
form a part of the answer. Select TWO.)

A. By raising the forest functional level of Certkingdom.com and testlabs.com to Windows Server 2008.
B. By raising the domain functional level of all domains in Certkingdom.com and testlabs.com to Windows
Server 2008.
C. By creating a forest trust between Certkingdom.com and testlabs.com.
D. By setting the Allowed to Authenticate for TESTLABS-SR07.
E. By setting the Allowed to Authenticate right on the computer object for the testlabs.com
infrastructure operations master object.

Answer: C,D

Explanation:
To ensure that the users in ABC-south.com are denied access to all the resources ABC-north.com
except the resources on ABC-SR07, you need to create a forest trust between ABC-south.com
and ABC-north.com so that resources can be shared between both the forests. You can however
set the trust authentication setting to selective authentication so that only selected authentication
is allowed.
Next you need to set the Allowed to Authenticate right on the computer object for ABC-SR07 so
that each user must be explicitly granted the Allowed to Authenticate permission to access
resources on ABC-SR07.
You should not set the Allowed to Authenticate right on the computer object for the ABC-north.com
infrastructure operations master object because Allowed to Authenticate right is set for the users in
a trusted Windows Server 2003 domain or forest to be able to access resources in a trusting
Windows Server 2003 domain or forest, where the trust authentication setting has been set to
selective authentication, each user must be explicitly granted the ‘Allowed to Authenticate’
permission on the security descriptor of the computer objects (resource computers) that reside in
the trusting domain or forest.
Reference: Grant the Allowed to Authenticate permission on computers in the trusting domain or
forest
http://technet2.microsoft.com/windowsserver/en/library/b4d96434-0fde-4370-bd29-
39e4b3cc7da81033.mspx?mfr=true


QUESTION 8
You work as an enterprise administrator at Certkingdom.com. The Certkingdom.com network has a domain named
Certkingdom.com. All servers in the Certkingdom.com network run Windows Server 2008. Certkingdom.com has its
headquarters in Chicago and branch offices in Boston. The Boston office is connected to the
Chicago by a WAN link. The Chicago office has a DNS Sever named ABC-SR04 that is configured
as a single DNS zone. The Boston office has two servers named ABC-SR07 and ABC-SR08.
ABC-SR08 hosts shared folders that are only accessed by Certkingdom.com users in the Boston office.
You work in the Chicago office while a network administrator named Rory Allen works in the
Boston office.
Certkingdom.com wants you to ensure that users at the Boston office can log on to the Certkingdom.com domain
and can connect to the shared folders on ABC-SR08 even when the WAN link is down. You must
allow Rory Allen to configure the servers in the Boston office without allowing him to modify the
Active Directory configuration.
Which actions should you take to accomplish this task? (Each correct option will form a part of the
answer. Choose THREE.)

A. By promoting ABC-SR07 to a domain controller.
B. By promoting ABC-SR07 to a read-only domain controller (RODC).
C. By installing USMT role on ABC-SR07.
D. By installing ADMT role on ABC-SR07.
E. By installing DNS role on ABC-SR07.
F. By adding Rory Allen to the Domain Admins group.
G. By creating an organizational unit (OU) for the Boston office.
H. By assigning administrative rights to Rory Allen.

Answer: B,E,H

Explanation:
To ensure that the users in the branch office are able to log on to the domain even if the WAN link
fails, you need to promote the member server to a read-only domain controller (RODC) because
the RODC works as a domain controller and allows log in to the domains except allowing
modifications and changes to the Active directory domain.
Delegating administrative rights to the local branch office administrator after promoting a member
server to a RODC will make sure that branch office administrator is not allowed to initiate any
changes to Active Directory but should be allowed to make configuration changes to the servers in
the branch office.
Configuring the DNS role to the member server, will ensure that the users are allowed to access
file shares on the local server in the absence of the WAN link. Without name resolution and the
other services that are provided by DNS servers, client access to remote host computers would be
prohibitively difficult. DNS servers need to be configured because in intranets computer users
rarely know the IP addresses of computers on their local area network (LAN).
Reference: DNS Server Role: Read-only domain controller support/ Who will be interested in this
server role?
http://technet2.microsoft.com/windowsserver2008/en/library/533a1cfc-5173-4248-914c-
433bd018f66d1033.mspx?mfr=true


QUESTION 9
You work as an enterprise administrator at Certkingdom.com. The Certkingdom.com network has a domain named
Certkingdom.com and a workgroup named ABCGROUP. All servers in the Certkingdom.com network run Windows
Server 2008 and all the client computers run Windows Vist
A. The Certkingdom.com network has
unmanaged network switches and has two servers named ABC-SR07 and ABC-SR08. ABC-SR07
is configured with the Active Directory Domain Services (AD DS), the Active Directory Certificate
Services (AD CS) and the Dynamic Host Configuration Protocol (DHCP) service while ABC-SR08
is configured with the Routing and Remote Access Service (RRAS), the Network Policy Service
(NPS) and Health Registration Authority (HRA).
You notice that the latest Microsoft updates have not been applied to all client computers that are
part of the ABCGROUP workgroup. You are concerned that Certkingdom.com users are accessing the
local area network (LAN) from these client computers.
You want to implement Network Access Protection (NAP) to secure the network by preventing
client computers that are not members of the Certkingdom.com network or do not have the latest Microsoft
updates from accessing any network servers that are members of the Certkingdom.com domain.
Which of the following option would you choose?

A. TCP/IP
B. 802.1z
C. PPTP
D. DHCP
E. L2TP
F. IPsec

Answer: F

Explanation:
To ensure that only the computers that have the latest Microsoft updates installed should be able
to connect to servers in the domain and that only the computers that are joined to the domain
should be able to connect to servers in the domain, you need to use the IPSec NAP enforcement
method. IPsec domain and server isolation methods are used to prevent unmanaged computers
from accessing network resources. This method enforces health policies when a client computer
attempts to communicate with another computer using IPsec.
Reference: Protecting a Network from Unmanaged Clients / Solutions
http://www.microsoft.com/technet/security/midsizebusiness/topics/serversecurity/unmanagedclient
s.mspx
Reference: Network Access Protection (NAP) Deployment Planning / Choosing Enforcement
Methods
http://blogs.technet.com/nap/archive/2007/07/28/network-access-protection-deploymentplanning.
aspx


QUESTION 10
You work as an enterprise administrator at Certkingdom.com. The Certkingdom.com network has a domain named
Certkingdom.com. All servers in the Certkingdom.com network run Windows Server 2008. The Certkingdom.com network
has two web servers named ABC-SR07 and ABC-SR08. Certkingdom.com wants to hosts the company's
e-commerce Web site named sales.Certkingdom.com on the two web servers. You receive instructions
from the CEO to ensure that the Web site is available even when one of the Web servers is offline.
The CEO also wants the session state of the web site to be available should one of the web
servers be offline. Additionally, you must be able to support the Web site on up to six Web servers
with each Web server having a dedicated IP address.
What action should you take?

A. Configure a two-failover cluster on ABC-SR07 and ABC-SR08.
B. Configure multiple ports for the sales.Certkingdom.com web site.
C. Configure Network Load Balancing on ABC-SR07 and ABC-SR08.
D. Configure the sales.Certkingdom.com web site on each server with the site content on a network share.
E. Configure multiple host headers for the sales.Certkingdom.com website.
F. Configure multiple IP addresses for the sales.Certkingdom.com website.


Answer: C


Explanation:
To ensure that the users of the website would be able to access the Web site if a single server
fails. The website should be scalable to as many as seven Web servers and the web servers
should be able to store session-state information for all users. It should also provide support for
multiple dedicated IP addresses for each Web server.
The Network Load Balancing (NLB) feature in Windows Server 2008 enhances the availability and
scalability of Internet server applications such as those used on Web, FTP, firewall, proxy, virtual
private network (VPN), and other mission-critical servers. NLB provides high availability of a
website by detecting and recovering from a cluster host that fails or goes offline.
You should not use failover clustering in this scenario because failover clustering requires shared
storage which is not mentioned in this question.
Reference: Overview of Network Load Balancing
http://technet2.microsoft.com/windowsserver2008/en/library/11dfa41c-f49e-4ee5-8664-
8b81f6fb8af31033.mspx?mfr=true




Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com

Tuesday, October 11, 2011

Microsoft to boost Bing's music, TV, movies, game search

Microsoft will unveil new features next week to enhance the Bing search engine's capabilities to search for entertainment-related content, specifically in areas such as music, television, movies and online games.

MCTS Certification, MCITP Certification
Cisco CCNA Training, Cisco CCNA Certification 2000+ Exams at Examkingdom.com



The announcement will be made on Tuesday by Yusuf Mehdi, senior vice president of Microsoft's Online Audience Business, at a press conference in West Hollywood, California, according to an invitation Microsoft sent to journalists.

The goal is to significantly beef up Bing's handling of entertainment-related queries, an area that draws much interest from users, along with other "verticals" such as health, travel and shopping that Microsoft will also strengthen in the near future, according to people familiar with the plans.

For example, TV search results will get enhanced with programming listings and with the ability to stream episodes from the search engine user interface, these people said.

Likewise, music searches will return richer and more extensive information about artists, concerts and songs, including lyrics, and a music player will let users play back tunes on Bing, these people said. Users will also get options to purchase music.

Movie queries will return smarter results with information about local showtimes and critic reviews, while gaming enthusiasts will get specialized tools to discover games, view ratings and access overall game information in a central, consolidated place.

Some of the new entertainment-search capabilities involve deals and partnerships with other companies, as Microsoft continues its attempts to put up stronger competition in search against market leader Google, these people said.

Microsoft didn't immediately respond to a request for comment.

The press conference will be followed by an event about the future of entertainment, hosted by TV and radio personality Ryan Seacrest and featuring a panel discussion and musical performances.

EU antitrust regulators give Microsoft-Skype deal green light

Antitrust regulators in the European Union today approved Microsoft's $8.5 billion acquisition of Skype, the online telephone and chat giant.

"The Commission considers that there are no competition concerns in this growing market where numerous players, including Google, are present," the European Commission, the EU's antitrust agency, said in a statement today, referring to competition concerns for consumers, who make up the bulk of Skype's customers.

MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at http://www.actualkey.com


The commission also dismissed concerns that the deal would stifle competition in the enterprise communication market.

"The investigation confirmed that Skype has a limited market presence for these products and does not compete directly with Microsoft's enterprise communication product Lync, which is used mostly by large enterprises," the commission added.

Microsoft announced the proposed purchase of Skype last May, saying then that it would pay $8.5 billion to the investment group that acquired a majority interest in the Internet telephony company from eBay in 2009.

"We're committed to optimizing Skype for the TV, with Xbox and Kinect, for the Windows Phone, and the Windows PC," said Microsoft CEO Steve Ballmer at a May 10 news conference that unveiled the deal. "At the same time, we want to extend the reach of Skype by connecting Skype users with users of our Outlook products, our Lync enterprise unified communications product, Xbox LIVE, and other opportunities like Messenger and Hotmail."

Microsoft applauded the EU antitrust watchdog's decision.

"This is an important milestone, as we've now received clearance from both the United States and the European Union," said Brad Smith, Microsoft's lead lawyer, in a Friday statement. "We look forward to completing soon the final steps needed to close the acquisition."

In June, U.S. regulators at the Department of Justice gave Microsoft the green light after also deciding that there was sufficient competition from other major players, including Google.

The Commission's decision stymies a complaint submitted by Messagenet, an Italian rival to Skype, which last month asked regulators to block the deal unless Microsoft agreed not to bundle Skype with its Office products.

Lync, formerly Microsoft Office Communicator, is composed of both server and client pieces, and is under the general Office umbrella.

Messagenet's complaint resurrected arguments that the EU had used against Microsoft for years in a case over the bundling of a media player with Windows. That action ended in 2007 when Microsoft lost on appeal; it paid a $1.4 billion fine the following year.

Later, Norwegian browser maker Opera complained that Microsoft's bundling of Internet Explorer gave IE an unfair advantage. Under pressure from the EU, Microsoft agreed to display a "browser ballot screen" that let users choose which browser they installed on their Windows PCs.

Messagenet did not reply to a request for comment on the EU Commission's decision today.

In May, Ballmer promised that if it acquired Skype, Microsoft would continue to develop and support the software on rival operating systems, including Apple's Mac OS X and Google's Android.

Monday, October 10, 2011

Google+ iPhone App released

After an overwhelming response of users just during the field trial period, Google is now
onboard with iPhone for the release of its first Google+ iPhone app. This recently released
application is now available for iPhone (4.1 iOS or newer), featuring all the vital functions for
your ease with the commitment to thrive in the future as well.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com



The best and most promising thing about this application is that it’s totally free, which makes
it a lot easier for everyone to get it directly from the iTunes. It is also reported that this iPhone
app for Google+ has now become the no. 1 free application in the Apple app store. You
can use many of the Google+ features on this app like access or manage your circles, get
streaming updates from your friends and other contacts, upload photos, check in from different
places, or use Huddles which is the instant group messaging service you can enjoy within a
circle. ‘Huddles’ is a great feature that is available in Google+ for mobile only.

The main interface of the Google+ iPhone app is very neat and simple, giving it a classy
Googlized touch. It has a black bar above and below the app with Settings and Notifications
icons on it. In the middle, there are only five icons namely Stream, Huddle, Photos, Profile,
and Circles arranged in a simple grid mode. In terms of appearance, this iPhone app looks
exactly like the Android app for Google+.

Goole+iphone app

The application is not available for iPads or iPhones with older versions yet, so we can only
hope to see these other versions sometime really soon. Since Google+ is one of the fastest
growing projects ever presented, the developers must definitely be working really hard to
spread it on all the devices as soon as possible. Makes sense, right?

For all those who’re still not aware about The Google+, let me tell you, it’s a newly released
social networking project by Google, which is still in the field trial period, and like the
previous project Orkut, is accessible through invitations only. It will be open to public once
it gets over its trial mode, explained the developers. The project already received such an
amazing response from all around the world that people now expect it to oust Facebook in
the future. According to Google’s CEO Larry Page, “There are more than 10 million users on
the social network already, and more than 1 billion items are shared every day”.

Friday, October 7, 2011

Terry Childs juror explains why he voted to convict

Terry Childs' guilty conviction struck a nerve with IT staffers this week.

MCTS Certification, MCITP Certification
Cisco CCNA Training, Cisco CCNA Certification 2000+ Exams at Examkingdom.com




Here was a man who, by all accounts, was good at his job, though lacking in interpersonal skills. Suddenly, on July 9, 2008, he's pushed into a tense situation -- a hostile conference call with the human resources department, his boss and even a police officer, all listening in, and told to hand over the passwords to the City of San Francisco's FiberWAN network, which he helped build. He chokes and hands over bogus passwords. Later, he argues that he did this because nobody in the room was qualified to have administrative access to the network.

IT people are used to being held accountable for bad decisions made by their superiors, and some people who've read about the case feel some sympathy for Mr. Childs. After all, the city's network never went down, and Childs eventually did hand over control of the FiberWAN to San Francisco Mayor Gavin Newsom -- the only person Childs felt was competent to have the passwords.

"How exactly was he breaking the law?" wrote one Slashdot poster, reacting to news of Childs' conviction. "[H]e refused to disclose the passwords when the person requesting them did not follow proper protocols."

While the City of San Francisco apparently did a poor job in spelling out the protocols for handing over administrative control of its network, Childs was still guilty of a crime. A jury found him guilty of breaking California's hacking laws on Tuesday, and when he is sentenced on June 14, he will be facing a possible five-year prison term.

So how did Childs break the law? We put the question to one of the best people able to answer it: Juror # 4, also known as Jason Chilton. In addition to having listened to countless hours of courtroom testimony, he also happens to be a Cisco Certified Internetwork Expert (CCIE) and a senior network engineer with payroll administrator Automatic Data Processing. (ADP) He's spent the past five months of his life on the trial, which began jury selection in late November. According to him, there's much more to the Terry Childs case than most people realize. Following is an edited version of an interview he gave the IDG News Service on Wednesday, the day after the verdict was handed down.

IDG News Service: Why did you find Terry Childs guilty?

Chilton: The law was clearly spelled out for us. Within it there are very specific questions that you have to answer in order to reach a guilty verdict. And within those questions there are certain terms such as computer network, computer service, and those are given legal definitions, which you have to follow.

The questions were, first, did the defendant know he caused a disruption or a denial of computer service. It was rather easy for us to answer, "Yes there was a denial of service." And that service was the ability to administer the routers and switches of the FiberWAN.

That was the first aspect of it, the second aspect was the denial to an authorized user. And for us that's what we really had to spend the most time on, defining who an authorized user was. Because that wasn't one of the definitions given to us.

IDGNS: People who followed the case heard about this conference call with Cisco engineers, and the defense said he was reluctant to hand over passwords to people who were not authorized to have them. There was an HR person in the room, a police detective, and the chief operating officer of his division, Richard Robinson.

Chilton: It was really hard for us to get through that part. We said, "OK, what policies may there have been that defined an authorized user?" Well, the city didn't have any procedures. There was no policy that was formally adopted that people were supposed to follow. It was this amorphous thing.

Eventually we looked at it and we saw that in late June his manager had requested certain accounts to be created that would have access to certain routers and switches. And he did create those accounts, and he sent that back in an email with the user IDs and passwords, to which Richard Robinson was also copied. If his big concern was that Richard Robinson was not authorized to be a user, why -- just a week before -- did he copy him on an email that has user IDs and passwords?

IDGNS: If you're doing this stuff in the course of your job, it's not criminal. There must have been a point at which you decided that what he was doing was outside of his job description?

Chilton: Essentially, one of his job duties was to allow the network to be maintained. So when he went into that meeting on July 9th, he was told he was being reassigned, therefore he was not going to be working on the FiberWAN any more. Somebody has to get access, and he refused to provide that. So he's leaving this very critical network in the city's hands, but saying that nobody can maintain it.

IDGNS: What do you think he was thinking at that point? The defense made it sound like this was a high pressure meeting and he choked.

Chilton: I think he went into that meeting probably thinking he was being fired. Definitely he knew that there were some employment changes coming. He had received an email the week prior from his manager saying, "We're about to go through organizational changes." So that was proof to us he knew something was going to happen organizationally that would affect his employment. That very morning before he went into the meeting, he received a phone call from one of his co-workers saying, "We've just been told you've been reassigned."

I think he was used to, over the years, dealing with Herb Tong, his manager, who didn't understand how to deal with him effectively. He would let him get away with everything, and he was kind of weak-willed and would let things slide. And I think Terry Childs was used to that and not thinking that the consequences of what he was about to do would be greater than what they normally would be if he was dealing with Herb Tong. Now he's dealing with Richard Robinson [Tong's boss] and the police.

And I think he left that meeting honestly thinking, "OK, they're going to try to get into this network and they're not going to be able to." He even sent an email the next day, saying, "I know you all are trying to figure out how I can get into this network."

So he knew nobody else could get in, and I think he had the assumption that they would say, "We need you back to maintain this network." And that obviously did not happen.

IDGNS: Since the verdict you've finally been able to read what people are saying about the case. Any surprises there?

Chilton: No, not really. Most of the news stories that covered it really boiled it down to something simple such as he was in a meeting and asked to give up his passwords and refused. There were so many other things happening that don't get put in the news that really led to the whole situation happening. It wasn't simply he wouldn't give up his username and password. It was two years of building up to this point.

IDGNS: What do you think of Terry Childs?

Chilton: I think he's a decent guy. Like many IT people, protective of his work. Possibly a little paranoid. But the problem he had was that he didn't have good management to keep that in check. He was allowed free rein, which allowed engineering decisions over the years that made things worse and worse, and locked people out of possibly getting into this network.

IDG News: Going back, what was the one step he could have done to avoid prison?

Chilton: If he would have simply said, "I will create you an account and you can go in and you can remove my access if you want." If he had created access for someone else, I think that would have resolved it. If he had not decided to leave and go to Nevada a few days later and withdraw US$10,000 in cash, [Childs did this the day before his arrest, while under police surveillance] I think the police may have let it continue on as an employment issue and not a criminal matter.

IDGNS: Do you think Terry Childs deserves another chance?

Chilton: Yes I do. He has a lot of knowledge and he has the ability to learn this stuff on his own. I think with what's happened, he's probably not going to get himself hired by an AT&T or a Bank of America, but he could probably do stuff on his own. Because he definitely has the knowledge.

MCITP Training - MCITP Certificaion - MCTS Exams Training - CCNA Exams - and more at CertKingdom.com