Archive for March, 2012:

Why Windows 8 touch sorta stinks in the Consumer Preview edition

Existing hardware wasn’t built to rigorous Microsoft standards for the new operating system.

If you’ve been less than impressed with the performance of the touch interface for Windows 8 Consumer Preview it may be because the hardware running it wasn’t designed for the new operating system, Microsoft says.

The eight screen-touch interactions defined for Windows 8 call for screens whose sensitivity may vary from what Microsoft requires of manufacturers who are building machines for Windows 8 specifically, according to the Building Windows 8 blog.
MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training
at certkingdom.com

“[W]hile we ensure that the OS works well with a Windows 7 PC, a new Windows 8 PC is going to be much more consistent and predictable both from a user and developer perspective,” say the authors of the blog, Jerry Koh, a group program manager, and Jeff Piira, a test manager of the Windows human interaction platform team.

When the software is finalized and installed on devices that were designed specifically to support it the experience should be better, they say, and that is the top priority. In the meantime Microsoft has tried to make Windows 8 compatible with machines designed for Windows 7. “So you should feel confidence in installing the Consumer Preview on the machines that you own today,” they write. “However, as much as we value compatibility, we also have to balance this with making Windows 8 really shine on new Windows 8 PCs.”

As an example, they point to the edge-swipe feature that reveals application bars from the bottom of the screen and the charm bar from the right side. “Traditionally, the edges of the screen are where touch sensitivity drops off, and it’s a place that hardware manufacturers have traditionally not placed much emphasis on,” they write. So on Windows 8 machines, those edges will be made more responsive without sacrificing space that the application can use when the bars are hidden.

Since Windows 7 machines had different design requirements, Microsoft had to do a workaround for screens that are not ideal. “In order to make edge swipe work consistently on Windows 7 PCs, we created a mode where there is a 20-pixel buffer to catch the edge swipe gesture. This allows a majority of PCs to reliably invoke the charms and use Windows 8 effectively,” the blog says.

As it says, this may work on a majority of machines, but not flawlessly. On a brand new HP TouchSmart 520 PC tested by Network World, the preview edition sometimes responds the first time with a finger swipe from the left to open up the charm bar, but sometimes it takes two or three swipes. Sometimes it misinterprets the edge swipe for a slide-to-pan swipe which scrolls the screen side to side. So a swipe meant to summon charms can scroll the live-tile screen for the Windows Store, for example.

But Microsoft says it has straightened this out with hardware developers. “There were many challenges here,” the blog says, “but we were able to deliver on the promise of Windows 8 PCs that have the ability to trigger the edge swipe without taking any pixels from applications, and with extremely good edge sensitivity using touch — a promise that benefits developers and users alike.”

Other issues the blog acknowledges:

= Taps don’t always work, especially when typing. This may be due to touch screen response rate and the number of touch points. Or it may be that the user is typing too fast, leaving more than two fingers on the screen at the same time.

= Trouble detecting swipe-to-select motions. This could be because some systems ignore the first few values of a touch, throwing off its interpretation of a swipe.

= Swipe-and-slide can be interpreted as a tap. Again, if the first values are ignored, the swipe is misinterpreted. Slower swiping and sliding can help.

= Swipe from edge doesn’t always work. Similar causes to the previous two issues and the same solution: slower swiping.

In its Windows on Arm (WOA) devices, in which the hardware is wed to the software with tight restrictions, Microsoft is shooting for responsive touchscreens that will inevitably be compared to the performance of iPads, since many WOA devices will be tablets.

The bloggers list some of the machines on which Microsoft has been testing Windows 8: HP Elitebook 2760p convertible; ASUS EP121 tablet; Dell Inspiron Duo convertible; Lenovo x220t convertible; 3M M2256PW 22″ display; Samsung Series 7 slate.
MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training
at certkingdom.com


Continue Reading

TIIT Offers the set of Microsoft Certification Training Programs

India, New Delhi, April 8, 2010 – TIIT, an India based IT training & certification institute supporting the skill development program of employees in leading IT organizations offers the most comprehensive set of Microsoft certification training programs as per the latest industry standards. These certification courses are mainly designed to make the developers, networking professionals & database administrators feel at ease while updating their skill set in a never before manner. Thus IT professionals will be able to choose from hundreds of Microsoft certification courses including certification for MCSA, MCP, MCSE Security, MCSE, CCNP, CCIP, CCSP, MCSE Messaging Cisco CCNA, Network+, CompTIA for A+ and much more depending on their requirement.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Presently IT sector is emerging as the most competitive job area where professionals need to keep updated at all time otherwise they may be left behind. With a large number of IT professionals struggling to find better job opportunities, ignoring the newer developing software technologies can hamper the job prospects. TIIT provides industry oriented Microsoft certification training to those seeking entry in the competitive IT market while allowing already employed professionals to update their knowledge discreetly. TIIT’s Microsoft certification training is meant to bring out the change & adaptability in professionals that will help them survive in the software job market & get job preference from the reputed recruiters.

“All our Microsoft training courses are web-based & making it easier for professionals to get trained either from their homes, office or any other place where internet connection is available. Most of these are developed on a specific Microsoft technology which enables trainees to take up these certification courses such as MCITP, MCTS & MCAS certification individually. We offer advance MCSA & MCSE training courses together with learning management system & trainee progress tracking facility. All our courses are developed & taught by expert Microsoft professionals & are of high quality. Apart from e-learning, they facilitate active student participation, enhancing their overall expertise & stimulating their thinking power,” said, Mr.Gaurav, spokesperson of TIIT.

TIIT has been offering Microsoft Certification for MCP, MCSA, MCSE, MCSE Security, MCSE Messaging Cisco CCNA, CCNP, CCIP, CCSP and CompTIA for A+, Network+ and many more for years. It is helping out those IT professionals seeking training on Microsoft platforms (Windows Server 2003 / 2008 and Exchange Server 2003 / 2007), Redhat Linux (RHCT , RHCE, RHCSS, RHCA, RHCDS), Cisco technologies (CCNA, CCNP, CCIP, CCSP, CCVP, CCIE), Sun Microsystems (SCSA, SCNA, SCSECA), Oracle (OCA, OCP, OCM, ERP), Citrix(CCA) for a reasonable price. All these courses lead to world -recognized certifications from leading global players like CISCO, Microsoft, Oracle, Checkpoint and Sun Microsystems.


Continue Reading

Is there a ‘best’ way to set up your private cloud storage?

There’s an energetic debate over storage architectures going on

Given that cloud computing is still emerging, it shouldn’t come as a surprise that opinions vary widely on the best way to architect the storage. In fact, it seems likely that there is no such panacea — different types of private cloud almost always require different approaches.

Or do they?
In a recent interview, Piston Cloud CEO Joshua McKenty asserted flatly that, when it comes to private clouds, the best approach is to integrate the storage with the servers, a setup that offers performance far beyond that of more traditional approaches.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

“The right model is a two U server with a bunch of JBOD,” McKenty says. “Because you’re limited not by the rate of any one drive, but by the number of spindles.”

PREVIOUSLY: Piston Cloud has made the tough private cloud decisions for you
It works, according to McKenty, because direct-attached storage in the servers doesn’t have to get routed through a single gatekeeper like a filer or even a SAN switch. Instead of “20 servers all talking to this one filer at a total bandwidth of 10G,” he said, each server has its own 10G port, meaning you have 200G worth of bandwidth. Even if the individual disks are slower and you need to store multiple copies of files, total performance far exceeds what you can achieve with a more traditional setup.

This idea is “heresy” as far as many IT departments are concerned, McKenty said, because they want to use NAS or SAN to handle their storage workloads instead of integrating storage and compute on every node. He described how a NASA operations team tried to replace one of his integrated systems.

“They brought in a $20,000 filer and put it in the bottom of the rack. It had Fibre Channel. And they put in a Brocade switch. And they cabled everything up with Fibre Channel and FCoE. And they spent four days of down time tweaking this thing, and they got 20% of the performance that we’d been getting out of our configuration,” he asserted.

But is this integrated JBOD approach just for private clouds that have special NASA-like workloads?

Absolutely not, McKenty said in a follow-up conversation. “We’ve seen customers use the same architecture for VDI workloads, Web hosting, risk analysis [and] other compute-heavy things like financial simulations or Monte Carlo simulations.”

The fact that storage density and processor speed are growing far more quickly than network capacity — an idea McKenty described as the mobility gap — is a key reason why the distributed model works so well, he says.

“The speed of light trumps your infrastructure. The latency of moving your data is never going to keep up with the growth of how much data we’re saving and how much processing we want to do on it,” he says. “And yet, if you look at a SAN or NAS architecture, you’re always putting all of your storage essentially in one device on the far end of a single wire.”
‘Stepping back in time 10 or 15 years’

Needless to say, not everyone agrees with McKenty’s characterization of the issues involved.
“What he’s talking about doing is sort of like stepping back in time about 10 or 15 years,” says Brocade product marketing manager Scott Shimomura. “He’s making the argument that the direct-attached storage approach is the best way to ensure performance, and that just isn’t the way customers think about their storage today.”

He also criticizes the idea that one system represents the way forward for nearly all uses.

“The trap that many people fall into is they want to say ‘cloud is this’ or ‘big data is that,’ or ‘there’s one type of infrastructure that’s going to solve world hunger,’ and the reality is that it depends on the workload,” he says. “You’re going to have different aspects of an application leverage different parts of your infrastructure.”

Director of Product Marketing for HP Storage Sean Kinney also disagrees, arguing that the integrated compute/storage approach makes it difficult for users to adapt to changing workloads in a flexible and agile way.

He also points out that the idea of keeping multiple copies of single files in order to improve access speed flies in the face of the industry trend toward data de-duplication.

“If disk cost is not an issue — which, for almost every IT customer, it is — this might work,” Kinney says. “Enterprise IT tends to be fairly cautious. What [McKenty] is proposing, at this point … looks to be a little too much like a science project.”

For his part, the Piston Cloud CEO scoffs at the notion of cost being an issue — compared to the price of specialty storage systems, distributed storage is far more economical. “Converged infrastructure using the hard drives in every server is way less expensive than dedicated filers,” he says.
So who’s right?

As far as performance goes, McKenty likely has a point, according to Forrester Research Principal Analyst Andrew Reichman.
“Simple storage architectures, I think, end up working better [than large arrays] in a lot of ways,” he says. “The disk that’s on-board a server is the fastest disk I/O that you can have, because it’s connected to the bus. … Part of the problem with storage arrays is that they share capacity across a large number of servers, so if you’re talking about an application that doesn’t really have a huge amount of storage capacity … you probably won’t have enough spindles to get good speed.”

That said, he notes, the Piston Cloud CEO may have oversold the wide array of potential use cases. Low data growth and high CPU intensity are the key factors in making a workload suitable for the model, Reichman argues. Nevertheless, sufficiently advanced algorithms for copying and handling data could make such a system highly effective.

On the cost issue, it’s difficult to conclusively say whether McKenty’s “heretical” ideas hold up, according to Crehan Research President Seamus Crehan.

“Disks may be cheaper than buying a storage array system with specialized interfaces (e.g., Fibre Channel). But if you have to buy a lot of redundant disks and there are possibly other associated network and management costs, then this may be mitigated,” Crehan says. “It is hard to tell without comparing all of the pieces of specific deployments. Businesses have very diverse sets of IT needs and what makes sense for one may not make sense for another.”
Running the numbers

In any case, Crehan says that companies may be moving in the direction of integration. Sales of the type of switching hardware that would be used in McKenty’s framework are on the rise.

“The [market] segment is enjoying tremendous growth and cloud deployments are an important driver of this. At the same time, despite very strong 4Q11 results, total Fibre Channel switch shipments did not grow in 2011,” he says. This could imply a downturn in interest for storage arrays.

Still, Crehan warns that organizational and technical inertia could hamper some companies looking to make an upgrade.
“More traditional enterprises have a lot of existing infrastructure to integrate with new deployments as well as organizational structures (such as separate teams for compute, storage and networking), which make some of these cloud-type implementations more challenging,” he says.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

 


Continue Reading

70-659 Q&A / Study Guide / Testing Engine

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


QUESTION 1
You work as a Network Administrator at Certkingdom.com. The network consists of a single Active
Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2 and all
client computers Windows 7 Professional.
The company network consists of an internal LAN and a perimeter network. The two networks are
separated by an internal corporate firewall. An external corporate firewall connects the perimeter
network to the Internet.
The network includes virtual machines (VMs) running on host servers contained in both the
internal network and the perimeter network.
You have recently installed a server named Certkingdom-VMM1 on the internal network. Certkingdom-VMM1 runs
Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 and will be used to manage
the virtual environment.
You are now in the process of deploying VMM agents on the host servers. You have configured
the port number for the VMM agents and configured the internal corporate firewall to allow
communications on the appropriate port number.
What else do you need to configure to ensure that the VMM agents can communicate with CertkingdomVMM1?

A. You need to configure the name of the VMM server (Certkingdom-VMM1).
B. You need to configure the Fully Qualified Domain Name (FQDN) of a domain controller.
C. You need to configure the name of a SQL Server.
D. You need to configure an encryption key.

Answer: D

Explanation:


QUESTION 2
You work as a Network Administrator at Certkingdom.com. The network consists of a single Active
Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2 and all
client computers Windows 7 Professional.
The company network consists of two subnets. The Development subnet is used by the
Development department. The Production subnet is used by all other company departments.
You install a Windows Server 2008 R2 Hyper-V server named Certkingdom-VMHost1 in the Production
subnet. Certkingdom-VMHost1 contains two network interface cards named NIC1 and NIC2. You have
configured NIC1 as a management interface.
You want to configure Certkingdom-VMHost1 to host virtual machines on both the Production subnet and
the Development subnet.
How should you configure Certkingdom-VMHost1?

A. You should use VLAN tags for the VMs and configure NIC2 to use Trunk Mode.
B. You should assign NIC2 as an additional management interface.
C. You should configure both adapters to support jumbo frames.
D. You should configure NIC1 with an IP address in the Production subnet and configure NIC2
with an IP address in the Development subnet.

Answer: A

Explanation:


QUESTION 3
You work as a Network Administrator at Certkingdom.com. The network consists of a single Active
Directory Domain Services (AD DS) domain. All servers in the network run Windows Server 2008 R2.
A server named Certkingdom-VMM1 runs Microsoft System Center Virtual Machine Manager (VMM) 2008
R2 and is used to manage the company’s virtual environment.
The company includes a Development department. Users in the Development department use
their computers to develop and test software applications for use by other company departments and customers.
You install a Windows Server 2008 R2 Hyper-V server named Certkingdom-VMTest1 in the Development
department. Certkingdom-VMTest1 will host virtual machines (VMs) for the Development department
users to use to test their applications.
You need to ensure that the VMs are completely isolated from production servers.
How can you ensure that the test VMs can communicate with each other while being isolated from
the host server and the rest of the network?

A. By configuring the VMs to connect to a Dedicated virtual network.
B. By configuring the VMs to connect to an Internal virtual network.
C. By configuring the VMs to connect to a Local virtual network.
D. By configuring the VMs to connect to a Private virtual network.

Answer: D

Explanation:


QUESTION 4
You work as a Network Administrator at Certkingdom.com. The network consists of a single Active
Directory Domain Services (AD DS) domain.
You are configuring a virtual environment for the company. You have an iSCSI storage disk array
that will be used to store virtual machines (VMs).
You install a server named Certkingdom-Host1 that runs a Server Core Installation of Windows Server 2008 R2.
You need to configure Certkingdom-Host1 to store to VMs on the iSCSI disk array.
Which two of the following tools could you use?

A. You could use Disk Management.
B. You could use Diskpart.exe.
C. You could use iSCSICLI.exe.
D. You could use iSCSICPL.exe.

Answer: C,D

Explanation:


QUESTION 5
You work as a Network Administrator at Certkingdom.com. The network consists of a single Active
Directory Domain Services (AD DS) domain named Certkingdom.com.
The company network consists of an internal LAN and a perimeter network. To comply with
company security policy, servers located in the perimeter network are not members of the
Certkingdom.com domain.
A Microsoft Hyper-V Server 2008 R2 server named Certkingdom-VMHost1 is located in the perimeter network.
You relocate Certkingdom-VMHost1 into the internal network. You now need to join Certkingdom-VMHost1 to the
Certkingdom.com AD DS domain.
How should you join Certkingdom-VMHost1 to the Certkingdom.com domain?

A. You should use the System Properties control panel applet.
B. You should use the Netsh command line utility.
C. You should use the Hyper-V configuration utility (hvconfig).
D. You should use the dcpromo utility.

Answer: D

Explanation:


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


Continue Reading

Techniques to Success for Passing the MCSE Exam!

MCSE certification course is really a a part of MCP courses linked to diverse technologies and merchandise in the Microsoft company. MCSE is an acronym for Microsoft Certified System Engineer. Holding this certificate certifies how the person is a Microsoft certified professional in the field of system engineering. MCSE Practice Exams can be a means to pay off the actual MCSE exams effectively. Their need arose because of Microsofts policy allowing aspirants to show up only once or twice for almost any certification course performed by them.

MCTS Certification, MCITP Certification

Best Microsoft MCTS Certification, Microsoft MCITP Training at examkingdom.com

The main element aspects these MCSE practice tests cover consists of installing, configuring and applying the Windows Server 2000 and 2003, implementing network infrastructure on their behalf, implementing and administering directory semelle for Windows2000 and 2003 servers, installing windows systems, designing the directory is important structure, designing investments and managing the network environment.

The MCSE practice exam covers each of the elements of the genuine MCSE exam. The advantage of appearing for any practice test before the actual MCSE exam is they help someone to understand those locations he needs to further progress up on improve his knowledge. In line with the rules and regulations for appearing in the MCSE exam test or some other exam to the Microsoft certification test, the candidate is qualified for can be found in this exam only once. After that the candidate cannot reappear for your exam.

Candidates can join extensive training programs for MCSE exam. Hoyouver, it’s important for the candidate to hold a tab through to his/her capacity to clear the exam a single attempt. With the, he/she can choose a practice test. These practice tests are difficult and typical than actual papers. This is accomplished so that you can prepare the applicant for the toughest situations that he/she could face in the real exam paper.

A number of MCSE practice exam out there that give an opportunity to the candidate to learn where they stand vis-‘e0-vis the genuine test. A+ certification test is certainly one such test that the candidate can select.

Success features a careful planning and use. Step one is usually to pick the Microsoft certification length of choice. Then before enrolling for any form of training, you will need to acquire some hands on experience for the technology where you have chosen to find the certificate. If you find it alright, only you then moves for many training curriculum. After completing working out program, you need to anticipate the practice exam to get a feel of the actual exam pattern. Then finally select the actual exam. Whether MCSE Practice Exam or any other practice exam for the different certification course, the look is going on in similar ways to help you succeed in these examinations.


Continue Reading

Microsoft’s ads, humor boost consumer opinion of IE

But tech fans still think less of the browser than does the general public

Computerworld – Microsoft’s recent campaigns touting Internet Explorer 9 (IE9), including a tongue-in-cheek promotion it unveiled last week, have moved IE’s quality perception needle for U.S. adults, according to a brand quality measurement company.

“When we see an inflection [in the quality scores], we look at other events that are happening,” said Ted Marzilli, the global manager for BrandIndex, a brand awareness and consumer perception service of U.K.-based YouGov.

While BrandIndex does not gauge reaction to specific ad campaigns, Marzilli called Microsoft’s marketing moves “a contributing factor.”

IE’s perception index is at its highest level since January 2011, said Marzilli.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Microsoft has been running national television ads for IE9 and a week ago kicked off a “browser you loved to hate” website and video. In the latter Microsoft poked fun at computer enthusiasts who obsessively uninstalled IE from friends’ and family members’ PCs.

The ads and self-deprecating humor seem to have won over some people.

From March 5-14, BrandIndex measured a 10-point jump in the quality perception rating of IE among U.S. adults, and a nine-point increase in the group that identified themselves as early technology adopters. By March 16, IE’s quality rating was 50 among U.S. adults, 44 among early adopters.

Not surprisingly, IE’s rating is regularly higher in the general population than it is among early adopters, who have long criticized the browser as behind the times.

Mozilla’s Firefox, meanwhile, also saw a jump in its BrandIndex score, ending March 16 at 44 for early adopters, 28 for the general public. Unlike IE, Firefox’s early adopter score tracks above that of the general population, belying its standing as a more flexible alternative.

“Early adopters and fast followers have a more favorable impression of Firefox than the general population,” said Marzilli. “That’s in tune with those who consider themselves advanced users, who are usually more eager to explore new technology, and may want to use a more obscure browser because that separates them from their peers.”

BrandIndex measures browser brand quality by interviewing 5,000 U.S. adults 18 and older daily, pulling the people polled from a pool of about 1.5 million Americans. Scores range from 100 to -100, and are compiled by subtracting negative feedback from positive, meaning that a score of zero is equal parts positive and negative.

BrandIndex doesn’t ask people their take on Google’s Chrome.

It’s difficult to assess whether the spike in perception that BrandIndex reported has translated into more IE users.

But according to Irish Web metrics company StatCounter, IE’s U.S. usage share for the seven-day stretch of March 9-15 was 42.3%, eight-tenths of a percentage point higher than the seven days prior. Since March 15, however, IE’s average daily share has dropped to 40.8%.

Firefox’s U.S. share also moved slightly this month, hitting a seven-day low of 21.3% the same week that IE peaked.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Posted in: Microsoft, TECH

Continue Reading

70-595 Q&A / Study Guide / Testing Engine

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training
at certkingdom.com


QUESTION 1
You are employed as a developer at Certkingdom.com. Certkingdom.com makes use of BizTalk Server 2010 in
their environment.
You have designed a BizTalk Server 2010 messaging solution for processing XML messages. You
then configured the solution to makes use of a solitary Business Activity Monitoring (BAM) activity
and BAM tracking profile to obtain content values from a message.
When a message is received, a portion of the values are bound to a receive port. When a
message is sent, the rest of the values are bound to a send port.
You have been instructed to make sure that a single record that includes all content values is
created for each message.
Which of the following actions should you take?

A. You should consider making use of the BizTalk Tracking Profile Utility (bttdeploy.exe) to
redeploy the tracking profile used in this solution.
B. You should consider linking a complete value to ActivityID field.
C. You should consider adding a relationship to the BAM tracking profile.
D. You should consider configuring the solution to make use of another Business Activity
Monitoring (BAM) activity.

Answer: C

Explanation:


QUESTION 2
You are employed as a developer at Certkingdom.com. You are currently in the process of designing a
BizTalk Server 2010 orchestration for Certkingdom.com’s environment.
You have already created and saved a policy, named CertkingdomEmployeeBonus, to compute an
employee’s bonus based on year-to-date sales via the Business Rule Composer. You have also
included a Call Rules shape in the new BizTalk Server 2010 orchestration.
When you access the BizTalk Orchestration Designer, you are unable to find CertkingdomEmployeeBonus
in the menu of accessible policies.
It is imperative that CertkingdomEmployeeBonus is made available.
Which of the following actions should you take?

A. You should consider publish CertkingdomEmployeeBonus from the BizTalk Orchestration Designer.
B. You should consider publish CertkingdomEmployeeBonus from the Business Rules Composer.
C. You should consider creating and publishing a vocabulary containing a definition that
references the XML schema used to evaluate CertkingdomEmployeeBonus from the Business Rules Composer.
D. You should consider creating and publishing a vocabulary containing a definition that
references the XML schema used to evaluate CertkingdomEmployeeBonus from the BizTalk Orchestration Designer.

Answer: B
Reference:
http://msdn.microsoft.com/en-us/library/aa995582(v=BTS.70).aspx


QUESTION 3
You are employed as an administrator at Certkingdom.com. Certkingdom.com is a shipping company that uses
radio frequency identification (RFID) readers with a server shipping management system built on
BizTalk Server 2010 to track shipped containers.
Subsequent to defining a custom tag event, named ContainerArrivalEvent, you include the
SqlServerSink component to the RFID process using the RFID manager.
You are required to make sure that only the custom tag event is logged.
Which of the following actions should you take?

A. You should make use of the Inline XSLT script type.
B. You should make use of the fully qualified assembly name for the EventType property.
C. You should make use of the Inline C# script type.
D. You should make use of the Generic EventType property.

Answer: D
Reference:
http://msdn.microsoft.com/en-us/library/dd352454(v=BTS.70).aspx


QUESTION 4
You are employed as an administrator at Certkingdom.com. Certkingdom.com has a BizTalk Server 2010
environment.
Certkingdom.com has three trading partners to which EDI purchase orders are regularly sent. Certkingdom.com’s
trading partners make use of email, instead of through response messages, to confirm purchase
order acknowledgements. Furthermore, Certkingdom.com’s three trading partners employ identical
versions of the purchase order message. The only difference is that the product types for each
trading partner are defined by custom codes, which are not included in the standard BizTalk
purchase order schemas.
You have been instructed to make sure that a purchase order schema is used for each trading
partner when sending purchase orders. Each purchase order schema should contain the required
custom product type codes for that particular trading partner.
Which two of the following actions should you take? (

A. You should consider defining a local host setting for each of the three trading partners via the
transaction set settings for the party.
B. You should consider defining an envelope for each of the three trading partners via the
transaction set settings for the party.
C. You should consider making use of the default namespace defined by BizTalk for EDI
messages.
D. You should consider defining a custom namespace for each BizTalk schema.

Answer: B,C
Reference:
http://technet.microsoft.com/en-us/library/ff629750(v=BTS.70).aspx


QUESTION 5
You work as a BizTalk Server 2010 administrator at Certkingdom.com. Certkingdom.com makes use of a BizTalk
Server 2010 orchestration that calls a Business Rules Engine policy.
You have previously configured the policy to assess test scores for passes or fails. You then
deployed The BizTalk solution, as well as the policy.
When Certkingdom.com decides to increase the value of a passing score, you are instructed to make the
necessary changes to the policy so that the adjusted rule parameter is displayed.
Which of the following actions should you take? (Choose all that apply.)

A. You should create a new version of the policy in the Business Rules Composer
B. You should create a different policy with a new name that includes the changed parameter in
the Business Rules Composer.
C. You should create a new vocabulary in the Business Rules Composer.
D. You should create a new version of the policy in the Business Rules Composer
E. Add the new parameter to this vocabulary
F. You should edit this version to reflect the changed parameter.
G. You should deploy the new version.
H. You should publish the new version.
I. You should publish the vocabulary.
J. You should deploy the new policy.

Answer: C,E,I
Reference:
http://msdn.microsoft.com/en-us/library/aa560288(v=BTS.70).aspx


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training
at certkingdom.com


Continue Reading

Useful Twitter search tool

Like other Twitter devotees, I encounter a lot of useful tidbits on Twitter. But while a tool like Tweetdeck allows me to more easily monitor lists of people and subject-specific hashtags I care about, it still relies somewhat on serendipity: that I’ll see what I need when I happen to be monitoring.

But what if I want to search for something specific on Twitter among people I follow? Unfortunately, Twitter’s own advance search page only offers up tweets that are fairly recent — and there’s only an option to narrow by specific accounts, not “my stream.” Tweetdeck lets me search my stream, but only in a limited timeframe. If I want to search tweets from the last few months, you’ll need another tool.

PostPost creates a searchable index of your Twitter stream that lets you look for tweets by term and then filter results by specific Twitter account. You can also narrow tweets based on whether they include links, photos or videos. This can be helpful if you’re trying to find a tweet that you sent last year (“What was that cool mapping site I shared?”) or, even tougher, a useful tweet that you know you saw awhile back, but you can’t remember from whom. Or, perhaps you’re researching a new subject and want to see what some of the smart people you follow on Twitter have had to say about it over the past few months.

PostPost today is touting an additional feature that aims to show you a personalized “trending topics” — just among people you follow. I’m not finding this especially useful, perhaps because my timeline is being flooded by comments about the new iPad. Trust me, I don’t need a tool to tell me the iPad is a “trending topic” among people I follow. And given that my list is weighted toward data-visualization topics, I don’t need PostPost to tell me that “#dataviz” and “Web design” are popping up on my “Timeline Topline.”

This particular feature might be more helpful if your Twitter timeline is somewhat broader subject-wise than mine is. But while I’ll pass on the PostPost Timeline Topline algorithm, I’d still recommend PostPost for its original purpose: finding useful nuggets in your Twitter stream. If you want to look through more of your social networks, Greplin will index multiple sources including LinkedIn, Facebook and Google Docs as well as Twitter. But if you know that you’re just seeking info on Twitter, PostPost is a useful option.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


Continue Reading

MCSA is the fastest-growing Microsoft certification

The MCSA is the fastest-growing Microsoft free Microsoft exams certification, within the first five months of its launch over 22,000 people had earned the MCSA Certification after passing the MCSA exam. Microsoft is a global leader in computer networking, so you can set your sights on a high flying career with long term prospects and the potential to travel nationally and internationally.

MCTS Certification, MCITP Certification

Best Microsoft MCTS Certification, Microsoft MCITP Training at examkingdom.com
MCSA (Microsoft Certified Systems Administrator)—This certification is for anyone who possesses a high level of networking expertise with Microsoft operating systems and software products. This credential is designed to prepare individuals to manage, maintain, and support information systems, networks, and internetworks built around the Microsoft Windows Server System and Windows XP and Windows 2000 desktop computers.

MCSA candidates must pass four exams to become certified. Microsoft currently offers two tracks for the MCSA credential—MCSA on Windows 2000 and MCSA on Windows Server 2003. The exam requirements for attaining each MCSA credential are detailed in Tables I.1 and I.2.MCSA on Windows 2000 Specializations—After a candidate successfully passes the three required core exams (70-290, 70-291 and 70-270 or 70-210), he has the options to specialize in the areas of Messaging and/or Security. A candidate earns the specialization title of MCSA on Windows 2000: Messaging by passing one of the following elective exams as listed in Table I.1—Exam 70-680 covering Exchange 2000 Server or Exam 70-680 covering Exchange Server 2003.

From an engineering standpoint, as well as greatfully pardon me for being rsther than techie here; a Internet is a set of subnets, as well as aggregates of subnets, that share a purebred IP residence space as well as sell report about a reachability of those IP addresses regulating a Border Gateway Protocol . Computer networks might additionally be personal according to a microsoft exam papers covering during that they work according to a small simple anxiety models that have been deliberate to be standards in a attention such as a 7 covering OSI anxiety indication as well as a 5 covering TCP/IP model.

Companies that work their own mechanism networks contingency discharge formidable systems which, once deployed, turn vicious collection for a one after another potency of their operations. They occupy administrators who concentration essentially upon a day-to-day operation of networks, whilst network engineers understanding essentially with complement upgrades, confidence testing, as well as so on.

Given a rarely technological inlet of mechanism networks we would have suspicion that only progressing as well as building these would be tough enough. However, companies additionally customarily face ongoing hurdles with a quarrel opposite deleterious software, such as malware such as worms, viruses, as well as spyware.

Computer networking has enabled people to work upon a move, as well as take work home most some-more well than has ever been probable before. Today’s mobile workforce insert countless inclination to a corporate network that have been tough to carry out from a confidence process perspective. It is a usual strand that companies that uncover off a work of as well as benefits from a capacities as well as free comptia security+ exam capabilities of their networks have been means to gather, analyze, as well as pass out vicious selling report quickly, that can give them an value over their competitors.


Continue Reading

MCSA is the fastest-growing Microsoft certification

The MCSA is the fastest-growing Microsoft free Microsoft exams certification, within the first five months of its launch over 22,000 people had earned the MCSA Certification after passing the MCSA exam. Microsoft is a global leader in computer networking, so you can set your sights on a high flying career with long term prospects and the potential to travel nationally and internationally.

MCTS Certification, MCITP Certification

Best Microsoft MCTS Certification, Microsoft MCITP Training at examkingdom.com

MCSA (Microsoft Certified Systems Administrator)—This certification is for anyone who possesses a high level of networking expertise with Microsoft operating systems and software products. This credential is designed to prepare individuals to manage, maintain, and support information systems, networks, and internetworks built around the Microsoft Windows Server System and Windows XP and Windows 2000 desktop computers.

MCSA candidates must pass four exams to become certified. Microsoft currently offers two tracks for the MCSA credential—MCSA on Windows 2000 and MCSA on Windows Server 2003. The exam requirements for attaining each MCSA credential are detailed in Tables I.1 and I.2.MCSA on Windows 2000 Specializations—After a candidate successfully passes the three required core exams (70-290, 70-291 and 70-270 or 70-210), he has the options to specialize in the areas of Messaging and/or Security. A candidate earns the specialization title of MCSA on Windows 2000: Messaging by passing one of the following elective exams as listed in Table I.1—Exam 70-680 covering Exchange 2000 Server or Exam 70-680 covering Exchange Server 2003.

From an engineering standpoint, as well as greatfully pardon me for being rsther than techie here; a Internet is a set of subnets, as well as aggregates of subnets, that share a purebred IP residence space as well as sell report about a reachability of those IP addresses regulating a Border Gateway Protocol . Computer networks might additionally be personal according to a microsoft exam papers covering during that they work according to a small simple anxiety models that have been deliberate to be standards in a attention such as a 7 covering OSI anxiety indication as well as a 5 covering TCP/IP model.

Companies that work their own mechanism networks contingency discharge formidable systems which, once deployed, turn vicious collection for a one after another potency of their operations. They occupy administrators who concentration essentially upon a day-to-day operation of networks, whilst network engineers understanding essentially with complement upgrades, confidence testing, as well as so on.

Given a rarely technological inlet of mechanism networks we would have suspicion that only progressing as well as building these would be tough enough. However, companies additionally customarily face ongoing hurdles with a quarrel opposite deleterious software, such as malware such as worms, viruses, as well as spyware.

Computer networking has enabled people to work upon a move, as well as take work home most some-more well than has ever been probable before. Today’s mobile workforce insert countless inclination to a corporate network that have been tough to carry out from a confidence process perspective. It is a usual strand that companies that uncover off a work of as well as benefits from a capacities as well as free comptia security+ exam capabilities of their networks have been means to gather, analyze, as well as pass out vicious selling report quickly, that can give them an value over their competitors.


Continue Reading

Symantec to acquire Nukona to assist in BYOD strategy

Deal with privately held mobile application management company to be completed in April

Symantec today announced it has reached an agreement to acquire privately held Nukona, a maker of mobile application management software, for an undisclosed price.

Symantec indicated the acquisition of Mountain View-based Nukona, expected to be concluded in April, is intended to further its strategy in managing and securing Apple iOS, Google Android and HTML5 apps, especially when the smartphone or tablet is owned by the employee but permitted for business use by the employer.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com
ANALYSIS: Cloud-based single-sign-on, a business perk for customers?
This “bring your own device” (BYOD) phenomenon, as it’s called, is becoming increasingly prevalent in the enterprise and forcing IT managers to look to new management approaches.

Nukona’s mobile management software includes an “enterprise apps store” for app distribution and a “policy manager” that can wrap apps in a management layer that allows IT to apply security policies for purposes such as authentication, enforcing encryption or setting restrictions.

C.J. Desai, Symantec’s senior vice president, endpoint and mobility group, said the Nukona acquisition “will help organizations protect and isolate corporate data and applications across both corporate-owned and personally owned devices.”

Earlier this month, Symantec also acquired Odyssey Software, a provider of mobile device management software as a foundation to enroll and manage all necessary device settings across a broad range of platforms.
MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


Continue Reading

Stolen encryption key the source of compromised certificate problem, Symantec says

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Kaspersky Lab’s discovery of Mediyes malware signed with Conpavi digital certificate sets off search

When Kaspersky Lab last week spotted code-signed Trojan malware dubbed Mediyes that had been signed with a digital certificate owned by Swiss firm Conpavi AG and issued by Symantec, it touched off a hunt to determine the source of the problem.

The answer, says Symantec’s website security services (based on the VeriSign certificate and authentication services acquisition), is that somehow the private encryption key associated with Conpavi AG certificate had been stolen.

BACKGROUND: Kaspersky Lab spots malware signed with digital certificate

“The private key for Conpavi was exposed,” says Quentin Liu, senior director of engineering at the Symantec division. “Someone got hold of the private key.” For this type of digital certificate, the private key is held by the certificate owner, in this case, Conpavi. Whether the private encryption key was stolen by an insider at Conpavi or outside attacker isn’t known. But the incident points out the risks associated with private encryption keys for this type of digital certificate and the need to safeguard them.

Symantec has revoked the Conpavi certificate that was used to digitally sign the Mediyes malware and is assisting the Swiss firm in analyzing what occurred and helping them prevent this from happening again.

The incident also highlights why malware authors want to sign the code they write, which in the case of Mediyes, is a so-called dropper file used to seed computers so they can be easily manipulated for other purposes. In the case of the Mediyes Trojan, the purpose was to intercept browser requests sent to search engines so the attackers could earn money in a fraudulent pay-per-click scheme.

Kaspersky last week estimated 5,000 users, mainly in Western Europe, including Germany, Switzerland, Sweden, France and Italy, had been exploited with the Mediyes Trojan for this purpose.

Criminals are increasingly using stolen digital certificates to sign their malicious code, Symantec acknowledges. The advantage in code-signing for them is it gives these attackers a boost up in having the malicious code evade detection by antivirus and other types of anti-malware software.

“We have seen more being signed, sometimes with stolen certificates,” says Liam O Murchu, manager of Symantec security response. “It lends an air of legitimacy to the file.”

Compromised digital certificates with stolen keys are available in criminal black markets online in places where you might find other stolen items, like credit card numbers and the like, he points out.

As Symantec has evolved its malware protection method, a risk-based score based on several factors will be used to quickly determine if code is benign or malevolent. Digitally signed code gets an advantage in this scoring system, says O Murchu. If attackers are effectively figuring out how to get around detection this way, this scoring system will need to be recalibrated, O Murchu acknowledges.

Ellen Messmer is senior editor at Network World, an IDG publication and website, where she covers news and technology trends related to information security.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


Continue Reading

Kaspersky Lab spots malware signed with stolen digital certificate

Mediyes malware looks to seed computers in order to wreak havoc later on

Security firm Kaspersky Lab Thursday said it’s identified a malicious program that appears to make use of a compromised Symantec VeriSign digital certificate issued to Conpavi AG, which is known to work with Swiss government agencies. Kaspersky says it has asked Symantec VeriSign to revoke the compromised certificates.

Kaspersky says the malicious program contains what’s being called Trojan-Dropper.Win32.Mediyes. A dropper file is a type of malware commonly used by attackers to seed targeted computers in order to easily drop other malware into it in the future for a wide variety of purposes.

Kaspersky Lab researcher Vyacheslav Zakorzhevsky wrote today in a blog that the malicious DLL Trojan.Win32.Mediyes was detected on the computers of about 5,000 users, mainly in Western Europe, including Germany, Switzerland, Sweden, France and Italy.

The Mediyes malware has been seen between December 2011 and March 7, 2012 and in all the cases it was signed with a certificate issued for the Swiss company Conpavi, according to the Kaspersky Lab researcher.

One main purpose of Trojan.Win32.Mediyes is to help facilitate the interception of web browser requests sent to the Google, Yahoo! And Bing search engines, as the search queries are “used by the criminals to earn money as part of the Search 123 partner program that works on a pay-per-click basis,” writes Zakorzhevsky. The attackers seem to working with a server in Germany.

“The malware is clearly aimed at users in Europe,” Zakorzhevsky writes. “This is backed up by other evidence – the certificate from a Swiss company, the server in Germany, and only the requests made on major international search engines being intercepted.”

Ellen Messmer is senior editor at Network World, an IDG publication and website, where she covers news and technology trends related to information security.

 

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


Continue Reading

MCSA is the fastest-growing Microsoft certification

The MCSA is the fastest-growing Microsoft free Microsoft exams certification, within the first five months of its launch over 22,000 people had earned the MCSA Certification after passing the MCSA exam. Microsoft is a global leader in computer networking, so you can set your sights on a high flying career with long term prospects and the potential to travel nationally and internationally.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

MCSA (Microsoft Certified Systems Administrator)—This certification is for anyone who possesses a high level of networking expertise with Microsoft operating systems and software products. This credential is designed to prepare individuals to manage, maintain, and support information systems, networks, and internetworks built around the Microsoft Windows Server System and Windows XP and Windows 2000 desktop computers.

MCSA candidates must pass four exams to become certified. Microsoft currently offers two tracks for the MCSA credential—MCSA on Windows 2000 and MCSA on Windows Server 2003. The exam requirements for attaining each MCSA credential are detailed in Tables I.1 and I.2.MCSA on Windows 2000 Specializations—After a candidate successfully passes the three required core exams (70-290, 70-291 and 70-270 or 70-210), he has the options to specialize in the areas of Messaging and/or Security. A candidate earns the specialization title of MCSA on Windows 2000: Messaging by passing one of the following elective exams as listed in Table I.1—Exam 70-680 covering Exchange 2000 Server or Exam 70-680 covering Exchange Server 2003.

From an engineering standpoint, as well as greatfully pardon me for being rsther than techie here; a Internet is a set of subnets, as well as aggregates of subnets, that share a purebred IP residence space as well as sell report about a reachability of those IP addresses regulating a Border Gateway Protocol . Computer networks might additionally be personal according to a microsoft exam papers covering during that they work according to a small simple anxiety models that have been deliberate to be standards in a attention such as a 7 covering OSI anxiety indication as well as a 5 covering TCP/IP model.

Companies that work their own mechanism networks contingency discharge formidable systems which, once deployed, turn vicious collection for a one after another potency of their operations. They occupy administrators who concentration essentially upon a day-to-day operation of networks, whilst network engineers understanding essentially with complement upgrades, confidence testing, as well as so on.

Given a rarely technological inlet of mechanism networks we would have suspicion that only progressing as well as building these would be tough enough. However, companies additionally customarily face ongoing hurdles with a quarrel opposite deleterious software, such as malware such as worms, viruses, as well as spyware.

Computer networking has enabled people to work upon a move, as well as take work home most some-more well than has ever been probable before. Today’s mobile workforce insert countless inclination to a corporate network that have been tough to carry out from a confidence process perspective. It is a usual strand that companies that uncover off a work of as well as benefits from a capacities as well as free comptia security+ exam capabilities of their networks have been means to gather, analyze, as well as pass out vicious selling report quickly, that can give them an value over their competitors.


Continue Reading

Cisco pays $5 billion for video company

Cisco’s purchase of NDS Group is firm’s most significant acquisition since Tandberg; makes company leader in service provider video gear
Cisco CCNA Training, Cisco CCNA Certification

Best CCNA Training and CCNA Certification and more Cisco exams log in to Certkingdom.com
Cisco this week said it will acquire NDS Group Ltd., a provider of video software and content security systems for service providers and media companies, for $5 billion.

More: Top tech M&A deals of 2012

NDS is the most significant acquisition for Cisco since it bought videoconferencing leader Tandberg in 2009. It’s indicative of the company’s intent to lead the service provider video market, where its Videoscape initiative and Scientific-Atlanta set top boxes are targeted.

“The acquisition would make Cisco the largest provider of SP video solutions,” notes Oppenheimer & Co. analyst Ittai Kidron in a bulletin on the acquisition.

It also furthers Cisco’s intent to build up its software and services expertise and revenue base, areas the company has said it will place more emphasis on.

ANOTHER VIDEOSCAPE ACQUISITION: Cisco to acquire video delivery startup BNI

NDS software and services are designed to create pay TV video offerings for service providers that enable subscribers to view, search and navigate digital content on any device. Its products include set-top/DVR, program guide and digital-content software, and video headend systems. Customers include Cox and DirecTV, among many others.

Cisco said NDS will complement and accelerate the delivery of its cloud-based Videoscape TV offerings, which is designed to enable service providers and media companies to deliver entertainment content.

“Our strategy has always been driven by customer need and on capturing market transitions,” said Cisco CEO John Chambers, in a statement. “Our acquisition of NDS fits squarely into this strategy, enabling content and service providers to deliver new video solutions that leverage the cloud and drive new monetization opportunities and service differentiation.”

Acquiring NDS will also expand Cisco’s reach into emerging markets, such as China and India, where NDS has an established customer footprint, the company says.

A “significant portion” of NDS’s software, services and content protection business is recurring, with long-term contracts, typically with an average duration of approximately five years, Cisco says.

The acquisition has been approved by the boards of directors of both companies.

The acquisition is expected to close during the second half of calendar year 2012, subject to customary closing conditions, including regulatory review in the United States and elsewhere. Prior to the close, Cisco and NDS will continue to operate as separate companies.

Upon closing, NDS’s operations, including sites in the United Kingdom, Israel, France, India and China, and 5,000 employees will join the Cisco Service Provider Video Technology Group, led by Senior Vice President and General Manager Jesper Andersen. NDS Executive Chairman Abe Peled will be named senior vice president and chief strategist for Cisco’s Video & Collaboration Group, of which SPVTG is a part.

Peled will report to Marthin De Beer, senior vice president, Cisco Video and Collaboration Group.

Posted in: IT CAREER, TECH

Continue Reading

Follow Us

Bookmark and Share


Popular Posts