Windows Phone 8 could out-earn Android, if Microsoft would let it

Windows Phone 8 could out-earn Android, if Microsoft would let it
Some unofficial analysis of Android revenue and that of Windows Phone 8 shows Microsoft’s true potential in the smartphone market.

Take a step through the looking glass, folks, and see a world where Windows Phone is more lucrative than Google’s Android.

Actually, you don’t have to. That world is real and you live in it. Here’s how it works.

Let’s start with the basics. Google offers the Android operating system to manufacturers for free so long as they use Google’s homegrown tools and applications with it. Google figures it will make that money back through search. The phrase is frequently called “giving away the razor and making money on the blades.” Game consoles operate like this, too.

The Android operating system enjoys global dominance approaching 75% of the market, with iOS a distant second and WP8 getting the scraps. BlackBerry, despite a nice showing with BB10 and the new phones, is imploding. IDC puts 2012 smartphone sales around the 720 million mark, which means 540 million phones shipped in 2012 that didn’t pay a penny in royalties. Google might want to rethink its strategy there.

Google doesn’t break out the profit and loss of products in its annual reports. Motley Fool reported that the best picture we have comes from the ongoing lawsuit between Google and Oracle, in which Oracle estimated that Google generates $10 million per day on Android, which would total $3.6 billion per year. Of course, that’s Oracle’s estimate, and they want beaucoup damages.

During trial, the judge revealed that Android generated roughly $97.7 million in revenue during the first quarter of 2010, well below Oracle’s estimate. Granted, $400 million a year is nothing to sneeze at, but for a company the size of Google, it is chump change.

And then there’s Windows Phone 8. There’s actually a lot of back-and-forth between the two companies. Microsoft paid Nokia $1 billion in flat-fees, while Nokia pays Microsoft a per-set fee for every phone. Now, the Fool estimates Nokia pays Microsoft about $35 per device, while other analysts have guestimated the licensing fee for Windows Phone 8 to be around $30 to $35 per device. Microsoft has never officially confirmed it.

Microsoft also makes money when customers use the applications built into Windows Phone, like Bing, and there are Bing ads used in ad-driven applications.

With 7.4 million Lumias sold in the most recent quarter, that’s an estimated $259 million for Microsoft. I can’t rightfully compare it to the $97.7 million estimate from the Android trial since that is based on a 2010 number, but I can compare Android’s position in the market in 2010 to Windows Phone’s in the most recent quarter. In the first quarter of 2010, Android was breezing past Apple to account for 28% of the market, assuming the No. 2 spot in the market behind Research In Motion, the NPD Group estimated at the time. Meanwhile, Windows Phone 8 reached an all-time high in market share in the most recent quarter – a whopping 4%, according to Strategy Analytics.

By these estimates, we can say Microsoft earns more revenue from a platform that accounts for 4% of the market than Google did when Android stood at 28%.

So while it’s far from a slam dunk, it looks like Windows Phone brings in more money for Microsoft than Android, the vastly more popular OS, has for Google in the past. Admittedly, these aren’t perfect numbers, but the bigger picture here is that the Windows Phone 8 strategy stands to earn Microsoft a whole lot of money if it can get some momentum.

A per-set fee, on the other hand, might not be a bad idea for Google. It might help clean up the low end of the Android line, which is really low-rent.

But Microsoft really needs to get its tail in gear with WP8. It needs another OEM, if only to keep Nokia honest, it needs to support developers better, and it needs to fix the ad pipeline for in-app advertising, because that has been broken for months. It has a potential winner if it would just apply some effort.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Continue Reading

70-413: Designing and Implementing a Server Infrastructure


You need to enable the deployment of domain controllers using virtual machine cloning.
Which of the following would need to be done first?

A. The domain controller running the Schema Master role needs to be upgraded to Windows
Server 2012.
B. The domain controller running the Domain Naming Master role needs to be upgraded to
Windows Server 2012.
C. All domain controllers running the Infrastructure Master role need to be upgraded to Windows
Server 2012.
D. The functional level of the forest needs to be raised to Windows Server 2012.
E. All domain controllers running the PDC Emulator role need to be upgraded to Windows Server

Answer: E


You need to enable Active Directory Recycle Bin in the domains.
Which of the following would need to be done first?

A. The functional level of the forest needs to be raised to Windows Server 2008 R2 or later.
B. The domain controller running the Schema Master role needs to be upgraded to Windows
Server 2012.
C. All domain controllers need to be upgraded to Windows Server 2012.
D. All domain controllers running the Infrastructure Master role need to be upgraded to Windows
Server 2012.

Answer: A


Which of the following technologies should you implement to meet the technical requirement of
distributing virtual machines between Hyper-V hosts automatically according to server load?

A. Windows Network Load Balancing.
B. Microsoft System Center 2012 Virtual Machine Manager (VMM).
C. Microsoft System Center 2012 Data Protection Manager (DPM).
D. Microsoft Enterprise Desktop Virtualization (MED-V)

Answer: B


You have created a Windows Server 2012 virtual machine configured as a domain controller.
You want to clone the virtual domain controller to create another virtual domain controller.
Which two of the following steps should you perform first? (Choose two).

A. Run the Install-ADDSDomainController PowerShell cmdlet.
B. Run the New-ADDCCloneConfigFile PowerShell cmdlet.
C. Run sysprep.exe /oobe.
D. Run dcpromo.exe /adv.
E. Place a DCCloneConfig.xml file in the %Systemroot%\NTDS folder.
F. Place an Unattend.xml file in the %Systemroot%\SYSVOL folder.

Answer: B,E


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Continue Reading

70-272: Supporting Users and Troubleshooting Desktop Applications

You work as the network administrator at ABC.com. ABC.com has a domain named ABC.com. All
servers on the ABC.com network run Windows Server 2003 and all client computers run Microsoft
Windows XP Professional SP2.
ABC.com has a Marketing and Finance division which requires using Microsoft Office XP to
perform their daily duties.
How would you instruct the Marketing and Finance user’s to run the Microsoft Office XP setup if
the setup fails and rolls backup without changing the user’s currently assigned privileges?

A. By adding the Marketing and Finance division to the Network Configuration Operators group
and accessing Microsoft Office Product Updates to scan the computer for updates.
B. By adding the Marketing and Finance division to the Power Users group and using Add or
Remove Programs in Control Panel to remove Office and re-install Microsoft Office XP.
C. By creating a remote connection to the Marketing and Finance group client computers and reinstalling
Microsoft Office XP using a network-based installation point with the required .msi file.
D. By adding the Marketing and Finance division to the local Administrators group and restarting
the browser and Workstation services before re-installing Microsoft Office XP from the Windows
Installer command-line utility.

Answer: C

Explanation: To try to recreate the error you have to run the installation in the users’ privileges so
running the installation on your computer with your privileges will not help you to solve the problem
(answer B and D). Visiting the Microsoft Office Product Updates Web site will not help the user in
any way as long as he doesn’t have Microsoft Office installed on his computer.

You work as the desktop support technician at ABC.com. ABC.com has a domain named
ABC.com. All servers on the ABC.com network run Windows 2000 Server and all client computers
run Microsoft Windows XP Professional SP2.
ABC.com has a Marketing division which uses Microsoft Office 2003 for their daily duties. During
the course of the day Marketing division users reported that certain files of theirs have been deleted.
How would you configure the Marketing division client computers to track any attempts by
malicious users to alter or delete files on their computers?

A. By running the secedit /analyze command on the client computers.
B. By running the secedit /configure command on the client computers.
C. By configuring security access control lists for their disk drives by auditing the Everyone group
on the client computers.
D. By running the secedit /validate command on the client computers.

Answer: C

Explanation: You must track unauthorized attempts to modify or delete the files so auditing the
Everyone group is the correct choice.

You work as a desktop adminsitrator at ABC.com. ABC.com has a domain named ABC.com. All
servers run Microsoft Windows 2000 server and the client computers run Microsoft Windows XP
ABC.com has a Marketing division which makes online purchases during work hours.
How would you configure the network firewall to stop these activities whilst allowing the Marketing
division to access the Internet?

A. By having port 110 blocked on the firewall.
B. By having port 443 blocked on the firewall.
C. By having port 143 blocked on the firewall.
D. By having port 21 blocked on the firewall.

Answer: B

Explanation: Port 443 is used for Secure Sockets Layer connections to Secure HTTP Web sites.
This port should be blocked.

You work as the network administrator at ABC.com. ABC.com has a domain named ABC.com. All
servers on the ABC.com network run Windows Server 2003 and all client computers run Windows
XP Professional.
ABC.com has a Finance division which uses Microsoft Office XP to perform their daily tasks.
How would you configure Microsoft Office XP to ensure opened documents display’s a toolbar
containing the Balloons button?

A. By accessing the Help menu and selecting the Detect and Repair… option.
B. By right-clicking the toolbar and selecting the Reviewing toolbar from the context menu.
C. By re-installing Microsoft Office XP and copying a Normal.dot file from the administrator’s
computer to the My Documents folder.
D. By accessing the tools menu from another user’s document and accessing the Tools menu to
select Shared Workspace.

Answer: B

Explanation: The Balloons button appears on the Reviewing Toolbar. Simply enabling this toolbar
will show this button. To enable the toolbar, right click any open spot in the toolbar area. From the
dropdown list, click Reviewing.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Continue Reading

IT’s new concern: ‘Bring your own cloud’

As personal and professional clouds converge, IT’s mission to improve productivity while protecting corporate apps and data is getting tougher.

Bring your own device is so 2012. The next big push in the consumerization of IT is bring your own cloud. And just as when consumer devices poured into the enterprise, many IT organizations have already responded with a list of do’s and don’ts.

The standard approach has been to forbid the use of personal cloud applications for business use, by offering official alternatives — the “use this, not that” approach — and to carve out separate cloud storage workspaces for business documents that can be walled off, managed and audited. But personal cloud services are difficult to control, and users are adept at going around IT if the productivity tools in their personal cloud can do the job easier, faster and better. IT wants a bifurcated approach to consumer and professional cloud apps and storage. But users don’t work that way anymore.
Getting Around IT

Scott Davis, CTO of end-user computing at VMware, originally began using a personal cloud app for business after the IT organization failed to offer a viable solution that met his needs. Davis, who has speaking engagements all over the world and needs to share large multimedia presentation files, asked for an exception to VMware’s email attachment size quota. IT responded first by suggesting that he pare down the content and then followed up by suggesting that he buy “a bag full of USB drives” to send presentations by mail.

“That’s when I started using Dropbox,” he says. “IT has competition. People know what’s out there and how to get the job done if IT doesn’t help them.”

Gartner analyst Michael Gartenberg agrees. “IT has to deal not only with bring-your-own devices but bring-your-own services,” he says. People will bypass even viable alternatives if they feel that the officially sanctioned professional cloud offering isn’t equal to the task — or if they have a personal cloud app they like better. “If it’s digital and it’s consumer, it’s going to find its way into the office. People will come up with reasons for using it,” he says.

At construction management firm Skanska USA Building, employees are mashing up business and personal work on a wide range of personal cloud services, including Dropbox and Evernote. Today, says senior enterprise engineer Jeff Roman, “We don’t control that.” But IT is actively reviewing its options. “What are we going to limit? What can they access at work and at home?” he asks. Right now that’s controlled by use policies that employees must follow as to what types of documents need to stay out of the cloud and what’s permissible. For example, financial data “should never touch a cloud service,” he says, nor should some documents relating to government projects.

But Skanska is also looking for an officially sanctioned cloud storage option. It is considering Microsoft’s SkyDrive Pro, using Citrix’s ZenMobile to provide virtual access to files stored on back-end servers, or using niche services such as Autodesk Buzzsaw, which puts construction design tools and documents in the cloud. “We don’t need people using all of these different tools,” he says, but any solution must be as easy to use as the personal cloud tools employees rely on. Otherwise, users are likely to bypass the official alternative.

“It will be tough to find a one-size-fits-all solution,” he says, “but we’re working on it. I am hopeful that within the next year we will have one in place, whether that is on-premises or cloud or a hybrid of both.”
Blurring the Lines

Organizations need to develop a three-pronged strategy for on-premises, off-premises and cloud, says Jim Guinn, managing director at consultancy PricewaterhouseCoopers. “You really need to pay attention to how you secure documents that are in someone else’s cloud-based service,” he says.

Roman says some documents just don’t belong in popular cloud storage services. “I’ve read the whitepapers on Dropbox and Box. I guess they’re secure,” he says. But for sensitive documents, he adds, “we don’t want to risk it.”

Even the issue of who owns business applications and how those applications are licensed is blurring. Evernote for Business, for example, adds a business services layer that includes policy-controlled business notebooks and adds business document libraries to the user’s personal Evernote account. Personal and professional documents reside in different repositories but with a unified view.

“We’re seeing a transition from two completely separate worlds to a world where there is no line between what’s good for personal and what’s good for business,” says Andrew Sinkov, vice president of marketing at Evernote. And if the user leaves the organization, the account — sans business documents — goes with him. “This model is little understood but I think will have a profound impact,” says Frank Gillett, an analyst at Forrester Research.

With Office 2013 and SkyDrive, Microsoft has taken a small step toward creating a unified view of the user’s personal and professional worlds. It has created synchronized, local versions of the user’s SkyDrive and SkyDrive Pro (SharePoint document library) storage repositories that exist as separate folders on the user’s local desktop. In this way, Office 365 can create and modify documents in the cloud, Office 2013 can read and write to the same files in a local folder, and all changes will be synchronized. “There’s a convergence happening from the user’s point of view,” says Microsoft storyteller Steve Clayton.

This strategy gets around the modal approach to personal and professional workflows — the two-car-garage model where the user must back out of one account bay and enter another to view and edit documents. Office applications can save to either folder. And if the user copies a document from his personal SkyDrive folder into the SkyDrive Pro folder, that file will be copied back to the cloud, where the policies for that document library will apply.

But only in the cloud. While IT can control which files users can sync with SkyDrive Pro, the cloud service can’t control what users do with the locally stored versions of those files. Users either must work with sensitive files in the cloud only or use Office 2013’s Information Rights Management feature to control forwarding, copying or printing of specific documents.

“Clearly, there’s a lot of change coming where IT has to integrate these [personal cloud services] into the current stack and figure out how it will work together,” says Amit Singh, president of the enterprise unit at Google, which in recent years has added enterprise features to consumer-based cloud applications such as Google Docs. With the latter, individual documents can be shared between the controlled, auditable professional account and the user’s personal account. But Docs offers no unified document view. On the other hand, Google Plus, Singh says, “was imagined as a semipermeable layer where we add controls for the enterprise from the bottom up.”


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com



Continue Reading

Hackers increasingly target shared Web hosting servers for use in mass phishing attacks

Nearly half of phishing attacks seen during the second half of 2012 involved the use of hacked shared hosting servers, APWG report says

Cybercriminals increasingly hack into shared Web hosting servers in order to use the domains hosted on them in large phishing campaigns, according to a report from the Anti-Phishing Working Group (APWG).

Forty-seven percent of all phishing attacks recorded worldwide during the second half of 2012 involved such mass break-ins, APWG said in the latest edition of its Global Phishing Survey report published Thursday.

In this type of attack, once phishers break into a shared Web hosting server, they update its configuration so that phishing pages are displayed from a particular subdirectory of every website hosted on the server, APWG said. A single shared hosting server can host dozens, hundreds or even thousands of websites at a time, the organization said.

APWG is a coalition of over 2000 organizations that include security vendors, financial institutions, retailers, ISPs, telecommunication companies, defense contractors, law enforcement agencies, trade groups, government agencies and more.

Hacking into shared Web hosting servers and hijacking their domains for phishing purposes is not a new technique, but this type of malicious activity reached a peak in August 2012, when APWG detected over 14,000 phishing attacks sitting on 61 servers. “Levels did decline in late 2012, but still remained troublingly high,” APWG said.

During the second half of 2012, there were at least 123,486 unique phishing attacks worldwide that involved 89,748 unique domain names, APWG said. This was a significant increase from the 93,462 phishing attacks and 64,204 associated domains observed by the organization during the first half of 2012.

“Of the 89,748 phishing domains, we identified 5,835 domain names that we believe were registered maliciously, by phishers,” APWG said. “The other 83,913 domains were almost all hacked or compromised on vulnerable Web hosting.”

In order to break into such servers, attackers exploit vulnerabilities in Web server administration panels like cPanel or Plesk and popular Web applications like WordPress or Joomla. “These attacks highlight the vulnerability of hosting providers and software, exploit weak password management, and provide plenty of reason to worry,” the organization said.

Cybercriminals break into shared hosting environments in order to use their resources in various types of attacks, not just phishing, APWG said. For example, since late 2012 a group of hackers has been compromising Web servers in order to launch DDoS (distributed denial-of-service) attacks against U.S. financial institutions.

In one mass attack campaign dubbed Darkleech, attackers compromised thousands of Apache Web servers and installed SSH backdoors on them. It’s not clear how the Darkleech attackers break into these servers in the first place, but vulnerabilities in Plesk, cPanel, Webmin or WordPress have been suggested as possible entry points.


MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com



Continue Reading

70-431 Q&A / Study Guide / Testing Engine / Videos

Certkingdom has hired you as their Database administrator. You create a database on named
Development on ABC-DB01 that hosts an instance of SQL Server 2005 Enterprise Edition.
You perform weekly maintenance and conclude that the Development database growing at about
100 MB on a monthly basis. The network users started complaining about poor performance of
queries run against the database.
There is 2GB RAM installed on DB01 and the database consumes 1.6 GB of RAM.
How would you determine whether additional RAM should be acquired for ABC-DB01?

A. You should consider monitoring the SQL Server: Memory Manager – Target Server Memory
(KB) Page Splits/sec counter in System Monitor.
B. You should consider monitoring the SQL Server: Buffer Manager counter in System Monitor.
C. You should consider monitoring the System – Processor Queue counter in System Monitor.
D. You should consider monitoring the SQL Server: Access Methods – Page Splits/sec counter in System Monitor.

Answer: B

Explanation: The SQL Server: Buffer Manager object is utilized to view the information related to

You create a database on ABC-DB01 that is running an instance of SQL Server 2005 Enterprise Edition.
Certkingdom recently suffered a power outage to the building which forces you to restart ABC-DB01
which now fails to start the SQL Server (MSSQLSERVER). Certkingdom wants you to troubleshoot
the service failure.
What must be done to determine the cause of the service start failure?

A. You should consider reviewing the Event Viewer logs listed below:
The Event Viewer Applications log.
The Event Viewer System logs.
Microsoft Notepad should be utilized to manually view the Microsoft SQL
Server\MSSQL.1\MSSQL\LOG\ErrorLog file.

B. You should consider reviewing the Event Viewer logs listed below :
The Event Viewer Windows logs.
The Event Viewer Setup logs.
The Event Viewer Application log.

C. You should consider reviewing the Event Viewer logs listed below :
The Event Viewer Forwarded Event logs.
The Event Viewer Hardware events.
The Event Viewer Security log.

D. You should consider reviewing the Event Viewer logs listed below :
The Event Viewer Setup Events logs.
The Event Viewer Windows logs.
The Event Viewer Applications and Services logs.

Answer: A

Certkingdom has recently opened an office in Perth where you work as the database administrator.
The Certkingdom database infrastructure runs on computers utilizing SQL Server 2005 Enterprise
Edition. You create a Import database with a backup schedule configured in the table below:

The Imports database contains a table named incoming which was updated a week ago. During
the course of the day A network user informs you that a table has been dropped from the Imports
table at 16:10. Certkingdom wants the incoming table restored to the Imports database.
What must be done to restore the table using minimal effort and ensuring data loss is kept to a minimum?

A. You should consider restoring the database from the recent deferential backup.
B. You should consider having the differential of Monday and snapshot backup from Tuesday restored.
C. You should consider deletion of all differential and database snapshots except the recent backup.
D. You should consider having the database table recovered from the recent database snapshot.

Answer: A

Certkingdom hired you as the network database administrators. You create a database named
Customers on ABC-DB01 running an instance of SQL Server 2005 Enterprise Edition.
A custom application is used to access and query the database. The users recently reported that
the custom application experiences deadlock conditions constantly.
How would you determine which Server session ID is related to the deadlocks?
What must be done to observer the SQL Server session ID involved with the deadlock scenario?

A. You should consider monitoring the SQL Server Profiler to monitor Error and Warning events.
B. You should consider monitoring the SQL Server Profiler to monitor Lock Deadlock Chain events.
C. You should consider monitoring the SQL Server Profiler to monitor Objects.
D. You should consider monitoring the SQL Server Profiler to monitor performance.

Answer: B

You are the system administer of a SQL Server 2005 Enterprise Edition server named DB01 that
uses Windows Authentication mode. Certkingdom uses a custom developed application for running
queries against the database on DB01. Users complain that the custom application stops
responding. Yu notice that the CPU utilization at 100% capacity.
You then try to connect to DB01 by utilizing the SQL Server Management Studio but DB01 still
does not respond. Certkingdom wants you to connect to ABC-DB01 to determine the problem.
What should be done to successfully determine the problem?

A. You should consider utilizing the osql –L command from the command prompt.
B. You should consider utilizing the sqlcmd –A command from the command prompt.
You could additionally use SQL Server Management Studio to access Database Engine Query for
connecting to DB01 with the SQL Server Authentication mode.
C. You should consider utilizing the osql –E command from the command prompt.
D. You should consider utilizing the sqlcmd –N command from the command prompt.
E. You should consider utilizing the sqlcmd –R command from the command prompt.

Answer: B

Explanation: The sqlcmd –A command is utilized to ensure that a dedicated administrative connection is utilized.

MCTS Training, MCITP Trainnig

Continue Reading

Avaya willing to share customers with Cisco, Microsoft in three-way networking battle

Avaya CEO says company debt woes are under control

Avaya unified communications products can get along with Microsoft’s Lync Server, and many customers will probably choose to deploy both rather than just one, says Avaya’s CEO.

Despite what he sees as shortcomings of Microsoft’s real-time communications platform, businesses will see value to some of its features, and supplement those with products from Avaya, says Avaya chief Kevin Kennedy.

“Are they a full replacement for a phone system as you think about a phone system in the past? The answer is no,” Kennedy says. “Are they a full replacement of room-based videoconferencing system today? The answer would be no. Are there many things that you would have to add, to integrate with it, to make it a full system? The answer is yes.”

Nevertheless customers faced with using Lync Server for some of its features such as instant messaging may deploy other features such as voice calling in certain circumstances, directly competing with Avaya products, Kennedy says. This despite Avaya’s 50% lower consumption of network bandwidth, he says.

“The real reality is customers and employees will decide what tools they want to use, and it won’t be just one tool,” he says. “I actually think in many cases with many customers we will end up being a complement to Microsoft and Lync.”

It’s not just Microsoft that Avaya expects to share customers with, and with that in mind Avaya is embracing open standards for its UC products, “because we believe all of the answers are unlikely to come from any one company. If you want an application that can distribute an SMS to every device that you own vs. just one, well a company may want that and a company may get that from someone else other than Avaya – Microsoft, Cisco.”

Those two competitors have deep pockets that enable them to enter markets for the long-haul and ramp up sales slowly, he acknowledges, but Avaya can hang with them. “I think being one of three is a great thing,” Kennedy says. “In some sense that’s organizing for an industry, and as I further stated I think it will not be a single-vendor or a single-application, winner-take-all type of environment. As long as we continue to innovate and offer a proposition that is fundamentally different there will be a healthy place for us.”

Kennedy’s comments came during a one-on-one interview with Network World at Enterprise Connect 2013 last week. At the conference analyst Peter Hale of MTZ Ltd. said Avaya had lost market share in IP telephony to Cisco between 2011 and 2012, winding up with 12% to Cisco’s 18%.

That in part was due to paying more attention to large customers and losing smaller businesses customers, Kennedy says. “After we did the Nortel acquisition (2009), on both the contact center and the unified communications side our low-end and mid-market offerings became stale, and we were more focused on the high end.”

But with the advent of a new single-server phone system, IP Office, Avaya has started to come back. “…[T]he good news is we’re on a new product cycle, and [IP Office] that is so competitive is one of the reasons that we’re winning again.”

Kennedy says that Avaya’s recently restructured debt should keep the company clear of a cash crunch through 2017 at the earliest and enable it to continue updating its products.

The company owes $6.075 billion in long-term debt and scored an $85 million net loss during the last three months of 2012, according to the company’s latest 10-Q report to the Security and Exchange Commission.

He says that despite the stark terms of the refinancing, customers shouldn’t worry about its effects on actual products. “I would argue that through public information it is very clear that debt restructuring does not translate to an issue in product continuity. In fact it’s quite the opposite because that’s the only value to be protected,” he says. “That being said, gross margin, the ability to service debt has improved over the last five years.”

The company filed last June to sell public stock in the company but that initial public offering has stalled. He says he expected to seek an IPO in 2013, but the owners of the company, Silver Lake and TPG Capital, wanted to file earlier. “I think we filed in June and by August it had become a very dubious market and it was not optimum for us to go out,” he says. “Again, owners will make those decisions. They’re very clear for me to stay focused on improving the products, and that’s what I do.”

Meanwhile Avaya is benefitting from its 2009 purchase of Nortel’s enterprise network infrastructure gear and its customers, he says. “We’re taking over the management of their infrastructure directly. That’s a recurring revenue stream that becomes new to us as we take those contracts,” he says.

That infrastructure in combination with Avaya voice gear gives customers resources to debug networks that other vendors can’t match, he says. Customers who have Nortel equipment and choose to upgrade to the next generation choose Avaya to manage the transition.

He says Avaya supports BYOD programs with its Flare collaboration/presence/email/voice client and one-X mobile voice client or iPhones and Android devices. In addition, the company activates two softphones on PCs for every phone handset it sells, a dramatic change from four or five years ago when most sales were for hard phones.

Avaya’s Identity Engines portfolio also helps BYOD programs by setting aside virtual LANs for certain categories of users and making it easy for personally owned devices to access limited portions of corporate networks. “My real point is BYOD is not just a video or a unified communications client story it is also married into the ease with which we can help people do BYOD as an overlay into your networking environment,” Kennedy says.

MCTS Training, MCITP Trainnig

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com



Continue Reading

What’s the Business Value of SOA? Show It with KPIs

What’s the Business Value of SOA? Show It with KPIs

If you’re in IT, you’re being asked to add more business value than ever. In fact, today’s “CIOs are being asked to become drivers of the business while at the same time many are trying to replace old and inflexible infrastructures with modern and flexible ones,” according to InformationWeek’s Analytics 2009 Global CIO Survey. This report adds that “across the globe CIOs are fighting the stubborn perception that IT in general-and CIOs and their teams in particular-are cost centers rather than creators of value and accelerators of innovation.” Does this sound familiar? Whether you already have an SOA in place-or you’re just getting started with SOA-it is essential to prove business benefits.

Today, measuring cost and revenue impact as well as other SOA metrics is vital to any leading organization. Measuring the value and tracking changes to these metrics are critical as your SOA grows and its portfolio expands. Recent surveys from Forrester Research show organizations are increasingly implementing SOA as a business enabler. Furthermore, recent Gartner research concluded that:

More than 60% of organizations said their SOA projects had a positive impact on their organization’s ability to grow revenue; and
SOA projects generated positive returns…typically within 10 months


MCTS Certification, MCITP Certification

Best SOA Certification, SOA Exam at examkingdom.com

A proven way to demonstrate an SOA’s business value is through Key Performance Indicators (KPIs). KPIs use a language your business colleagues understand: metrics. They give you the means to measure a return on your SOA investment and directly link SOA projects to real business improvements:

What KPIs you can use to start measuring SOA results
How leading organizations-Avnet, Coca-Cola Enterprises and France Telecom-measure how SOA contributes to business success
How Software AG can help you analyze and deliver on your SOA-based KPIs

Software AG, provides a complete solution for SOA Governance, CentraSite, that enables customers to manage their IT assets and measure their business value.

If you’re looking for an introduction to SOA, please read our book, SOA Adoption for Dummies.

Continue Reading

A career in wireless networking-certified wireless network administrator

Wireless technology is a rapidly expanding market. The Wi-Fi standard (802.11), which is the defacto technology for wireless LANs, is continuing to evolve over time and has been embraced by almost all networking vendors and by many electronic hardware vendors. Wi-Fi technology has brought “Freedom and flexibility in Communication”. With wireless technology, people have more flexibility and more freedom to connect with their favorite content and to communicate with others even when they are on the move. All sorts of devices support now the wireless technology. From computers, media players, game consoles, mobile phones etc. Wireless is everywhere. Without the cumbersome cables, people’s communication and connectivity is now simpler and easier.

I.T professionals with wireless knowledge, skills, and qualifications are earning more money than others in the technology field. A “CertMag” salary survey showed that I.T professionals holding a CWNA (Certified Wireless Network Administrator) or CWSP (Certified Wireless Security Professional) certifications earn considerably more than many other technology certifications.


MCTS Certification, MCITP Certification

Best CWNA Certification, CWNA Training at examkingdom.com



An excellent, vendor-neutral, certification to pursue is the CWNA (Certified Wireless Network Administrator). This is a foundation level certification under the CWNP program. The CWNP is the industry standard for certifications in the wireless LAN industry. A CWNA certification is the initial step towards a successful career in the wireless field. Because it is vendor-neutral, you have the advantage of being employed by any company or organization having any wireless infrastructure vendor. A CWNA professional has the technical leadership and the ability to successfully implement any wireless solution and offers a career differentiation, with enhanced credibility and marketability.

CWNA Training and Preparation

For optimal CWNA preparation I suggest to get the only authorized CWNA Video Training (from Trainsignal) together with the Official CWNA Self-Study Guide (709 pages paperback) from the official website (cwnp.com). The combination of the two study resources above will definitely help you to pass the exam guaranteed. Especially the Trainsignal Video Training package, will provide you with an “instructor-like” experience which covers all required topics for the exam. The instructor in the videos, Ed Liberman, is a technology guru with 18 years experience in the I.T field and 12 years as an instructor.

CWNA Exam Details

To earn the CWNA certification you must pass the CWNA PW0-104 exam. This is a multiple-choice exam with 60 questions, for 90 minutes exam duration. You need a passing score of 70%. You can register at Pearson VUE to take this exam (www.vue.com).

The certification exam measures your ability to administer any wireless LAN. The exam covers a broad range of wireless LAN topics focused on 802.11 wireless technology rather than products of specific vendors. The main topics covered by the exam are the following:

Radio Technologies

Antenna Concepts

Wireless LAN Hardware and Software

Network Design, Installation, and Management

Wireless Standards and Organizations

802.11 Network Architecture

Wireless LAN Security


How to Perform Site Surveys

Pursuing a CWNA Certification is a smart move for networking professionals who want to differentiate themselves from the crowd. A CWNA Video Training together with the official book study guide are the surefire ways for passing the exam.

Continue Reading

EMC E20-670 certification


With the development of electrical and electronic technologies, the increasing popularity of home appliances and electronic products, radio and television, post and telecommunications and computer networks become increasingly developed, increasingly complex electromagnetic environment and deterioration, making electrical and electronic products, electromagnetic compatibility (EMC and EMI Electromagnetic Interference electromagnetic anti EMS) problem by governments and the increasing emphasis on manufacturers. Electronics, electrical products, electromagnetic compatibility (EMC) is a very important indicator of quality, it is not only the work related to the product itself, the reliability and use of security, but may also affect other equipment and systems work related to electromagnetic environment protection issues.


Best AFP Certification At Certkingdom.com
EMC (electromagnetic compatibility) of the full name is Electro Magnetic Compatibility, which is defined as “equipment and systems in its electromagnetic environment, can work and does not constitute anything in the environment can not afford the ability of the electromagnetic disturbance” This definition includes two aspects mean, first of all, the device should be able to electromagnetic environment in a certain work, that is, the equipment should have a certain electromagnetic immunity (EMS); Secondly, the electromagnetic disturbance generated by the device itself can not produce other electronic products, too much effects, namely electromagnetic interference (EMI).

Order to regulate the electromagnetic compatibility of electronic products, all developed and some developing countries have developed standards for electromagnetic compatibility. EMC standards is to make the product in the electromagnetic environment of the basic requirements to work properly. It is called the basic requirements, that is, products to meet the electromagnetic compatibility standards even if, in actual use interference problems may also occur. Most national standards are based on International Electrotechnical Commission (IEC) standards set.

As one of the most important EMC certification, E20-670 exam is your good choice.After you passing the exam and getting the certificate, you can find your own place in the IT field.

EMC certification exam got your attention? Do you want to pass your EMC exams on your first try! Do you want a 100% Money Back Guarantee on your purchase of EMC training products? Do you want to practice your EMC exams online? Then you just hit a jackpot! We provide nothing but leading edge EMC exam resources covering all types of EMC exam questions, and providing all correct answers. With Certkingdom complete EMC certification resources , you will minimize your EMC certification cost and be ready to pass your EMC certification tests on Your First Try, 100% Money Back Guarantee included!

Continue Reading

Learn Photoshop Now…Adobe Certification, the RIGHT Choice

Getting ahead in today’s market can be difficult. To stand out of the crowd and be noticed is more difficult than ever. One way to do this is to become Adobe Certified. Worldwide Adobe certification is an industry standard of excellence, and it is the definitive way to communicate your expertise in the leading products from Adobe.


As an individual, an Adobe Certified credential allows you to:Distinguish yourself from competitors,Get your resume spotlighted Attract and gain new business,Receive respect from your employer,Leverage the power of the Adobe brand

As an industry, you use the Adobe Certified credential as a standard so you can:Find the correct individual for the job Quickly ascertain the potential candidate’s skill level, Invest in, and endorse, your most promising employees In an ever changing world, students and instructors need to be more than general users of digital communications technology to be successful.


Certification can help provide the added credential for instructors as well as open new opportunities for students in the 21st century. Adobe offers multiple options for students and instructors to validate their digital media skills. Now educators and students can get certified for both beginner-level (Adobe Certified Associate) and advanced-level (Adobe Certified Expert) skills.

What is an ACE? An Adobe Certified Expert (ACE) is a person who has demonstrated proficiency with one or more Adobe software products. To become an ACE, you must pass one or more product-specific proficiency exams and agree to the ACE terms and conditions.

What is an ACP? Adobe Certified Professionals (ACPs) set themselves apart from other IT professionals. They consistently demonstrate expertise with Adobe products and platforms, and add value to colleagues, managers, and their own career.

What is an ACA? An Adobe Certified Associate (ACA) credential certifies individuals have the entry-level skills to plan, design, build, and maintain effective communications using different forms of digital media.


Continue Reading

Follow Us

Bookmark and Share

Popular Posts