Friday, April 19, 2013

Why a 7-inch Surface tablet would be a mistake for Microsoft

Rumors have begun circulating that Microsoft is working on a 7-inch version of its Surface tablet. I'm not convinced the company should even bother.

For the past couple of weeks, the web has been buzzing with rumors and speculation that Microsoft is working on a 7-inch version of its Surface Tablet. There has been no official word from Microsoft, of course, but if you look at current market trends, introducing a smaller tablet would seem to make a lot of sense. The popularity of the iPad Mini, Kindle Fire and Google’s Nexus 7 are clear indicators that consumers are interested in smaller tablets, and Microsoft surely wants a piece of the action.

Microsoft is in somewhat of a unique situation, however. Not only does the company already have a slew of hardware partners it probably shouldn’t anger any further, but it technically has two mobile operating systems to choose from, Windows RT and Windows 8. Although Windows RT and Windows 8 look similar, the former lacks compatibility with legacy x86 Windows applications, while the latter has somewhat steeper hardware requirements to run smoothly. And therein lies the rub.

A 7-inch Surface Tablet would be a tougher sell than the original.
If history is any indicator, and Microsoft is actually working on its own branded 7-inch tablet, it will most likely run Windows RT. Unfortunately, Windows RT hasn’t exactly been the darling of consumers or the tech community. In fact, many experts are calling for Microsoft to just kill off RT altogether and focus solely on Windows 8 for tablets. With Intel’s current x86-compatible SoCs already offering better performance and similar battery life than the ARM-based alternatives for Windows RT, it doesn’t make a whole lot of sense to continue expending resources on Windows RT. And if rumors hold true, Intel’s upcoming Bay Trail-based SoCs should only push RT further into oblivion.

The alternative is to produce a Windows 8-based, x86-compatible, 7-inch tablet. But I can already hear the tech press complaining now. They’ll say things like “Desktop mode is useless on a 7-inch tablet,” “You’ll be paying for features you won’t use,” and “There aren’t enough Windows 8 apps,” and so on. Whether everyone feels the same way or not, information and reviews full of caveats about a product don’t exactly instill consumer confidence and foster success.

Microsoft has taken such a beating lately that I’m of the opinion they shouldn’t bother with their own 7-inch tablet. Unless they hit an absolute home run on the hardware and market the device creatively alongside an enticing software promotion, there’s little chance the product will be well received. Microsoft should focus on bettering Windows 8 and its successors, and let its hardware partners introduce new tablet form factors.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


Tuesday, April 9, 2013

70-431 Q&A / Study Guide / Testing Engine / Videos


QUESTION 1
Certkingdom has hired you as their Database administrator. You create a database on named
Development on ABC-DB01 that hosts an instance of SQL Server 2005 Enterprise Edition.
You perform weekly maintenance and conclude that the Development database growing at about
100 MB on a monthly basis. The network users started complaining about poor performance of
queries run against the database.
There is 2GB RAM installed on DB01 and the database consumes 1.6 GB of RAM.
How would you determine whether additional RAM should be acquired for ABC-DB01?

A. You should consider monitoring the SQL Server: Memory Manager – Target Server Memory
(KB) Page Splits/sec counter in System Monitor.
B. You should consider monitoring the SQL Server: Buffer Manager counter in System Monitor.
C. You should consider monitoring the System – Processor Queue counter in System Monitor.
D. You should consider monitoring the SQL Server: Access Methods – Page Splits/sec counter in System Monitor.

Answer: B

Explanation: The SQL Server: Buffer Manager object is utilized to view the information related to
bottlenecks.


QUESTION 2
You create a database on ABC-DB01 that is running an instance of SQL Server 2005 Enterprise Edition.
Certkingdom recently suffered a power outage to the building which forces you to restart ABC-DB01
which now fails to start the SQL Server (MSSQLSERVER). Certkingdom wants you to troubleshoot
the service failure.
What must be done to determine the cause of the service start failure?

A. You should consider reviewing the Event Viewer logs listed below:
The Event Viewer Applications log.
The Event Viewer System logs.
Microsoft Notepad should be utilized to manually view the Microsoft SQL
Server\MSSQL.1\MSSQL\LOG\ErrorLog file.

B. You should consider reviewing the Event Viewer logs listed below :
The Event Viewer Windows logs.
The Event Viewer Setup logs.
The Event Viewer Application log.

C. You should consider reviewing the Event Viewer logs listed below :
The Event Viewer Forwarded Event logs.
The Event Viewer Hardware events.
The Event Viewer Security log.

D. You should consider reviewing the Event Viewer logs listed below :
The Event Viewer Setup Events logs.
The Event Viewer Windows logs.
The Event Viewer Applications and Services logs.

Answer: A


QUESTION 3
Certkingdom has recently opened an office in Perth where you work as the database administrator.
The Certkingdom database infrastructure runs on computers utilizing SQL Server 2005 Enterprise
Edition. You create a Import database with a backup schedule configured in the table below:



The Imports database contains a table named incoming which was updated a week ago. During
the course of the day A network user informs you that a table has been dropped from the Imports
table at 16:10. Certkingdom wants the incoming table restored to the Imports database.
What must be done to restore the table using minimal effort and ensuring data loss is kept to a minimum?

A. You should consider restoring the database from the recent deferential backup.
B. You should consider having the differential of Monday and snapshot backup from Tuesday restored.
C. You should consider deletion of all differential and database snapshots except the recent backup.
D. You should consider having the database table recovered from the recent database snapshot.

Answer: A


QUESTION 4
Certkingdom hired you as the network database administrators. You create a database named
Customers on ABC-DB01 running an instance of SQL Server 2005 Enterprise Edition.
A custom application is used to access and query the database. The users recently reported that
the custom application experiences deadlock conditions constantly.
How would you determine which Server session ID is related to the deadlocks?
What must be done to observer the SQL Server session ID involved with the deadlock scenario?

A. You should consider monitoring the SQL Server Profiler to monitor Error and Warning events.
B. You should consider monitoring the SQL Server Profiler to monitor Lock Deadlock Chain events.
C. You should consider monitoring the SQL Server Profiler to monitor Objects.
D. You should consider monitoring the SQL Server Profiler to monitor performance.

Answer: B


QUESTION 5
You are the system administer of a SQL Server 2005 Enterprise Edition server named DB01 that
uses Windows Authentication mode. Certkingdom uses a custom developed application for running
queries against the database on DB01. Users complain that the custom application stops
responding. Yu notice that the CPU utilization at 100% capacity.
You then try to connect to DB01 by utilizing the SQL Server Management Studio but DB01 still
does not respond. Certkingdom wants you to connect to ABC-DB01 to determine the problem.
What should be done to successfully determine the problem?

A. You should consider utilizing the osql –L command from the command prompt.
B. You should consider utilizing the sqlcmd –A command from the command prompt.
You could additionally use SQL Server Management Studio to access Database Engine Query for
connecting to DB01 with the SQL Server Authentication mode.
C. You should consider utilizing the osql –E command from the command prompt.
D. You should consider utilizing the sqlcmd –N command from the command prompt.
E. You should consider utilizing the sqlcmd –R command from the command prompt.

Answer: B

Explanation: The sqlcmd –A command is utilized to ensure that a dedicated administrative connection is utilized.


Friday, April 5, 2013

BlackBerry details extensive security protection in BlackBerry 10 OS

BlackBerry 10 OS is distinct from previous BlackBerry OS in that it can separate personal from corporate apps

The recent release of the BlackBerry 10 operating system sets the stage for a security evolution as well, according to Alex Manea, manager of security services at BlackBerry.

For one thing, the BlackBerry 10 OS is distinct from any previous BlackBerry OS in that it provides a way to separate out personal applications from corporate-designated ones by using a capability built directly into the OS called Balance. Manea says this "partitions the phone into two spaces, a workspace 100% controlled by IT, which can delete it without interfering in the personal side" and represents a way that businesses can support the bring-your-own-device (BYOD) trend by allowing employees their personal space on BlackBerry, too.

And although this BlackBerry Balance dual-partition capability for BYOD is not available for Google Android or Apple iOS devices, BlackBerry management can support these non-BlackBerry devices, says Manea, adding it involves adding a specialized app to iOS and Android devices to do that. Through use of the server-based BlackBerry Device Service software for BlackBerry 10, businesses can manage Android and iOS devices as well, though not Microsoft Windows Mobile, he says. Management capabilities include features such as lock, track and wipe.

BlackBerry is also working on what's known as a "containerization" type of technology for applications that could also be used for iOS and Android that would allow IT managers to place something akin to a container wrap around an app based on IT-based policy decisions.

BlackBerry 10 is also supporting data at rest and in transit through encryption, with the ability to swap out encryption algorithms.

But in addition to new features like Balance, the advent of the BlackBerry 10 OS has set the stage at BlackBerry to evolve the basic security strategy related to present and future smartphones and tablets. For example, BlackBerry recently established a partnership with security firm Trend Micro to assist in vetting apps against malware thorough the cloud-based Trend Micro Mobile Application Reputation Service. And in another partnership with Germany-based Secusmart GmbH, BlackBerry is creating a specialized encrypted mobile voice capability for BlackBerry that would be used by the German government there.

These kinds of projects are widening the perspective on what BlackBerry might undertake in the future as pertains to the BlackBerry 10 OS as a platform, including potentially coming up with a set of security APIs that third-party vendors could build to, such as the kind of anti-malware hooks which they don't have today. There has historically been very little malware aimed at BlackBerry because of its core design being highly virus-resistant, but it is growing.

Manea says as BlackBerry considers what it might undertake in terms of growing its security capabilities with BlackBerry 10, it's evident that the firm is more open than ever before to the idea of exploring projects, partnerships and possibilities.



Tuesday, February 19, 2013

Microsoft's Outlook.com comes out of preview phase

Microsoft's Outlook.com comes out of preview phase
Hotmail users will be upgraded to the new email service by summer

Microsoft has moved its email service Outlook.com out of the preview phase, and plans a marketing campaign to boost its adoption worldwide.

The service, which claims 60 million active users since the preview was released last July, will soon start to upgrade Hotmail users to the new service, David Law, director of product management at Outlook.com, wrote in a blog post on Monday.

At launch of the preview, Microsoft said Outlook.com would eventually replace Hotmail. The migration of Hotmail users, which will be completed by summer, will be seamless, and users' @hotmail.com email address, password, messages, folders, contacts, rules, vacation replies, and other features will stay the same, with no disruption in service, Law wrote. He did not specify a date when the transition would be complete. Users won't have to switch to an @outlook.com address if they prefer not to, he added.

Microsoft is also launching a large-scale marketing campaign to promote the service worldwide, stating that it is confident that Outlook.com is ready to scale to a billion people.

"A number of people have expressed appreciation that Outlook.com replaces advertising with the latest updates from Facebook or Twitter when they're reading email from one of their contacts," Law wrote. On an average, people saw 60% fewer ads when using Outlook.com because they now get much more relevant updates from their friends, he added.

Microsoft launched recently a campaign against Gmail in the U.S., targeting Google's alleged practice of going through the contents of all Gmail messages to sell and target advertisements. The "Don't Get Scroogled by Gmail" campaign on Microsoft's Scroogled.com promotes Outlook.com as an alternative to Gmail. Microsoft asked users to sign a petition to stop Google from going through personal email to sell ads.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Wednesday, January 30, 2013

IT security vendor Verdasys brings DLP to the cloud

IT security vendor Verdasys brings DLP to the cloud
Data loss prevention technology flags suspicious activity from afar

Security vendor Verdasys says it's ready to bring data loss prevention (DLP) to the cloud.

DLP systems typically require on-premises systems that monitor data use within a network and flag suspicious activity. With Verdasys' new cloud-based offering, the analysis of data flow is done off-site, without any sensitive information ever leaving the customer's site.

Verdasys is hoping the traditional advantages of cloud computing -- removing the need to buy hardware and off-loading the management of the system -- could make it an attractive option for midsize organizations looking to implement a DLP program. DLP has been somewhat slow to take off overall.

[ BACKGROUND: Next up for DLP: The cloud?

PROTECT YOURSELF: How to spot a social media scam ]

DLP systems are meant to ensure that sensitive information -- which is defined by the customer -- does not leave a company's network. If an employee attempts to download the company's IP and trade secrets on to a personal USB drive, a DLP system should be able to catch that and prevent the transfer.

Usually this has required an on-site footprint, including monitoring software, a centralized system for collecting the data traffic information and an on-site representative to analyze it. By using the cloud, Verdasys brings almost all those functions off-site, into its private cloud.

But Verdasys does not actually send any of the data it is analyzing up into its private cloud -- which is hosted by Rackspace's managed services division. Instead, Verdasys sensors that are positioned throughout the customer's network send encrypted, hashed metadata about the data traffic for analysis. This is a key, Verdasys officials say, for allowing the system to be able to monitor sensitive data without it having to leave the customer's network. "Metadata is descriptive language that defines the data, but does not contain it," says Bill Munroe, VP of marketing.

The company's Digital Guardian software, which powers the DLP system, analyzes the traffic flow and creates alerts for any suspicious activity. The system allows customers to see which employees have moved which files where, as well as provide encryption and hashing services to protect the data.

Verdasys' offering is the latest in what Forrester analyst Ed Ferrara says is a move by security vendors to push services to the cloud. "There's a huge amount of pressure on security organizations to look at the cloud seriously," he says.

DLP in the cloud can come with its concerns, though. Chief among them is the amount of information that must be sent to analyze. Even if only cached metadata is being sent to the cloud for analysis, that can still add up to be a lot of traffic for midsize to large organizations.

A variety of other security vendors -- including Trend Micro, McAfee, RSA, Symantec and CA -- are looking into cloud-based offerings, but Verdasys and BEW Global appear to be furthest along in their offerings, which are already on the market. Verdasys' system is priced between $6 and $14 per user per month, depending on the level of service.



MCTS Certification, MCITP Certification

Microsoft MCTS Certification, MCITP Certification and over 3000+
Exams with Life Time Access Membership at http://www.actualkey.com

Friday, January 25, 2013

Tech salaries jump 5.3%, bonuses flat

Tech and engineering pros reported the largest salary jump in more than a decade, according to career site Dice

Average salaries for tech pros climbed 5.3% to $85,619 last year, up from $81,327 in 2011. It's the largest salary jump in more than a decade, according to career site Dice, which specializes in jobs for tech and engineering professionals.

Entry level talent (two years or less experience) waited three years to see an increase in average annual pay -- and the market made up for the stagnancy with an 8% year-over-year increase to $46,315. At the other end of the spectrum, average salaries for tech professionals with at least 15 years of experience topped six-figures for the first time, growing 4% to $103,012.


 
2013 JOB WATCH: Top 11 metro areas for tech jobs

"Employers are recognizing and adjusting to the reality of a tight market," said Scot Melland, CEO of Dice Holdings, in a statement. "The fact is you either pay to recruit or pay to retain and these days, at least for technology teams, companies are doing both."

Tech bonuses were slightly more frequent -- 33% of respondents got one in 2012 compared to 32% in 2011 -- but slightly less lucrative at an average of $8,636 (down from $8,769). [Related story: "Outlook for IT bonus pay murky"]
tech salaries

"In the early stages of the recovery, companies were staying flexible by using performance pay to reward their top performers," Melland said. "Now, companies are writing the checks that will stick. With a 3.8% tech unemployment rate, no one wants to lose talent."

By location, Pittsburgh tech pros saw the largest salary increase, up 18% year/year to $76,207. Six other cities also reported double-digit growth in salaries -- which is the most ever registered by the Dice Salary Survey.

San Diego (+13% to $97,328)
St. Louis (+13% to $81,245)
Phoenix (+12% to $83,607)
Cleveland (+11% to $75,773
Orlando (+10% to $81,583)
Milwaukee (+10% to $81,670)

Silicon Valley remains the only market where tech professionals average six-figure salaries ($101,278).

Across the U.S., big data skills are in demand, as evidenced by $100,000+ salaries for tech pros who use Hadoop, NoSQL and MongoDB. By comparison, average salaries associated with cloud and virtualization are just under $90,000 and mobile salaries are closer to $80,000, Dice reports.

"We've heard it's a fad, heard it's hyped and heard it's fleeting, yet it's clear that data professionals are in demand and well paid," said Alice Hill, managing director of Dice.com. "Tech professionals who analyze large data streams and strategically impact the overall business goals of a firm have an opportunity to write their own ticket. The message to employers? If you have a talented data team, hold on tight or learn the consequences of a lift-out."

Looking ahead to the current year, 64% of tech professionals are confident they could find a favorable new job in 2013.

Dice surveyed 15,049 employed tech professionals between Sept. 24 and Nov. 16, 2012, for its annual Salary Survey.


Best CCNA Training and CCNA Certification and more Cisco exams log in to Certkingdom.com