Monday, 28 December 2015

How to view saved Wi-Fi passwords in Windows 10, Android and iOS

So many stores, service stations, coffee shops, pubs and so on offer free Wi-Fi that you probably have countless networks saved on your phone or laptop. Having a password saved on your computer is great, but how can you get the password so you can use it on your phone as well?

Rather than trying to hunt down a member of staff to ask, or hunting high and low for that tiny sign that shares the password, you can instead view the wireless passwords you have saved. Read on to find out how to retrieve these passwords in both Windows 10 and Android.

If you already have the password for a wireless network saved on your laptop and want to retrieve it to use on your phone -- or share with someone else -- things are quite simple. The same method works in Windows 7, Windows 8.x, and Windows 10, but it's important to note that you need to be connected to the network you are trying to retrieve the password for.

Press the Windows key and R, type ncpa.cpl and press Enter.
Right click on the wireless network adaptor and select Status.
Click the Wireless Properties button.
In the Properties dialog that appears, move to the Security tab.
Click the Show characters check box, and the network password will be revealed.



If you want to retrieve a saved wireless network password from Android or iOS, you'll have to have a rooted or jailbroken device -- sadly, there is no standard way to pull up security credentials. It's worth noting that there are several apps out there in Google Play that claim to reveal Wi-Fi passwords; while some of these work, there are also numerous malicious tools out there, so it's best to use an alternative method.

If you're using Android, install a copy of the free file browser ES File Explorer.

Navigate to the data/misc/wifi folder on your device -- it will not be visible on non-rooted phones.
Open the file called wpa_supplicant.conf and you will see a list of saved Wi-Fi networks complete with their passwords.

To retrieve a Wi-Fi password on a jailbroken iPhone, you can check in the Keychain access app if you have a Mac connected to the same network, but there's another method if you prefer to do it all from your phone.

Grab yourself a copy of WiFi Passwords from Cydia.

Fire up the app, and you'll be presented with a list of all of the passwords your iPhone has for saved wireless networks.

Certkingdom 20% Discount Promotion Coupon Code: 45K2D47FW4

Saturday, 12 December 2015

One-woman whirlwind: IT training expert is a do-it-all ‘worker bee’

Jay McElroy is a friendly, busy and highly productive woman. It’s an understatement to call her a “ball of fire” — she’s more like a “Supernova!” A supernova of ideas and actions, that is. Jay herself describes it this way: “I’m, like, on speed from the minute I wake up, and I just go all day.”

In 2004 she founded McElroy Enterprises (ME), a corporate training company specializing in hands-on training for careers in the corporate IT, healthcare, retail and construction fields. “We put together a Job Candidate Certification (JCC) professionalization learning management system to give job seekers a complete education in preparing for, finding and succeeding in employment,” she said.

ME has had phenomenal success. At one point, with a barely believable staff of just 10, they were helping between 800 and 1,000 people per month get back to work in IT, healthcare, retail and construction. Beginning in 2008, JCC’s scope expanded to include additional markets and embraced the increasing utilization of video, electronic media and related technologies.

A lifelong work ethic

Jay is definitely the driving force behind ME. She praises her parents for teaching her to “work hard and never quit.” She was raised in a large family of “about 13 children,” she said. “My parents were always taking in other children who needed some help and guidance.”

Her father was a postal worker who did construction on the side, while her mom laid the ground rules for life at home. “We always helped around the house with chores. As each kid graduated from high school we were given the same option: If you weren’t planning on continuing on to college, then you had to pay rent to live at home, and have a plan to put enough money aside to get your own place,” she said.

Jay’s original career interest was to be an undertaker. “I figured it had lots of job opportunities and I’d always be employed,” she said. “Mom never told us what type of jobs we should work, ‘Just work hard and be honest.’ But this was the one time she told me to ‘pick another career,’ so I chose computers.”

Jay worked full-time while attending the University of Pittsburgh and graduated with a degree in Information Systems, as well as a minor in Computer Science and Industrial Engineering.

Get her for our department!

“I always wanted to work for IBM in Tampa, Florida, but there were no job offers. So instead I went to work for the Westinghouse Corporation in Pittsburgh, where I was assigned to a number of different divisions and learned a lot of great things,” she said. At Westinghouse her work ethic and positive attitude landed her in “special programs,” an elite group of employees that traveled around the country working on various projects.

IBM eventually called and asked her to come to Raleigh, N.C., to interview for a positon. Like a good high achiever, Jay didn’t just interview for one position: “I met with eight different managers and got eight job offers,” she said. Speaking later with HR, Jay mentioned that she really wanted to live and work in Tampa, so they sent her down there for an interview and, of course, she got that job offer too.

To top things off, IBM asked if, on her way home, she could stop in Maryland to meet a couple of executives. “In Maryland I interviewed with nine managers and received seven offers. I felt really good,” she said with a laugh. “HR told me that they didn’t bother returning calls from the other two managers, and that my only decision should be whether I wanted to live in Florida or Maryland. I had an aunt in Maryland, so that’s where I went.”

Real estate and home improvement

Most people move to a new city and slowly start learning the area. Jay is not most people: “I wanted to get to know the area quickly, so I earned my real estate license.” High energy and a sunny disposition enabled her to be a successful agent. “I would show houses in the evenings and on weekends, and even on my lunch breaks,” she said.

Jay McElroy is an IT training expert who's succeeded at everything she's ever tried.She sold houses to and for IBM employees, even going the extra mile to help flip their properties. She enjoys telling how she used construction skills learned from her father: “Working for IBM often means, ‘I been moved.’ When an employee would be transferred, I would agree to move into their empty house and renovate it. I’d do sheetrock, floors, painting and electrical. Then they could sell the house quickly.”

Jay loves to garden and is an accomplished landscaper. “A neighbor saw how I landscaped my yard and asked me to do his,” she said. “Before I knew it, others were asking and I ended up landscaping almost all the yards on my street.” In her spare time she has also built two houses.

Jay’s first IBM job was in database management. “I worked really hard,” she said. “When I moved on to another positon, they replaced me with five full-time people.”

“I just wanted to be a worker bee.”

Hard work and a can-do attitude led to career opportunities with other well-known companies such as Concert, a joint venture between British telecom, AT&T and MCI, Computer Sciences Corporation and the Applied Physics Laboratory at Johns Hopkins University. Although Jay has often worked in management she said she never wanted to: “I just wanted to be a worker bee. My skills lie in understanding how all facets of a system work — at the nitty-gritty level, and I credit my career experiences with helping me recognize trending developments in IT training.”

Between 2005 and 2011 Jay recognized the need for workforce skills training, particularly among young people. “I saw they were lacking in basic skills that would help them find employment,” she said. “So I created Reaching Higher, a program to teach youth soft skills, created a six-week curriculum to help them find employment, and they started finding jobs. Then some of their parents started asking if we could teach them the same skills. So we did by creating Reaching Hire, which focused more intensely on employment.”

McElroy Enterprises has always included strong elements of IT training in each course. Recognizing the importance of IT certifications, Jay began teaching how search engines work, and how job candidates could get their resumes to the top of the stack. “Anyone can put a resume together,” she said, “but if you don’t know how things work once you put it online, it will not be seen.”

Government contract

In 2012, the U.S. Department of Labor selected Prince George’s Community College to receive a grant of $2.5 million through the department’s Trade Adjustment Assistance program. The College used the grant to develop the Hybrid Technology Training (HTT) program.

HTT partners with employers to create accelerated training in computer technology, networking and cybersecurity for unemployed workers, veterans, displaced and disadvantaged citizens, and victims of foreign outsourcing. Jay and McElroy Enterprises were a natural fit.

When HTT contacted ME’s Board, they suggested Jay help out, calling it a “vacation” of sorts for her. “I’ve never been one to take regular vacations — haven’t been on one in 10 years,” she said with a laugh. “But I liked what HTT was doing and I knew I could help.”

With Jay, HTT is focused on IT certifications and is able to incorporate virtual instruction, interactive simulations, online and real-world problem-solving challenges, and collaborations between learners and instructors.

In September of 2014, HTT began an eight-week pilot program focused on earning certifications for CompTIA: A+, Network+ and Security+. They have had great success, and Jay is understandably proud. “Our first cohort started with 18 students — three had to drop out, but the other 15 earned all three certifications,” she said. “Even better, several of them found employment in IT during the most difficult time of the year, December and January.”

One student, Roderick DeBrew, told how HTT helped him earn his certs and land an IT position: “Since December 12, 2014, I’ve been a contractor for the Department of Defense, in a cleared position as a NOC engineer. Every day I’m learning new techniques, processes and operational methods as it applies to Information Security and Data Centers.”

Success for students

Jay McElroy is an IT training expert who's succeeded at everything she's ever tried.A second cohort began in January and is showing great promise as well. In just five weeks, 20 of 25 students earned CompTIA’s A+ certification, and two earned Network+. Two other students earned Certkingdom.com PC Pro and one earned Certkingdom.com Network Pro.

Jay attributes HTT’s success to assessments that help students identify skill sets and interests. She also channels her mom by firmly telling students that, “No is not an option!” Jay said some students struggle and want to quit, but she does her level best to keep them engaged. “I know this program works,” she said. “If they put their time in, and sacrifice for a very short period of their lives, they will be successful and the sky is the limit.”

One of the components HTT uses to help students prepare for certification exams is Certkingdom.com Certification Training. “We use the trouble-shooting component scenarios for students to give them real-life on-the-job experience: Say they are moving an office and need to set up computers. Students just log in and do the lab; it shows what they can do,” Jay said. “LabSim is a phenomenal experience for students.”

HTT will continue its program through September and is hoping to market it more widely to students and the community. As DeBrew says, “The IT field is huge! I’m a product of the Hybrid Training classes. It’s a birthplace for a new opportunity to build a rewarding career in the IT industry.”

Surprisingly, for a woman who pushes IT cert training, Jay doesn’t have any certifications. “I kind of designed my own job candidate certification,” she said. “It took years to perfect it.”

Jay is a deeply religious woman who credits all her successes to her best friend, Emmanuel (God with us), and she feels an obligation to do as much good as she can. Her motivation in utilizing IT training is to make a difference in people’s lives. “I really get excited when I put something IT-based out there,” she said with a wide smile, “and it helps turn someone’s life around.”

Wednesday, 25 November 2015

Exam 77-418 Word 2013

Exam 77-418 Word 2013

Published: February 28, 2013
Languages: English
Audiences: Information workers
Technology: Microsoft Office 2013 suites
Credit toward certification: MOS

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft
Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.


Create and manage documents
Create a document
Creating new blank documents, creating new documents using templates, importing files, opening non-native files directly in Word, opening a PDF in Word for editing
Navigate through a document
Searching for text within document, inserting hyperlinks, creating bookmarks, using Go To
Format a document
Modifying page setup, changing document themes, changing document style sets, inserting simple headers and footers, inserting watermarks, inserting page numbers
Customize options and views for documents
Changing document views, using zoom, customizing the quick access toolbar, customizing the ribbon, splitting the window, adding values to document properties, using show/hide, recording simple macros, assigning shortcut keys, managing macro security
Configure documents to print or save
Configuring documents to print, saving documents in alternate file formats, printing document sections, saving files to remote locations, protecting documents with passwords, setting print scaling, maintaining backward compatibility

Preparation resources
Basic tasks in Word 2013
Create your first Word 2013 document (training)
Move around in a document using the navigation pane

Format text, paragraphs, and sections

Insert text and paragraphs
Appending text to documents, finding and replacing text, copying and pasting text, inserting text via AutoCorrect, removing blank paragraphs, inserting built-in fields, inserting special characters
Format text and paragraphs
Changing font attributes, using find and replace to format text, using format painter, setting paragraph spacing, setting line spacing, clearing existing formatting, setting indentation, highlighting text selections, adding styles to text, changing text to WordArt, modifying existing style attributes
Order and group text and paragraphs
Preventing paragraph orphans, inserting breaks to create sections, creating multiple columns within sections, adding titles to sections, forcing page breaks

Preparation resources
Insert fields
Copy formatting using the format painter
Add a page break

Create tables and lists
Create a table
Converting text to tables, converting tables to text, defining table dimensions, setting AutoFit options, using quick tables, establishing titles
Modify a table
Applying styles to tables, modifying fonts within tables, sorting table data, configuring cell margins, using formulas, modifying table dimensions, merging cells
Create and modify a list
Adding numbering or bullets, creating custom bullets, modifying list indentation, modifying line spacing, increasing and decreasing list levels, modifying numbering

Preparation resources

Insert a table
Convert text to a table or a table to text
Change bullet style

Apply references

Create endnotes, footnotes, and citations
Inserting endnotes, managing footnote locations, configuring endnote formats, modifying footnote numbering, inserting citation placeholders, inserting citations, inserting bibliography, changing citation styles
Create captions
Inserting endnotes, managing footnote locations, configuring endnote formats, modifying footnote numbering, inserting citation placeholders, inserting citations, inserting bibliography, changing citation styles

Preparation resources
Add footnotes and endnotes
Create a bibliography

Insert and format objects
Insert and format building blocks
Inserting quick parts, inserting textboxes, utilizing building locks organizer, customizing building blocks
Insert and format shapes and SmartArt
Inserting simple shapes, inserting SmartArt, modifying SmartArt properties (color, size, shape), wrapping text around shapes, positioning shapes
Insert and format images
Inserting images, applying artistic effects, applying picture effects, modifying image properties (color, size, shape), adding uick styles to images, wrapping text around images, positioning images

Preparation resources
Quick parts
Change the color of a shape, shape border, or entire SmartArt graphic
Move pictures or clip art

Sunday, 15 November 2015

70-695 Deploying Windows Desktops and Enterprise Applications

70-695 Deploying Windows Desktops and Enterprise Applications
Published: January 23, 2015
Languages: English
Audiences: IT professionals
Technology: Windows 8.1, Windows Server 2012 R2
Credit toward certification: MCP, MCSE


Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

Implement the Operating System Deployment (OSD) infrastructure (21%)
Assess the computing environment
Configure and implement the Microsoft Assessment and Planning (MAP) Toolkit, assess Configuration Manager reports, integrate MAP with Microsoft System Center 2012 Configuration Manager, determine network load capacity
Plan and implement user state migration
Design considerations, including determining which user data and settings to preserve, hard-link versus remote storage, mitigation plan for non-migrated applications, and wipe-and-load migration versus side-by-side migration; estimate migration store size; secure migrated data; create a User State Migration Tool (USMT) package
Configure the deployment infrastructure
Configure Windows Deployment Services (WDS), install and configure Microsoft Deployment Toolkit (MDT), identify network services that support deployments, select Configuration Manager distribution points, support BitLocker
Configure and manage activation
Configure KMS, MAK, and Active Directory–based activation; identify the appropriate activation tool

Implement a Lite Touch deployment (18%)
Install and configure WDS
Configure unicast/multicast, add images to WDS, configure scheduling, restrict who can receive images
Configure MDT
Configure deployment shares, manage the driver pool, configure task sequences, configure customsettings.ini
Create and manage answer files
Identify the appropriate location for answer files, identify the required number of answer files, identify the appropriate setup phase for answer files, configure answer file settings, create autounattend.xml answer files

Implement a Zero Touch deployment (20%)
Configure Configuration Manager for OSD
Configure deployment packages and applications, configure task sequences, manage the driver pool, manage boot and deployment images
Configure distribution points
Configure unicast/multicast, configure PXE, configure deployments to distribution points and distribution point groups
Configure MDT and Configuration Manager integration
Use MDT-specific task sequences; create MDT boot images; create custom task sequences, using MDT components

Create and maintain desktop images (21%)
Plan images
Design considerations, including thin, thick, and hybrid images, WDS image types, image format (VHD or WIM), number of images based on operating system or hardware platform, drivers, and operating features
Capture images
Prepare the operating system for capture, create capture images using WDS, capture an image to an existing or new WIM file, capture an operating system image using Configuration Manager
Maintain images
Update images using DISM; apply updates, drivers, settings, and files to online and offline images; apply service packs to images; manage embedded applications

Prepare and deploy the application environment (20%)

Plan for and implement application compatibility and remediation
Planning considerations, including RDS, VDI, Client Hyper-V, and 32 bit versus 64 bit; plan for application version co-existence; use the Application Compatibility Toolkit (ACT); deploy compatibility fixes
Deploy Office 2013 by using MSI
Customize deployment, manage Office 2013 activation, manage Office 2013 settings, integrate Lite Touch deployment, re-arm Office 2013, provide slipstream updates
Deploy Office 2013 by using click-to-run (C2R)
Configure licensing, customize deployment, configure updates, monitor usage by using the Telemetry Dashboard


Monday, 2 November 2015

HP is now two companies. How did it get here?

HP's split follows more than a decade of scandals and missteps

If Hollywood wanted a script about the inexorable decline of a corporate icon, it might look to Hewlett-Packard for inspiration. Once one of Silicon Valley's most respected companies, HP officially split itself in two on Sunday, betting that the smaller parts will be nimbler and more able to reverse four years of declining sales.

HP fell victim to huge shifts in the computer industry that also forced Dell to go private and have knocked IBM on its heels. Pressure from investors compelled it to act. But there are dramatic twists in HP's story, including scandals, a revolving door for CEOs and one of the most ill-fated mergers in tech history, that make HP more than a victim of changing times.

HP isn't down and out: It could still confound skeptics and return some of its former glory. But the breakup is an inauspicious moment for a company that was once one of the tech industry's finest. Here are some of the events that got HP to where it is today.

The Compaq acquisition: Much has been said about HP’s 2001 buyout of its larger PC rival, and the story is back in the news thanks to then-CEO Carly Fiorina’s U.S. presidential campaign. Without getting bogged down in whether Carly made a huge error, it’s safe to say that the deal did not set HP up for the future. Dell’s direct sales model was about to turn the industry on its head, and tablets and smartphones would deal a blow from which PCs have never recovered. HP bet big on a losing horse.

The pretexting scandal: You want a movie script? In 2006, HP admitted it had hired private investigators who spied on its own board members to figure out who was leaking company information to journalists. Criminal charges against HP executives were eventually dropped, but it cost the jobs of board chair Patricia Dunn and several other top staff. It was an embarrassing distraction at a time when HP needed to get down to business.

The EDS purchase: Buying a big IT services company in 2008 looked like a smart way for HP to diversify into more profitable areas, but HP “never unlocked the value from the deal they were looking for,” says IDC analyst Crawford Del Prete. Soon after, the market turned from large outsourcing deals to smaller contracts, and HP was riding the wrong horse again. Its services business continues to struggle.

Mark Hurd scandal: Like Fiorina, Hurd is a divisive figure for HP watchers. What's undeniable is that his relationship with R-rated movie actress Jodie Fisher cost him his job and kicked off a disastrous string of events for HP. More contentious is whether Hurd’s rampant cost-cutting stunted innovation and set HP up to fail. Del Prete doesn’t see it that way: Hurd slashed expenses, was adored by Wall Street, and probably would have reinvested some of those savings in the long term, he says. Regardless, his ouster kicked off the most damaging period in HP’s history. Hurd was forced to resign, ostensibly over an inaccurate expense report. If only his successor's missteps had been so trivial.

Leo Apotheker. Oh Leo, what were you thinking? Or maybe that’s a question for HP’s board. The former SAP chief took over from Hurd in September 2010 and managed to do a lot of damage before his ouster 11 months later. "He was really a software sales and marketing executive," says Del Prete. "He had a hammer and everything became a nail." Among the highlights of his tenure:

The Autonomy debacle: The New York Times has called it “the worst corporate deal ever,” and it’s hard to argue it didn’t contribute mightily to HP’s woes. HP shelled out $11.1 billion for the U.K. software maker and took a write-down of $8.8 billion the following year, effectively admitting that it had drastically overpaid. HP claims it was hoodwinked by Autonomy's management, and lawsuits are ongoing, but there’s evidence that HP rushed the deal without knowing what it was getting into. It was another big distraction for HP and gave more ammunition to investors who wanted change at the company.

The PC blunder: At the same time it bought Autonomy, Apotheker announced that HP was considering a sale of its PC division. It wasn’t a terrible idea — IBM did the same and hasn’t looked back — but dithering about it in public for many months caused uncertainty that hurt HP’s business and helped its rivals.Apotheker also killed off HP's webOS smartphones and tablets, which HP gained when it bought Palm for $1 billion a year earlier. At a time when smartphones were the hottest item in tech, it was a curious decision, to say the least.

Revolving doors: Before a year was up, HP’s board had had enough and Apotheker was replaced by Meg Whitman, the company's third CEO in 13 months. Her first move: announcing that HP would keep its PC division after all. Whitman seemed an unlikely choice after her 10 years running Ebay, but she's won praise for making the best of a tough assignment.

Cloud confusion: It's an open question whether an enterprise IT company needs its own public cloud, but it's now clear that HP won't have one. It said a few weeks ago it will shut down its Helion cloud services in January, and focus instead on "hybrid" infrastructure and partnering with other cloud providers. HP's public cloud was another initiative started by Apotheker, though one wonders if HP couldn't have done a bit more with it after four years of effort.

None of these events alone landed HP where it is today. The move to cloud computing and collapsing PC market played a role, along with the ongoing decline in proprietary high-end Unix systems. The failure of Intel’s Itanium processor, on which HP bet the farm in systems, was also a major setback.

Despite all the missteps, the two HPs remain formidable entities, each with some $50 billion in revenue. HP Inc., which will sell PCs and printers, is unlikely to produce much growth, but the PC business can generate a good amount of cash, as Michael Dell has proved. And the core infrastructure business of Hewlett-Packard Enterprise has "never been executing better," according to IDC's Del Prete, who pointed to its 3Par storage gear and industry-standard servers.

"We don't see customers being at risk from the split," he said, meaning IDC isn't advising HP customers to shop around.

What matters, he says, is whether Hewlett-Packard Enterprise can make the right acquisitions and partnerships over the next 24 months to bring back some growth.


Best HP Certification Training and HP Exams Training  and more Cisco exams log in to Certkingdom.com

Thursday, 29 October 2015

Exam 70-694 Virtualizing Enterprise Desktops and Apps

Exam 70-694 Virtualizing Enterprise Desktops and Apps

Published: January 8, 2015
Languages: English
Audiences: IT professionals
Technology Windows 8.1, Windows Server 2012 R2, Microsoft Intune
Credit toward certification: MCP, Microsoft Specialist

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area on the exam. The higher the percentage, the more questions you are likely to see on that content area on the exam. View video tutorials about the variety of question types on Microsoft exams.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

Do you have feedback about the relevance of the skills measured on this exam? Please send Microsoft your comments. All feedback will be reviewed and incorporated as appropriate while still maintaining the validity and reliability of the certification process. Note that Microsoft will not respond directly to your feedback. We appreciate your input in ensuring the quality of the Microsoft
Certification program.

If you have concerns about specific questions on this exam, please submit an exam challenge.

Plan app virtualization (27%)

Design an app distribution strategy
Design considerations, including impact on clients, offline access, deployment infrastructure, and remote locations; plan for updates to apps
Plan and implement app compatibility
Configure and implement Microsoft Assessment and Planning (MAP) Toolkit; planning considerations, including Remote Desktop Services (RDS), Virtual Desktop Infrastructure (VDI), client Hyper-V, and Application Compatibility Toolkit (ACT); plan for application version co-existence
Update apps in desktop images
Configure online servicing, apply patches offline, configure offline virtual machine (VM) servicing, update Microsoft Deployment Toolkit (MDT) task sequences

Implement app virtualization (25%)
Configure App-V
Configure a new application, configure a Connection Group, configure App-V reporting on the client, create a report for App-V
Deploy App-V clients
Install and test the App-V client; configure the App-V client; configure the App-V client, by using Group Policy
Configure apps sequencing
Install the App-V Sequencer, deploy sequenced apps, update sequenced apps, publish Office 2013 and Sequencing Add-On for Word 2013, deploy connected apps

Plan and implement virtual desktops (21%)
Plan for pooled and personal desktops
Planning considerations, including shared storage, network, Storage Spaces, and scale-out file servers; plan capacity
Implement virtual desktop collections
Configure collections type, VM creation, and user assignments; configure client settings; configure Active Directory permissions
Plan and implement Remote Desktop Services (RDS)
Install and configure Remote Desktop Session Host, install and configure the Remote Desktop Web Access (RD Web Access) role, configure the Remote Desktop Connection Broker (RD Connection Broker) for the Remote Desktop Session Host, perform capacity analysis
Create and configure remote applications
Prepare Remote Desktop Session Hosts for application installation; configure RemoteApp properties; create a RemoteApp distribution file (MSI or RDP); sign packages with certificates; implement application version co-existence, by using RD Web Access; configure file extension associations
Deploy and manage remote applications
Configure RemoteApp and Desktop Connections settings, configure GPOs for signed packages, configure RemoteApp for Hyper-V, export and import RemoteApp configurations, deploy a RemoteApp distribution file (MSI or RDP)

Plan and implement business continuity for virtualized apps (27%)
Plan and implement a resilient Remote Desktop infrastructure
Design highly available RD Web Access, RD Connection Broker, and Remote Desktop Gateway; perform backup and recovery of the Remote Desktop Licensing server; configure VM or dedicated farm redirection
Plan and implement business continuity for virtual desktops
Design and implement Hyper-V Replica with Hyper-V Replica Broker, design and implement business continuity for personal and shared desktop collections
Plan and implement a resilient virtual app delivery infrastructure
Plan and implement highly available App-V data store and management server; implement pre-populated/shared cache App-V functionality for the VDI environment; implement highly available content share; implement a branch office strategy, using App-V; manage VM backups



Tuesday, 13 October 2015

70-332 Advanced Solutions of Microsoft SharePoint Server 2013

QUESTION 01
You need to ensure that the developers have the necessary permissions to meet the BCS model
requirements. What should you do?

A. Grant Edit permissions to the developers by using the Set Object Permissions option.
B. Grant Execute permissions to the developers by using the Set Object Permissions option.
C. Grant Edit permissions to the developers by using the Set Metadata Store Permissions option.
D. Grant Execute permissions to the developers by using the Set Metadata Store Permissions
option.

Correct Answer: C

QUESTION 02
You need to configure Excel Services. What should you do?

A. Add a trusted file location to the Certkingdom360 site.
B. Add each user as a Viewer.
C. Add each user as a Contributor.
D. Add a trusted data connection library to the Certkingdom360 site.

Correct Answer: A

QUESTION 56
You need to configure the BCS model to access data. What should you do?

A. Create an external content type and enter the target application friendly name in the Secure
Store Application ID field
B. Create an external content type and enter the target application ID in the Secure Store
Application ID field.
C. Create an external content type and choose the Connect with impersonated custom identity
option. Enter the target application friendly name of the Secure Store target application.
D. Create an external content type and choose the Connect with user's identity option.

Correct Answer: B

QUESTION 03
You need to meet the site availability requirements. What should you do?

A. Configure each web server as a node of a Network Load Balancing (NLB) cluster.
B. Create an alternate access mapping entry for each server
C. Create client-side host entries to point to specific servers.
D. Create Request Management rules to route traffic to each server.

Correct Answer: A

Friday, 9 October 2015

70-247 Configuring and Deploying a Private Cloud with System Center 2012

QUESTION 1
You have a System Center 2012 Virtual Machine Manager (VMM) infrastructure that contains a
server named Server1. Server1 hosts the VMM library. You add a server named Server2 to the
network. You install the Windows Deployment Services (WDS) server role on Server2. You have the
Install.wim file from the Windows Server 2008 R2 Service Pack 1 (SP1) installation media. You need
to install Hyper-v hosts by using the bare-metal installation method. What should you do first?

A. Add Install.wim to the VMM library.
B. Convert Install.wim to a .vhd file.
C. Convert Install.wim to a .vmc file.
D. Add Install.wim to the Install Images container.

Answer: B


QUESTION 2
You have a System Center 2012 Virtual Machine Manager (VMM) infrastructure that contains a
visualization host named Server2. Server2 runs Windows Server 2008 R2 Service Pack 1 (SP1).
Server2 has the Hyper-V server role installed. You plan to deploy a service named Service1 to
Server2. Service1 has multiple load-balanced tiers. You need to recommend a technology that must
be implemented on Server2 before you deploy Service1. What should you recommend?

A. MAC address spoofing
B. the Network Policy and Access Services (NPAS) server role
C. TCP Offloading
D. the Multipath I/O (MPIO) feature

Answer: A


QUESTION 3
Your network contains a server named Server1 that has System Center 2012 Virtual Machine
Manager (VMM) installed. You have a host group named HG1. HG1 contains four virtualization
hosts named Server2, Server3, Server4, and Servers. You plan to provide users with the ability to
deploy virtual machines by using the Self-Service Portal. The corporate management policy states
that only the members of a group named Group1 can place virtual machines on Server2 and
Server3 and only the members of a group named Group2 can place virtual machines on Server4
and Server5. You need to recommend a cloud configuration to meet the requirements of the
management policy. What should you recommend?

A. Create two clouds named Cloud1 and Cloud2. Configure the custom properties of each cloud.
B. Create a host group named HG1\HG2. Create one cloud for HG1 and one cloud for HG2. Move
two servers to HG2.
C. Create two clouds named Cloud1 and Cloud2. Configure placement rules for HG1.
D. Create two host groups named HG1\Group1 and HG1\Group2. Create one cloud for each new
host group. Move two servers to each host group.

Answer: D


QUESTION 4
Your company has a private cloud that contains 200 virtual machines. The network contains a
server named Server1 that has the Microsoft Server Application Virtualization (Server App-V)
Sequencer installed. You plan to sequence, and then deploy a line-of-business web application
named App1. App1 has a Windows Installer package named Install.msi. App1 must be able to store
temporary files. You need to identify which task must be performed on Server1 before you deploy
App1. What task should you identify?

A. Modify the environment variables.
B. Add a script to the OSD file.
C. Compress Install.msi.
D. Install the Web Server (IIS) server role.

Answer: D
QUESTION 174
Your company has three datacenters located in New York, Los Angeles and Paris. You deploy a
System Center 2012 Virtual Machine Manager (VMM) infrastructure. The VMM infrastructure
contains 2,000 virtual machines deployed on 200 Hyper-V hosts. The network contains a server
named DPM1 that has System Center 2012 Data Protection Manager (DPM) installed.
You need to recommend a solution for the infrastructure to meet the following requirements:
* Automatically backup and restore virtual machines by using workflows.
* Automatically backup and restore system states by using workflows.
What should you include in the recommendation? (Each correct answer presents part of the
solution. Choose two.)

A. Deploy System Center 2012 Orchestrator.
B. Install the Integration Pack for System Center Virtual Machine Manager (VMM).
C. Install the Integration Pack for System Center Data Protection Manager (DPM).
D. Deploy System Center 2012 Operations Manager.
E. Deploy System Center 2012 Service Manager.

Answer: AB


QUESTION 5
You are the datacenter administrator for a company named CertKingdom, Ltd. The network contains a
server that has System Center 2012 Virtual Machine Manager (VMM) installed. You create four
private clouds. Developers at CertKingdom have two Windows Azure subscriptions. CertKingdom creates a
partnership with another company named A.Datum. The A.Datum network contains a System
Center 2012 Virtual Machine Manager (VMM) infrastructure that contains three clouds.
Developers at A.Datum have two Windows Azure subscriptions. You deploy System Center 2012
App Controller at A.Datum. You plan to manage the clouds and the Windows Azure subscriptions
for both companies from the App Controller portal. You need to identify the minimum number of
subscriptions and the minimum number connections required for the planned management. How
many connections and subscriptions should you identify?

A. Two connections and four subscriptions
B. Two connections and two subscriptions
C. Four connections and four subscriptions
D. Eight connections and four subscriptions
E. Four connections and two subscriptions

Answer: A


QUESTION 6
Your network contains an Active Directory forest named CertKingdom.com. The forest contains a System
Center 2012 Operations Manager infrastructure. Your company, named CertKingdom, Ltd., has a partner
company named
A. Datum Corporation. The
A. Datum network contains an Active Directory forest
named adatum.com. Adatum.com does not have any trusts. A firewall exists between the
A. Datum
network and the CertKingdom network. You configure conditional forwarding on all of the DNS servers
to resolve names across the forests. You plan to configure Operations Manager to monitor client
computers in both of the forests. You need to recommend changes to the infrastructure to monitor
the client computers in both of the forests. What should you include in the recommendation? (Each
correct answer presents part of the solution. Choose two.)

A. Allow TCP port 5723 on the firewall.
B. Deploy a gateway server to adatum.com.
C. Create a DNS zone replica of adatum.com.
D. Allow TCP port 5986 on the firewall.
E. Create a DNS zone replica of CertKingdom.com.
F. Deploy a gateway server to CertKingdom.com.

Answer: AB

Tuesday, 22 September 2015

Microsoft has built software, but not a Linux distribution, for its software switches

A Microsoft Linux distribution would be remarkable, but Redmond says it doesn't have one.

Late last week, hell had apparently frozen over with the news that Microsoft had developed a Linux distribution of its own. The work was done as part of the company's Azure cloud platform, which uses Linux-based network switches as part of its software-defined networking infrastructure.

While the software is real, Microsoft isn't characterizing it as a Linux distribution, telling us that it's an internal project. That's an important distinction, and we suspect that we're not going to see a Microsoft Linux any time soon.

The Open Compute Project (OCP), of which Microsoft is a member, is an industry group that is working together to define hardware and software standards for data center equipment. This includes designs for high-density compute nodes, storage, and networking equipment. One part that Microsoft has been working on is network hardware, in particular, software-defined networking (SDN). SDN adds a layer of software-based programmability, configuration, and centralized management to hardware that is traditionally awkward to manage. Traditional network switches, even managed ones, aren't designed to enable new policies—alterations to quality-of-service or VLANs, say—to be deployed to hundreds or thousands of devices simultaneously. And to the extent that such capabilities are present, they vary from vendor to vendor.

Earlier this year, Microsoft, Dell, Mellanox, Facebook, Broadcom, and Intel contributed a specification, the Switch Abstraction Interface (SAI), that provides a common API that can span the wide range of ASICs (application-specific integrated circuits—chips tailored to handle very specific workloads, in this case, handling Ethernet frames) used in software-defined switch hardware. The SAI API is, in principle, cross-platform, defined for both Windows and Linux, but much of the switch hardware is supported best, or even exclusively, in Linux. A Linux distribution to support these applications, Open Network Linux, has even been developed.

The Azure Cloud Switch, which is what Microsoft announced on Friday, is Redmond's software-defined switch. It builds on the SAI API to enable it to work with switch hardware from many different vendors; in August, an ACS switch using six different vendors' switch ASICs was demonstrated. ACS is built on top of a Linux SAI implementation, and it uses Linux drivers for the switch ASICs.

Given Linux's dominance in this area, it's at once both surprising and unsurprising that ACS uses Linux. Unsurprising because there's little practical alternative for this situation; surprising because Microsoft is still assumed to have some degree of hostility toward Linux. The company today would tell you that this hostility is a thing of the past. Microsoft would say today it's willing to use the best tool for the job and work to ensure that its software is available on the platforms that people need it on. With this new, more pragmatic Microsoft, the use of Linux should be expected. And accordingly, Microsoft says that it is using this software in its own datacenters. Microsoft has publicly used non-Windows infrastructure before—some Skype infrastructure initially used Linux, for example, and Hotmail ran on FreeBSD when it was bought—but this is nonetheless unusual, as it's new Microsoft development, not a bought-in project.

So why isn't the company calling this new endeavor a distribution? The big reason is that the company doesn't intend to distribute it. Again, it's an internal development that showcases the OCP approach, but it isn't a package that will be given to third parties.

Microsoft's diagram describing ACS might also be significant; the Microsoft components are a set of applications and services that sit above SAI; that's a chunk of software, but everything else could be taken from an off-the-shelf Linux distribution (Microsoft hasn't specified). Another confounding factor could be the various switch ASIC components. Each vendor's ASICs have their own drivers and SDKs, and at least some of these are not open source. This would make it difficult to build a Linux distribution around them.

As such, hell likely remains toasty and warm, and Microsoft won't be in the Linux distribution business any time soon. But equally, it's clearer than ever that this isn't the Microsoft of the 2000s. If Linux is the best tool for the job, Microsoft is willing not only to use it, but to tell the world that it's doing so.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Wednesday, 2 September 2015

Microsoft and VMware cozy up, forgoing past rivalry

The companies have worked together on a new device management initiative

Microsoft's new, more collaborative approach to the computing industry was on display at VMware's annual conference in San Francisco Tuesday, when executives from both companies shared the stage to talk about new device management features in Windows 10.

As VMware Executive Vice President Sanjay Poonen explained, VMware and Microsoft, historically fierce rivals, have been working together more closely under the leadership of Satya Nadella. That work has now borne fruit in the form of Project A2, a new service that brings together VMware's AirWatch device management service and its App Volumes application delivery technology. Using Project A2, Windows 10 users can log in to their corporate account, get their device set up for use with a company's resources and then get all the applications they need provided straight from IT.

Project A2 is made possible by new tools in Windows 10 that make it easier for IT professionals to provision devices and ensure that they comply with company policy. Microsoft makes use of that with its own device management services, but has also made them available to companies like VMware.

The appearance of Microsoft Corporate Vice President Jim Alkove at VMworld is a significant move that Poonen didn't let go unnoticed. He told the crowd that people backstage at the conference had compared the appearance to Mikhail Gorbachev and Ronald Reagan working together.

"I think you're the tall Reagan, and I'm the Indian version of Gorbachev," Poonen joked.

Microsoft is singing a very different tune from the position it took last year. During VMworld 2014, Corporate Vice President Brad Anderson took to his blog to discuss everything he thought VMware got wrong with AirWatch and why people should use Microsoft's management tools. (He hasn't yet published anything relating to VMworld this year.)

The charm offensive from Alkove is part of Microsoft's push to get businesses to adopt Windows 10. The company said last week that 1.5 million devices are already running the enterprise edition of its new operating system, and the company said that it plans to have 1 billion devices running Windows 10 within 3 years. Getting businesses to bring their deployments into the next generation is key for the company's ambitions.

It's also another sign of how the Redmond-based tech giant, under Nadella, is playing nicer with companies that it would have treated more harshly in the past. Microsoft has also doubled down on building out its services for non-Windows platforms, and is working better with companies like Salesforce.com that compete with it.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Tuesday, 25 August 2015

Google now displaying tweets in desktop search

The integration began earlier this year with mobile devices.

A partnership between Google and Twitter that has placed tweets in Google search results on mobile devices since earlier this year has now been expanded to the desktop.

Relevant tweets will appear in desktop results for queries performed in English. The search doesn’t need to include the term “twitter” or twitter hashtags -- if there are tweets that Google thinks are relevant, it will surface them anyway.

On Friday, for instance, a search for “President Obama” returned recent tweets from Obama’s Twitter account near the top of the page, below a few news articles.

The tweets that appear will include photos and links that may have been contained in the tweet.

Google has provided links to tweets in its search results for a long time, but showing the actual tweets could potentially give a boost to Twitter at a time when it’s struggling to add new users.

Google noted the expansion on Friday in an update to its earlier announcement around the mobile rollout.

The company has said it will make the feature available in other languages besides English.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Tuesday, 18 August 2015

Google pushes back Project Ara testing to 2016

The company plans to test the device in the U.S.

Google is delaying initial testing for its modular smartphone, known as Project Ara, to 2016.

The company plans to test the device in the U.S., according to several tweets posted Monday by the Project Ara team. Neither the exact location nor precise timing of the tests was given.

The Project Ara smartphone is designed to let users easily swap out its components.

The idea is that users purchase the hardware modules, like processors and sensors, themselves and snap them together to create a customized smartphone. In so doing, users could improve their device on their own terms, rather than buying a new phone outright.

Google had planned to commence initial testing in Puerto Rico this year, though those plans were scrapped as part of a "recalculation," announced last week.

The hastag #Yeswearelate was affixed to one of the tweets on Monday.

Google did not immediately respond to comment further.


Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


Tuesday, 4 August 2015

SanDisk, Toshiba double down, announce the world's highest capacity 3D NAND flash chips

Toshiba's BiCS technology stacks 48 layers of microscopic NAND layers atop one another, vastly increasing memory density. Credit: Toshiba

The new 3D NAND chip is designed for wide use in consumer, client, mobile and enterprise products

SanDisk and Toshiba announced today that they are manufacturing 256Gbit (32GB), 3-bit-per-cell (X3) 48-layer 3D NAND flash chips that offer twice the capacity of the next densest memory.

The two NAND flash manufacturers are currently printing pilot the 256Gb X3 chips in their new Yokkaichi, Japan fabrication plant. They are expecting to ship the new chips next year.

Last year, Toshiba and SanDisk announced their collaboration on the new fab wafer plant, saying they would use the facility exclusively for three dimensional "V-NAND" NAND flash wafers.

At the time of the announcement, the companies reported the collaboration would be valued at about $4.84 billion when construction of the plant and its operations were figured in.

In March, Toshiba announced the first 48-layer 3D V-NAND chips; those flash chips held 128Gbit (16GB) of capacity.

The new 256Gbit flash chip, which uses 15 nanometer lithography process technology, is suited for diverse applications, including consumer SSDs, smartphones, tablets, memory cards, and enterprise SSDs for data centers, the companies said.

Based on a vertical flash stacking technology that the companies call BiCS [Bit Cost Scaling], the new flash memory stores three bits of data per transistor (triple-level cell or TLC), compared to the previous two-bit (multi-level cell or MLC) memory Toshiba had been producing with BiCS.

"This is the world's first 256Gb X3 chip, developed using our industry-leading 48-layer BiCS technology and demonstrating SanDisk's continued leadership in X3 technology. We will use this chip to deliver compelling storage solutions for our customers," Siva Sivaram, SanDisk's executive vice president for memory technology, said in a statement.
sandisk nand manufacturing image2

SanDisk and Toshiba's fab operations in Yokkaichi, Japan where the new 48-layer 3D V-NAND chip is being produced.

Last year, Samsung became the first semiconductor manufacturer to begin producing 3D NAND. Its V-NAND chip provides two to 10 times higher reliability and twice the write performance, according to Samsung.

Samsung's V-NAND uses cell structure based on 3D Charge Trap Flash (CTF) technology. By applying the latter technologies, Samsung's 3D V-NAND can provide more than twice the scaling of today's 20nm-class planar NAND flash.

Samsung is using its 3D V-NAND for a wide range of consumer electronics and enterprise applications, including embedded NAND storage and solid-state drives (SSDs). Samsung's 3D NAND flash chips were used to create SSDs with capacities ranging from 128GB to 1TB.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Wednesday, 29 July 2015

Amazon proposes drone superhighways in sky

Amazon has unveiled a bold vision for integrating drones into the skies above our cities, proposing drone superhighways that would crisscross the sky and enable thousands of unmanned vehicles to fly at high speeds under completely automated control.

The proposal, delivered at a key industry conference in Silicon Valley on Tuesday, received a cautious welcome from at least one regulator and is the latest move in a back-and-forth between U.S. government regulators and private companies eager to make money off drones.

“It’s really a call for action,” said Gur Kimchi, co-founder of Amazon Prime Air. “We need to come together as an industry, both public and private, NASA and Amazon, many other companies here.”

The proposal sees airspace below 500 feet, which is currently largely unregulated but off limits to drones, divided into three distinct bands. From the ground up to 200 feet would be dedicated to low-speed operations, including hobbyists, photographers, agricultural users and others. Drones here would be under manual or automatic control.

A band from 200 feet to 400 feet would be for high-speed operation and exclusively under automatic control. Drones would need to be capable of sharing information about their location, flight path and receiving and processing data from others in the area to avoid collisions.

The final band, between 400 feet and 500 feet would be a no-fly zone, intended to provide a buffer between drone aviation and regulated airspace.

“We feel this is a safe and scalable approach,” said Kimchi.

The plan advances proposals for integrating drones into the airspace and, if adopted, would be advantageous for Amazon. It would provide a much simpler environment for Amazon’s proposed Prime Air drones to zip around cities and accomplish their promised task of delivering goods in 30 minutes or less.

At present, the Federal Aviation Administration is allowing limited drone use by companies, but all flights are restricted to line-of-sight. That means delivery operations are impractical under current rules. Amazon’s proposal for highly automated flight would allow beyond line-of-sight, which is essential for Prime Air.

The proposals were delivered at a conference at NASA’s Ames Research Center, which is working on next-generation air traffic control management systems. The audience included many in the drone industry and representatives from regulators including the FAA.

“They really have done careful thinking,” NASA Associate Administrator Jaiwon Shin told IDG News Service, calling the approach fairly reasonable, very practical, and something that all parties can work together to implement.

The proposal was also welcomed by Brian Wynne, president of the Association of Unmanned Vehicle Systems, the biggest trade group for the drone industry.

“It’s challenged the industry, it’s challenged the community to look at this in a slightly different way,” Wynne said. “I think it will pull people together.”

But whatever Amazon or the industry proposes, it still needs government acceptance.

“At the end of the day, the FAA regulates the airspace, so we have to come together and develop things that the FAA can adopt,” said Wynne.

Best CCNA Training and CCNA Certification and more Cisco exams log in to Certkingdom.com

Sunday, 12 July 2015

Five smartphones to look forward to

If you’re planning to buy a new smartphone this year, but haven’t bought one yet it might be better to wait a bit longer: Apple, Samsung Electronics and OnePlus are all expected to launch new models in the next couple of months.

Here are some of the models you should see during the second half of the year:


OnePlus 2

MORE: 10 mobile startups to watch

While most of the products on this list (and their specs) are just rumors, Chinese smartphone maker OnePlus has been busy detailing its 2 model, which will be launched on July 27.

So far, OnePlus has revealed the phone will have a fingerprint sensor and be powered by Qualcomm’s Snapdragon 810. The company is using an upgraded version of the processor, v2.1, that isn’t susceptible to the overheating issues that the first version reportedly suffered from, it said.

OnePlus has also said the 2 will be the first high-end smartphone with a USB-C port, which is meant to be an all-in-one solution for power, video, and data delivery using a single cable with a reversible connector. There are already laptops that use the technology.

Some things OnePlus is still keeping some things under wraps, including what the 2 will look like and cost.



Fairphone 2
Just like OnePlus, Dutch company Fairphone has started to build some hype for its second product. The goal is to build a smartphone that won’t easily break and can be easily repaired.

Hardware specs include a Qualcomm Snapdragon 801 processor and a 5-inch, Full HD screen. The camera has an 8-megapixel resolution and there is 32GB of storage that can be expanded using a microSD card. The LTE smartphone also has 2GB of RAM and two SIM slots. The operating system will be Android 5.1.

The Fairphone 2 will be available for pre-order before the end of August, and then ship during the following couple of months.



Samsung Galaxy Note 5
A new Galaxy Note model arriving during the second half of the year has become a bit of a tradition. A launch at the IFA trade show in the beginning of September looks likely. With the fifth version Samsung needs to step up its game if it wants to compete more successfully with Apple’s iPhone 6 Plus, the upgrade of which before the end of the year is also a forgone conclusion.

Anticipated improvements include a new design that follows in the footsteps of the Galaxy S6. The Note 4 was with its metal frame and plastic back was a step in the right direction. But the metal frame and glass back on the S6 looks classier Another reported upgrade is a screen that’s slightly larger than the Note 4’s 5.7-inch display, with a 2K or 4K resolution.


LG G4 Pro
Launching a high-end smartphone during the second half of the year would be a departure for LG. That strategy has worked well for Samsung with the Galaxy Note family, so LG might want to emulate that to boost sales instead of just relying on dropping the price tag of the G4.

The G4 Pro is rumored to have some really impressive specs, including a 5.8-inch, 1440 by 2560 pixel screen, a 27-megapixel main camera, 4GB of RAM and Qualcomm’s Snapdragon 820 processor.

Most of the parts to build a phone with those specs are shouldn’t cause LG much of a problem. The big question mark is whether the Snapdragon 820 will be ready for use in a smartphone before the end of the year. LG was the first to announce smartphones powered by the Snapdragon 808 and the 810, so the company is a likely candidate to be among the first to get its hands on the new model.


Apple iPhone 6s and 6s Plus
The iPhone 6 and 6 Plus with its bigger screens have been unmitigated successes. The challenge for the company this year will be to come up with upgrades to continue to build on that success.

Cameras are one aspect the company is expected to focus on with the iPhone 6s and 6s Plus. Upgrading the current 1.2-megapixel front camera makes a lot of sense since competing products launched this year have at least 5-megapixel cameras. To what extent an upgrade of the main camera to a reported 12-megapixel resolution will result in better image quality remains to be seen. The new models are anticipated to have a faster processor, more RAM and a speedier LTE connection.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Thursday, 25 June 2015

Preparing for your Windows Server upgrade

It’s time to say goodbye to Windows Server 2003. Getting through the migration requires not just Windows expertise, but knowledge of your app portfolio

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

f you’ve been clinging to Windows Server 2003 trying to ignore the fact that Microsoft will officially end support July 14, 2015, you’re playing with fire. One the updates stop, you’ll be exposed to troubling security and compliance risks. Take note that in 2013 alone, 37 updates were issued by Microsoft for Windows Server 2003/R2.

Yet upgrading servers is a resource challenge as well as a mindset issue. The top barrier for migration, according to a survey, is the belief that existing systems are working just fine, and many users worry about software incompatibility.

The actual migration process to Windows Server 2008 or 2012 (the likely choices) is straightforward and well-documented, and most Windows engineers can easily learn how to work in a new OS. The complexity lies in determining if and how business applications will successfully transition to the new platform, and which ones will need to be replaced or shuttered.

Some IT shops will find they simply don’t have time to undergo this rigorous process. External service providers can help. Even if you have a sizable IT staff, you’ll need to consider whether it’s a worthwhile use of a senior engineer’s time to work on server migrations, compared with other high-priority projects. Regardless of your approach – internally or externally managed – here are some steps for working through a successful move away from Windows Server 2003.

1. It is often surprising what midsize and large companies don’t know about their internal IT systems. It’s critical to identify how many servers you have, where they’re located, and what OS and applications they’re running. That gives insight into how many servers and which applications are at risk. Asset management software can help by updating this information continually, saving crucial time in the analysis. Don’t forget to document what security systems are in place on servers, networks and applications.

2. It’s important to work closely with business unit heads to communicate why and when the migration is happening and any expected changes to their applications. Determine what IT specialists you need (including database and application managers) and if you can free them up for the migration or if you’ll need outside help.

3. Most companies will likely opt for Windows Server 2012, simply because it will last longer and it’s the latest version. Yet whether this is feasible or not depends upon your applications. If a critical application or two aren’t compatible with or don’t have a near-term upgrade path to your desired OS, you’ve got the decision to replace it or retire it. Work closely with application vendors to understand if and when they will issue an updated version, keeping in mind that promises don’t always pan out.

An application might also require running on a 32-bit version of the software. While both 2008 and 2012 offer 32-bit versions, this will cut performance. We’ve seen at least one case in which a company had to undergo two upgrades for a particular application – from 2003 to 2008 and finally to 2012 because the application vendor was not ready for 2012. Knowing these factors ahead of time makes all the difference as you plan for migration.

4. A positive outcome of being forced into migration (other than getting a better and faster OS) is that it’s the perfect time to push for a change in strategy. Most IT organizations will need to replace their hardware to install 2008 or 2012, yet there’s also the question of whether your company should continue owning equipment at all. Companies of all sizes and sectors are looking harder at hosted and cloud environments, which reduces daily IT support for standard processes such as server maintenance. For those companies still worried about security and compliance, a co-location arrangement at a nearby data center can reduce some of the risk and cost of maintaining hardware on site. Managed services allows your staff to focus on initiatives that add real value to the business, rather than maintaining systems.

5. For a midsize to large company with dozens of servers and hundreds of applications, sorting out a migration plan can be overwhelming. Here’s a simple way to look at it. First, you’ll want to move any customer facing apps and public websites, since they present the greatest potential damage to your business if impaired or hacked. Next, begin the process of migrating applications with compatibility problems and which require customization or upgrades, as they’ll take the longest time to prepare. In parallel, migrate the easy to move applications. These are the ones which are already primed to run on an upgraded operating system or can be upgraded quickly.

Technically, this is a straightforward process once you tackle all the previous challenges. However, server migration is not just a technical project. You’ll need people to help with coordination and communication with the business, project management and support. You’ll of course want to test the applications on the new servers before retiring the old ones. Backups are absolutely critical.

What if, despite your best efforts, you find yourself in no man’s land, past the deadline, and your environment is still not fully transitioned to the new server platform? To mitigate security and reliability risks, ensure that all applications which are exposed to the Internet are fully encrypted and that all servers are also locked down. You’ll need to invest more time monitoring applications that remain on 2003, watching for potential breaches or suspicious behavior.

If you’ve not already started on a Windows Server 2003 migration plan, don’t wait another minute, but don’t panic either. There’s a world of experienced consultants and providers out there ready to help you complete a successful upgrade and keep your business running smoothly.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


Saturday, 20 June 2015

Microsoft needs SDN for Azure cloud

Microsoft needs SDN for Azure cloud

Couldn't scale without it, Azure CTO says
The Microsoft cloud, through which the company’s software products are delivered, has 22 hyper-scale regions around the world. Azure storage and compute usage is doubling every six months, and Azure lines up 90,000 new subscribers a month.

Six TED Talks that can change your career
Of the hundreds of TED talks available online, many are geared toward helping people view life in a new

Fifty-seven percent of the Fortune 500 use Azure and the number of hosts quickly grew from 100,000 to millions, said CTO Mark Russinovich during his Open Network Summit keynote address here this week. Azure needs a virtualized, partitioned and scale-out design, delivered through software, in order to keep up with that kind of growth.

“When we started to build these networks and started to see these types of requirements, the scale we were operating at, you can’t have humans provisioning things,” Russinovich said. “You’ve got to have systems that are very flexible and also delivering functionality very quickly. This meant we couldn’t go to the Web and do an Internet search for a scalable cloud controller that supports this kind of functionality. It just didn’t exist.”

Microsoft wrote all of the software code for Azure’s SDN. A description of it can be found here.
Microsoft uses virtual networks (Vnets) built from overlays and Network Functions Virtualization services running as software on commodity servers. Vnets are partitioned through Azure controllers established as a set of interconnected services, and each service is partitioned to scale and run protocols on multiple instances for high availability.

Controllers are established in regions where there could be 100,000 to 500,000 hosts. Within those regions are smaller clustered controllers which act as stateless caches for up to 1,000 hosts.
Related

Why is Microsoft killing off Internet Explorer?
Microsoft builds these controllers using an internally developed Service Fabric for Azure. Service Fabric has what Microsoft calls a microservices-based architecture that allows customers to update individual application components without having to update the entire application.

Microsoft makes the Azure Service Fabric SDK available here.
Much of the programmability of the Azure SDN is performed on the host server with hardware assist. A Virtual Filtering Platform (VFP) in Hyper-V hosts enable Azure’s data plane to act as a Hyper-V virtual network programmable switch for network agents that work on behalf of controllers for Vnet and other functions, like load balancing.

Packet processing is done at the host where a NIC with a Field Programmable Gate Array offloads network processing from the host CPU to scale the Azure data plane from 1Gbps to 40Gbps and beyond. That helps retain host CPU cycles for processing customer VMs, Microsoft says.

Remote Direct Memory Access is employed for the high-performance storage back-end to Azure.
Though SDNs and open source go hand-in-hand, there’s no open source software content in the Azure SDN. That’s because the functionality required for Azure was not offered through open source communities, Russinovich says.

“As these requirements were hitting us, there was no open source out there able to meet them,” he says. “And once you start on a path where you’re starting to build out infrastructure and system, even if there’s something else that comes along and addresses those requirements the switching cost is pretty huge. It’s not an aversion to it; it’s that we haven’t seen open source out there that really meets our needs, and there’s a switching cost that we have to take into account, which will slow us down.”

Microsoft is, however, considering contributing the Azure Service Fabric architecture to the open source community, Russinovich said. But there has to be some symbiosis.

“What’s secret sauce, what’s not; what’s the cost of contributing to open source, what’s the benefit to customers of open source, what’s the benefit to us penetrating markets,” he says. “It’s a constant evaluation.”

Some of the challenges in constructing the Azure SDN were retrofitting existing controllers into the Service Fabric, Russinovich says. That resulted in some scaling issues.
Resources

7 Critical Questions to Demystify DRaaS
“Some of the original controllers were written not using Service Fabric so they were not microservice oriented,” he says. “We immediately started to run into scale challenges with that. Existing ones are being (rewritten) onto Service Fabric.

“Another one is this evolution of the VFP and how it does packet processing. That is not something that we sat down initially and said, ‘it’s connections, not flows.’ We need to make sure that packet processing on every packet after the connection is set up needs to be highly efficient. It’s been the challenge of being able to operate efficiently, scale it up quickly, being able to deliver features into it quickly, and being able to take the load off the server so we can run VMs on it.”

What’s next for the Azure SDN? Preparing for more explosive growth of the Microsoft cloud, Russinovich says.

“It’s a constant evolution in terms of functionality and features,” he says. “You’re going to see us get more richer and powerful abstractions at the network level from a customer API perspective. We’re going to see 10X scale in a few years.”
Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Tuesday, 9 June 2015

Apple shows iOS 9's major upgrades, from multitasking to picture-in-picture

Apple shows iOS 9's major upgrades, from multitasking to picture-in-picture

Side-by-side apps, video overlays, and much more are coming to iPads when Apple's mobile OS releases this fall.

Major changes are coming to our iPads, from the way we select text, to the way we interact with our favorite apps and play videos.

Speaking at Apple's Worldwide Developer Conference on Monday, Senior Vice President Craig Federighi showcased an updated version of iOS 9 that included a few new features designed specifically with tablet users in mind.

Let’s start with QuickType, an enhancement to the iPad’s onscreen keyboard that includes new shortcuts and turns into a trackpad when you place two fingers on it. The trackpad can be used to select text, move objects around, and generally combine the convenience of touch controls and the precision of a mouse.

iPads will also get access to true, onscreen multitasking, which allows two apps to run side-by-side on the screen at the same time. The new feature, which Apple calls Split View, opens two resizable virtual windows on the screen. Users will be able to control each app independently, transferring information from one to the other using simple gestures, and quickly change the program running inside each panel using a brand-new app switcher. Note: While multitasking will work on most recent iPad models, Split View will be available only on the iPad Air 2.

Finally, a new picture-in-picture feature allows users to play a video from one app while using a different app. The video appears in a tiny window can be moved around, or even pushed temporarily off-screen to allow you to focus on your work while your favorite movie or game keeps playing along. The window also includes a set of simple controls that let you pause the video or close and dismiss it without leaving the current app.

The new iPad features will arrive with iOS 9 this fall, with a public beta program open to all starting in July.




Wednesday, 3 June 2015

Exam 70-412 Configuring Advanced Windows Server 2012 Services

Exam 70-412 Configuring Advanced Windows Server 2012 Services

Published: 17 September 2012
Languages: English, Chinese (Simplified), French, German, Japanese, Portuguese (Brazil)
Audiences: IT professionals
Technology: Windows Server 2012 R2
Credit towards certification: MCP, MCSA, MCSE

Skills measured
This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the relative weight of each major topic area in the exam. The higher the percentage, the more questions you are likely to see on that content area in the exam.

Please note that the questions may test on, but will not be limited to, the topics described in the bulleted text.

As of January 2014, this exam includes content covering Windows Server 2012 R2.

Configure and manage high availability (15–20%)

Configure Network Load Balancing (NLB)

Install NLB nodes, configure NLB prerequisites, configure affinity, configure port rules, configure cluster operation mode, upgrade an NLB cluster

Configure failover clustering
Configure quorum, configure cluster networking, restore single node or cluster configuration, configure cluster storage, implement Cluster-Aware Updating, upgrade a cluster, configure and optimise clustered shared volumes, configure clusters without network names, configure storage spaces

Manage failover clustering roles
Configure role-specific settings, including continuously available shares; configure virtual machine (VM) monitoring; configure failover and preference settings; configure guest clustering

Manage VM movement
Perform live migration; perform quick migration; perform storage migration; import, export and copy VMs; configure VM network health protection; configure drain on shutdown

Preparation resources
Managing Network Load Balancing clusters
Setting Network Load Balancing parameters
Failover cluster deployment guide

Configure file and storage solutions (15–20%)

Configure advanced file services
Configure Network File System (NFS) data store, configure BranchCache, configure File Classification Infrastructure (FCI) using File Server Resource Manager (FSRM), configure file access auditing

Implement Dynamic Access Control (DAC)
Configure user and device claim types, implement policy changes and staging, perform access-denied remediation, configure file classification, create and configure Central Access rules and policies, create and configure resource properties and lists

Configure and optimise storage
Configure iSCSI target and initiator, configure Internet Storage Name server (iSNS), implement thin provisioning and trim, manage server free space using Features on Demand, configure tiered storage

Preparation resources
Network File System
File Server Resource Manager
Dynamic Access Control: Scenario overview

Implement business continuity and disaster recovery (15–20%)

Configure and manage backups
Configure Windows Server backups, configure Microsoft Azure backups, configure role-specific backups, manage VSS settings using VSSAdmin

Recover servers
Restore from backups, perform a Bare Metal Restore (BMR), recover servers using Windows Recovery Environment (Win RE) and safe mode, configure the Boot Configuration Data (BCD) store

Configure site-level fault tolerance
Configure Hyper-V Replica, including Hyper-V Replica Broker and VMs; configure multi-site clustering, including network settings, Quorum and failover settings; configure Hyper-V Replica extended replication; configure Global Update Manager; recover a multi-site failover cluster

Preparation resources
Windows Server backup overview
Windows Recovery Environment (RE) explained
How to configure bare-metal restore/recovery media

Configure Network Services (15–20%)

Implement an advanced Dynamic Host Configuration Protocol (DHCP) solution
Create and configure superscopes and multicast scopes; implement DHCPv6; configure high availability for DHCP, including DHCP failover and split scopes; configure DHCP Name Protection; configure DNS registration

Implement an advanced DNS solution
Configure security for DNS, including Domain Name System Security Extensions (DNSSEC), DNS Socket Pool, and cache locking; configure DNS logging; configure delegated administration; configure recursion; configure netmask ordering; configure a GlobalNames zone; analyse zone level statistics

Deploy and manage IP Address Management (IPAM)
Provision IPAM manually or by using Group Policy, configure server discovery, create and manage IP blocks and ranges, monitor utilisation of IP address space, migrate to IPAM, delegate IPAM administration, manage IPAM collections, configure IPAM database storage

Preparation resources
Dynamic Host Configuration Protocol (DHCP) overview
Step-by-step: Demonstrate DNSSEC in a test lab
Holistic administration of IP address space using Windows Server 2012 IP Address Management

Configure the Active Directory infrastructure (15–20%)

Configure a forest or a domain
Implement multi-domain and multi-forest Active Directory environments, including interoperability with previous versions of Active Directory; upgrade existing domains and forests, including environment preparation and functional levels; configure multiple user principal name (UPN) suffixes

Configure trusts
Configure external, forest, shortcut and realm trusts; configure trust authentication; configure SID filtering; configure name suffix routing

Configure sites
Configure sites and subnets, create and configure site links, manage site coverage, manage registration of SRV records, move domain controllers between sites

Manage Active Directory and SYSVOL replication
Configure replication to Read-Only Domain Controllers (RODCs), configure Password Replication Policy (PRP) for RODC, monitor and manage replication, upgrade SYSVOL replication to Distributed File System Replication (DFSR)

Preparation resources
Deploy Active Directory Domain Services (AD DS) in your enterprise
Active Directory domains and trusts
Introduction to Active Directory replication and topology management using Windows PowerShell (Level 100)

Configure Identity and Access Solutions (15–20%)

Implement Active Directory Federation Services (AD FS)
Install AD FS; implement claims-based authentication, including Relying Party Trusts; configure authentication policies; configure Workplace Join; configure multi-factor authentication

Install and configure Active Directory Certificate Services (AD CS)
Install an Enterprise Certificate Authority (CA), configure certificate revocation lists (CRL) distribution points, install and configure Online Responder, implement administrative role separation, configure CA backup and recovery

Manage certificates
Manage certificate templates; implement and manage certificate deployment, validation, and revocation; manage certificate renewal; manage certificate enrolment and renewal to computers and users using Group Policies; configure and manage key archival and recovery

Install and configure Active Directory Rights Management Services (AD RMS)
Install a licensing or certificate AD RMS server, manage AD RMS Service Connection Point (SCP), manage RMS templates, configure Exclusion Policies, back up and restore AD RMS

Preparation resources
AD FS deployment guide
Active Directory Certificate Services overview
Deploy a private CA with Windows Server 2012






QUESTION 1
You are employed as a network administrator at ABC.com. ABC.com has an Active Directory
domain named ABC.com. All servers on the ABC.com network have Windows Server 2012
installed.
ABC.com has a server, named ABC-SR07, which is configured as a DHCP server. You have
created a superscope on ABC-SR07.
Which of the following describes a reason for creating a superscope? (Choose all that apply.)

A. To support DHCP clients on a single physical network segment where multiple logical IP
networks are used.
B. To allow for the sending of network traffic to a group of endpointsdestination hosts.
C. To support remote DHCP clients located on the far side of DHCP and BOOTP relay agents.
D. To provide fault tolerance.

Answer: A,C

Explanation:


QUESTION 2
You are employed as a network administrator at ABC.com. ABC.com has an Active Directory
domain named ABC.com. All servers, including domain controllers, on the ABC.com network have
Windows Server 2012 installed.
ABC.com has a domain controller, named ABC-DC01, which is configured as a DNS server. You
are planning to unsign the ABC.com zone.
Why should you unsign the zone?

A. To remove the zone.
B. To change the current zone type.
C. To add a new primary zone.
D. To create an Active Directory-integrated zone.

Answer: B

Explanation:


QUESTION 3
You are employed as a network administrator at ABC.com. ABC.com has an Active Directory
domain named ABC.com. All servers on the ABC.com network have Windows Server 2012
installed.
ABC.com has a server named ABC-SR01, which hosts the IP Address Management (IPAM)
Server feature. ABC.com also has a server, named ABC-SR02, which is configured as a DHCP
server.
You have been instructed to make sure that a user, named Mia Hamm, who belongs to the IPAM
Users group on ABC-SR01, has the ability to modify the DHCP scopes on ABC-SR02 by making
use of use IPAM. You want to achieve this without assigning Mia Hamm any unnecessary
permissions.
Which of the following actions should you take?

A. You should consider making Mia Hamm a member of the DHCP Administrators group on ABCSR02.
B. You should consider making Mia Hamm a member of the IPAM Administrators group on ABCSR02.
C. You should consider making Mia Hamm a member of the Local Administrators group on ABCSR02.
D. You should consider making Mia Hamm a member of the Domain Administrators group.

Answer: A

Explanation:


QUESTION 4
You are employed as a senior network administrator at ABC.com. ABC.com has an Active
Directory domain named ABC.com. All servers on the ABC.com network have Windows Server
2012 installed.
You are currently running a training exercise for junior network administrators. You are discussing
the DNSSEC NRPT rule property.
Which of the following describes the purpose of this rule property?

A. It is used to indicate the namespace to which the policy applies.
B. It is used to indicate whether the DNS client should check for DNSSEC validation in the
response.
C. It is used to indicate DNSSEC must be used to protect DNS traffic for queries belonging to the
namespace.
D. It is used to whether DNS connections over DNSSEC will use encryption.

Answer: A

Explanation:


QUESTION 5
You work as an administrator at ABC.com. The ABC.com network consists of a single domain
named ABC.com. All servers on the ABC.com network have Windows Server 2012 installed.
ABC.com has a server, named ABC-SR07, which has the AD DS, DHCP, and DNS server roles
installed. ABC.com also has a server, named ABC-SR08, which has the DHCP, and Remote
Access server roles installed. You have configured a server, which has the File and Storage
Services server role installed, to automatically acquire an IP address. The server is named ABCSR09.
You then create a filter on ABC-SR07.
Which of the following is a reason for this configuration?

A. To make sure that ABC-SR07 issues ABC-SR09 an IP address.
B. To make sure that ABC-SR07 does not issue ABC-SR09 an IP address.
C. To make sure that ABC-SR09 acquires a constant IP address from ABC-SR08 only.
D. To make sure that ABC-SR09 is configured with a static IP address.

Answer: B

Explanation: